tech trajectories robertson 2010

Upload: biccard7338

Post on 02-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 Tech Trajectories Robertson 2010

    1/10

    From societal fragility to sustainable robustness: Some tentative

    technology trajectories

    Lindsay J. Robertson*

    Professional Engineer (Mechanical), New Zealand

    Keywords:

    Technology

    Robust

    Fragile

    Dependence

    Supply-chain

    Capability

    Vulnerability

    Roadmap

    Society

    Collapse

    a b s t r a c t

    Centralization of production has allowed great increases to efciency, and specialization

    has allowed advances that would otherwise be almost impossible. But centralized

    production leads to long supply lines, and specialization causes decreased accessibility of

    alternatives; together these increase the consumersvulnerability to disruption of access to

    essential goods and services. Assessing these vulnerabilities and making at least prelimi-

    nary proposals for amelioration, is a topic of this paper. Initially, the functional needs of

    individuals are reviewed and classied. The paper then reviews and attempts to quantify

    the vulnerabilities associated with present approaches to meeting those needs. Having

    identied both specic vulnerabilities, and common factors associated with vulnerability,

    the paper then considers some general principles for increasing technological and social

    robustness. With vulnerabilities and indicative principles for improved robustness iden-

    tied, some coarse but illustrative technology trajectories are proposed.

    The paper covers a broad scope in limited detail: it is presented in the hope that real

    advance towards a more robust and decentralized sophistication can be encouraged. 2010 Elsevier Ltd. All rights reserved.

    1. Introduction

    1.1. Vulnerability described

    1.1.1. General

    There is an old adage that any city is three meals away

    from anarchy. Some slight exaggeration may be detected,

    but the plight of an urban apartment dweller is certainly

    severe when suddenly deprived of cash-dispenser, super-market, running water, sewage systems, power and

    communications.

    1.1.2. Centralization and specialization are associated with

    vulnerability

    A neighboring rural town expects a major earthquake in

    the foreseeable future. Ata public meeting to review disaster

    preparations, residents initially expressed condence in

    their communications security noting that Internet,

    landline, and cellular phones were available. Residentswere

    less condent when told that the communications for every

    one of these, plus the point-of-sale terminals and the

    Automatic Teller Machines were ALL carried via a single

    ber-opticcable. They might also havenotedthat almostthe

    entire communications volume depended upon one oper-

    ating system, one brand of router, TCP/IP protocols only,

    a single DNS system, and one of only two undersea cablesconnecting to the rest of the world. [1]. Predictions of the

    collapse of nancial systems were made before the new

    millennium, but the events starting with the American

    mortgage issues in 2007 have reminded us of how central-

    ized, interconnected and ubiquitous our nancial systems

    are. Financial products designed (badly) in USA cause

    business failures in Dunedin, and individualbankruptcies in

    Cape Town. Citizens with few options for storing their

    savings deposited them with reputable nancial institu-

    tions only to nd that their savings had vanished! Our

    centralized systems for distributing goods is dependent on* Tel.: 64 21 240 6863.

    E-mail address: [email protected].

    Contents lists available atScienceDirect

    Technology in Society

    j o u r n a l h o m e p a g e : w w w . e l s e v i e r . c o m / l o c a t e / t e c h s o c

    0160-791X/$

    see front matter

    2010 Elsevier Ltd. All rights reserved.doi:10.1016/j.techsoc.2010.10.012

    Technology in Society 32 (2010) 342351

    mailto:[email protected]:[email protected]://www.sciencedirect.com/science/journal/0160791Xhttp://www.elsevier.com/locate/techsochttp://dx.doi.org/10.1016/j.techsoc.2010.10.012http://dx.doi.org/10.1016/j.techsoc.2010.10.012http://dx.doi.org/10.1016/j.techsoc.2010.10.012http://dx.doi.org/10.1016/j.techsoc.2010.10.012http://dx.doi.org/10.1016/j.techsoc.2010.10.012http://dx.doi.org/10.1016/j.techsoc.2010.10.012http://www.elsevier.com/locate/techsochttp://www.sciencedirect.com/science/journal/0160791Xmailto:[email protected]
  • 8/10/2019 Tech Trajectories Robertson 2010

    2/10

    transportfuel yet most countrieshavefew if any sources of

    crude oil, few ports capable of ofoading tankers, perhaps

    only a single renery, storage of less than 90 days, and long

    fuel distribution chains[2]. The very high market share of

    one computer operating system and software bundle has

    allowed relatively simple exchangeability of documents in

    theshort-term,but causesusers to be locked in to facilities

    that will inevitably be deemed obsolete: This creates

    a signicant risk that information will be lost in the medium

    term as these proprietary systems cease to be supported.

    Electricity is the most ubiquitous energy carrier for

    stationary applications; Centralized power generation has

    minimized costs but at the expense of long distribution

    paths, and power grids that require progressively more

    stringent measures to remain stable.

    We can remember that whenever a monoculture

    thrives, there is increased risk of an explosion of those

    who prey on it: The increased efciencies of production

    that have allowed Homo sapiens to increase, have also

    resulted in our increased dependence on a progressively

    optimized but less diverse food sources, e.g. Rice, wheat,

    corn, potato, sheep and cattle. We have already seen

    evidence of threats (the Ug99 strain of the killer wheat

    fungus, potato blight), and know of the potential for yet-to-

    emerge insect, bacterial and viral threats. This principle is

    not limited to our food sources: H. sapiens is one of the

    largest monocultures, and direct threats to our species

    include old diseases e.g. smallpox, plus emergent diseases

    e.g., a mutated H5N1 inuenza virus and potentially

    many other natural and unnatural pathogens.

    1.1.3. Vulnerability widely recognized

    Societal vulnerabilities are recognized quite widely

    academic writers [3,4] have explored particular aspects,

    novelists have based apocalyptic works upon them, and one

    suspects that think-tanks have produced, but never pub-

    lished, analyses of national vulnerabilities. It is also reason-

    able to suggest that the rise of survivalist cults, back to

    nature and self-sufciency movements, are each reec-

    tions of a poorly-articulated awareness of societal fragility.

    1.1.4. Vulnerability through lack of responsiveness

    The centralized creation of consumables, and their

    distribution, are generally only efcient when broad-

    reaching polities of law and commerce were also stable:

    That stability has almost intrinsically reduced the speed

    of adaptation. A topical example may be seen in the

    greenhouse gas reduction negotiations: Our production

    systems promote global warming yet precisely because of

    the lack of adaptability of these centralized systems,

    proposals to reduce greenhouse gases become mired in

    a morass of competing interests and arguments.

    1.1.5. Social effects

    The focus of this paper is on technical issues of societal

    fragility caused by centralization, specialization and inter-

    connectedness of supply chains: There are also, however,

    important sociological issues that arise from the same

    phenomena: Simplistic economic theory proposes that

    competition will control the abuse of market power but

    centralization and specialization are inherently trends

    towards decreased real competition and one can readily

    observe examples where centralized and specialized

    services experience little real competition. Whenever

    consumers are highly dependent on the availability of

    particular goods and services, the suppliers acquire

    considerable power to dictate prices, terms and conditions.

    The tendency for large monocultures to encourage natural

    predators has been mentioned already, and large concen-

    trations of people and centralized infrastructure certainly

    offer juicy targetsfor those intent on destruction. Tainter

    [5] argued that the societies collapse when the costs

    of maintaining the society exceed the marginal benets

    to citizens: he envisioned that cost would be counted

    in terms of taxation and bureaucratic overhead; but

    distasteful invasions of privacy, constraints on freedom and

    burdensome legislation to control the predatorsare also

    signicant costs.

    1.1.6. Gains and costs

    It would, however, be naive to ignore the societal

    advances that have been made possible by optimized,

    specialized, and centralized capabilities: Life expectancy

    has improved with better food production[6]; healthcare

    has improved, infant mortality has decreased, and our

    lives have been enriched by access to knowledge, culture

    and communication. Few would willingly sacrice these,

    despite a wish for greater robustness. Technical advances

    have also included the development of acceptable

    methods of restraining population growth (thus avoiding

    Malthus predictions [7]) and possible methods of

    reducing further environmental damage: these should not

    be under-valued.

    1.2. Dening an issue

    Stated simply, while centralization and specialization

    have allowed goods and services to be produced with

    unprecedented efciency, the precise corollary has been

    vulnerability to disruption of the central creation and

    distribution facilities, and to the facilities for the re-

    centralization of wealth. The best of both worlds is

    a theme of this paper.

    1.3. Lessons from history

    Tainter, Diamond[8] et al. do not speak of the failure

    of individuals to survive, or the failure of species to

    survive. Both of these authors analyze historical exam-

    ples of the Collapse of SOCIETY, i.e., the process

    by which individuals existence changes from that of

    a specialized contributor within an interconnected and

    specialized societal structure, to a self-dependent exis-

    tence at some lower state of sophistication. Tainter has

    asserted that societies become prone to collapse when

    the incremental costs of maintenance outweigh the

    benets to the individual. Diamond basically asserts that

    societies collapse when natural resources are mis-

    managed. These authors do essay denitions of society

    and to a lesser degree denitions of collapse but the

    lack of granularity in the terminology masks important

    issues.

    L.J. Robertson / Technology in Society 32 (2010) 342351 343

  • 8/10/2019 Tech Trajectories Robertson 2010

    3/10

    1.4. Dene the goal

    When authors describe a more-or-less-signicant event

    triggering a collapse of society, they articulate an example

    of what chaos-theorists identify as a move from one

    attractorto another[9].

    Both Tainter and Diamond imply that two attractors

    represent the only stable states for society; i.e., a highly

    centralized, hierarchically-controlled nation/state, and

    a primitive state in which small groups exist at a survival/

    subsistence level.

    One could posit many societal states(nomadic groups

    with clan bonds, or ideologically homogenous groups),

    and examples of some exist (Roma) but most such

    struggle to survive, and remain vulnerable. This paper

    proposes that there could be a stable form of society that

    is decentralized, robust, and advancedor sophisticated

    and that sometime considerably before collapseit will

    become equally desirable to choose such a decentralized

    existence with minimal loss of utility. The general tech-

    nical underpinnings of such a robust and decentralized

    sophistication, are the theme for this paper. The charac-

    teristics of such a decentralized society would probably

    include;

    a) Socially-optimum sized groups existing with high

    levels of independence

    b) Groups capable of meeting sophisticated needs from

    internal resources

    c) Groups able to generate further advance, by forming ad-

    hoc task-oriented groupings (without creating the

    vulnerabilities of permanent hierarchical structures)

    1.4.1. Technical goal

    Building on a proposed classication of the needs and

    vulnerabilities of society, a process of functional specica-

    tion can suggest the generic technological capabilities that

    would contribute most to the decrease of present vulner-

    abilities while continuing to meet functional needs.

    1.4.2. Non-technical goals

    Dunbars[10]number (about 150) is frequently quoted

    as the sociologically ideal community size. The disparity

    between this number and the size of present city-states

    makes it hardly surprising that sociological problems as

    well as the technical vulnerabilities are seen. Should it

    become technically possible to adequately meet advanced

    needs, within smaller people-groupings, then a social as

    well as a material advance is possible.

    2. Methods

    2.1. Codication and ranking of needs

    If personal/societal needs are dened strictly within

    the current norms, then an assessment of vulnerabilities is

    likely to be supercial, and only a very constrained set of

    alternatives is likely to present. If, however, needscan be

    dened in rather more functional terms, then it is more

    likely that vulnerabilities can be identied and quantied,

    and it is also more likely that alternative solutions can be

    identied. A functional denition of needs will also allow

    us to assess the value of alternative approaches to meeting

    real needs.

    2.2. Indices of vulnerability

    As with terms like collapse, vulnerability is an

    imprecise term: By dening a Vulnerability Index (VI) and

    evaluating it for current approaches to fulllment of

    various needs, it will be possible both to rank the signi-

    cance of various vulnerabilities and to determine, at least to

    a low level of precision, whether a proposed change

    decreases or increases vulnerability. Even if the numerical

    values of such a Vulnerability Index have very low

    precision, they will be useful if the index is dimensionless

    and if the algebraic relationship of the components is

    basically correct.

    2.3. Principles of robustness

    Having established an index by which specic vulner-

    abilities can be assessed, this paper will use the format and

    the components of that index to suggest principles for

    improving robustness.

    2.4. Technology trajectories

    When needs have been dened functionally, and the

    components of current vulnerabilities have been described,

    then technological solution-spaces for improved robust-

    ness can be considered. Each functional specication for

    a technological capability can then be characterized

    according to its present developmental status, and its

    developmental requirements. Collectively, these assess-

    ments outline a trajectory or path (but not a roadmap),

    towards improved robustness.

    3. Results

    3.1. Establish a hierarchy of needs

    Vulnerability is a very imprecise term: and begs

    questions of what is at risk, and what is the signicance

    of the potential deprival? To codify and quantify human

    and societal vulnerability, it is useful rst to list, then to

    categorize and rank, our individual and societal needs. The

    listing will help to dene what is at risk, and the catego-

    rization will help to assess the signicance of the at risk

    items. A commonly-referenced hierarchy of human needs is

    that proposed by Maslow [11]. Briey, the need-levels

    identied by Maslow are 1) Physiological (homeostasis).

    2) Safety (personal, nancial etc predictability and secu-

    rity).3) Loveand belonging (friendship, intimacy, family). 4)

    Esteem/belongingness (of peers). 5) Need to know and

    understand (curiosity, exploration). 6) Aesthetic needs

    (beauty). 7) Self-actualization (to reach ones potential) and

    8) Transcendence (aspiration to that beyond oneself).

    Maslows list has a curious granularity: Maslow s rst

    need is very broad, and must be subdivided for the

    purposes of this paper. Maslow gave the title of safety

    to his second need; the description suggests that titles

    L.J. Robertson / Technology in Society 32 (2010) 342351344

  • 8/10/2019 Tech Trajectories Robertson 2010

    4/10

    such as predictabilityor orderlinessmight have been

    better, and would certainly have avoided confusion with

    the concept of protection from personal danger. Safety,

    in the sense of avoidance of personal danger is clearly

    a need that takes precedence over the need for food,

    water and shelter a person will survive many days

    without the latter, but danger must be avoided immedi-

    ately. Items 3 to 8 of Maslows list are personal (though

    their realization has technological implications), and

    represent quitene subdivisions. Nevertheless, Maslows

    hierarchy can be adapted to develop a list of personal/

    societal needs that can then be grouped into categories

    which are somewhat more technologically oriented.

    Table 1 shows the proposed adaptation, listing both

    functional needs and groupings that represent broadly

    dened levels of societal sophistication.

    3.2. Analysis of vulnerability

    3.2.1. Types and signicance of vulnerabilities

    Two particular types of vulnerability can bedistinguished:

    a) Cascading failures caused by sensitive dependence on

    initial conditions. ..For the lack of a nail the horse was

    lost, for lack of a horse the battle was lost.., or .one

    ap of a seagulls wings could change the course of

    weather forever.. Some vulnerabilities do arise from

    single causes: the introduction of cane-toads to

    Australia, the possibility of an oil-renery explosion on

    an island state dependent on only one such facility, or

    the publication of a simple crack to the encryption

    system used for all internet banking transactions. Chaos

    theory uses the terminology extreme sensitivity to

    initial conditionsto describe this category.

    b) Multi-level, common-mode failures. This type of vulner-

    ability arises where a highly interconnected network/

    system of nodes (all having different functions) each

    depend on a common resource (perhaps energy, or

    personnel). In such a system, if the common resource is

    affected (e.g., plague strikes personnel at all levels of

    distribution chain), the whole system may collapse.

    High vulnerability levels can be expected to be linked to

    capabilities that affect ALL levels of multi-stage creation

    Table 1

    A hierarchy of needs.

    Title, and closest

    correspondence to

    Maslows need-level

    Description of need Timeframe to

    consequences,

    if need unmet

    Components of need

    Safety Avoid immediate death

    or permanent injury

    Secondsdays Capacity to survive major accident or

    natural disaster

    Protection from accidental or purposeful injury

    Physiological

    (Maslow-1)

    Physiological needs

    for continuation of life

    Daysmonths Water

    Nutrition

    Shelter

    Waste disposalTransport fuel

    Generational continuity

    (Maslow-2 & 3)

    Generational continuity of life

    Familial cohesion and stability

    Basic information storage

    Basic communication

    Monthsyears Maintain ability to provide for physiological needs

    Ability to safely bear and raise children

    Develop and apply basic healthcare

    Financial services

    Record and access basic information

    Communicate basic information to others

    Communal

    (Maslow 4,5&6)

    Avoid collective health failures Years Avoidance or diseases (plagues) that would

    severe limit life or capability

    Important information and

    capabilities must be retained

    across generations.

    Diagnosis of medical conditions (applied

    to people, and also to essential animal

    and plant crops)

    Long-term maintenance of

    community facilities

    Information must be retained (i.e., recorded)

    in a means that can be found, analyzed,

    and communicated to others, across generations.

    Need to acquire basic materials to support

    individual needs and infrastructure/equipment repair

    Capacity for repair of basic equipment.

    Developmental

    (Maslow-7,8)

    To know, to understand,

    and explore;

    Years to few-decades Capacity to measure, sense and explore the

    extra-communal world and to

    acquire/manufacture the sensors

    To nd self-fulllment, to

    realize ones potential;

    Capability to form structured and functional

    (ad-hoc) collaborations.

    Capability to marshal (physical and intellectual)

    resources to allow goals that are beyond the

    resources of the individual sociological grouping.

    L.J. Robertson / Technology in Society 32 (2010) 342351 345

  • 8/10/2019 Tech Trajectories Robertson 2010

    5/10

    and delivery systems e.g., personal (collective health,

    food, air, water, security) needs and productivity needs

    (nance, energy). Other needs such as raw materials,

    knowledge, and enabling-equipment are commonly

    specic to particular steps.

    3.2.2. A metric for vulnerability

    It has already been noted that vulnerability is

    a loosely-dened term, and qualiers such as highly

    contribute little additional precision. A Vulnerability

    Index offers one approach to quantication, and

    contributes to more precise denition both by the alge-

    braic terms and the algebraic construction used. If the

    algebraic form of a Vulnerability Index encourages a wide

    numerical spread when evaluated, and if the form gener-

    ates a dimensionless evaluation, then the index is more

    likely to be useful.

    The following denition is proposed for a signed

    Vulnerability index(VI):

    VINeed SF Ta Td=Tc

    Where: SF is the scale factor, the number of persons

    affected by the failure of a single means for supplying

    a current need; Ta is the time for consumer to access

    a functional alternative;Tdis the time-to-depletion for the

    accessible reserve, OR the Mean Time Before Failure

    (MTBF) of local capacity;Tcis the time from complete loss

    of functionality, to dened consequence.

    3.2.2.1. VI terms and parameters. For an adequate result, the

    need parameter should be dened functionally; other-

    wise the assessment of the time required to source an

    alternative will not identify a useful value. The terms in the

    proposed VI are certainly not precise and further work isplanned to clarify them, however for the purposes of this

    paper, the terms are described as follows:

    3.2.2.2. Scale factor. This is a crude metric of the scale of the

    deprivation caused by a single event and hence it is also

    a crude measure of the degree of centralization of the

    service that is at risk.

    3.2.2.3. Access to functional alternatives. If a functionally

    equivalent, alternative and independent means of

    supplying a specic need is accessible, the effect will be to

    decrease the VI. The VI as proposed takes no account of the

    degree to which the need is met; hence access to a sloweror poorer-quality alternative (a graceful retreatpath) still

    allows the signed index to decrease.

    3.2.2.4. Reserve depletion time, or MTBF. Where a natural

    resource becomes exhausted, the time tond alternative is

    very large: for such cases the index will become high

    (aligning with Diamonds conclusions). For needs that

    involve an effectively inexhaustible resource, then the VI is

    low. If the need is a service that is dependent on some

    technological component, then increased MTBF lowers the

    VI. In a case where a resource is consumable and has negli-

    gible storage potential (e.g. mains electricity or the contents

    of a cars petrol tank), then the VI will generally be large.

    3.2.2.5. Time-to-consequence. If the time to signicant

    consequence is small, a large VI is evaluated.

    3.2.3. Description of functional needs, and current vulnerabilities

    With functional denitions of needs (categorized into

    hierarchical levels) and at least a crude metric for vulnera-

    bility, it is now possible to review the current methods by

    which these needs aremet, andthe associated vulnerabilities.

    3.2.3.1. Safety. The currentsolution toavoidingdeathdueto

    accident or assault emphasizes risk avoidance or risk deter-

    rence. Should these approaches fail, the time elapsing before

    serious consequences is very short (seconds or minutes). A

    highlycentralizedsociety is unable to provide a responseto an

    individual safety need (injury/assault) in a timeframe less

    than a large fraction of an hour: The vulnerability for an

    individual is high, butthe societal VI is only moderatebecause

    the numbers affected by an event are generally small.

    3.2.3.2. Physiological survival. Physiological needs are

    commonly met by consumer use of centralized nancialservices, (and electronic communications) to purchase

    goods that have been manufactured at a distance (in

    serviced and maintained centralized facilities) and

    distributed to retail centres. This approach creates a curi-

    ously bi-modal VI; The time-to-consequence from fail-

    ures to supply this needis of the order of a few days, and

    over that time period storage of food and water is quite

    feasible implying a low VI. However, if a major supply

    failure occurred, many months would be required to

    establish a genuine alternative, and hence a high VI is

    evaluated for that timeframe.

    Consumer nancial services present a very high

    vulnerability because consumers store very small amountsof wealth, consumer-level failure of centralized nancial

    systems affect large numbers, and there are no accessible

    alternatives. Housing materials are durable and many

    alternatives exist so these do not contribute large vulner-

    ability except in short-term, localized cases such (e.g., in the

    aftermath of an earthquake). City-scale sewage systems are

    common but functional alternatives could be arranged in

    a short timeframe, so the VI is low. Food distribution is

    dependent on transport fuel, equipment and infrastructure

    and transport fuel has a high VI due to lack of alternatives

    and limited storage capability. Vulnerability to loss of

    electrical energy for cooking is moderately low because

    alternatives are accessible. (Gas bottles in short-term,biomass in longer term). We can therefore assign a low VI

    to physiological needs for the short-term, and a high VI for

    the longer term.

    3.2.3.3. Generational. To have a high probability of species/

    generational/genetic survival, needs in addition to the

    physiological needs of individuals become signicant: A

    minimum breadth of gene-pool is needed, and children

    must not only be raised to the age of self-sufciency, but

    equipped with the minimum skills and knowledge to

    survive and raise their own children. Basic healthcare is

    essential to meeting this need and healthcare follows

    a very strong law of diminishing returns against effort.

    L.J. Robertson / Technology in Society 32 (2010) 342351346

  • 8/10/2019 Tech Trajectories Robertson 2010

    6/10

    Nutrition, basic hygiene, sewage treatment and the avoid-

    ance of waterborne and food-borne disease are by far the

    largest contributors to societal health. Recognition of this

    principle has, for example, allowed Cuba to achieve health

    indicators better than many wealthier countries. At this

    need-level, basic information-recording is required but

    only at the level which can be provided by oral history and

    local information sources.

    3.2.3.4. Communal. Once the needs for generational/

    genetic survival are provided, it is possible for communi-

    ties, in the commonly accepted denitions of the term, to

    develop. Stable communitieshave needs beyond those of

    extended and multi-generational families: Societal health

    needs are presently met by centralized heath services for

    people, and also for essential animal and plant crops. The

    diagnosis and treatment of disease (i.e., where disease

    prevention has failed) has a particularly high VI, since the

    facilities that actually make original diagnoses, and that

    discover and/or design the active ingredients of drugs, are

    highly centralized. While stockpiling of limited ranges of

    medicines is possible in the short-term, this is not viable for

    the longer term, and by denition stockpiling cannot work

    for newly emerging conditions. The VI associated with

    health failure due to disease, is increased by the very large

    numbers that are potentially affected. Perhaps counter-

    intuitively, many medical procedures do not have a high

    VI. Procedures such as surgical removal of an appendix

    have been carried out by untrained persons under remote

    instruction and presumably this principle could be

    extended in case of sufciently urgent need. Communica-

    tion and information needs (for example, weather reports

    for shermen, drought predictions for farming, and accu-

    mulated wisdom for health workers) also become highly

    signicant in this timeframe. Present approaches to

    communication are sophisticated yet have high V.I0s

    because the time to access any functional alternative is

    long, there are few graceful retreat paths, and large

    numbers of people are affected within a short time (e.g.

    whole countriesinternet access affected by poisoned DNS

    servers). There are few functional alternatives to present

    information storage systems (hard disk storage), due to lack

    of standardization and lack of graceful retreat paths

    however the time-to-depletion (MTBF) is comparatively

    long. Most current communication and information storage

    facilities require low-voltage DC electricity which pres-

    ents a moderate vulnerability at present due to the number

    of people affected by reticulated power failures, lack of

    long-term storage technologies, and the low uptake of

    accessible alternatives. Equipment and facility mainte-

    nance needs (e.g. for food production) become signicant

    in the timeframe associated with this need-level, and show

    vulnerability associated with the lack of capacity for

    replacement/refurbishment of components and infra-

    structure. The capacity to measure, sense and explore the

    external world (in its most general sense) has a low VI:

    Most of the requisite technology is durable and much

    equipment capable of supporting cognition can be created

    under a decentralized model (home-made microscopes

    and telescopes), hence the time to access alternatives is not

    high compared to the MTBF.

    3.2.3.5. Developmental/extension. Our developmentalneed

    is currently (partially) met by our capability to marshal

    physical and intellectual resources from a wide range of

    sources, and to funnelor concentratethese to a point of

    application, thus allowing goals that are beyond the resources

    of the individual or small group. Present approaches to meet

    the need for development or extension have a high VI due to:

    a) The high VI of present nancial systems, and

    b) Our monarchical and hierarchical polity, whereby we

    depend on centralized systems of (commercial/contractual

    and criminal) law and associated enforcement capabilities.

    Without an underlying contractual or legal framework, the

    processof concentratingand dispersedresources is difcult.

    c) Dependence on vulnerable information storage and

    transmission modes.

    3.2.4. Evaluation of Vulnerability IndicesThe terms in the VI are not simple to evaluate, and

    different assumptions will produce ranges of values.

    Nevertheless by assigning Hto VIs over a million, Lto

    values below one thousand and Mto others, distinctions

    are stable across a range of assumptions.

    The (coarse) VI evaluations, associated with the each

    functional need are listed inTable 2.

    3.2.5. Notes on VI evaluations

    Some general observations on the VI evaluations

    include:

    a) Specialized GOODS generally do not have high VIvalues, since their MTBF is long compared to the time-

    to-source-alternatives. To quote but one example, the

    microprocessors in the Voyager spacecraft have func-

    tioned for 30 years in a harsh environment this

    timeframe is long compared to the construction time

    for an RCA 1802 fabrication plant. Specialized goods

    only cause high VIs when there is a low level of stan-

    dardization, and no graceful retreat capability.

    b) Long supply chains for services and consumables cause

    the highest VI values because the depletion time for

    consumer reserves is short compared to time required

    to access alternatives.

    c) Multi-level common factors (personal health, energy,information, and communications) cause high VIs.

    d) The process of de-centralizing (distributing) goods and

    services has a mirror image the process of accumu-

    lating and re-centralizing nance. Centralized nancial

    systems have a very high VI.

    3.3. Principles for robustness

    Reviewing the effects of each term in the VI, shows that

    robustness may be increased, and vulnerability decreased,

    by any of the following approaches:

    a) Partitioning the risk, to reduce scaling factors.

    L.J. Robertson / Technology in Society 32 (2010) 342351 347

  • 8/10/2019 Tech Trajectories Robertson 2010

    7/10

    Table 2

    Technology specication and assessment.

    Functional specication of

    capability, to meet need

    VI Illustrative technologies, capable

    of meeting functional specications

    Tech. Status

    Safety

    Immediately available means

    of surviving natural disasters,

    and preventing injury due to assault

    M Many available 8

    Physiological

    Collect and sterilize water within a days M Various water treatment technologies 7

    Hygienically deal with sewage, after a few days M Several, including composting toilet 7

    Continuous production of nutritionally adequate food locally,

    on small-scale, within a few days.

    H Algaculture, others 3

    Capability to retain body warmth, within hours L Many available 8

    Capability to make/obtain shelter within days L Many available 8

    Means by which individual can securely hold personal wealth,

    and transparently carry out transactions, without centralized

    banking services

    H No technology meets this requirement at present 3

    Access usable energy (cooking and heating) within days/weeks.

    Functionally this implies technology for energy storage

    and concentration.

    M Biomass energy is simple, but is not versatile,

    and has long access times.

    8

    Energy for currently available ICEs H Macro-algae oil, H2 on demand 3

    Generational continuity & community

    Avoidance of widespread death from

    quick-onset disease (pandemic)

    H Risk partitioning 7?

    Diagnose human,

    food-animal & crop illness

    H Lab-on-chip 4

    Create treatments for human, food-animal & crop illness H General-purpose chemical synthesis. 3

    Enable competent but untrained local practitioner

    to carry out simple procedures (childbirth,

    broken-bone setting??)

    M Durable, robust information storage 6

    General-purpose manufacturing capability (probably

    for limited number of materials)

    M General-purpose manufacturing 5

    Local capability for creating (limited range of)

    metals, plastics

    L General-purpose materials creation 5

    Local capacity (skills, equipment, materials) to maintain

    basic infrastructure (pipes, roads), perhaps with

    reduced functionality

    M Many available 7

    Fully developed ad-hoc, peer-to-peer communication system. H Robustcommunications 5

    DC power for communications, information H Seebeck effect, solar PV etc 7

    Long-term high-density storage media H Durable, robustinformation storage 6

    Graceful retreat alternatives to exiting information

    storage systems

    M See above 4

    Creation/maintenance of basic sensor (telescope, microscope,

    barometer, clock)

    L Knowledge of manufacture requirements,

    general-purpose manufacturing

    7

    Long-term high-density storage media 4

    Local capacity to create transport fuel, maintain basic

    infrastructure

    H Macro-algae oil 3

    Developmental

    Need is for a scalable politythat would allow ad-hoc groups

    to assemble for a purpose, to marshal resources for a goal,

    regulate their activities in a pre-agreed manner, and then

    to disband amicably.

    M Robust and scalable polity 3

    Ad-hoc,peer-to-peer communication system. M (See above communication) 5

    L.J. Robertson / Technology in Society 32 (2010) 342351348

  • 8/10/2019 Tech Trajectories Robertson 2010

    8/10

    b) Raising the accessibility of alternatives. Where a product

    has many processing steps and each has a proprietary

    intermediate product, access to alternative suppliers at

    intermediate production points is denied. Conversely,

    when all of the intermediate processing steps have well-

    standardized and openly-specied intermediate prod-

    ucts, alternatives are possible at each intermediate stage.

    The most important approach to improving the accessi-

    bility ofalternativesis by promoting standardization of

    intermediate products. This concept could be rened

    mathematically, however a descriptive approach is

    sufcient for this paper.

    c) Bringing production of services and consumables

    (which have small or no storage capability) close to the

    point of consumption, and bringing storage capacity for

    those goods/consumables as close as possible to the

    point of need. In practice this means both selecting

    technologies that make local storage possible, and

    applying effort to developing alternative technologies

    for cases where signicant storage is presently not

    practical.

    d) Enabling scalable, ad-hoc networks and association

    models, and avoiding rigid dendritic service models.

    This is an issue that is related as much to sociology as to

    technology, yet is a key to the development of a less-

    centralized society.

    Modifying the value of factors of a VI will reduce the VI,

    but this may actually have limited signicance if the VI is

    low initially! Since the VI of a complete need-level (see

    Section3.1) corresponds to the highest VI for each of the

    needs in that level, it is clear that rate-of-progress towards

    robustness will be improved if the highest-evaluated VI s

    for each need-level are addressed rst.

    3.4. Technology trajectories

    Ambitious goals are normally achieved by carefully

    dening outcomes, then systematically addressing

    components. In this case, goals are only loosely dened and

    it is enough to suggest some initial trajectories rather

    than propose a roadmap.

    3.4.1. Technology characteristics linked to robustness

    Having dened societal needs functionally, and

    described both current vulnerabilities and general

    approaches to increasing robustness, it is now possible to

    consider some examples that illustrate how functional

    qualities (specications) of a technology improve supply

    robustness for the user.Table 2provides some illustrative

    examples It is likely that time and experience will suggest

    alternatives and improvements, but the illustrations may

    be useful.

    Technologies that would increase self-reliance and

    promote individual survivability exist, but are commonly

    restricted by problematic security concerns; similarly,

    defensive technologies are readily available, and objections

    tend to be based on emotive and political arguments rather

    than statistics [12]. Algaculture is an example of a tech-

    nology that addresses specic vulnerabilities (long supply

    chains and long production lead-times) associated with

    current approaches to both food and liquid fuel supply [13]

    Oil-rich algae strains are already under development, but

    food strain development has far to go. Other illustrative

    qualities of this technology include its relatively simple

    technology needs, scalability, exibility and the very short

    (days) grow/harvest cycle. Another exemplar (illustrating

    durability, simplicity and scalability) energy source is the

    H2on demandapproach, in which water is metered onto

    a reactive metal (Li, Ca, etc) [14] to release hydrogen. A

    sustainable cycle is achieved by chemical reduction of the

    metal oxide. At present there is no robust means by which

    individuals can securely hold personal wealth and trans-

    parently carry out transactions, without centralized

    banking services: this is a major vulnerability for which

    technological solutions are not presently available. Small-

    scale, semi-automated chromatography and diagnostic

    capabilities such as the lab on a chip technologies[15]

    already illustrate the general feasibility of decentralized

    and general-purpose analysis/diagnostic capabilities.

    General-purpose and semi-automated synthesis facilities

    for bio-actives (pharmaceutical or avoring) have also been

    described: by using automated sequencing of basic chem-

    ical unit-operations[16].Ranges of synthesis are possible,

    and illustrate the realistic possibility of a decentralized and

    highly exible synthesis capability.

    At a larger scale, small and general-purpose

    manufacturing facilities (Micro factories [17]) have been

    proposed and general-purpose machining facilities using

    either abrasion or Electro-discharge Machining [18]

    already exist. These examples, plus concepts such as

    Rapid Prototyping, micro-foundries, and solar pyro-

    metallurgy [19], illustrate the realistic possibility of

    decentralized and exible fabrication. Durable information

    storage, in the form of rock carving, has existed for

    millennia, but approaches such as that proposed by the

    Rosetta project [20] illustrate the practicality of dense,

    large-scale and durable information storage for true

    robustness a corresponding means ofstoringinformation is

    required, as is a means of reading such information back

    into data processing equipment. The components for

    robust, decentralized communication systems are available

    now, and some approaches[21]can be illustrated. A robust

    and fully decentralized communication system seems

    a realistic goal. Some general principles for the develop-

    ment of a decentralized and scalable polity exist (e.g.. codes

    of human rights, rules for arbitration, and templates for

    contracts), but there are huge obstacles to implementation.

    3.4.2. Technology development priorities

    Table 2 links an assessment of vulnerability to the

    current status of technology options for each need-level.

    The table lacks detail and offers illustrative examples only,

    but the correlation is presented in the hope of illustrating

    priorities for technology development. Technology status is

    characterized as:

    1. Scientic principles unknown (e.g. anti-gravity)

    2. Scientic principles known

    3. Technology required to create components is known

    L.J. Robertson / Technology in Society 32 (2010) 342351 349

  • 8/10/2019 Tech Trajectories Robertson 2010

    9/10

    4. Proof-of-concept examples exist

    5. Components have been created at laboratory-scale

    6. Laboratory demonstrations of assembled components

    have been made

    7. Prototype available

    8. Consumer-usable examples exist, with infrastructure for

    repair and modication

    4. Discussion and conclusion

    4.1. Risks and predictions

    Risk is commonly associated with probability, but

    when the timeframe is sufciently long the outworking of

    a vulnerability is very likely to occur sometime and

    so this paper has taken a different approach to that of

    Taleb [22] and Posner [23]. A detailed risk analysis may

    certainly rene the admittedly coarse assessments pre-

    sented here.

    4.2. Feasibility and desirability

    The exercise of indicating technology directions

    (trajectories), has shown that for many capabilities that

    would increase robustness, technological solutions are

    either in existence or are foreseeable. Other capabilities

    such as short lead-time food production, are foreseeable,

    but are not close to being available. For other cases, high

    vulnerability and lack of technologically mature solu-

    tions suggests both a trajectory, and a long path to the

    target!

    4.2.1. Counter-intuitive conclusions

    While some technologies (integrated circuit manufac-

    ture) are only feasible at highly specialized facilities, such

    technologies are generally capable of multi-decade dura-

    bility so it seems reasonable to suggest that these could

    be re-created using ad-hoc associations, without creating

    vulnerabilities.

    Transport is inextricably linked to centralization so as

    production is decentralized the vulnerability associated

    with transport (and fuel etc issues) decreases.

    4.3. Drivers and moderators

    That societies have historically collapsed is beyond

    doubt and all who have studied such collapses have asked

    could our society collapse? It seems presumptuous to

    assume that todays society has evolved past the point

    where collapse is possible.

    Some unpalatable possibilities include:

    a) A reversion to anarchic groups living at the Personal- or

    Generational-survival level,

    b) The vulnerability arising from un-restrained centrali-

    zation and specialization of production

    c) The multitude of constraints that are commonly

    considered necessary to avoid the consequences of

    vulnerability.

    These are thedrivers for change: the moderator is the

    observation that centralized and specialized production

    offershighefciencyand lowcost andhas not collapsed yet!

    4.4. Technology directions (trajectories) towards robustness

    Since many aspects of society currently involve central-ized sources of supply, a change from centralized to distrib-

    uted society requires not one, but many changes. For any

    change to occur, the technical opportunity for change must

    exist, barriers must be removed, and a trigger is usually also

    needed. This paper makes an initial attempt to correlate

    present vulnerabilities with the status of corresponding

    technical capabilities: together these suggest technology

    trajectories that have reasonable potential. Amongst the

    high priority needs identied, there are those for which:

    a) Technical solutions are actually available, but there has

    not been a sufcient trigger for change

    b) Technical solutions are not available, but could practi-cally become available with signicant effort: an ad-hoc

    centralization of effort, solely to develop a long-life

    technology, incurs very little long-term vulnerability

    c) Technical solutions seem possible in principle, but

    would face intransigent barriers: examples would

    include the need for a scalable polity and a decentral-

    ized capability to securely hold personal wealth.

    4.5. Stepping stonesand transitional stages

    Even if all the technical and non-technical barriers could

    be overcome, any societal change requires a transitionpathway if it is to be feasible. Such a topic could occupy

    a large volume of text, and is not the main topic of this

    paper. If the relative VI levels and technology categoriza-

    tions are reviewed, these do suggest that a number of

    individually feasible stages could be used as a transitional

    pathway to increased robustness; these stepping stones

    are tentatively identied as:

    a) Functional alternatives to all essential consumables

    become available locally

    b) Services are converted from central to local/ad-hoc

    approaches, using highly standardized protocols/

    specications

    c) General-purpose capabilities for research, fabrication,

    diagnosis and formulation are decentralized.

    d) Maintenance aspects of infrastructure and equipment

    are decentralized

    e) Mechanisms are develop and rened, to allow ad-hoc

    centralization without long-term dependencies.

    f) Durable alternatives for long-life components are

    designed.

    Strong incentives to reduce vulnerability already exist:

    by suggesting at leastsome useful technologicalapproaches,

    this paper may perhaps stimulate progress towards the

    state of more robust and decentralized sophistication.

    L.J. Robertson / Technology in Society 32 (2010) 342351350

  • 8/10/2019 Tech Trajectories Robertson 2010

    10/10

    References

    [1] Perens B. A cyber-attack on an American city. Seen online at,http://perens.com/works/articles/MorganHill/; 23 Apr 2009, http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdf;23 Apr 2009. See also Report to the President. Cyber Security: ACrisis of Prioritization. FEBRUARY 2005. See online aton 3 May2009.

    [2] Murray AlanT, Grubesic TonyH. Overview of reliability and vulner-ability in critical infrastructure. ISSN: 1430-9602. Berlin Heidelberg:Springer; 2007. .

    [3] Martin J. The meaning of the 21st century. A vital blueprint forensuring out future. Random House NZ Ltd.; 2006. Copyright JamesMartin.

    [4] Interview with Thomas Homer-Dixon, director of the TrudeauCentre for Peace and Conict Studies Can we get ourselves out of themess weve made. New Scientist 25 Nov 2006;V192(No 2579):52 3.

    [5] Tainter JosephA. The collapse of complex societies. CambridgeUniversity Press; 1988.

    [6] Wade Nicholas. Breaking out of the Malthusian Trap. Seen online at,http://www.relativitycalculator.com/articles/miscellaneous/breaking_out_of_malthusian_trap.html; August 7, 2007. on 3 May2009.

    [7] Malthus Rev Thomas Robert. An essay on the principle of populationas it affects the future improvement of society. Canada: McMasterUniversity; 1798. Source: Rod Hays Archive for the History ofEconomic Thought.

    [8] Diamond J. Collapse; how societies choose to fail or succeed.Penguin group; 2005. See also Jared Diamond. "Guns, Germs andSteel". (1997).

    [9] Stewart Ian. Does God play dice? The mathematics of chaos. Wiley,ISBN 1557861064; 1991.

    [10] Dunbars number. Seen online at, http://en.wikipedia.org/wiki/Dunbar's_number; on 23 Mar 2009.

    [11] Maslow AH. A theory of human motivation. Psychol Rev 1943;50(4):37096.

    [12] Stevens RW. (compiler) Statistics and Gun control. Seen online at,http://www.jpfo.org/legen-a-m/data-docs.htm; April 2010.

    [13] Algaculture: From Wikipedia, the free encyclopaedia. Seen online at,http://en.wikipedia.org/wiki/Algaculture; on 13 Apr 2009.

    [14] McClaine AW, Breault RW, Larsen C, Konduri R, Rolfe J, Becker F &Miskolczy G. Hydrogen transmission/storage with metal hydride-

    organic slurry and advanced chemical hydride/hydrogen for pemfcvehicles. Proceedings of the 2000 U.S. DOE Hydrogen ProgramReview NREL/CP-57028890, 2000.

    [15] Kaigala GV, Behnam M, Bliss C, Khorasani M, Ho S, McMullin JN,et al. Inexpensive, universal serial bus-powered and fully portablelab-on-a-chip-based capillary electrophoresis instrument. IETNanobiotechnology/IET 2009;3(1):17.

    [16] Watts P, Haswell SJ. The application of micro reactors for organicsynthesis. Chem Soc Rev 2005;34:23546. doi:10.1039/b313866f.Also see Stephen Muggleton Towards Chemical Universal Turing

    Machines Seen online at, http://pubs.doc.ic.ac.uk/towards-chemical-universal/towardschemical-universal.pdfon 13 Apr 2010.

    [17] Evans Arvid. Microfactory. Seen online at, http://arvid.evans.googlepages.com/microfactory; in Apr 2009.

    [18] Electrical discharge machining. Seen online at, http://www.engineersedge.com/edm.shtml; on 13 Apr 2010.

    [19] Solar pyrometallurgy an historic review. J Min Metals Mater SocPublisher Springer Boston Issue Volume 60, Number 2/February,2008.

    [20] The LongNow and Rosetta project. seen online at, http://www.rosettaproject.org/; on 21 Mar 2008.

    [21] Robertson LJ. Network/data layer messaging protocol for stand-alone, free-eld communications systems. QEX 2007;242:338.

    [22] Taleb NassimNicholas. The Black Swan: The impact of the highlyimprobable. Random House Publishing Group; 2007.

    [23] Posner RA. Catastrophe, risk and response. Pub Oxford UniversityPress; 2004. Copyright 2004. ISBN 0-19-517813-0.

    Lindsay Robertson

    The author is a professional engineer, in the mechanical discipline.Much of his careerhad been involved with energy, fuel, power and relatedtopics, and has included time spent in research establishments, in designofces and consulting practices as well as on construction sites! Hispersonal interests are quite wide (some are listed on my website), andinclude communication systems and electronics, plus other elds atprogressively more amateur levels. The author has lived in New Zealandmuch of his life, though with periods of work in UK and elsewhere. He hastaken a strong interest in the institutions that serve the engineeringprofession. Though he took a qualication in computing technology, hewould freely confess that only limited professional use has been made ofthat qualication.

    L.J. Robertson / Technology in Society 32 (2010) 342351 351

    http://perens.com/works/articles/MorganHill/http://perens.com/works/articles/MorganHill/http://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdfhttp://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdfhttp://www.relativitycalculator.com/articles/miscellaneous/breaking_out_of_malthusian_trap.htmlhttp://www.relativitycalculator.com/articles/miscellaneous/breaking_out_of_malthusian_trap.htmlhttp://en.wikipedia.org/wiki/Dunbar%27s_numberhttp://en.wikipedia.org/wiki/Dunbar%27s_numberhttp://www.jpfo.org/filegen-a-m/data-docs.htmhttp://www.jpfo.org/filegen-a-m/data-docs.htmhttp://www.jpfo.org/filegen-a-m/data-docs.htmhttp://en.wikipedia.org/wiki/Algaculturehttp://pubs.doc.ic.ac.uk/towards-chemical-universal/towardschemical-universal.pdfhttp://pubs.doc.ic.ac.uk/towards-chemical-universal/towardschemical-universal.pdfhttp://arvid.evans.googlepages.com/microfactoryhttp://arvid.evans.googlepages.com/microfactoryhttp://www.engineersedge.com/edm.shtmlhttp://www.engineersedge.com/edm.shtmlhttp://www.rosettaproject.org/http://www.rosettaproject.org/http://www.rosettaproject.org/http://www.rosettaproject.org/http://www.engineersedge.com/edm.shtmlhttp://www.engineersedge.com/edm.shtmlhttp://arvid.evans.googlepages.com/microfactoryhttp://arvid.evans.googlepages.com/microfactoryhttp://pubs.doc.ic.ac.uk/towards-chemical-universal/towardschemical-universal.pdfhttp://pubs.doc.ic.ac.uk/towards-chemical-universal/towardschemical-universal.pdfhttp://en.wikipedia.org/wiki/Algaculturehttp://www.jpfo.org/filegen-a-m/data-docs.htmhttp://en.wikipedia.org/wiki/Dunbar%27s_numberhttp://en.wikipedia.org/wiki/Dunbar%27s_numberhttp://www.relativitycalculator.com/articles/miscellaneous/breaking_out_of_malthusian_trap.htmlhttp://www.relativitycalculator.com/articles/miscellaneous/breaking_out_of_malthusian_trap.htmlhttp://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdfhttp://www.nitrd.gov/pitac/reports/20050301_cybersecurity/cybersecurity.pdfhttp://perens.com/works/articles/MorganHill/http://perens.com/works/articles/MorganHill/