Thursday, June 12, 2008
6/4&6/6 "open-sources"
what are these things to "open-sources "?
what is “resistance” in digital media?
what is “resistance”?
tactics and means to oppose the strategies of “The Prince”
–e.g., while the prince tries to “divide and conquer,” the resistance tries to overcome the imposed isolation
countering the techniques and “technologies of power” (cf., Foucault) that impose isolation, distraction and domination through surveillance, entertainment, and force
what is a software virus?
virus: [from the obvious analogy with biological viruses, via SF] n. A cracker program that searches out other programs and `infects' them by embedding a copy of itself in them, so that they become {Trojan Horse}s. When these programs are executed, the embedded virus is executed too, thus propagating the `infection'. This normally happens invisibly to the user. Unlike a {worm}, a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see {SEX}). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing cute messages on the terminal or playing strange tricks with your display (some viruses include nice {display hack}s). Many nasty viruses, written by particularly perversely minded {cracker}s, do irreversible damage, like nuking all the user's files. - Hackers’ Dictionary
what is a software “trojan horse”?
Trojan horse: [coined by MIT-hacker-turned-NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! See {back door}, {virus}, {worm}. -Hackers Dictionary
what is “worm”?
worm: [from `tapeworm' in John Brunner's novel `The Shockwave Rider', via XEROX PARC] n. A program that propagates itself over a network, reproducing itself as it goes. Compare {virus}. Nowadays the term has negative connotations, as it is assumed that only {cracker}s write worms. Perhaps the best-known example was Robert T. Morris's `Internet Worm' of 1988, a `benign' one that got out of control and hogged hundreds of Suns and VAXen across the U.S. See also {cracker}, {RTM}, {Trojan horse}, {ice}. -Hackers Dictionary
what is a software “bomb”?
logic bomb: n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}. -Hackers’ Dictionary
what is a “back door”?
back door: n. A hole in the security of a system deliberately left in place by designers or maintainers. The motivation for this is not always sinister; some operating systems, for example, come out of the box with privileged accounts intended for use by field service technicians or the vendor's maintenance programmers. Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The infamous {RTM} worm of late 1988, for example, used a back door in the {BSD} UNIX `sendmail(8)' utility. -Hackers Dictionary
examples of open source software
Internet
–Apache, which runs over 50% of the world's web servers.
–BIND, the software that provides the DNS (domain name service) for the entire Internet.
–sendmail, the most important and widely used email transport software on the Internet.
–Mozilla, the open source redesign of the Netscape Browser
–OpenSSL is the standard for secure communication (strong encryption) over the Internet.categories.
Sunday, May 25, 2008
5/21&5/23 Public&Privacy
Etymology: French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful
now the “terrorism information awareness” project
name change as of may 21, 2003 to mollify congress’ worries about intrusion of the privacy of u.s. citizens
headed by convicted felon (former admiral) john poindexter
capture model: is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time
computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures
–try clearing all of the cookies in your web browser and the visit web sites that you have been.
Sunday, May 18, 2008
5/14&5/16 "Human"
In medicine, a prosthesis is an artificial extension that replaces a missing body part. It is part of the field of biomechatronics, the science of fusing mechanical devices with human muscle, skeleton, and nervous systems to assist or enhance motor control lost by trauma, disease, or defect. Prostheses are typically used to replace parts lost by injury (traumatic) or missing from birth (congenital) or to supplement defective body parts. In addition to the standard artificial limb for every-day use, many amputees have special limbs and devices to aid in the participation of sports and recreational activities.
Haraway earned a degree in Zoology and Philosophy at the Colorado College and received the Boettcher Foundation scholarship. She lived in Paris for a year, studying philosophies of evolution on a Fulbright scholarship before completing her Ph. D. from the Biology Department of Yale in 1972. She wrote her dissertation on the functions of metaphor in shaping research in developmentalbiology in the twentieth century.
Haraway has taught Women's Studies and General Science at the University of Hawaii and Johns Hopkins University. In September, 2000, Haraway was awarded the highest honor given by the Society for Social Studies of Science, the J. D. Bernal Award, for lifetime contributions to the field. Haraway has also lectured in feminist theory and techno-science at the European Graduate School in Saas-Fee, Switzerland. Haraway is a leading thinker about people's love and hate relationship with machines. Her ideas have sparked an explosion of debate in areas as diverse as primatology, philosophy, and developmental biology
The Internet presents a real dilemma to postcolonial theorists, writers, and intellectuals; indeed, perhaps to postcolonial theory itself. The range and tone of responses to cyberspace reflect a deep split in the ways that this new communication technology is viewed by non-Western cultures and races. Ziauddin Sardar sees the Internet as a tool of imperialism, and he asserts that it is simply the newest example on a continuum of imperializing practices perpetrated by the West in its ongoing domination of other cultures. He regards cyberspace as a medium that can only transmit imperialistic ideologies; its background in military research and high cost of access makes it intrinsically a Western technology with no potential for resistance by people of color. In short, he sees it as a medium that’s inherently flawed by its association with modernity, tropes of colonialism, and hypercapitalism. His critique is extremely similar in many ways to Chinua Achebe’s famous response to Joseph Conrad’s Heart of Darkness. There’s no turning back from the way that Achebe singlehandedly politicized that text; the Norton Critical Edition of the novel includes it because it’s now become part of the discursive field of postcolonial criticism as well as a virtuoso reading of the text. Achebe demonstrates that Conrad’s novel depicts natives as irredeemably Other, as the West’s dark side. Sardar says that cyberspace accomplishes the same thing.On the other hand, many new media collectives in traditionally “media poor” countries who lack widespread access to the Internet strongly assert the usefulness of Internet and computer use in the context of non-Western culture. The Sarai New Media Centre in Delhi is trying to make software for people who are non-literate as a means to wrest the medium away from cultural elites. Even more importantly, this move away from textual literacy produces expressive forms which are more in line with the culture’s distinctive media landscape, thus reducing the dangers of imperializing incursions from the West. Jeebesh Bagchi, Sarai member and a Raqs media collective artist, claims that “India is a song and visual sign board culture” and asks, “What kind of dialogue with this strange and eclectic world do we want to create, not based on domination or populism?” (qtd. in Lovink 212). Envisioning and using the Internet in visual rather than primarily textual ways can be a radically empowering move for non-literate groups.
Sunday, May 11, 2008
5/7&5/9 "Computer games"
graphics
physics
ai
...and a lot more
Mod (modification: fps, rpgs, real-time strategy games)
by general public or developer
can be entirely new games in themselves
partial conversions (total conversions)example development environment
example groups and events:
the game developers’ conference: http://www.gdconf.com/
game studies: academic journal: http://gamestudies.org/
research groups:
academic: e.g., Center for Computer Games Research, IT University of Copenhagen
industry: and, of course, the folks at Microsoft, Electronic Arts, etc.
art:
e.g., the show Bang the Machine: Computer Gaming Art and Artifacts
e.g., alternative games competition, Rhizome.org at the New Museum, New York City, March 2004
play? or,
story? or,
something else?
“When you play a video game you enter into the world of the programmers who made it. You have to do more than identify with a character on the screen. You must act for it. Identification through action has a special kind of hold. Like playing a sport, it puts people into a highly focused, and highly charged state of mind. For many people, what is being pursued in the video game is not just a score, but an altered state.
from Sherry Turkle, “Video Games and Computer Holding Power”
Identification is known to psycho-analysis as the earliest expression of an emotional tie with another person. It plays a part in the early history of the Oedipus complex. A little boy will exhibit a special interest in his father; he would like to grow like him and be like him, and take his place everywhere. We may say simply that he takes his father as his ideal.
from Sigmund Freud, Group Psychology and the Analysis of the Ego
Cf., Jacques Lacan on “The Mirror Stage,” and writings about identification in film theory by Laura Mulvey, Kaja Silverman, Christian Metz, Stephen Heath, and others
is it a place where boys can...
enjoy lurid images?
prove themselves with stunts?
gain mastery?
(re)produce hierarchies?
vent aggressive feelings?
engage in scatological humor?
competitively role-play?
and bond together
these criteria are from Henry Jenkins’ article
Monday, May 5, 2008
4/30&5/2 "computer-aid"
key-point
every digital media technology has an architecture using diagrams to compare physical architectures with digital architectures
conversations are linked in regular patterns of triggering and breakdown (ex: next issues…)
in creating tools we are designing new conversations and connections (ex: ways, methods, rules…)
computers are a tool for conducting the network of conversations (ex: how-to, clues ….)
by Bill Hillier and Julienne Hanson
Sunday, April 27, 2008
4/23&4/25 Human-computer interaction
key point
–related ideas
Clifford and Nash, “the media equation”
Freud, transference
–see also Sherry Turkle on computers as “second selves” and as “evocative objects”
surrealists, “automatic writing” (recall Tristan Tzara’s “recipe”)
Mannheim/Schutz/Garfinkel, the “documentary method”
–should we treat technologies as people or people as technologies?
–should we only treat others who are like us with care and respect? or, should we also extend our care and respect to others who are radically different?
–what makes believe someone or something is alive, thinking, or simply the same as us?
–Vannevar Bush: memex
–J.C.R. Licklider: computer networking, agents
–Ivan Sutherland: sketchpad
–Doug Engelbart: mouse, GUI, word processing, etc.
–Ted Nelson: hypertext
–Alan Kay: object-oriented programming, laptops, ...
basic design question: should the computer act like a person?
–agents versus “direct manipulation”
e.g., Ben Schneiderman versus Pattie Maes (sigchi, 1997)
even “direct-manipulation” interfaces are based on a “conversation” metaphor: the computer responds immediately to each action or command from the “user”
but, there are (at least) two models of conversation
–information/intention transmission
inspirations for ai: e.g., Paul Grice, pragmatics
–co-construction of meaning
ethnomethodology: e.g., Harvey Sacks, conversation analysis
Boring? ok.. let’s watch some movie related to HCI generally.
–hci lesson from “Sleeper”
»1) Reliability
»2) Personalization
»3) if it isn’t broken, don’t fix it
»4) intuitive UI design
Sunday, April 13, 2008
4/11 artificial intelligence
artificial intelligence is what's that means?
Artificial intelligence (AI) is both the intelligence of machines and the branch of computer science which aims to create it.
Major AI textbooks define artificial intelligence as "the study and design of intelligenagents,"where an intelligent agent is a system that perceives its environment and takes actions which maximize its chances of success.AI can be seen as a realization of an abstract intelligent agent (AIA) which exhibits the functional essence of intelligence.John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines."
Among the traits that researchers hope machines will exhibit are reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects.General intelligence(or "strong AI") has not yet been achieved and is a long-term goal of AI research.
AI research uses tools and insights from many fields, including computer science, psychology, philosophy, neuroscience, cognitive science, linguistics, ontology, operations research, economis, control theory, probabilit, optimization and logic. AI research also overlaps with tasks such as robotics, control systems, scheduling, data mining, logistics, speech recognition, facial recognition and many others. Other names for the field have been proposed, such as computational intelligence,synthetic intelligence,intelligent systems,or computational rationality(wikipedia.org)
Alan Turing
-ounder of computer science, artificial intelligence, mathematician, philosopher, codebreaker, and a gay man
“imitation game”
The new form of the problem can be described in terms of a game which we call the ‘imitation game.’ It is played with three people, a man, a woman, and an interrogator who may be of either sex. The interrogator stays in a room apart from the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman.”
Turing Test more on Turing test
when i saw this movie that A.I, i'm was really feld interesting
& Now,l'm introducing this movie-(source by wikipedia.org)
A.I. was initially inspired by "Super-Toys Last All Summer Long", a short story published in 1969 by UK science fiction writer Brian Aldiss.
During the 1980s, Kubrick and Aldiss began to develop the story into a script for a feature film. Aldiss said later that Kubrick's theory of writing features revolved around six to eight "non-submersible units" — his name for interesting sequences. They came up with three or four of these, by taking ideas from other Aldiss stories.
Aldiss claims he never felt the story could be successfully expanded into something bigger, as its original focus was intimate, and this seems to have been the origin of his problems with Kubrick, who was equally certain it could be fully fleshed out. There was also a dispute over money.[citation needed] These factors, along with Kubrick's desire to use elements from Pinocchio,[citation needed] caused their relationship to deteriorate. Kubrick fired Aldiss in 1990.Irish science fiction novelist Bob Shaw was brought on board for a few months, but he found Kubrick too demanding.Kubrick turned to UK science fiction notable Ian Watson, and the two produced the long treatment (credited to Watson). Both British feminist writer, Sara Maitlandand Arthu C. Clarke added ideas to the story.[citation needed] A science fiction painter, Chris Baker, also known as "Fangorn", was commissioned to produce hundreds of pieces of concept art from ideas and descriptions given to him by Kubrick. Chris Cunningham, a British music video film director (famous for the video "Come to Daddy" by Aphex Twin), worked for over a year on the film.[After Kubrick died in 1999, his widow contacted Spielberg, whom Kubrick had previously asked to direct the film and with whom he had discussed the project at length, and she asked him to finish producing the movie. Spielberg used the Kubrick-Watson treatment as the basis for the screenplay, which he wrote himself.He bought the rights to Aldiss' two brief sequels to "Supertoys" and ideas from them appear in the movie.
The movie had an unusual publicity campaign consisting of a new type of "game" involving approximately 30 interlinked websites. This type of game has since become known as an alternate reality game (ARG). The A.I. game did not have an official name, but became known as The Beast by its most ardent fans.
Saturday, April 5, 2008
4/2&4/4 "Social network"
-New media technologies usually reinforce existing social networks or even work to isolate people.
isolate people is common happening to media peaple.
"hikihomori"is very famous disease in japan
-When new media technologies facilitate new social networks, they simultaneously challenge existing social, political and economic relationships.
social network analysis is an interdisciplinary social science, but has been of especial concern to sociologists
recently, physicists and mathematicians have made large contributions to understanding networks in general (as graphs) and thus contributed to an understanding of social networks too.
New media technologies usually reinforce existing social networks or even work to isolate people.
When new media technologies facilitate new social networks, they simultaneously challenge existing social, political and economic relationships.
centrality bridge is very imfortant to social network!
and dr.yoon was showing us that really interested infomations
i'm use to kind of many webpage that it was so great
amazon network is so many works do that anounced inform user's to another user.
from 'each national speaker!!!!!'
"People who bought this book also bought."
social networks as popular culture-kecin vacon
he is central bridge in movie network
-kevin bacon has a bacon number of 0
an actor, A, has a bacon number of 1 if s/he appeared in a movie with kevin bacon
an actor, B, has a bacon number of 2 if s/he appear in a movie with A
etc.
and then, dr.yoon was very intersted say that "oracle of bacon"
Deph story & oracle who appearing to movie"metrix"
Vizster is an interactive visualization tool for online social networks, allowing exploration of the community structure of social networking services such as friendster.com, tribe.net, and orkut. Such services provide means by which users can publicly articulate their mutual "friendship" in the form of friendship links, forming an undirected graph in which users are the nodes and friendship links are the edges. These services also allow users to describe themselves in a profile, including attributes such as age, marital status, sexual orientation, and various interests. These services profess any number of goals, ranging from supporting dating and creating communities of shared interest to facilitating new business connections. Newman provides a wonderful overview of the statistical properties of such networks and boyd describes emergent social phenomena surrounding social networking service.
from-Vizster-Visualizing Online Social Networks
"social network artist"-
i'm never know that, what so many kind of art-!
Ben Discoe’s, Friendster Map : Well, you can do that using cyworld.
Mark Lombardi, Global Networks (using pen, pencil, paper)
Official Computer Scene Sexchart
Warren Sack and Sawad Brooks
Saturday, March 29, 2008
3/26&3/28 what about W W W
He is senior research scientist, laboratory for computer science (lcs), mit and 3com founders chair, lcs, mit.He made 'World Wide Web' from'Hypertext' and the world-wide web consortium.
He is motivation of research of WWWis that developed to be a pool of human knowledge, which would allow collaborators in remote sites to share their ideas and all aspects of a common project. (ORGANIZATIONS AND STANDARDS)
WWW write a characterin simplified form 'World Wide Web'.
WWW is the collaborately authored hypertext and the standard in Internet. like a ISO, IETF, RFC.
ISO is a network of national standards institutes from 145 countries working in partnership with international organizations, governments, industry, business and consumer representatives.It has created over 12,000 standards.
IETF is 'Internet Engineering Task Force'. They define standardprotocol in internet.
RFC is 'Request For Comments'.Each distinct version of an Internet standards-related specification is published as part of theRFC document series.
URIs is 'Universal Resource Identifier'. This is used for address of homepage.
HTML is 'the HyperText Markup Language'.
try [view] --> [source] in your web browser.
html is derived from sgml (standard generalize markup language).
sgml is intended to be a means to make explicit the content and structure of a document.
HTTP is 'the HyperText Transfer Protocol'.
It is designed for transferring information for hypertext documents.
Media Artist clip
baik nam june-
was a South Korean-born American artist. He worked with a variety of media and is considered to be the first video artist.He is considered by some to have been the author of the phrase "Information Superhighway", which, according to his own account, he used in a Rockefeller Foundation paper in 1974.
lisa jevbratt
1967 in Vaxholm (S); lives in San José (USA).Lisa Jevbratt is a Swedish research theorist, systems and Internet artist. Her projects explore data mining, organizational structures, information filtering, data organization and mapping, aesthetic, political, and cultural implications of the languages and protocols of emerging technologies. She is a member of C5 and a board member of the New Langton Arts Gallery in San Francisco where she is curating the Net Work program. Jevbratt has an MFA in Computers In Fine Art from the CADRE Institute at San Jose State University, where she is currently teaching. Jevbratt’s works and collaborations essentially create new imagery by reorganizing the oceans of data on the Internet and other created networks in unique ways. Theory becomes concrete using data as the medium.
mark napier
Sunday, March 23, 2008
19,21 mar! in to the Hypertext-!
so he thinked better, faster access to computer.main point
Saturday, March 15, 2008
3/12&3/14 'course overview and hypertext'
start!
-welcome to the present
still this class is hard to me
yoon professor to us with powerpoint presentation.
he emphasis on two key points.
one is when digital media technologies connect or separate people,
they became media. another is technologies embody social, political, cultural, economic and philosophical dieas and realationships.
he displayed some pictures and explains connect or separate.
especially I'm concentrate my attention.because of art part is my major too
and also i had learned very miraclously drawing method to this expalantion
white egg???i just eating and massaging to my handsome face(oh..)
after finished presentation, he talked about reading homework.
also power point system is very interesting and yoon professor's explanation too.
but English class is............not interesting to me yet.....hmm
-As we may think
I'm never thougt originator or that network&html
because i haven't interest this part(oh.........very hard!!!!!!!!!-0-)
This acticle written by Vannevar Bush
Information is over and over, so he think solution method.
That is a Memex. Memex is theoretical proto-hypertext computer system.
he think memex will assist us to process information.
In this point Memex shows future! the pressent we are not use internet with hyper-rink, this origin from Memex..In short, Bush see the future-wow......he is foreknowable?
estra episde-3/14
two days ago yoon professor's command was grinding our teeth
"I had only 5person set a question."
'5person.....ye...we are 60...i'm never belong on 5person!that's lower than 10%'
but if......i'm belong on 5person???!!!!!
i'm nesecessary had looking for this letter.
but i'm not clarely translation to this paper before when today class...
and.... unfortunatly.....i'm choosed yoon professor.....
this moment i'm become rigid with nervous tension
I'm boundless sorry to yoon professor.
next class i'm ready to all hard sledding!^-^