Critique
An annotated collection of 50 books, papers, essays & articles on critique, spanning 1934 to 2026. Featuring works by Lewis Mumford, Jacques Ellul, Hubert Dreyfus and 45 more — each with editorial commentary oriented to digital product practice.
Technics and Civilization
The book that inaugurated the philosophy of technology as a discipline. Mumford's distinction between "polytechnics" (technologies oriented toward life and variety) and "monotechnics" (technologies oriented toward power…
The Technological Society
Ellul's central claim is that technique — the ensemble of means oriented toward efficiency — has become an autonomous system that shapes human ends rather than serving them. The argument is extreme and deliberately uncom…
What Computers Can't Do: The Limits of Artificial Intelligence
The earliest and most philosophically rigorous critique of symbolic AI — written when the AI community was making promises remarkably similar to today's. Dreyfus draws on phenomenology (Heidegger, Merleau-Ponty) to argue…
Computer Lib / Dream Machines
The most radical manifesto of personal computing — a book printed back-to-back, readable from either end. Nelson coined "hypertext" and argued that computers are too important to be left to computer scientists. Wild, unc…
The Postmodern Condition: A Report on Knowledge
Lyotard wrote this short report for the Quebec government on the status of knowledge in computerized societies, and it became one of the most cited philosophical texts of the twentieth century. His central thesis is that…
A Thousand Plateaus: Capitalism and Schizophrenia
The introduction to this book — titled simply "Rhizome" — is one of the most consequential metaphors in twentieth-century thought. Deleuze and Guattari describe a system with no centre, no hierarchy, where any point can…
Simulacra and Simulation
Baudrillard's thesis is that the distinction between reality and representation has collapsed — not because representations have improved, but because the model now precedes and generates the thing it was supposed to rep…
Towards a Philosophy of Photography
Flusser's short book — barely eighty pages — argues that the photographic image represents a break in the history of human communication as fundamental as the invention of writing. His concept of the "technical image" —…
A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century
Haraway's manifesto argues that the boundaries between human and machine, physical and non-physical, male and female, are not natural facts but political constructions — and that the figure of the cyborg, a hybrid of org…
Does Writing Have a Future?
Flusser asks whether alphanumeric code — and with it, the linear, historical, critical thinking that writing made possible — will survive the age of technical images. His answer is not nostalgic but analytical: writing p…
What Computers Still Can't Do: A Critique of Artificial Reason
The 1992 update to Dreyfus's 1972 original, written twenty years later with the critique deepened rather than softened. Dreyfus adds new introductions addressing connectionism, neural networks, and the failures of expert…
Technopoly: The Surrender of Culture to Technology
Postman's later, sharper book: the argument that contemporary culture has moved from using technology as a tool (tool-using cultures) through technocracy (where tools reshape social institutions) to technopoly — a cultur…
The Rise and Fall of Strategic Planning
Mintzberg's argument is that strategic planning as practised by most organisations is not strategy at all — it is a formalised ritual that produces plans but not strategic thinking, and that the two are different activit…
There Is No Software
In five pages, Kittler mounts a provocation that has shaped two decades of debate: "software" as a distinct category does not exist. What we call software, he argues, is a marketing abstraction layered over voltage diffe…
Protocol: How Control Exists After Decentralization
Galloway's thesis is that the internet is not, in any politically meaningful sense, a space of freedom — it is a space of protocol. He argues that TCP/IP and DNS constitute a new form of control that operates not through…
The Digital Sublime
Mosco, working from the political economy of communication tradition, dissects the myths that have accompanied every major technological wave — the telegraph would bring world peace, electricity would eliminate poverty,…
Code: And Other Laws of Cyberspace, Version 2.0
Lessig's central argument — "code is law" — holds that the architecture of software regulates behavior as effectively as any statute, and that choices made by engineers are therefore political choices whether they recogn…
The Exploit: A Theory of Networks
An extension of Galloway's Protocol into a general political theory of networks. Galloway and Thacker argue that networks are not inherently egalitarian — they produce their own native forms of control, exploitation, and…
The Future of the Internet—And How to Stop It
Zittrain's core concept is "generativity" — the capacity of a system to produce unanticipated change through unfiltered contributions from broad and varied audiences. The open PC and the early internet were generative; t…
The Shallows: What the Internet Is Doing to Our Brains
Carr expanded his 2008 Atlantic essay "Is Google Making Us Stupid?" into a full argument that the internet is reshaping the neural circuits responsible for sustained attention and deep reading. Drawing on neuroscience re…
The Filter Bubble
Pariser named the phenomenon that Google, Facebook, and every algorithmic feed now takes for granted: the invisible, personalized editing of reality that happens when platforms decide what you see based on what you have…
Recoding Gender: Women's Changing Participation in Computing
Abbate investigates a historical inversion that most people in technology take for granted without examining: how programming went from being classified as clerical "women's work" in the 1950s and 1960s to being cultural…
Vinod Khosla: 70-80% Of VCs Add Negative Value To Startups
Khosla's notorious TechCrunch interview in which he argued, from the perspective of someone who had run a successful venture firm for decades, that most VCs actively subtract value from the startups they invest in — thro…
It's Complicated: The Social Lives of Networked Teens
A decade of ethnographic research with American teenagers, dismantling the moral panics that adults project onto young people's use of social media. boyd demonstrates that teens are not addicted, naive, or reckless — the…
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous
The definitive account of Anonymous, written by the anthropologist who had been studying hacker culture for over a decade before the movement exploded into public consciousness. Coleman traces the lineage from 4chan trol…
The Global War for Internet Governance
DeNardis maps the institutions that actually govern the internet — ICANN, IETF, regional internet registries, root server operators, national regulators — and the conflicts among them. Her central argument is that intern…
The Revolt of the Public and the Crisis of Authority in the New Millennium
A former CIA open-source intelligence analyst argues that the information explosion — driven by the internet and mobile devices — has fatally undermined the authority of institutions that depended on controlling the flow…
The Black Box Society
Pasquale is a legal scholar, and he brings a normative framework that most algorithmic criticism lacks. The book examines three domains where opaque algorithms exercise decisive power: search engines that determine reput…
The Undersea Network
Ninety-nine percent of intercontinental internet traffic travels through submarine cables, yet almost no one outside the telecommunications industry writes seriously about them. Starosielski combines ethnography, media t…
A Prehistory of the Cloud
Hu is a former network engineer turned literature professor, and the book reflects both formations. He traces how the metaphor of the "cloud" inherits older infrastructural imaginaries — railways, pneumatic tubes, Cold W…
This Is Why We Can't Have Nice Things
An academic origin story of online trolling that traces the subculture from its roots in early internet forums through its amplification by mainstream media in the late 2000s. Phillips's central argument is that trolls d…
Chaos Monkeys
García Martínez's memoir covers his journey from Goldman Sachs to a Y Combinator startup to Facebook's ads team, and it reads like a picaresque novel set inside the attention economy. The book is cynical, funny, and deli…
Weapons of Math Destruction
O'Neil, a mathematician who moved from academia to Wall Street to data science, identifies a class of predictive models she calls Weapons of Math Destruction: opaque, unregulated, and operating at scale in domains where…
The Attention Merchants
Wu traces the history of how human attention became a commodity — from Benjamin Day's New York Sun in 1833, which invented the penny press model of selling eyeballs to advertisers, through radio, television, and the rise…
Programmed Inequality: How Britain Discarded Women Technologists and Lost Its Edge in Computing
Hicks documents, with archival rigor, how the British government and computing industry systematically pushed women out of technical roles during the 1960s and 1970s — precisely the period when computing was becoming str…
Technically Wrong: Sexist Apps, Biased Algorithms, and Other Threats of Toxic Tech
A catalogue of how the assumptions, demographics, and blind spots of design teams crystallise into products that harm the people they claim to serve — from name-validation forms that reject non-Western characters to algo…
Algorithms of Oppression
Noble's investigation begins with a simple, devastating observation: searching for "black girls" on Google returned pornography and racist stereotypes, while searches for white counterparts returned wholesome content. Fr…
What No One Tells You About Personalization
Polonski's essay argues the uncomfortable point behind "personalisation" as a product feature: most implementations reduce user agency rather than extend it, and many produce filter bubbles and perceived surveillance wit…
Surveillance Valley
Levine reconstructs the history of the internet that the Silicon Valley origin myth prefers to forget. ARPANET was not a project to survive nuclear war — it was a counterinsurgency tool, funded by ARPA to help the U.S. m…
The Promise of Artificial Intelligence: Reckoning and Judgment
A philosopher-computer scientist with fifty years in the field argues that the difference between calculation and judgment is categorical, not a matter of degree. Smith distinguishes between reckoning — the formal manipu…
Zucked: Waking Up to the Facebook Catastrophe
McNamee was an early mentor to Zuckerberg and an investor who helped broker the hire of Sheryl Sandberg — which makes his turn to fierce public critic unusually credible. The book traces his growing alarm at Facebook's r…
The Age of Surveillance Capitalism
Zuboff names and anatomizes a new economic logic: the unilateral claiming of private human experience as free raw material for translation into behavioral data, which is then fabricated into prediction products and sold…
Where Is My Flying Car?
A physicist's investigation into why the technological future imagined in the 1960s — flying cars, nuclear-powered abundance, routine space travel — never arrived. Hall's central argument is that energy regulation, not a…
The Age of Agile Must End
Burnett's argument is the one many product directors have been quietly thinking but struggle to say out loud: the word "agile" has been consumed by the industry it was meant to correct, and what is sold today under its n…
Why I Finally Quit Spotify
Chayka writes The New Yorker's Infinite Scroll column on internet culture and the book Filterworld. This piece is his account of leaving Spotify after the platform's algorithmic homogenisation made his listening feel imp…
Behavioral Indicators of Overreliance During Interaction with Conversational Language Models
The paper tackles a foundational problem for product directors working with AI: how do you know when users are trusting the system too much? Traditional metrics miss the behavioral patterns that emerge during interaction…
The Compulsory Imaginary: AGI and Corporate Authority
Barkett applies Jasanoff's framework of sociotechnical imaginaries to decode how OpenAI and Anthropic construct authority over technological futures through shared rhetorical strategies that transcend their apparent diff…
Reckoning with the Political Economy of AI: Avoiding Decoys in Pursuit of Accountability
Vertesi, boyd, Taylor, and Shestakofsky argue that AI accountability debates are not failing by accident — they are being shaped by the same networks of power they nominally critique. The concept of 'decoys' is analytica…
Context Over Content: Exposing Evaluation Faking in Automated Judges
The Vulnerability Of The Liberal Neutral State
Sandel's argument that the liberal state's claim to neutrality is both impossible and dangerous speaks directly to product directors navigating the fiction that technology is neutral. His critique of procedural liberalis…