2,403
Views
1
CrossRef citations to date
0
Altmetric
Articles

Storing data on the margins: making state and infrastructure in Southwest China

Pages 2412-2426 | Received 05 Nov 2021, Accepted 03 May 2022, Published online: 27 Jun 2022

References

  • Amin, A. (2014). Lively infrastructure. Theory, Culture & Society, 31(7/8), 137–161. https://doi.org/10.1177/0263276414548490
  • Anand, N. (2012). Municipal disconnect: On abject water and its urban infrastructures. Ethnography, 13(4), 487–509. https://doi.org/10.1177/1466138111435743
  • Anand, N. (2015). Leaky states: Water audits, ignorance and the politics of infrastructure. Public Culture, 27(2), 305–330. https://doi.org/10.1215/08992363-2841880
  • Anand, N., Gupta, K., & Appel, H. (eds.). (2018). The promise of infrastructure. Duke University Press.
  • Anonymous. (2018, April 29). Live at the Yangtz River: Guizhou- Gui’an xinqu is building data tunnels. China Central Television. http://tv.cctv.com/2018/04/29/VIDEkwr6lVle6jjnAO2xZzFi180429.shtml
  • Bach, J. (2016). China’s infrastructural fix. Limn 7. https://limn.it/articles/chinas-infrastructural-fix/
  • Cartier, C. (2018). Zone analog: The state-market problematic and territorial economies in China. Critical Sociology, 44(3), 455–470. https://doi.org/10.1177/0896920517712367
  • Chen, N. N. (2003). Breathing spaces: Qigong, psychiatry, and healing in China. Columbia University Press.
  • Cook, G., & van Horn, J. (2011). How dirty is your data? A look at the energy choices that power cloud computing. Greenpeace International.
  • Cross, J. (2014). Dream zones: Anticipating capitalism and development in India. Pluto Press.
  • Edwards, P. N., Bowker, G. C., Jackson, S. J., & Williams, R. (2009). Introduction: An agenda for infrastructure studies. Journal of the Association for Information Systems, 10(5), 364–374. https://doi.org/10.17705/1jais.00200
  • Fish, A., & Garrett, B. L. (2019). Resurrection from bunkers and data centers. Cultural Machine.18. https://culturemachine.net/vol-18-the-nature-of-data-centers/resurrection-from-bunkers/
  • Gabrys, J. (2011). Digital rubbish: A natural history of electronics. University of Michigan Press.
  • Goodman, D. (1983). Guizhou and the People’s Republic of China: The development of an internal colony. In D. Drakakis-Smith, & S. William (Eds.), Internal colonialism: Essays around a theme (pp. 107–124). Institute of British Geographers, Developing Areas Research Group Monograph 3.
  • Greenhalgh, S. (2008). Just one child: Science and policy in Deng’s China. University of California Press.
  • Greenhalgh, S. (2020). Governing through science: The anthropology of science and technology in contemporary China. In S. Greenhalgh, & L. Zhang (Eds.), Can science and technology save China? (pp. 1–24). Ithaca and London: Cornell University.
  • Greenhalgh, S., & Zhang, L. (2020). Can science and technology save China? Cornell University.
  • Hathaway, M. J. (2013). Environmental winds: Making the global in southwest China. University of California Press.
  • Hogan, M. (2013). Facebook data storage centers as the archive’s underbelly. Television & New Media, 16(1), 1–16.
  • Hu, T. H. (2015). A prehistory of the cloud. The MIT Press.
  • Johnson, A. (2019). Data centers as infrastructural in-betweens: Expanding connections and enduring marginalities in Iceland. American Ethnologist, 46(1), 75–88. https://doi.org/10.1111/amet.12735
  • Lam, T. (2020). Ruins for politics: Selling industrial heritage in postsocialist China’s rust belt. In S. Berger (Ed.), Constructing industrial parks: Heritage, historical culture and identity in regions undergoing structural economic transformation (pp. 251–269). Berghahn.
  • Larkin, B. (2008). Signal and noise: Media, infrastructure, and urban culture in Nigeria. Duke University Press.
  • Liu, D. (2019, June 26). Cloud infrastructure services spend in China exceeds US$2 billion in Q1 2019. Canalys. https://www.canalys.com/newsroom/canalys-cloud-infrastructure-services-spend-in-china-exceeds-us2-billion-in-q1-2019
  • Luo, Y., Oakes, T., & Schein, L. (2019). Resourcing remoteness and the ‘post-alteric’ imaginary in China. Social Anthropology, 27(2), 270–285. https://doi.org/10.1111/1469-8676.12645
  • Mitchell, T. (2002). Rule of experts: Egypt, techno-politics, modernity. University of California Press.
  • Mosco, V. (2015). To the cloud: Big data in a turbulent world. Routeledge.
  • Mosher, S. W. (1991). Chinese prison labor. Society, 29(1), 49–59. https://doi.org/10.1007/BF02695363
  • Naughton, B. (1988). The third front: Defense industrialization in the Chinese interior. The China Quarterly, 115, 351–386. https://doi.org/10.1017/S030574100002748X
  • Oakes, T. (1999). Selling Guizhou: Cultural development in an era of marketization. In H. Hendrischke (Ed.), The political economy of China’s provinces: Comparative and competitive advantage (pp. 31–72). Routledge.
  • Oakes, T. (2004). Building a southern dynamo: Guizhou and state power. The China Quarterly, 178, 467–487. https://doi.org/10.1017/S0305741004000268
  • Palmer, D. A. (2007). Qigong fever: Body, science, and utopia in China. Columbia University Press.
  • Pickren, G. (2017). The factories of the past are turning into the data centers of the future. Imaginations Journal of Cross-Cultural Image Studies, 8(2), 21–29. https://doi.org/10.17742/IMAGE.LD.8.2.3
  • Pickren, G. (2018). The global assemblage of digital flow: Critical data studies and the infrastructures of computing. Progress in Human Geography, 42(2), 225–243. https://doi.org/10.1177/0309132516673241
  • Ragland, L. A., McReynolds, J., Southerland, M., & Mulvenon, J. (2014). Red cloud rising: Cloud computing in China. Createspace independent publishing platform.
  • Seymour, J. D., & Anderson, R. (2015/1998). New ghosts old ghosts: Prisons and labor reform camps in China. Routledge.
  • Starosielski, N. (2015). The undersea network. Duke University Press.
  • The Laogai Research Foundation (TLRF). (2008). Laogai handbook 2007–2008. Washington, DC.
  • Tsing, A. (2005). Friction: An ethnography of global connection. Princeton University Press.
  • Vonderau, A. (2017). Technologies of imagination: Locating the cloud in Sweden’s North. Imaginations Journal of Cross-Cultural Image Studies, 8(2), 8–21. https://doi.org/10.17742/IMAGE.LD.8.2.2
  • Vonderau, A. (2018). Scaling the cloud: Making state and infrastructure in Sweden. Ethnos, 84(4), 698–718. https://doi.org/10.1080/00141844.2018.1471513
  • Vonderau, A. (2019). Storing data, infrastructuring the air: Thermocultures of the cloud. Culture Machine, 18, 1–10. https://culturemachine.net/vol-18-the-nature-of-data-centres/storing-data/
  • Wagner, D. (2018, 25 June). China’s cybersecurity law is biased and open to abuse, but it may not stop others copying it. South China Morning Post. https://www.scmp.com/comment/insight-opinion/china/article/2152347/chinas-cybersecurity-law-biased-and-open-abuse-it-may
  • Weinstein, J. (2013). Empire and identity in Guizhou: Local resistance to Qing expansion. University of Washington Press.
  • Yuen, S. (2015). Becoming a cyber power: China’s cybersecurity upgrade and its consequences. China Perspectives, 2(2), 53–58. https://doi.org/10.4000/chinaperspectives.6731