2008년 5월 25일 일요일

Class for 08.05.21~23

Class for 08.05.21~23






This class's key points are public & privacy.

We talked surveillance that means close watch kept over someone or something. surveillance's etymology is : French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful. Some artists and art groups concerned with surveillance. Example of technologies of surveillance is Viisage & Superbowl XXXV. We can see the company homepage(http://www.viisage.com)./

From surveillance to dataveillance. Name change as of may 21, 2003 to mollify congress’ worries about intrusion of the privacy of u.s. citizens. Headed by convicted felon (former admiral) john poindexter. Patriot act and post 9/11. And we see Aclu’s analysis. New powers of surveillance, search and seizure.

Surveillance model versus capture model.

Surveillance model: is built upon visual metaphors and derives from historical experiences of secret police surveillance.

Capture model: is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time.

We thought capture (in comparison with surveillance) . linguistic metaphors (e.g., grammars of action).
privacy: a definition
1. The quality or state of being apart from company or observation.
SECLUSION: freedom from unauthorized intrusion
2. Archaic : a place of seclusion.

We talked what are the connections between the public and the private. Resistances between private and public.
Lawrence Lessig on the merits of inefficiency. An inefficiency that makes it harder for these technologies to be misused. And of course it is hard to argue that we ought to build in features of the architecture of cyberspace that will make it more difficult for government to do its work. It is hard to argue that less is more.
Digital media versus computer science.
Digital media studies: some architectures (e.g., democratic ones) are best designed to be inefficient.
Computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures.
Lessig on architecture of privacy.
Life where less is monitored is a life more private; and life where less can (legally perhaps) be searched is also a life more private.
Architectures of privacy. From doors, windows and fences. To wires, networks, wireless networks, databases and search engines. Example: architecture of the web.
We can monitoring on the web.
Cookies are information that a web server stores on the machine running a web browser.
–try clearing all of the cookies in your web browser and the visit web sites that you have been.
Encyption: the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. “data mining” is one form of “elaboration”
Types of data mining.
First, descriptive: compute a relatively concise, description of a large data set. Second, predictive: predict unknown values for a variable for one or more known variables.
–e.g., will this person likely pay their bills on time?
Data mining tasks is regression,classification,clustering,inference of associative rules,inference of sequential patterns.



*comments*



public & privacy
Where is place in which privacy is kept? Room? Bath room?
I think privacy more.
I am interested incapture , data mining and so on.
*




2008년 5월 17일 토요일

Class for 08.05.14~16

Class for 08.05.14~16






This class' topic is human.
Media as mirrors versus media as prostheses. Medium as mirror - we see “ourselves” in the medium. Medium as prosthesis - we are radically altered by a medium.
A definition of media studies. Media studies is the theory and practice of exploring how people and things are connected, reflected, extended, reconfigured, and separated by technologies and techniques. Media as mirrors and machinations, prostheses.
Digital media studies is a kind of media studies that pays especial attention to the techniques and technologies of computers and computer networks.
Mediation: how are we connected/separated? Hypertexts, networks, documentary method and identification (or even, “more than identification”), prostheses/extensions, Haraway’s proposals.
Physical-non-physical (e.g., molecular-scale machines of electromagnetism and light).
Identity and cyborgs: identity and affinity. What is a cyborg? Democratic, liberal politics; identity politics; biopolitics; and, cyborg politics.
Democratic, liberal politics. One of the good assumptions about democratic politics: we are all equal (i.e., “universal man”) . One of the unrealistic assumptions about democratic politics: we are all equal (i.e., “universal man”). Race, class, gender, sexuality, and a set of other social, political, cultural and economic differences separate us.
We talked background. Gender: who is a woman? who is a man? Race: who is black? who is white? Sexuality: who is straight? who is gay? Class: who is rich? who is poor?
Biopolitics: politics carried out through the means, the techniques and technologies of health and illness, statistics, the census, epidemiology and demography, the science of race, eugenics, population, abortion, genomics, and new reproductive technologies.
Mythology: A fabled fire-breathing monster of Greek mythology, with a lion's head, a goat's body, and a serpent's tail (or according to others with the heads of a lion, a goat, and a serpent), killed by Bellerophon.
From one perspective, a cyborg world is about the final imposition of a grid of control on the planet, about the final abstraction embodied in a Star Wars apocalypse waged in the name of defense, about the final appropriation of women’s bodies in a masculinist orgy of war.
From another perspective, a cyborg world might be about lived social and bodily realities in which people are not afraid of their joint kinship with animals and machines, not afraid of permanently partial identities and contradictory standpoints.
We have a means of short-circuiting differences of identity and institutional boundaries.
Cyborg politics is the struggle for language and the struggle against perfect communication, against the one code that translates all meaning perfectly, the central dogma of phallogocentrism.
One of the means to (re)connect people is through (re)coding systems because coded systems have become a means for defining who we are on a biological-level;
And also it’s no accident that the vocabulary of contemporary, molecular biology sounds like the vocabulary of computers: they were invented at about the same time.
The cyborg is a kind of disassembled and reassembled, post-modern collective and personal self. This is the self feminists must code.
Donna Haraway.
He is Professor of the History of Consciousness, UCSC and ssistant Professor of the History of Science, Johns Hopkins University also lecturer, Women Studies and History of Science, University of Hawai’i.
MUD stands for multi-user domain. MOO stands for MUD.





*comments*


I'm intereated in this part, human and cyborg through this class.




*

2008년 5월 12일 월요일

Class for 08.05.07~09

Class for 08.05.07~09







We continued to talk game.
There are two part of game. One is engine, and the other is participate.
Game engine is considered three points. One of them is graphics. And physics is very important in working together. Last point is ai. AI is running kind of rule. And a lot more.


“mods” is very interesting in game.
MOD(modification: fps, rpgs, real-time strategy games) Game is stimulated by mod.
Game can be entirely new games in themselves. For example, tum raider (original: tomb raider) . And pong in flash (original pong / mod 1 / mod 2) .

Ludology versus Narratology. The first campfire the guys on the hunt come back with a story to tell--that is something anybody can partake in. Ludology and Narratology is fighted. Professor said maybe Ludology is winer.

And we can see history of computer games.
There are two issues to consider from film theory.
One is identification. We thought about how do people relate to the characters and action on the screen. e.g., what do women do/think when the hero is a man versus when the hero is a woman?
Also thought about what does a designer or filmmaker do to facilitate the audience’s/players’ relations with characters and actions on the screen.
e.g., filmmaking techniques: POV, suture, the 180 degree rule, etc.


Two is space. We htought what is the space of cinema/games? what can the audience/player see or do there? And what can the designer or filmmaker do to increase, decrease, or change the space? e.g., montage and also think about the filming and editing techniques listed above concerning identificatiom.

video games as “metaphysical machines”
video games discussed by turkle is space war,pong,asteroids,pac man,joust,adventure.



boy’s space is enjoy lurid images, and prove themselves with stunts, also gain master, (re)produce hierarchies, vent aggressive feelings, engage in scatological humor, competitively role-play, and bond together, hese criteria are from Henry Jenkins’ article .

Girl space is a space of secrets and romance, a space of one’s own in a world which offers you far too little room to explore.

And we thought about hot and cool media.





* Comments

Game is interesting part. I didn't know game is complex.
MOD is very important point. Look so cool. I want to try.






*

2008년 5월 5일 월요일

Class for 08.04.30~05.02

Class for 08.04.30~05.02





This class' key points is that every digital media technology has an architecture using diagrams to compare physical architectures with digital architectures.
We talked about ethnomethodology. Ethnomethodology means I know you for long time, in fact, I do'nt know you.
Ethnomethodologists assume that social order is illusory. They believe that social life merely appears to be orderly; in reality it is potentially chaotic. For them social order is constructed in the minds of social actors as society confronts the individual as a series of sense impressions and experiences which she or he must somehow organize into a coherent pattern.


•CSCW: computer-supported cooperative work.
CSCW is a field of research and design. (ex: CAD/CAM, ABB Powerwall, Drug Design)
CAD is computer Aided Design.
Researchers in this field investigate how people work together in groups, and design computer-systems and networks to enable or facilitate group work.
CSCW is considered to a part of a larger field known as CHI or HCI: human-computer interaction (HCI) design, evaluation, implementation, and study of interactive computing systems for human use.
Winograd and Flores present a methodology for CSCW analysis and design. This methodology is commonly known as the “language/action” perspective.
design as conversation construction
any organization is constituted as a network of recurrent conversations (ex: issue, topic, theme…)
conversations are linked in regular patterns of triggering and breakdown (ex: next issues…)
in creating tools we are designing new conversations and connections (ex: ways, methods, rules…)
computers are a tool for conducting the network of conversations (ex: how-to, clues ….)
Winograd and Flores: model of conversation
conversations are sequences of actions because by saying things people are understood to be doing things;

i.e., saying = doing;
–e.g., taking an oath in court, saying “I do” in a wedding, etc. are not just words, but words that perform actions.
this classroom: a language/action perspective
what is our network of recurrent (repeating) conversations? --->organization
what are our patterns of triggering and breakdown? --> linking t to t
how do we use computers and networks to conduct this network of conversations? --> creating tools
what new media technologies might be designed to create new conversations and connections? --> blogs …
Every digital media technology has an architecture that can be used to transform work, play and governance.
For example, a city plan from Hillier and Hanson

And then we talked what is the architecture of cyberspace?
•consider the hardware and software that links together (or separates) groups of people
e.g the bandwidth of a network and network protocols (like HTTP or FTP or SMTP or NNTP, etc.) “threads”; i.e., links between email messages.
We talked Agre’s “surveillance model” surveillance model is visual metaphors.
And assumption that watching is non-disruptive. Also territorial metaphors as in the “invasion of private space” Next, centralized orchestration by means of a bureaucracy with a unified set of files. Finally identification with the state and malevolent aims of a specifically political nature.
surveillance is close watch kept over someone or something.
Etymology: French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful


history of surveillance: the panopticon
Panopticon developed by Jeremy Bentham in the 18th century for prison
Similar designs adapted for hospitals and factories
In the 18th century prisons and hospitals known, in France, collectively as “environments of humanity”

Claude-Nicolas Ledoux’s salt plant at arc-et-senans (1779)-a hierarchical organization of work

•Michel Foucault: “I would say that Bentham was the complement Rousseau. What in fact was the Rousseauist dream that motivated many of the revolutionaries? It was the dream of a transparent society, visible and legible in each of its parts, the dream of there no longer existing any zones of darkness, zones established by the privileges of royal power or the prerogatives of some corporation.” But They that can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.



*comments

This class is so interesting.
Claude-Nicolas Ledoux’s and HCI and surveillance and Ethnomethodology is cool.






*

2008년 4월 25일 금요일

Class for 08.04.23~25

Class for 08.04.23~25




This class's key point is that has implications for the aesthetic, ethics and evaluation of human-computer interaction. Second, history of HCI from a tools perspective. And conversational models of the interface: the intersection of AI and HCI . And also, question for today: what problem does Weizenbaum’s ELIZA system address or solve? And then, the answer of AI.
And, the answer of Ethnomethodology. Finally, People often interact with media technologies as though the technologies were people.
Here is related ideas. One is clifford and Nash, “the media equation” Two, Freud, transference
–see also Sherry Turkle on computers as “second selves” and as “evocative objects”
Three, surrealists, “automatic writing” (recall Tristan Tzara’s “recipe”)
Finally, Mannheim/Schutz/Garfinkel, the “documentary method”

If we view objects, technologies and natural phenomenon as if they do, in fact, have goals and intentions, then we will design like an artificial intelligence researcher.

On the other hand, if we view objects, technologies and natural phenomenon as if the just look like they have goals and intentions, then we will design like a tool builder for human “users” or “operators” of our tools.

And we talked about HCI.
History of HCI as tools: people, tools, funding. And then, we talked about where does HCI meet AI. Basic design question: should the computer act like a person? Answer is agents versus “direct manipulation” e.g., Ben Schneiderman versus Pattie Maes (sigchi, 1997)

Question for today is what problem does Weizenbaum’s ELIZA system address or solve?
The artificial intelligence answer: it does (or does not) behave like a human and is therefore successful (or not successful)
The ethnomethodology answer: it is taken to be a like a person in a conversation and thus simply works like most other technologies in a social situation.

And next, we talked about Johnstone’s “algorithm”

•If the last two answers were “No,” then answer “Yes.”
•Else, if more than 20 total answers, then answer “Yes.”
•Else, if the question ends in vowel, then answer “No.”
•Else, if question ends in “Y,” then answer “Maybe.”
•Else, answer “Yes.”

And we thought ethnomethodology.
Ethnomethodology differs from other sociological perspectives in one very important respect:
Ethnomethodologists assume that social order is illusory. They believe that social life merely appears to be orderly; in reality it is potentially chaotic. For them social order is constructed in the minds of social actors as society confronts the individual as a series of sense impressions and experiences which she or he must somehow organise into a coherent pattern.


*comments*

HCI is amazing~. Surprise~
I'am interested in Johnstone’s “algorithm” Very interesting.





*

2008년 4월 12일 토요일

Class for 04.11

Class for 04.11



We have taked together about Alan Turing who founder of computer science, artificial intelligence, mathematician, philosopher, codebreaker, and a gay man.

Turing studied interesting game, “imitation game” (1 of 3) The new form of the problem can be described in terms of a game which we call the ‘imitation game.’

It is played with three people, a man, a woman, and an interrogator who may be of either sex.
The interrogator stays in a room apart from the other two. The object of the game for the interrogator is to determine which of the other two is the man and which is the woman.
It is [the man's] object in the game to try and cause [the interrogator] to make the wrong identification. The object of the game for [the woman] is to help the interrogator.

We now ask the question, ‘What will happen when a machine takes the part of [the man] in this game?’ Will the interrogator decide wrongly as often when the game is played like this as he does when the game is played between a man and a woman? These questions replace our original [question], ‘Can machines think?’

And we though artificial intelligence [AI] the science of making machines do things that would require intelligence as if done by humans. We also talked film AI.

We talked about Hanoi. GPS is what is known in AI as a “planner.” (not global positioning system! it is a computer program for theorems proof, geometric problems and chess playing.

To work, GPS required that a full and accurate model of the “state of the world” (i.e., insofar as one can even talk of a “world” of logic or cryptoarthimetic, two of the domains in which GPS solved problems) be encoded and then updated after any action was taken (e.g., after a step was added to the proof of a theorem).



*comments

I interested in Alan Turing's game. Surpise!
It is very interesting and that is connected AI.







*

2008년 4월 6일 일요일

Class for 08.04.02~04

Class for 08.04.02




Professor said key points so far. First, when technologies connect or separate people, they become media. Second, tembody social, political, cultural, economic and philosophical ideas and relationships. Third, when a medium is new, it is often used to simulate old media. Fourth, new media do not replace old media, they displace them. Last, people make media and then media make people.
And next, he said today's key points. One is that New media technologies usually reinforce existing social networks or even work to isolate people. For example is e-mail and messenger. Because e-mail and messenger are don't need to meet people. The other is that when new media technologies facilitate new social networks, they simultaneously challenge existing social, political and economic relationships.

This class' topic is social networking.
Social networks as science: field. Social network analysis is an interdisciplinary social science, but has been of especial concern to sociologists; Recently, physicists and mathematicians have made large contributions to understanding networks in general (as graphs) and thus contributed to an understanding of social networks too. For instant, treatises mix all field. And professor said he's experience.

Social networks as science: field.
Social network analysis is an interdisciplinary social science, but has been of especial concern to sociologists; Recently, physicists and mathematicians have made large contributions to understanding networks in general (as graphs) and thus contributed to an understanding of social networks too.
Social network as science: definition. Potential constraints on their behavior. For instance, go to army and network system. Example of network system is genealogical table.
Children connected between mother side and father side.

Social network as science: history. Like J.L. Moreno, kinship (family) studies, see Jeff Tobin, many people stuied social network history. The funny study is Stanley Milgram (1967)
Milgram sent 60 letters to various recruits in Wichita, Kansas who were asked to forward the letter to the wife of a divinity student living at a specified location in Cambridge, Massachusetts. The participants could only pass the letters by hand to personal acquaintances who they thought might be able to reach the target - whether directly or via a "friend of a friend". The world is small. Because that needed only six-degrees of separation.
This studies are important. We can know patten, and face each other.
And next example is this. Mark Granovetter, “The Strength of Weak Ties”
Sometimes acquaintances are more valuable than friends (e.g., when one is looking for a job).
- weak relationship > strong relationship. Because friends have similar interesting.

Social networks as science: equivalence. “structurally equivalent” means connect to the same people and thus have equivalent positions in the network.
social networks as science: social capital. If you connect separate networks you have bridging capital. If you are central to a network you have bonding capital.

Social networks as science: bowling alone. Sociologist robert putnam claims that united states citizens no longer know or trust their neighbors and thus communities have lost their social capital.

social networks as technology. For instance, email, newsgroups, and weblogs.
In the design of the arpanet (the forerunner to the internet) email was an afterthought!
Search engines: e.g., Google. Google’s Page Rank algorithm gives more weight to popular webpages. A webpage is considered popular if many other webpages link to it.
Compare this to search engines built specially for weblogs, music, movie and so on.
Collaborative filtering and/or recommender systems; e.g., amazon.com’s feature: “People who bought this book also bought...”

Social networks as popular culture. e.g., six degrees of kevin bacon.
Kevin bacon has a bacon number of 0. An actor, A, has a bacon number of 1 if s/he appeared in a movie with kevin bacon. An actor, B, has a bacon number of 2 if s/he appear in a movie with A. And etc. Try this with the internet movie database or, have it done automatically here, at the “oracle of bacon”.
“Fixing” the networks; e.g., Google hacking.
social networks as popular culture. Social software; e.g., friendster, orkut, tribe, cyworld etc. Tunderstand “artificial” social networks we need to rethink the social scientific concepts of “equivalence,” “centrality,” even “node” and “link.”

Social networks as art.
Ben Discoe’s, Friendster Map : Well, you can do that using cyworld.
Mark Lombardi, Global Networks (using pen, pencil, paper), Official Computer Scene Sexchart, Josh On (Futurefarmers), They Rule, Jonah Peretti, Nike Sweatshop Email, Angie Waller, Data Mining the Amazon.




*comments.

Networking is very important field. I studied many things.








*