Thursday, June 12, 2008

6/4&6/6 "open-sources"

This week, we learned about of "open-sources ".
what are these things to "open-sources "?
what is “resistance” in digital media?





what is “resistance”?

tactics and means to oppose the strategies of “The Prince”
–e.g., while the prince tries to “divide and conquer,” the resistance tries to overcome the imposed isolation


countering the techniques and “technologies of power” (cf., Foucault) that impose isolation, distraction and domination through surveillance, entertainment, and force





what is a software virus?


virus: [from the obvious analogy with biological viruses, via SF] n. A cracker program that searches out other programs and `infects' them by embedding a copy of itself in them, so that they become {Trojan Horse}s. When these programs are executed, the embedded virus is executed too, thus propagating the `infection'. This normally happens invisibly to the user. Unlike a {worm}, a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends (see {SEX}). The virus may do nothing but propagate itself and then allow the program to run normally. Usually, however, after propagating silently for a while, it starts doing things like writing cute messages on the terminal or playing strange tricks with your display (some viruses include nice {display hack}s). Many nasty viruses, written by particularly perversely minded {cracker}s, do irreversible damage, like nuking all the user's files. - Hackers’ Dictionary





what is a software “trojan horse”?


Trojan horse: [coined by MIT-hacker-turned-NSA-spook Dan Edwards] n. A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or (in one notorious 1990 case on the Mac) a program to find and destroy viruses! See {back door}, {virus}, {worm}. -Hackers Dictionary





what is “worm”?


worm: [from `tapeworm' in John Brunner's novel `The Shockwave Rider', via XEROX PARC] n. A program that propagates itself over a network, reproducing itself as it goes. Compare {virus}. Nowadays the term has negative connotations, as it is assumed that only {cracker}s write worms. Perhaps the best-known example was Robert T. Morris's `Internet Worm' of 1988, a `benign' one that got out of control and hogged hundreds of Suns and VAXen across the U.S. See also {cracker}, {RTM}, {Trojan horse}, {ice}. -Hackers Dictionary





what is a software “bomb”?


logic bomb: n. Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met. Compare {back door}. -Hackers’ Dictionary





what is a “back door”?


back door: n. A hole in the security of a system deliberately left in place by designers or maintainers. The motivation for this is not always sinister; some operating systems, for example, come out of the box with privileged accounts intended for use by field service technicians or the vendor's maintenance programmers. Historically, back doors have often lurked in systems longer than anyone expected or planned, and a few have become widely known. The infamous {RTM} worm of late 1988, for example, used a back door in the {BSD} UNIX `sendmail(8)' utility. -Hackers Dictionary



examples of open source software


Internet
–Apache, which runs over 50% of the world's web servers.
–BIND, the software that provides the DNS (domain name service) for the entire Internet.
–sendmail, the most important and widely used email transport software on the Internet.
–Mozilla, the open source redesign of the Netscape Browser
–OpenSSL is the standard for secure communication (strong encryption) over the Internet.categories.








Sunday, May 25, 2008

5/21&5/23 Public&Privacy


 
 
 
"Keeping your privacy

By the way what is your think about your publical foam?"


Human-life is aways scared to privacy.
then, people has been invented to protecting our life


surveillance

close watch kept over someone or something
Etymology: French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful


from surveillance to dataveillance

total information awareness agency
now the “terrorism information awareness” project
name change as of may 21, 2003 to mollify congress’ worries about intrusion of the privacy of u.s. citizens
headed by convicted felon (former admiral) john poindexter


surveillance model versus capture model

surveillance model: is built upon visual metaphors and derives from historical experiences of secret police surveillance
capture model: is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time


digital media versus computer science

digital media studies: some architectures (e.g., democratic ones) are best designed to be inefficient
computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures


cookies

cookies are information that a web server stores on the machine running a web browser
–try clearing all of the cookies in your web browser and the visit web sites that you have been.



Agre on “elaboration”

“The captured activity records, which are in economic terms among the products of the reorganized activity, can now be stored, inspected, audited, merged with other records, subjected to statistical analysis, ... and so forth.”


Sunday, May 18, 2008

5/14&5/16 "Human"


"All about things to technology is existenced for human."


dr.yoon was introducing about these on this week.




1.Prosthesis


For other uses, see Prosthesis (disambiguation).
In medicine, a prosthesis is an artificial extension that replaces a missing body part. It is part of the field of biomechatronics, the science of fusing mechanical devices with human muscle, skeleton, and nervous systems to assist or enhance motor control lost by trauma, disease, or defect. Prostheses are typically used to replace parts lost by injury (traumatic) or missing from birth (congenital) or to supplement defective body parts. In addition to the standard artificial limb for every-day use, many amputees have special limbs and devices to aid in the participation of sports and recreational activities.


2.Donna Haraway


Donna Haraway (born September 6, 1944 in Denver, Colorado) is currently a professor and chair of the History of Consciousness Program at the University of California, Santa Cruz, United States. She is the author of Crystals, Fabrics, and Fields: Metaphors of Organicism in Twentieth-Century Developmental Biology (1976), Primate Visions: Gender, Race, and Nature in the World of Modern Science (1989), Simians, Cyborgs, and Women: The Reinvention of Nature (1991), and Modest_Witness@Second_Millennium.FemaleMan©Meets_OncoMouse (1997).
Haraway earned a degree in Zoology and Philosophy at the Colorado College and received the Boettcher Foundation scholarship. She lived in Paris for a year, studying philosophies of evolution on a Fulbright scholarship before completing her Ph. D. from the Biology Department of Yale in 1972. She wrote her dissertation on the functions of metaphor in shaping research in developmentalbiology in the twentieth century.
Haraway has taught Women's Studies and General Science at the University of Hawaii and Johns Hopkins University. In September, 2000, Haraway was awarded the highest honor given by the Society for Social Studies of Science, the J. D. Bernal Award, for lifetime contributions to the field. Haraway has also lectured in feminist theory and techno-science at the European Graduate School in Saas-Fee, Switzerland. Haraway is a leading thinker about people's love and hate relationship with machines. Her ideas have sparked an explosion of debate in areas as diverse as primatology, philosophy, and developmental biology


3.Lisa Nakamura


The Internet presents a real dilemma to postcolonial theorists, writers, and intellectuals; indeed, perhaps to postcolonial theory itself. The range and tone of responses to cyberspace reflect a deep split in the ways that this new communication technology is viewed by non-Western cultures and races. Ziauddin Sardar sees the Internet as a tool of imperialism, and he asserts that it is simply the newest example on a continuum of imperializing practices perpetrated by the West in its ongoing domination of other cultures. He regards cyberspace as a medium that can only transmit imperialistic ideologies; its background in military research and high cost of access makes it intrinsically a Western technology with no potential for resistance by people of color. In short, he sees it as a medium that’s inherently flawed by its association with modernity, tropes of colonialism, and hypercapitalism. His critique is extremely similar in many ways to Chinua Achebe’s famous response to Joseph Conrad’s Heart of Darkness. There’s no turning back from the way that Achebe singlehandedly politicized that text; the Norton Critical Edition of the novel includes it because it’s now become part of the discursive field of postcolonial criticism as well as a virtuoso reading of the text. Achebe demonstrates that Conrad’s novel depicts natives as irredeemably Other, as the West’s dark side. Sardar says that cyberspace accomplishes the same thing.On the other hand, many new media collectives in traditionally “media poor” countries who lack widespread access to the Internet strongly assert the usefulness of Internet and computer use in the context of non-Western culture. The Sarai New Media Centre in Delhi is trying to make software for people who are non-literate as a means to wrest the medium away from cultural elites. Even more importantly, this move away from textual literacy produces expressive forms which are more in line with the culture’s distinctive media landscape, thus reducing the dangers of imperializing incursions from the West. Jeebesh Bagchi, Sarai member and a Raqs media collective artist, claims that “India is a song and visual sign board culture” and asks, “What kind of dialogue with this strange and eclectic world do we want to create, not based on domination or populism?” (qtd. in Lovink 212). Envisioning and using the Internet in visual rather than primarily textual ways can be a radically empowering move for non-literate groups.

Sunday, May 11, 2008

5/7&5/9 "Computer games"


what’s in a game engine?


graphics
physics
ai
...and a lot more


game “mods”


Mod (modification: fps, rpgs, real-time strategy games)
by general public or developer
can be entirely new games in themselves
partial conversions (total conversions)example development environment


games research and development



example groups and events:
the game developers’ conference:
http://www.gdconf.com/
game studies: academic journal:
http://gamestudies.org/
research groups:
academic: e.g., Center for Computer Games Research, IT University of Copenhagen
industry: and, of course, the folks at Microsoft, Electronic Arts, etc.
art:
e.g., the show Bang the Machine: Computer Gaming Art and Artifacts
e.g., alternative games competition, Rhizome.org at the New Museum, New York City, March 2004




what makes a good game?


play? or,
story? or,

realism? or, is it
something else?


more than identification



“When you play a video game you enter into the world of the programmers who made it. You have to do more than identify with a character on the screen. You must act for it. Identification through action has a special kind of hold. Like playing a sport, it puts people into a highly focused, and highly charged state of mind. For many people, what is being pursued in the video game is not just a score, but an altered state.
from Sherry Turkle, “Video Games and Computer Holding Power”


identification



Identification is known to psycho-analysis as the earliest expression of an emotional tie with another person. It plays a part in the early history of the Oedipus complex. A little boy will exhibit a special interest in his father; he would like to grow like him and be like him, and take his place everywhere. We may say simply that he takes his father as his ideal.
from Sigmund Freud, Group Psychology and the Analysis of the Ego
Cf., Jacques Lacan on “The Mirror Stage,” and writings about identification in film theory by Laura Mulvey, Kaja Silverman, Christian Metz, Stephen Heath, and others


space: what’s a boy’s space?



is it a place where boys can...
enjoy lurid images?
prove themselves with stunts?
gain mastery?
(re)produce hierarchies?
vent aggressive feelings?
engage in scatological humor?
competitively role-play?
and bond together
these criteria are from Henry Jenkins’ article



Monday, May 5, 2008

4/30&5/2 "computer-aid"



key-point
every digital media technology has an architecture using diagrams to compare physical architectures with digital architectures

CSCW
computer-supported cooperative work (CSCW) is a field of research and design. (ex: CAD/CAM, ABB Powerwall, Drug Design)


Winograd and Flores
Winograd and Flores present a methodology for CSCW analysis and design. This methodology is commonly known as the “language/action” perspective.


design as conversation construction
any organization is constituted as a network of recurrent conversations (ex: issue, topic, theme…)
conversations are linked in regular patterns of triggering and breakdown (ex: next issues…)
in creating tools we are designing new conversations and connections (ex: ways, methods, rules…)
computers are a tool for conducting the network of conversations (ex: how-to, clues ….)


Technologies embody social, political, cultural, economic and philosophical ideas and relationships.
Every digital media technology has an architecture that can be used to transform work, play and governance.


physical architecture and digital architecture
For example, The Social Logic of Space(1990)
by Bill Hillier and Julienne Hanson




Sunday, April 27, 2008

4/23&4/25 Human-computer interaction


We used all about machine that usually has A.I?
what a wonderful world!
and what's that means "HCI?"
where does "HCI" meet "A.I"?

key point


People often interact with media technologies as though the technologies were people.
–related ideas
Clifford and Nash, “the media equation”
Freud, transference
–see also Sherry Turkle on computers as “second selves” and as “evocative objects”
surrealists, “automatic writing” (recall Tristan Tzara’s “recipe”)
Mannheim/Schutz/Garfinkel, the “documentary method”


related points: ethics

questions of ethics and “others”
–should we treat technologies as people or people as technologies?
–should we only treat others who are like us with care and respect? or, should we also extend our care and respect to others who are radically different?
–what makes believe someone or something is alive, thinking, or simply the same as us?


history of HCI as tools: people

people:
–Vannevar Bush: memex
–J.C.R. Licklider: computer networking, agents
–Ivan Sutherland: sketchpad
–Doug Engelbart: mouse, GUI, word processing, etc.
–Ted Nelson: hypertext
–Alan Kay: object-oriented programming, laptops, ...



basic design question: should the computer act like a person?
–agents versus “direct manipulation”
e.g., Ben Schneiderman versus Pattie Maes (sigchi, 1997)
even “direct-manipulation” interfaces are based on a “conversation” metaphor: the computer responds immediately to each action or command from the “user”
but, there are (at least) two models of conversation
–information/intention transmission
inspirations for ai: e.g., Paul Grice, pragmatics
–co-construction of meaning
ethnomethodology: e.g., Harvey Sacks, conversation analysis
Boring? ok.. let’s watch some movie related to HCI generally.
–hci lesson from “Sleeper”
»1) Reliability
»2) Personalization
»3) if it isn’t broken, don’t fix it
»4) intuitive UI design

Sunday, April 13, 2008

4/11 artificial intelligence


artificial intelligence is what's that means?




Artificial intelligence (AI) is both the intelligence of machines and the branch of computer science which aims to create it.
Major AI textbooks define artificial intelligence as "the study and design of intelligenagents,"where an intelligent agent is a system that perceives its environment and takes actions which maximize its chances of success.AI can be seen as a realization of an abstract intelligent agent (AIA) which exhibits the functional essence of intelligence.John McCarthy, who coined the term in 1956, defines it as "the science and engineering of making intelligent machines."
Among the traits that researchers hope machines will exhibit are reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects.General intelligence(or "strong AI") has not yet been achieved and is a long-term goal of AI research.
AI research uses tools and insights from many fields, including computer science, psychology, philosophy, neuroscience, cognitive science, linguistics, ontology, operations research, economis, control theory, probabilit, optimization and logic. AI research also overlaps with tasks such as robotics, control systems, scheduling, data mining, logistics, speech recognition, facial recognition and many others. Other names for the field have been proposed, such as computational intelligence,synthetic intelligence,intelligent systems,or computational rationality(wikipedia.org)



Alan Turing


-ounder of computer science, artificial intelligence, mathematician, philosopher, codebreaker, and a gay man


“imitation game”


The new form of the problem can be described in terms of a game which we call the ‘imitation game.’ It is played with three people, a man, a woman, and an interrogator who may be of either sex. The interrogator stays in a room apart from the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman.”
Turing Test more on Turing test



when i saw this movie that A.I, i'm was really feld interesting


& Now,l'm introducing this movie-(source by wikipedia.org)


A.I. was initially inspired by "Super-Toys Last All Summer Long", a short story published in 1969 by UK science fiction writer Brian Aldiss.
During the 1980s, Kubrick and Aldiss began to develop the story into a script for a feature film. Aldiss said later that Kubrick's theory of writing features revolved around six to eight "non-submersible units" — his name for interesting sequences. They came up with three or four of these, by taking ideas from other Aldiss stories.
Aldiss claims he never felt the story could be successfully expanded into something bigger, as its original focus was intimate, and this seems to have been the origin of his problems with Kubrick, who was equally certain it could be fully fleshed out. There was also a dispute over money.[citation needed] These factors, along with Kubrick's desire to use elements from Pinocchio,[citation needed] caused their relationship to deteriorate. Kubrick fired Aldiss in 1990.Irish science fiction novelist Bob Shaw was brought on board for a few months, but he found Kubrick too demanding.Kubrick turned to UK science fiction notable Ian Watson, and the two produced the long treatment (credited to Watson). Both British feminist writer, Sara Maitlandand Arthu C. Clarke added ideas to the story.[citation needed] A science fiction painter, Chris Baker, also known as "Fangorn", was commissioned to produce hundreds of pieces of concept art from ideas and descriptions given to him by Kubrick. Chris Cunningham, a British music video film director (famous for the video "Come to Daddy" by Aphex Twin), worked for over a year on the film.[After Kubrick died in 1999, his widow contacted Spielberg, whom Kubrick had previously asked to direct the film and with whom he had discussed the project at length, and she asked him to finish producing the movie. Spielberg used the Kubrick-Watson treatment as the basis for the screenplay, which he wrote himself.He bought the rights to Aldiss' two brief sequels to "Supertoys" and ideas from them appear in the movie.
The movie had an unusual publicity campaign consisting of a new type of "game" involving approximately 30 interlinked websites. This type of game has since become known as an alternate reality game (ARG). The A.I. game did not have an official name, but became known as The Beast by its most ardent fans.

Saturday, April 5, 2008

4/2&4/4 "Social network"


social nerwork is explaning to media people.



-New media technologies usually reinforce existing social networks or even work to isolate people.

isolate people is common happening to media peaple.
"hikihomori"is very famous disease in japan

-When new media technologies facilitate new social networks, they simultaneously challenge existing social, political and economic relationships.

social network analysis is an interdisciplinary social science, but has been of especial concern to sociologists
recently, physicists and mathematicians have made large contributions to understanding networks in general (as graphs) and thus contributed to an understanding of social networks too.

New media technologies usually reinforce existing social networks or even work to isolate people.
When new media technologies facilitate new social networks, they simultaneously challenge existing social, political and economic relationships.


centrality bridge is very imfortant to social network!
and dr.yoon was showing us that really interested infomations
i'm use to kind of many webpage that it was so great

amazon network is so many works do that anounced inform user's to another user.
from 'each national speaker!!!!!'
"People who bought this book also bought."

social networks as popular culture-kecin vacon
he is central bridge in movie network
-kevin bacon has a bacon number of 0
an actor, A, has a bacon number of 1 if s/he appeared in a movie with kevin bacon
an actor, B, has a bacon number of 2 if s/he appear in a movie with A
etc.

and then, dr.yoon was very intersted say that "oracle of bacon"
Deph story & oracle who appearing to movie"metrix"


Vizster is an interactive visualization tool for online social networks, allowing exploration of the community structure of social networking services such as friendster.com, tribe.net, and orkut. Such services provide means by which users can publicly articulate their mutual "friendship" in the form of friendship links, forming an undirected graph in which users are the nodes and friendship links are the edges. These services also allow users to describe themselves in a profile, including attributes such as age, marital status, sexual orientation, and various interests. These services profess any number of goals, ranging from supporting dating and creating communities of shared interest to facilitating new business connections. Newman provides a wonderful overview of the statistical properties of such networks and boyd describes emergent social phenomena surrounding social networking service.



from-Vizster-Visualizing Online Social Networks

"social network artist"-
i'm never know that, what so many kind of art-!
Ben Discoe’s, Friendster Map : Well, you can do that using cyworld.
Mark Lombardi, Global Networks (using pen, pencil, paper)
Official Computer Scene Sexchart
Warren Sack and Sawad Brooks

Saturday, March 29, 2008

3/26&3/28 what about W W W





Tim verners-lee
He is senior research scientist, laboratory for computer science (lcs), mit and 3com founders chair, lcs, mit.He made 'World Wide Web' from'Hypertext' and the world-wide web consortium.
He is motivation of research of WWWis that developed to be a pool of human knowledge, which would allow collaborators in remote sites to share their ideas and all aspects of a common project. (
ORGANIZATIONS AND STANDARDS)

WWW
WWW write a characterin simplified form 'World Wide Web'.
WWW is the collaborately authored hypertext and the standard in Internet. like a ISO, IETF, RFC.


ISO

ISO is 'International Standards Organization'.
ISO is a network of national standards institutes from 145 countries working in partnership with international organizations, governments, industry, business and consumer representatives.It has created over 12,000 standards.

IETF
IETF is 'Internet Engineering Task Force'. They define standardprotocol in internet.

RFC
RFC is 'Request For Comments'.Each distinct version of an Internet standards-related specification is published as part of theRFC document series.

URIs
URIs is 'Universal Resource Identifier'. This is used for address of homepage.

HTML
HTML is 'the HyperText Markup Language'.
try [view] --> [source] in your web browser.
html is derived from sgml (standard generalize markup language).
sgml is intended to be a means to make explicit the content and structure of a document.

HTTP
HTTP is 'the HyperText Transfer Protocol'.
It is designed for transferring information for hypertext documents.


Media Artist clip



baik nam june-


was a South Korean-born American artist. He worked with a variety of media and is considered to be the first video artist.He is considered by some to have been the author of the phrase "Information Superhighway", which, according to his own account, he used in a Rockefeller Foundation paper in 1974.



lisa jevbratt


1967 in Vaxholm (S); lives in San José (USA).Lisa Jevbratt is a Swedish research theorist, systems and Internet artist. Her projects explore data mining, organizational structures, information filtering, data organization and mapping, aesthetic, political, and cultural implications of the languages and protocols of emerging technologies. She is a member of C5 and a board member of the New Langton Arts Gallery in San Francisco where she is curating the Net Work program. Jevbratt has an MFA in Computers In Fine Art from the CADRE Institute at San Jose State University, where she is currently teaching. Jevbratt’s works and collaborations essentially create new imagery by reorganizing the oceans of data on the Internet and other created networks in unique ways. Theory becomes concrete using data as the medium.



mark napier


Mark Napier has been creating artwork exclusively for the Web since 1995. He combines his training as a painter with fifteen years of expertise as a software developer to create "art interfaces," software that addresses issues of authority, ownership, and territory in the virtual world. Napier has received a NYFA Fellowship (2001) and a grant from the Greenwall Foundation (2001), and his work has been reviewed by The New York Times, ArtByte, Wired News and many international publications. Although net.flag is the first work to be acquired by a museum, Napier has also been commissioned to create Internet artwork for the San Francisco Museum of Modern Art and the Whitney Museum of American Art. His work has been shown in the Whitney Biennial (2002), SFMOMA's 010101, the Whitney's Data Dynamics, ZKM's net_condition, the Walker's Art and Entertainment Network; at new media festivals in Germany, Italy, Denmark, and South America; and at his own Web site, www.potatoland.org.





coment for blog-


hello,my fashionable blog-

this write is present for you at the third time

when i writed to this area, i had really great passion

and then, now, what did i say.....decreased a little much...

but now,i don't be fall in to dozen because, i must have "A".haha...

Sunday, March 23, 2008

19,21 mar! in to the Hypertext-!






hi:) this is secound time
i'm very interested when found new things


start-!
i'm thingking about a memex was near to 'imagenation'
but Douglas C. Engelbart's works was near to "realization"

what l this think?


this time, we also learend hypertext which is relative with that of last time.

hypertext means One way that digital media has been understood is as new forms of writing, reading and thinking.
and a system that people get information which was wanted by sequence.
this hypertext is near with dadaism.
for example, a person think one word.
and think another one word. c
onsistently he think a word. and then he collect word and make poem.
but this poem has no sense.second, a person choose an article, cut out article.
hmm.........but this cut ups doesn't limited text. voice, sound, image etc...............
so many things made by this method.
engelbarthe wants to increase man's intellect.

"Man’s population and gross product are increasing at a considerable rate, but the complexity of his problems grows still faster, and the urgency with which solutions must be found becomes steadily greater. Augmenting man’s intellect, would warrant full pursuit by an enlightened society…as we read that, this world becomes very complex and urgence.
so he thinked better, faster access to computer.main point
he invented mouse, demo etc.in that time many people think engelbart's products were poor,
no available. but today, we use them perfectly.
commentfrankly say, in first I didn't understand the that page so I read mat times.
now a little bit I understand.I think engelbart is a great man. surely he invented many things, but I respect his unique concept paradime.
he considerate new idea, practise, research.
so new technology appear world we use much more convenient
a conclusion i think new invention is make by begining to somone's thougt.

Saturday, March 15, 2008

3/12&3/14 'course overview and hypertext'




ye....:)this is my first paper....
I'm not ready to start write English...




start!
-welcome to the present
still this class is hard to me
yoon professor to us with powerpoint presentation.
he emphasis on two key points.

one is when digital media technologies connect or separate people,
they became media. another is technologies embody social, political, cultural, economic and philosophical dieas and realationships.
he displayed some pictures and explains connect or separate.

especially I'm concentrate my attention.because of art part is my major too
and also i had learned very miraclously drawing method to this expalantion
white egg???i just eating and massaging to my handsome face(oh..)
after finished presentation, he talked about reading homework.

also power point system is very interesting and yoon professor's explanation too.
but English class is............not interesting to me yet.....hmm

-As we may think


I'm never thougt originator or that network&html
because i haven't interest this part(oh.........very hard!!!!!!!!!-0-)
This acticle written by Vannevar Bush

Information is over and over, so he think solution method.
That is a Memex. Memex is theoretical proto-hypertext computer system.
he think memex will assist us to process information.
In this point Memex shows future! the pressent we are not use internet with hyper-rink, this origin from Memex..In short, Bush see the future-wow......he is foreknowable?


estra episde-3/14

two days ago yoon professor's command was grinding our teeth
"I had only 5person set a question."
'5person.....ye...we are 60...i'm never belong on 5person!that's lower than 10%'

but if......i'm belong on 5person???!!!!!
i'm nesecessary had looking for this letter.
but i'm not clarely translation to this paper before when today class...
and.... unfortunatly.....i'm choosed yoon professor.....
this moment i'm become rigid with nervous tension

I'm boundless sorry to yoon professor.
next class i'm ready to all hard sledding!^-^