Thursday, June 12, 2008

6/4&6/6 "open-sources"

This week, we learned about of "open-sources ".
what are these things to "open-sources "?
what is “resistance” in digital media?





what is “resistance”?

tactics and means to oppose the strategies of “The Prince”
–e.g., while the prince tries to “divide and conquer,” the resistance tries to overcome the imposed isolation


countering the techniques and “technologies of power” (cf., Foucault) that impose isolation, distraction and domination through surveillance, entertainment, and force





what is a software virus?


virus: [from the obvious analogy with biological viruses, via SF] n. A cracker program that searches out other programs and `infects' them by embedding a copy of itself in them, so that they become {Trojan Horse}s. When these programs are executed, the embedded virus is executed too, thus propagating the `infection'. This normally happens invisibly to the user. Unlike a {worm}, a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see {SEX}). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing cute messages on the terminal or playing strange tricks with your display (some viruses include nice {display hack}s). Many nasty viruses, written by particularly perversely minded {cracker}s, do irreversible damage, like nuking all the user's files. - Hackers’ Dictionary





what is a software “trojan horse”?


Trojan horse: [coined by MIT-hacker-turned-NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! See {back door}, {virus}, {worm}. -Hackers Dictionary





what is “worm”?


worm: [from `tapeworm' in John Brunner's novel `The Shockwave Rider', via XEROX PARC] n. A program that propagates itself over a network, reproducing itself as it goes. Compare {virus}. Nowadays the term has negative connotations, as it is assumed that only {cracker}s write worms. Perhaps the best-known example was Robert T. Morris's `Internet Worm' of 1988, a `benign' one that got out of control and hogged hundreds of Suns and VAXen across the U.S. See also {cracker}, {RTM}, {Trojan horse}, {ice}. -Hackers Dictionary





what is a software “bomb”?


logic bomb: n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}. -Hackers’ Dictionary





what is a “back door”?


back door: n. A hole in the security of a system deliberately left in place by designers or maintainers. The motivation for this is not always sinister; some operating systems, for example, come out of the box with privileged accounts intended for use by field service technicians or the vendor's maintenance programmers. Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The infamous {RTM} worm of late 1988, for example, used a back door in the {BSD} UNIX `sendmail(8)' utility. -Hackers Dictionary



examples of open source software


Internet
–Apache, which runs over 50% of the world's web servers.
–BIND, the software that provides the DNS (domain name service) for the entire Internet.
–sendmail, the most important and widely used email transport software on the Internet.
–Mozilla, the open source redesign of the Netscape Browser
–OpenSSL is the standard for secure communication (strong encryption) over the Internet.categories.








Sunday, May 25, 2008

5/21&5/23 Public&Privacy


 
 
 
"Keeping your privacy

By the way what is your think about your publical foam?"


Human-life is aways scared to privacy.
then, people has been invented to protecting our life


surveillance

close watch kept over someone or something
Etymology: French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful


from surveillance to dataveillance

total information awareness agency
now the “terrorism information awareness” project
name change as of may 21, 2003 to mollify congress’ worries about intrusion of the privacy of u.s. citizens
headed by convicted felon (former admiral) john poindexter


surveillance model versus capture model

surveillance model: is built upon visual metaphors and derives from historical experiences of secret police surveillance
capture model: is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time


digital media versus computer science

digital media studies: some architectures (e.g., democratic ones) are best designed to be inefficient
computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures


cookies

cookies are information that a web server stores on the machine running a web browser
–try clearing all of the cookies in your web browser and the visit web sites that you have been.



Agre on “elaboration”

“The captured activity records, which are in economic terms among the products of the reorganized activity, can now be stored, inspected, audited, merged with other records, subjected to statistical analysis, ... and so forth.”


Sunday, May 18, 2008

5/14&5/16 "Human"


"All about things to technology is existenced for human."


dr.yoon was introducing about these on this week.




1.Prosthesis


For other uses, see Prosthesis (disambiguation).
In medicine, a prosthesis is an artificial extension that replaces a missing body part. It is part of the field of biomechatronics, the science of fusing mechanical devices with human muscle, skeleton, and nervous systems to assist or enhance motor control lost by trauma, disease, or defect. Prostheses are typically used to replace parts lost by injury (traumatic) or missing from birth (congenital) or to supplement defective body parts. In addition to the standard artificial limb for every-day use, many amputees have special limbs and devices to aid in the participation of sports and recreational activities.


2.Donna Haraway


Donna Haraway (born September 6, 1944 in Denver, Colorado) is currently a professor and chair of the History of Consciousness Program at the University of California, Santa Cruz, United States. She is the author of Crystals, Fabrics, and Fields: Metaphors of Organicism in Twentieth-Century Developmental Biology (1976), Primate Visions: Gender, Race, and Nature in the World of Modern Science (1989), Simians, Cyborgs, and Women: The Reinvention of Nature (1991), and Modest_Witness@Second_Millennium.FemaleMan©Meets_OncoMouse (1997).
Haraway earned a degree in Zoology and Philosophy at the Colorado College and received the Boettcher Foundation scholarship. She lived in Paris for a year, studying philosophies of evolution on a Fulbright scholarship before completing her Ph. D. from the Biology Department of Yale in 1972. She wrote her dissertation on the functions of metaphor in shaping research in developmentalbiology in the twentieth century.
Haraway has taught Women's Studies and General Science at the University of Hawaii and Johns Hopkins University. In September, 2000, Haraway was awarded the highest honor given by the Society for Social Studies of Science, the J. D. Bernal Award, for lifetime contributions to the field. Haraway has also lectured in feminist theory and techno-science at the European Graduate School in Saas-Fee, Switzerland. Haraway is a leading thinker about people's love and hate relationship with machines. Her ideas have sparked an explosion of debate in areas as diverse as primatology, philosophy, and developmental biology


3.Lisa Nakamura


The Internet presents a real dilemma to postcolonial theorists, writers, and intellectuals; indeed, perhaps to postcolonial theory itself. The range and tone of responses to cyberspace reflect a deep split in the ways that this new communication technology is viewed by non-Western cultures and races. Ziauddin Sardar sees the Internet as a tool of imperialism, and he asserts that it is simply the newest example on a continuum of imperializing practices perpetrated by the West in its ongoing domination of other cultures. He regards cyberspace as a medium that can only transmit imperialistic ideologies; its background in military research and high cost of access makes it intrinsically a Western technology with no potential for resistance by people of color. In short, he sees it as a medium that’s inherently flawed by its association with modernity, tropes of colonialism, and hypercapitalism. His critique is extremely similar in many ways to Chinua Achebe’s famous response to Joseph Conrad’s Heart of Darkness. There’s no turning back from the way that Achebe singlehandedly politicized that text; the Norton Critical Edition of the novel includes it because it’s now become part of the discursive field of postcolonial criticism as well as a virtuoso reading of the text. Achebe demonstrates that Conrad’s novel depicts natives as irredeemably Other, as the West’s dark side. Sardar says that cyberspace accomplishes the same thing.On the other hand, many new media collectives in traditionally “media poor” countries who lack widespread access to the Internet strongly assert the usefulness of Internet and computer use in the context of non-Western culture. The Sarai New Media Centre in Delhi is trying to make software for people who are non-literate as a means to wrest the medium away from cultural elites. Even more importantly, this move away from textual literacy produces expressive forms which are more in line with the culture’s distinctive media landscape, thus reducing the dangers of imperializing incursions from the West. Jeebesh Bagchi, Sarai member and a Raqs media collective artist, claims that “India is a song and visual sign board culture” and asks, “What kind of dialogue with this strange and eclectic world do we want to create, not based on domination or populism?” (qtd. in Lovink 212). Envisioning and using the Internet in visual rather than primarily textual ways can be a radically empowering move for non-literate groups.

Sunday, May 11, 2008

5/7&5/9 "Computer games"


what’s in a game engine?


graphics
physics
ai
...and a lot more


game “mods”


Mod (modification: fps, rpgs, real-time strategy games)
by general public or developer
can be entirely new games in themselves
partial conversions (total conversions)example development environment


games research and development



example groups and events:
the game developers’ conference:
http://www.gdconf.com/
game studies: academic journal:
http://gamestudies.org/
research groups:
academic: e.g., Center for Computer Games Research, IT University of Copenhagen
industry: and, of course, the folks at Microsoft, Electronic Arts, etc.
art:
e.g., the show Bang the Machine: Computer Gaming Art and Artifacts
e.g., alternative games competition, Rhizome.org at the New Museum, New York City, March 2004




what makes a good game?


play? or,
story? or,

realism? or, is it
something else?


more than identification



“When you play a video game you enter into the world of the programmers who made it. You have to do more than identify with a character on the screen. You must act for it. Identification through action has a special kind of hold. Like playing a sport, it puts people into a highly focused, and highly charged state of mind. For many people, what is being pursued in the video game is not just a score, but an altered state.
from Sherry Turkle, “Video Games and Computer Holding Power”


identification



Identification is known to psycho-analysis as the earliest expression of an emotional tie with another person. It plays a part in the early history of the Oedipus complex. A little boy will exhibit a special interest in his father; he would like to grow like him and be like him, and take his place everywhere. We may say simply that he takes his father as his ideal.
from Sigmund Freud, Group Psychology and the Analysis of the Ego
Cf., Jacques Lacan on “The Mirror Stage,” and writings about identification in film theory by Laura Mulvey, Kaja Silverman, Christian Metz, Stephen Heath, and others


space: what’s a boy’s space?



is it a place where boys can...
enjoy lurid images?
prove themselves with stunts?
gain mastery?
(re)produce hierarchies?
vent aggressive feelings?
engage in scatological humor?
competitively role-play?
and bond together
these criteria are from Henry Jenkins’ article



Monday, May 5, 2008

4/30&5/2 "computer-aid"



key-point
every digital media technology has an architecture using diagrams to compare physical architectures with digital architectures

CSCW
computer-supported cooperative work (CSCW) is a field of research and design. (ex: CAD/CAM, ABB Powerwall, Drug Design)


Winograd and Flores
Winograd and Flores present a methodology for CSCW analysis and design. This methodology is commonly known as the “language/action” perspective.


design as conversation construction
any organization is constituted as a network of recurrent conversations (ex: issue, topic, theme…)
conversations are linked in regular patterns of triggering and breakdown (ex: next issues…)
in creating tools we are designing new conversations and connections (ex: ways, methods, rules…)
computers are a tool for conducting the network of conversations (ex: how-to, clues ….)


Technologies embody social, political, cultural, economic and philosophical ideas and relationships.
Every digital media technology has an architecture that can be used to transform work, play and governance.


physical architecture and digital architecture
For example, The Social Logic of Space(1990)
by Bill Hillier and Julienne Hanson




Sunday, April 27, 2008

4/23&4/25 Human-computer interaction


We used all about machine that usually has A.I?
what a wonderful world!
and what's that means "HCI?"
where does "HCI" meet "A.I"?

key point


People often interact with media technologies as though the technologies were people.
–related ideas
Clifford and Nash, “the media equation”
Freud, transference
–see also Sherry Turkle on computers as “second selves” and as “evocative objects”
surrealists, “automatic writing” (recall Tristan Tzara’s “recipe”)
Mannheim/Schutz/Garfinkel, the “documentary method”


related points: ethics

questions of ethics and “others”
–should we treat technologies as people or people as technologies?
–should we only treat others who are like us with care and respect? or, should we also extend our care and respect to others who are radically different?
–what makes believe someone or something is alive, thinking, or simply the same as us?


history of HCI as tools: people

people:
–Vannevar Bush: memex
–J.C.R. Licklider: computer networking, agents
–Ivan Sutherland: sketchpad
–Doug Engelbart: mouse, GUI, word processing, etc.
–Ted Nelson: hypertext
–Alan Kay: object-oriented programming, laptops, ...



basic design question: should the computer act like a person?
–agents versus “direct manipulation”
e.g., Ben Schneiderman versus Pattie Maes (sigchi, 1997)
even “direct-manipulation” interfaces are based on a “conversation” metaphor: the computer responds immediately to each action or command from the “user”
but, there are (at least) two models of conversation
–information/intention transmission
inspirations for ai: e.g., Paul Grice, pragmatics
–co-construction of meaning
ethnomethodology: e.g., Harvey Sacks, conversation analysis
Boring? ok.. let’s watch some movie related to HCI generally.
–hci lesson from “Sleeper”
»1) Reliability
»2) Personalization
»3) if it isn’t broken, don’t fix it
»4) intuitive UI design

Sunday, April 13, 2008

4/11 artificial intelligence


artificial intelligence is what's that means?




Artificial intelligence (AI) is both the intelligence of machines and the branch of computer science which aims to create it.
Major AI textbooks define artificial intelligence as "the study and design of intelligenagents,"where an intelligent agent is a system that perceives its environment and takes actions which maximize its chances of success.AI can be seen as a realization of an abstract intelligent agent (AIA) which exhibits the functional essence of intelligence.John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines."
Among the traits that researchers hope machines will exhibit are reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects.General intelligence(or "strong AI") has not yet been achieved and is a long-term goal of AI research.
AI research uses tools and insights from many fields, including computer science, psychology, philosophy, neuroscience, cognitive science, linguistics, ontology, operations research, economis, control theory, probabilit, optimization and logic. AI research also overlaps with tasks such as robotics, control systems, scheduling, data mining, logistics, speech recognition, facial recognition and many others. Other names for the field have been proposed, such as computational intelligence,synthetic intelligence,intelligent systems,or computational rationality(wikipedia.org)



Alan Turing


-ounder of computer science, artificial intelligence, mathematician, philosopher, codebreaker, and a gay man


“imitation game”


The new form of the problem can be described in terms of a game which we call the ‘imitation game.’ It is played with three people, a man, a woman, and an interrogator who may be of either sex. The interrogator stays in a room apart from the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman.”
Turing Test more on Turing test



when i saw this movie that A.I, i'm was really feld interesting


& Now,l'm introducing this movie-(source by wikipedia.org)


A.I. was initially inspired by "Super-Toys Last All Summer Long", a short story published in 1969 by UK science fiction writer Brian Aldiss.
During the 1980s, Kubrick and Aldiss began to develop the story into a script for a feature film. Aldiss said later that Kubrick's theory of writing features revolved around six to eight "non-submersible units" — his name for interesting sequences. They came up with three or four of these, by taking ideas from other Aldiss stories.
Aldiss claims he never felt the story could be successfully expanded into something bigger, as its original focus was intimate, and this seems to have been the origin of his problems with Kubrick, who was equally certain it could be fully fleshed out. There was also a dispute over money.[citation needed] These factors, along with Kubrick's desire to use elements from Pinocchio,[citation needed] caused their relationship to deteriorate. Kubrick fired Aldiss in 1990.Irish science fiction novelist Bob Shaw was brought on board for a few months, but he found Kubrick too demanding.Kubrick turned to UK science fiction notable Ian Watson, and the two produced the long treatment (credited to Watson). Both British feminist writer, Sara Maitlandand Arthu C. Clarke added ideas to the story.[citation needed] A science fiction painter, Chris Baker, also known as "Fangorn", was commissioned to produce hundreds of pieces of concept art from ideas and descriptions given to him by Kubrick. Chris Cunningham, a British music video film director (famous for the video "Come to Daddy" by Aphex Twin), worked for over a year on the film.[After Kubrick died in 1999, his widow contacted Spielberg, whom Kubrick had previously asked to direct the film and with whom he had discussed the project at length, and she asked him to finish producing the movie. Spielberg used the Kubrick-Watson treatment as the basis for the screenplay, which he wrote himself.He bought the rights to Aldiss' two brief sequels to "Supertoys" and ideas from them appear in the movie.
The movie had an unusual publicity campaign consisting of a new type of "game" involving approximately 30 interlinked websites. This type of game has since become known as an alternate reality game (ARG). The A.I. game did not have an official name, but became known as The Beast by its most ardent fans.