2008년 5월 25일 일요일

Class for 08.05.21~23

Class for 08.05.21~23






This class's key points are public & privacy.

We talked surveillance that means close watch kept over someone or something. surveillance's etymology is : French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful. Some artists and art groups concerned with surveillance. Example of technologies of surveillance is Viisage & Superbowl XXXV. We can see the company homepage(http://www.viisage.com)./

From surveillance to dataveillance. Name change as of may 21, 2003 to mollify congress’ worries about intrusion of the privacy of u.s. citizens. Headed by convicted felon (former admiral) john poindexter. Patriot act and post 9/11. And we see Aclu’s analysis. New powers of surveillance, search and seizure.

Surveillance model versus capture model.

Surveillance model: is built upon visual metaphors and derives from historical experiences of secret police surveillance.

Capture model: is built upon linguistic metaphors and takes as its prototype the deliberate reorganization of industrial work activities to allow computers to track them [the work activities] in real time.

We thought capture (in comparison with surveillance) . linguistic metaphors (e.g., grammars of action).
privacy: a definition
1. The quality or state of being apart from company or observation.
SECLUSION: freedom from unauthorized intrusion
2. Archaic : a place of seclusion.

We talked what are the connections between the public and the private. Resistances between private and public.
Lawrence Lessig on the merits of inefficiency. An inefficiency that makes it harder for these technologies to be misused. And of course it is hard to argue that we ought to build in features of the architecture of cyberspace that will make it more difficult for government to do its work. It is hard to argue that less is more.
Digital media versus computer science.
Digital media studies: some architectures (e.g., democratic ones) are best designed to be inefficient.
Computer science: efficiency is almost always considered to be a virtue: efficient architectures are usually good architectures.
Lessig on architecture of privacy.
Life where less is monitored is a life more private; and life where less can (legally perhaps) be searched is also a life more private.
Architectures of privacy. From doors, windows and fences. To wires, networks, wireless networks, databases and search engines. Example: architecture of the web.
We can monitoring on the web.
Cookies are information that a web server stores on the machine running a web browser.
–try clearing all of the cookies in your web browser and the visit web sites that you have been.
Encyption: the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. “data mining” is one form of “elaboration”
Types of data mining.
First, descriptive: compute a relatively concise, description of a large data set. Second, predictive: predict unknown values for a variable for one or more known variables.
–e.g., will this person likely pay their bills on time?
Data mining tasks is regression,classification,clustering,inference of associative rules,inference of sequential patterns.



*comments*



public & privacy
Where is place in which privacy is kept? Room? Bath room?
I think privacy more.
I am interested incapture , data mining and so on.
*




2008년 5월 17일 토요일

Class for 08.05.14~16

Class for 08.05.14~16






This class' topic is human.
Media as mirrors versus media as prostheses. Medium as mirror - we see “ourselves” in the medium. Medium as prosthesis - we are radically altered by a medium.
A definition of media studies. Media studies is the theory and practice of exploring how people and things are connected, reflected, extended, reconfigured, and separated by technologies and techniques. Media as mirrors and machinations, prostheses.
Digital media studies is a kind of media studies that pays especial attention to the techniques and technologies of computers and computer networks.
Mediation: how are we connected/separated? Hypertexts, networks, documentary method and identification (or even, “more than identification”), prostheses/extensions, Haraway’s proposals.
Physical-non-physical (e.g., molecular-scale machines of electromagnetism and light).
Identity and cyborgs: identity and affinity. What is a cyborg? Democratic, liberal politics; identity politics; biopolitics; and, cyborg politics.
Democratic, liberal politics. One of the good assumptions about democratic politics: we are all equal (i.e., “universal man”) . One of the unrealistic assumptions about democratic politics: we are all equal (i.e., “universal man”). Race, class, gender, sexuality, and a set of other social, political, cultural and economic differences separate us.
We talked background. Gender: who is a woman? who is a man? Race: who is black? who is white? Sexuality: who is straight? who is gay? Class: who is rich? who is poor?
Biopolitics: politics carried out through the means, the techniques and technologies of health and illness, statistics, the census, epidemiology and demography, the science of race, eugenics, population, abortion, genomics, and new reproductive technologies.
Mythology: A fabled fire-breathing monster of Greek mythology, with a lion's head, a goat's body, and a serpent's tail (or according to others with the heads of a lion, a goat, and a serpent), killed by Bellerophon.
From one perspective, a cyborg world is about the final imposition of a grid of control on the planet, about the final abstraction embodied in a Star Wars apocalypse waged in the name of defense, about the final appropriation of women’s bodies in a masculinist orgy of war.
From another perspective, a cyborg world might be about lived social and bodily realities in which people are not afraid of their joint kinship with animals and machines, not afraid of permanently partial identities and contradictory standpoints.
We have a means of short-circuiting differences of identity and institutional boundaries.
Cyborg politics is the struggle for language and the struggle against perfect communication, against the one code that translates all meaning perfectly, the central dogma of phallogocentrism.
One of the means to (re)connect people is through (re)coding systems because coded systems have become a means for defining who we are on a biological-level;
And also it’s no accident that the vocabulary of contemporary, molecular biology sounds like the vocabulary of computers: they were invented at about the same time.
The cyborg is a kind of disassembled and reassembled, post-modern collective and personal self. This is the self feminists must code.
Donna Haraway.
He is Professor of the History of Consciousness, UCSC and ssistant Professor of the History of Science, Johns Hopkins University also lecturer, Women Studies and History of Science, University of Hawai’i.
MUD stands for multi-user domain. MOO stands for MUD.





*comments*


I'm intereated in this part, human and cyborg through this class.




*

2008년 5월 12일 월요일

Class for 08.05.07~09

Class for 08.05.07~09







We continued to talk game.
There are two part of game. One is engine, and the other is participate.
Game engine is considered three points. One of them is graphics. And physics is very important in working together. Last point is ai. AI is running kind of rule. And a lot more.


“mods” is very interesting in game.
MOD(modification: fps, rpgs, real-time strategy games) Game is stimulated by mod.
Game can be entirely new games in themselves. For example, tum raider (original: tomb raider) . And pong in flash (original pong / mod 1 / mod 2) .

Ludology versus Narratology. The first campfire the guys on the hunt come back with a story to tell--that is something anybody can partake in. Ludology and Narratology is fighted. Professor said maybe Ludology is winer.

And we can see history of computer games.
There are two issues to consider from film theory.
One is identification. We thought about how do people relate to the characters and action on the screen. e.g., what do women do/think when the hero is a man versus when the hero is a woman?
Also thought about what does a designer or filmmaker do to facilitate the audience’s/players’ relations with characters and actions on the screen.
e.g., filmmaking techniques: POV, suture, the 180 degree rule, etc.


Two is space. We htought what is the space of cinema/games? what can the audience/player see or do there? And what can the designer or filmmaker do to increase, decrease, or change the space? e.g., montage and also think about the filming and editing techniques listed above concerning identificatiom.

video games as “metaphysical machines”
video games discussed by turkle is space war,pong,asteroids,pac man,joust,adventure.



boy’s space is enjoy lurid images, and prove themselves with stunts, also gain master, (re)produce hierarchies, vent aggressive feelings, engage in scatological humor, competitively role-play, and bond together, hese criteria are from Henry Jenkins’ article .

Girl space is a space of secrets and romance, a space of one’s own in a world which offers you far too little room to explore.

And we thought about hot and cool media.





* Comments

Game is interesting part. I didn't know game is complex.
MOD is very important point. Look so cool. I want to try.






*

2008년 5월 5일 월요일

Class for 08.04.30~05.02

Class for 08.04.30~05.02





This class' key points is that every digital media technology has an architecture using diagrams to compare physical architectures with digital architectures.
We talked about ethnomethodology. Ethnomethodology means I know you for long time, in fact, I do'nt know you.
Ethnomethodologists assume that social order is illusory. They believe that social life merely appears to be orderly; in reality it is potentially chaotic. For them social order is constructed in the minds of social actors as society confronts the individual as a series of sense impressions and experiences which she or he must somehow organize into a coherent pattern.


•CSCW: computer-supported cooperative work.
CSCW is a field of research and design. (ex: CAD/CAM, ABB Powerwall, Drug Design)
CAD is computer Aided Design.
Researchers in this field investigate how people work together in groups, and design computer-systems and networks to enable or facilitate group work.
CSCW is considered to a part of a larger field known as CHI or HCI: human-computer interaction (HCI) design, evaluation, implementation, and study of interactive computing systems for human use.
Winograd and Flores present a methodology for CSCW analysis and design. This methodology is commonly known as the “language/action” perspective.
design as conversation construction
any organization is constituted as a network of recurrent conversations (ex: issue, topic, theme…)
conversations are linked in regular patterns of triggering and breakdown (ex: next issues…)
in creating tools we are designing new conversations and connections (ex: ways, methods, rules…)
computers are a tool for conducting the network of conversations (ex: how-to, clues ….)
Winograd and Flores: model of conversation
conversations are sequences of actions because by saying things people are understood to be doing things;

i.e., saying = doing;
–e.g., taking an oath in court, saying “I do” in a wedding, etc. are not just words, but words that perform actions.
this classroom: a language/action perspective
what is our network of recurrent (repeating) conversations? --->organization
what are our patterns of triggering and breakdown? --> linking t to t
how do we use computers and networks to conduct this network of conversations? --> creating tools
what new media technologies might be designed to create new conversations and connections? --> blogs …
Every digital media technology has an architecture that can be used to transform work, play and governance.
For example, a city plan from Hillier and Hanson

And then we talked what is the architecture of cyberspace?
•consider the hardware and software that links together (or separates) groups of people
e.g the bandwidth of a network and network protocols (like HTTP or FTP or SMTP or NNTP, etc.) “threads”; i.e., links between email messages.
We talked Agre’s “surveillance model” surveillance model is visual metaphors.
And assumption that watching is non-disruptive. Also territorial metaphors as in the “invasion of private space” Next, centralized orchestration by means of a bureaucracy with a unified set of files. Finally identification with the state and malevolent aims of a specifically political nature.
surveillance is close watch kept over someone or something.
Etymology: French, from surveiller to watch over, from sur- + veiller to watch, from Latin vigilare, from vigil watchful


history of surveillance: the panopticon
Panopticon developed by Jeremy Bentham in the 18th century for prison
Similar designs adapted for hospitals and factories
In the 18th century prisons and hospitals known, in France, collectively as “environments of humanity”

Claude-Nicolas Ledoux’s salt plant at arc-et-senans (1779)-a hierarchical organization of work

•Michel Foucault: “I would say that Bentham was the complement Rousseau. What in fact was the Rousseauist dream that motivated many of the revolutionaries? It was the dream of a transparent society, visible and legible in each of its parts, the dream of there no longer existing any zones of darkness, zones established by the privileges of royal power or the prerogatives of some corporation.” But They that can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.



*comments

This class is so interesting.
Claude-Nicolas Ledoux’s and HCI and surveillance and Ethnomethodology is cool.






*