CRITICAL PROGRAMMING: Toward A Philosophy Of Computing

Sourceforge Project Wiki / Proposal (Literature Review) / Work in Progress / Source Code

Recent Notes Thu Mar 23 07:16:19 2017

Reading of last [1] months (Recent Reading
Bibliography Annotated Bibliography Work)
gallowayprotocol01 20138.302017022790%90%
20170227Hacker insight into nature of utopia because realizable in cyberspace by working code. (169)
Items [1]

Bibliography Thu Mar 23 07:16:19 2017

Dissertation bibliography (
Recent Notes Bibliography Annotated Bibliography Work)
aarsethnonlinearity_and_literary_theory06 20128.302013102490%90%Y0
abbateinventing_the_internet08 20138.302014050690%50%Y1
adornofetish_character_in_music09 20118.202013091090%90%Y0
aloisiocalculation_of_easter_day12 20128.302013090990%90%Y0
applen_mcdanielrhetorical_nature_of_xml07 20128.302013091090%90%Y0
barkerwriting_software_documentation02 20118.302013090890%25%Y0
barthesimage_music_text10 20118.40201112085%5%Y0
bartheslistening09 20118.402013090990%90%Y0
barthesmyth_today07 20118.302013102490%90%Y0
barthesmythologies08 20158.30201612170%0% 0
barthesstructuralist_activity05 20128.202013102590%90%Y0
batailleaccursed_share12 20168.70201612170%0% 0
batailleon_nietzsche12 20168.70201612260%0% 0
baudrillardsimulacra_and_simulation02 20128.202013091590%50%Y0
baudrillardsimulations05 20128.002013091525%25% 0
baudrillardsymbolic_exchange_and_death06 19948.002013060175%5% 0
baudrillardtransparency_of_evil06 19948.202014042125%25%Y0
bauerleindumbest_generation05 20148.102014061490%90%Y0
beck_and_adresextreme_programming_explained_second_edition09 20138.60201309090%0%Y16
benjaminwork_of_art_in_age_of_mechanical_reproduction03 20118.202015021990%90%Y0
berardisoul_at_work01 20168.702015020490%5%Y4
berrycopy_rip_burn03 20168.702016030390%5%Y16
berryphilosophy_of_software06 20128.302015090390%90%Y0
bijker_hughes_pinchsocial_construction_of_technological_systems09 20138.302013102550%25%Y1
blackibm_and_the_holocaust10 20138.102014071290%50%Y0
bogostalien_phenomenology04 20128.302013102690%90%Y0
bogostpersuasive_games12 20128.302013102690%90%Y0
bogostunit_operations01 20128.302015082690%90%Y0
boltanski_chiapellonew_spirit_of_capitalism01 20148.202014061590%50%Y0
bolterwriting_space09 20088.302013111790%90%Y0
bolter_and_gromalawindows_and_mirrors03 20118.302013090825%25%Y0
borkexam1_question110 20128.00201401120%0% 0
borkexam1_question310 20128.00201309070%0% 0
borkexam2_question112 20128.00201212040%0% 0
borkexam2_question212 20128.002014011725%25% 0
borkexam3_question212 20138.00201312240%0% 0
borkexam3_question302 20138.00201304140%0% 0
borkexam3_question402 20138.00201304240%0% 0
borkknowledge_and_learning_in_project_based_organizations07 20098.00201302110%0% 0
bowker_and_starsorting_things_out07 20118.302013091225%25%Y0
bracha_et_alcomputerized_pin_ball_machine02 20138.402013021150%5% 2
bravermanlabor_and_monopoly_capital01 20178.702017012950%5%Y0
brinwhy_johnny_cant_code04 20138.102013091290%90%Y0
brooksmythical_man_month04 20138.602015081390%25%Y4
brown_duguidsocial_life_of_information03 20128.302013091290%75%Y0
buck_morssdream_world_of_mass_culture11 20128.302013102690%90%Y0
bukatmanterminal_identity06 19948.202013091225%25% 0
bull_and_backauditory_culture_reader08 20118.402013102650%25% 0
burks_goldstine_von_neumannlogical_design_of_electronic_computing_instrument01 19988.602015080475%75% 0
burnard_okeefe_unsworthelectronic_textual_editing03 20128.302013102790%75%Y0
burnetthow_images_think03 20128.202013102790%75%Y0
busaperspectives_on_digital_humanities09 20148.302014091490%90%Y0
bushas_we_may_think06 20128.302013102790%90%Y0
bynum_rogersonethics_in_the_information_age01 20148.302014040150%5%Y0
callonsociety_in_the_making04 20148.302014041290%90%Y0
campbell_kelley_aspraycomputer_history_of_information_machine03 20138.302013102790%75%Y0
campbell_kellyfrom_airline_reservations_to_sonic_the_hedgehog08 20128.302015080690%90%Y0
castellsrise_of_network_society_second_edition06 20128.202013102790%75%Y0
cewbally_electronic_pinball_games_theory_of_operation02 20138.402013102790%90%Y0
chionvoice_in_cinema10 20118.402013090825%25% 0
chunon_sourcery08 20128.302013102790%90%Y0
chunprogrammed_visions07 20138.302015083090%90%Y0
cicerophilippics02 19968.502013102890%25% 0
clarkembodied_cognitive_science04 20108.202013102890%90%Y0
clarksupersizing_the_mind10 20128.202013102890%75%Y0
clark_chalmersextended_mind04 20108.202013091390%90%Y0
colburnphilosophy_of_computer_science04 20168.70 0%0% 0
conleyrethinking_technologies12 20138.202013120590%90%Y0
connormodern_auditory_i08 20118.202013091390%90%Y0
copelandwhat_is_computation12 20128.302013091390%75%Y0
craneclassics_and_the_computer03 20128.302013102890%90%Y0
cummingscoding_with_power04 20128.302013091390%90%Y0
de_lauretistechnologies_of_gender03 20128.202013091450%50%Y0
deleuzepostscript_on_the_societies_of_control08 20128.202014032590%90%Y0
deleuze_guattarithousand_plateaus04 20138.302014040290%75%Y0
deleuze_guattariwhat_is_philosophy06 20138.202013102890%75%Y0
derridaaporias05 20138.302013102875%50% 0
derridaarchive_fever04 20128.202014082190%90%Y0
derridadissemination02 20128.302013102850%50%Y0
derridaof_grammatology01 20098.302013102890%90%Y0
diogenes_laertiuslives_of_eminent_philosophers07 19968.502014010775%50%Y0
drucker_and_mcvarishgraphic_design09 20088.002013102890%90%Y0
du_gaydoing_cultural_studies03 20128.302013102850%25%Y1
dumitpicturing_personhood11 20108.002013090890%90%Y0
dysonthe_ear_that_would_hear_sounds_in_themselves11 20118.402013102890%90%Y0
edwardsclosed_world08 20138.302013102990%90%Y0
engelbartaugmenting_human_intellect03 20128.602013102990%90%Y0
ensmengercomputer_boys_take_over03 20148.302014030290%5%Y1
feenbergdemocratic_rationalization03 20128.302013102990%90%Y0
feenbergquestioning_technology11 20098.302013102990%90%Y0
feenbergtransforming_technology11 20098.302013103090%75%Y0
feller_et_alperspectives_on_free_and_open_source_software06 20078.302013103075%25%Y16
flanaganjavascript_sixth_ed09 20168.70201609140%0% 0
floridiphilosophy_and_computing12 20128.302013092175%75%Y0
foucaultbirth_of_biopolitics01 20178.702017011690%5% 0
foucaultdiscipline_and_punish06 20128.202015021690%90%Y0
foucaultorder_of_things05 20118.202014011590%5% 0
frascasimulation_versus_narrative03 20128.302013092190%90%Y0
freiberger_and_swainefire_in_the_valley02 20018.302013103090%5%Y0
fullerbehind_the_blip04 20128.302015082890%50%Y1
fullersoftware_studies10 20118.302015090690%50%Y1
gadamertruth_and_method04 20168.70201604195%0%Y64
gallowayprotocol01 20138.302017022790%90%Y0
ganecomputerized_capitalism08 20128.202013092190%90%Y0
gatesroad_ahead04 20148.602014062990%90%Y0
geewhat_video_games_have_to_teach_us_about_learning_and_literacy09 20128.302013103190%90%Y0
golumbiacultural_logic_of_computation08 20138.302017011590%90%Y0
goodmansonic_warfare11 20118.402013092190%50%Y0
guattarichaosophy02 20168.702016021325%5%Y32
guattarimachinic_heterogenesis12 20138.302013120990%90%Y0
hafner_lyonwhere_wizards_stay_up_late02 20138.302013092390%90%Y0
hansenbodies_in_code04 20098.202013092490%90%Y0
harawaysimians_cyborgs_women04 20098.202013092375%50%Y0
hardt_negricommonwealth05 20168.702016052950%5%Y32
hardt_negriempire10 20148.202014113090%75%Y0
hardt_negrimultitude03 20168.702016031890%5%Y16
harmanon_vicarious_causation07 20128.302013103190%90%Y0
harpersmash_the_strata08 20128.302013092490%90%Y0
havelockmuse_learns_to_write05 20128.302013103190%75%Y0
hayleselectronic_literature02 20108.302013103190%90%Y0
hayleshow_we_became_posthuman03 20108.202013110190%90%Y0
hayleshow_we_think07 20128.302015060390%90%Y0
haylesmy_mother_was_a_computer12 20118.302013110190%90%Y0
haylesprint_is_flat_code_is_deep04 20118.302013110190%90%Y0
hayleswriting_machines09 20088.302013110190%75%Y0
hayles_pulizzinarrating_consciousness04 20118.302013092890%90%Y0
heideggerintroduction_to_metaphysics05 19968.302015052690%50%Y0
heideggernietzsche_vol_407 19958.202013092875%25%Y0
heideggerquestion_concerning_technology08 19958.202013092990%75%Y0
heideggerscience_and_reflection11 20128.202013110190%90% 0
heideggerwhat_is_called_thinking08 19958.202013092890%50%Y0
heilbronerdo_machines_make_history04 20148.302014041825%25%Y0
heimcomputer_as_component07 19958.202014040790%90%Y0
heimelectric_language09 20088.202013110290%75%Y0
heimmetaphysics_of_virtual_reality05 19988.302013110275%25%Y0
himanenhacker_ethic11 20138.602013110175%25%Y10
hockeyhistory_of_humanities_computing09 20148.102014091490%90%Y0
horkheimer_adornodialectic_of_enlightenment06 20118.202013092990%75%Y0
ihdephilosophy_of_technology06 20128.302013110290%75%Y0
iserhow_to_do_theory08 20118.302013110290%90%Y0
jamesonpostmodernism04 20128.202015021775%50%Y0
janzbetweenness_of_code02 20138.302013110290%90% 0
janzphilosophy_in_an_african_place05 20138.302014031790%75%Y0
janzreason_and_rationality_in_ezes_on_reason09 20138.302013110290%90%Y0
jenkinsconvergence_culture05 20128.302014082975%50%Y1
johnsoncomputer_ethics08 20148.10201407275%5%Y0
johnsoncomputer_ethics_fourth_edition06 20128.102014080325%25%Y0
johnsoncomputer_ethics_third_edition06 20118.102014072325%25%Y0
johnsonuser_centered_technology01 20098.302013110390%75%Y0
johnsonwhat_is_cultural_studies_anyway11 20108.302013110390%90%Y0
johnstonliterature_media_information_systems07 20128.202013110390%90%Y0
kahnnoise_water_meat08 20118.302013110350%25%Y0
keller_and_grontkowskiminds_eye08 20118.202013093090%90%Y0
kellnercritical_theory_today05 20128.302013093090%90%Y0
kemenyman_and_computer03 20138.602013110390%90%Y0
kemeny_kurtzback_to_basic05 20148.602014050590%5%Y6
kernighan_ritchiec_programming_language10 20138.60201310015%5%Y14
kirschenbaumextreme_inscription08 20128.302013110390%90%Y0
kitchin_and_dodgecode_space09 20138.302013112490%50%Y1
kittlerdiscourse_networks_1800_190012 20128.302013100190%50%Y1
kittlerdraculas_legacy05 20128.302013100190%90%Y0
kittlerevolution_of_programming_languages07 20158.30 0%0% 0
kittlergramophone_film_typewriter09 20118.302014032190%90%Y0
kittlermarch_of_technology07 20158.30 0%0% 0
kittleroptical_media01 20128.302013110390%25% 1
kittlerprotected_mode12 20128.302013110390%90%Y0
kittlerthere_is_no_software12 20128.302013110390%90%Y0
kittlerworld_of_the_symbolic06 20128.202013110490%90%Y0
knuthliterate_programming03 20148.60 0%0%Y15
knuthselected_papers_on_computer_science03 20148.60201403095%5%Y15
knuth_and_pardoearly_development_of_programming_languages09 20138.602014010990%25%Y8
koernerreadin_writin_ruby_on_rails12 20138.102013121490%90%Y0
kraftprogrammers_and_managers09 20138.302014012090%50%Y1
kramercultural_techniques_of_time_axis_manipulation08 20128.302015062890%90%Y0
kuhnstructure_of_scientific_revolutions11 19938.302012082575%50% 0
kurzweilage_of_spiritual_machines01 20148.102014012350%5%Y0
lammersprogrammers_at_work04 20128.602013110490%50%Y8
landowhypertext_3_007 20118.302013110490%90%Y0
lanierwho_owns_the_future03 20148.502014043090%25%Y8
latouraramis10 20138.302013081650%25%Y0
latourwe_have_never_been_modern05 20128.302013110490%90%Y0
latourwhy_has_critique_run_out_of_steam07 20128.302014021990%90%Y0
leorkerebranding_the_platform06 20138.302013100390%90%Y0
lessigcode_version_208 20138.302013090725%25%Y0
lessigfree_culture11 20088.202013110490%75%Y0
levi_straussstructural_study_of_myth02 19968.30201309085%5% 0
levinmodernity_and_hegemony_of_vision08 20118.202013110490%90%Y0
levycollective_intelligence02 20158.502015100290%25%Y8
levyhackers05 20128.302013100490%25%Y0
levyinsanely_great09 20138.602014011390%25%Y4
lickliderman_computer_symbiosis03 20128.302014033090%90%Y0
lyotardpostmodern_condition07 20118.202013100690%90%Y0
lyotardpostmodern_fables11 20168.70201610070%0% 0
lyotardthe_inhuman08 20138.202013100475%50%Y0
mackenziecutting_code07 20138.302013080590%90%Y0
malabouwhat_should_we_do_with_our_brain09 20138.302013092390%90%Y0
manerunique_ethical_problems_in_information_technology04 20138.302013042250%5%Y1
manovichlanguage_of_new_media01 20118.302015070190%90%Y0
manovichsoftware_takes_command03 20128.302013112490%50%Y2
marinocritical_code_studies07 20128.302013110590%90%Y0
mayerteaching_and_learning_computer_programming04 20118.302013110525%25%Y12
mazlishfourth_discontinuity04 20148.302014041825%25%Y0
mcgannradiant_textuality02 20128.302013110590%75%Y0
mckeecomputer_user_manuals_in_print04 20118.302013100590%90% 0
mcluhanunderstanding_media08 19948.202013110550%25%Y0
misaleonardo_to_the_internet06 20118.302013110590%90%Y0
mitchamthinking_through_technology02 20128.302014031075%5%Y0
montfort_bogostracing_the_beam11 20128.302015091090%90%Y0
montfort_el_al10_print02 20138.302013120790%75%Y0
morningstar_farmerlucasfilms_habitat10 20138.602013110690%90%Y0
mumfordauthoritarian_and_democratic_technics04 20148.302014041825%25%Y0
mumfordtechnics_and_nature_of_man04 20148.302014041825%25%Y0
murrayhamlet_on_the_holodeck11 20088.302013100790%90%Y0
neelplato_derrida_writing02 20098.302013100990%90%Y0
negropontesoft_architecture_machines10 20138.602013101990%75%Y0
normandesign_of_everyday_things11 20098.202013100690%90%Y0
ogormanecrit09 20088.302015020290%90%Y0
ongorality_and_literacy08 20088.402013110790%90%Y0
oram_wilsonbeautiful_code02 20148.602014042725%25%Y16
papertmindstorms09 20138.60201311075%5%Y12
plantin_et_alinfrastructure_studies_meet_platform_studies08 20168.70 0%0% 0
plutarchparallel_lives04 19968.502013110725%5% 0
postmantechnopoly12 20138.102013123190%25%Y0
raeknow_how_tradition04 20148.302014041825%25%Y0
ramsayreading_machines03 20138.302013100890%90%Y0
raymondcathedral_and_bazaar10 20148.60201410265%5%Y4
reddellsocial_pulse_of_telharmonics11 20118.302013110790%90% 0
reich_gemina_sauermodeling_knowledge07 20098.302013110790%75%Y0
ricerhetoric_of_cool02 20098.302013110790%90%Y0
rice_ogormannew_media_new_methods04 20128.102013110790%90%Y0
romanyshyndespotic_eye_and_its_shadow11 20128.202014031390%90%Y0
rosenbergdreaming_in_code03 20138.602014033090%90%Y0
rushkoffprogram_or_be_programmed01 20148.302014031090%90%Y0
ryanbeyond_myth_and_metaphor03 20128.302013110890%90%Y0
saussuregeneral_course_in_linguistics06 20118.302013110875%50%Y0
scharff_and_dusekphilosophy_of_technology06 20078.302013113025%5%Y0
senecaletter_9007 19958.102012032275%75% 0
shasha_lazereout_of_their_minds10 20138.602013100150%5%Y16
shneidermandirect_manipulation10 20138.602013101990%90%Y0
simonshape_of_automation04 20138.602013110890%90%Y0
smithon_the_origin_of_objects09 20138.602014021925%25%Y0
spinuzzinetwork01 20098.302013101190%75%Y0
stallmanfree_software_free_society06 20078.602013110875%25%Y6
stephensonin_the_beginning_was_the_command_line06 20128.602014071090%90%Y1
sterneaudible_past09 20118.302013110890%90%Y0
stieglertechnics_and_time_103 20168.70 0%0% 0
stroustrupdesign_and_evolution_of_cpp10 20138.602014041150%25%Y8
suchmanplans_and_situated_actions06 20118.202013110825%25%Y0
takhteyevcoding_places12 20138.602014010290%5%Y8
tanaka_ishiisemiotics_of_programming10 20128.302013110890%90%Y0
tanzcurse_of_cow_clicker05 20128.302013101390%90%Y0
thomsonunderstanding_technology_ontotheologically08 20128.202013101390%90%Y0
thriftmovement_space08 20138.302013101390%90%Y0
thriftremembering_technological_unconscious09 20138.302014042490%90%Y0
torvaldsjust_for_fun10 20138.602013102575%25%Y6
turingcomputing_machinery_and_intelligence06 20128.602013110890%90%Y0
turklealone_together06 20128.102014080890%75%Y0
turkleinner_history_of_devices08 20108.302013101425%25%Y1
turklelife_on_the_screen05 20118.202015010790%90%Y0
turklesecond_self04 20118.302015081690%75%Y0
ucfcore_exam_for_john_bork10 20128.002014011250%50% 0
uffenbeckmicrocomputers_and_microprocessors07 20048.302013110825%25% 0
ullmanclose_to_the_machine05 20128.602013110890%90%Y0
ulmerapplied_grammatology02 20098.302013110990%90%Y0
ulmerflorida_out_of_sorts06 20128.302013110990%90%Y0
ulmerinternet_invention03 20128.302013110925%25%Y0
von_neumanncomputer_and_brain05 20128.60201311095%5%Y12
von_neumanntheory_and_organization_of_complicated_automata01 19988.602014031775%75%Y0
von_neumanntheory_of_natural_and_artificial_automata01 19988.602013110975%75%Y0
wardrip_fruinexpressive_processing03 20128.302013110925%25%Y1
wardripfruin_and_montfortnew_media_reader01 20118.302013110950%50%Y0
weinbergpsychology_of_computer_programming02 20148.302015081290%75%Y2
weizenbaumcomputer_power_and_human_reason07 20138.602014082690%90%Y0
winderrobotic_poetics04 20128.302013110990%90%Y0
winnermythinformation06 20128.102013101990%90%Y0
winogradthinking_machines02 20118.602013101990%90%Y0
winograd_floresusing_computers06 20128.602013110990%90%Y0
woolgarreconstructing_man_and_machine04 20148.302014042190%50%Y0
yeatsrole_for_technical_communicators_in_oss_development08 20128.30 75%0%Y4
zizekenjoy_your_symptom07 20118.302013101925%25%Y0
zizekparallax_view05 20098.502014021925%25%Y0
Items [282]

Annotated Bibliography Thu Mar 23 07:16:19 2017

Dissertation bibliography notes in reverse chronological order (
Recent Notes Bibliography Annotated Bibliography Work)
aarsethnonlinearity_and_literary_theory06 20128.302013102490%90%Y0
20131024v+The original would be the author imagined text guiding the physical production that becomes the text, or abandon idea of real behind text. (764)3.1.2
20131024u+My version of CSS insists on experimentation beyond crafting fortuitous deformations, the default: seems like all bets are off in the region of indeterminate cybertext, where the Big Other is likely to most clearly speak to humans. (778)3.2.2
20131024t+Immersion the difference between hypertexts like Afternoon and cybertexts like Adventure. (778)3.1.2
20131024s+Examples of nonlinear rhetorical unit operations, following Pierre Fontanier: forking, linking/jumping, permutation, computation, polygenesis. (777)3.1.2
20131024r+Cybertextuality adds ontological category of simulation. (777)3.1.2
20131024q+MUDs are to be experienced, not read. (776)3.1.2
20131024p+Indeterminate cybertext, for example MUDs, beyond genre, not against genre. (775)3.1.2
20131024o+Absent structure of determinate cybertext is the plot. (774)3.1.2
20131024n+The game Adventure as example of determinate, ergographic cybertext. (774)3.1.2
20131024m+Difference between hypertext and cybertext is the latters self-changing ability. (773)3.1.2
20131024l+Bush memex user modeled after traditional academic author; hypertext jump equates to switching print texts, the lest topographical mode of nonlinearity. (771)3.1.2
20131024k+I Ching as expert system, readerless text; this answers a question I have been asking myself for years. (769)3.1.2
20131024j+Four degrees of nonlinearity, from static to indeterminate dynamic cybertext. (768)3.1.2
20131024i+Four feedback functions in addition to interpretive function of user: explorative, role-playing, configurative, poetic; note theorists seem to present sets of four or so key concepts (for example, Ryan). (768)3.1.2
20131024h+Variates applied to nonlinear texts (see Texts of Change): toplogy, dynamics, determinability, transiency, maneuverability, user-functionality. (767)3.1.2
20131024g+Basic units of texts are textons, which are arbitrarily long strings of graphemes, plus traversal functions. (767)3.1.2
20131024f+Textonomical version of topology studies ways various sections of text connected in terms of intentional design rather than physical appearance. (766)3.1.2
20131024e+Texts are cross products of linguistic, technological, historical matricies. (766)3.1.2
20131024d+These transboundary phenomena trace human machine symbiosis. (765)3.1.2
20131024c+To study textuality in its situated, media specific and cultural contexts, asking about textualities as what Hayles describes as shimmering signifiers how it may occur in virtual realities computed by machines, living in the thoughts of machines and passing through human thoughts as well. (765)5.1.1
20131024b+Scales of change of metamorphosis; compare to Berry modes of software. (765)3.1.2
20131024a+This is a bizarre claim to which on first reading I object giving the example of ontological interactivity that lies and pretends to be linear: perhaps Aarseth intends the obvious, believing that all print texts are linear, static, and that static texts do not secretly compute; and nonlinear as implying ontological interactivity require their electronic substrate. (764)3.1.2
20131024+Informative and interpretable aspects of texts. (763)3.1.2
20121127+Thus texts and technology studies emphasizes ethnography over textual anthropology, primarily operating in text, hypertext, and cybertext investigations. (778)3.1.3
20120825+Compare this to Ryan myth of the Aleph, and Castells invoking the Aleph from Borges for the totalizing submergence of prior discrete media into digital processing, the real virtualities in which we now live much of our perceptual lives: this is really a description of how running software may be understood as texts, along with images, too, going far beyond the zoographia grammata unit operation of antiquity through postliteracy. (765)3.1.3
abbateinventing_the_internet08 20138.302014050690%50%Y1
20140506a+Virtual communities provided new substantiation of humans forming communities through shared interests without respect to bodily proximity. (110)3.1.10
20140506+Unexpected advantages of networked computing by giving researchers access to other machines, programming languages, and services. (99)3.1.5
20140417+Consider Turkle critique of virtual communities against heroic struggle to create new ways of interacting. (84)3.1.6
20140405a+ICCC demo featured numerous interesting uses of networked applications and remote communications, a turning point in use of the ARPANET spanning commercial services and training a generation of American computer scientists in its techniques. (79)3.1.5
20140405+Connecting a host to the subnet the primary obstacle, but public interest in networking also needed to be increased, inspiring ICCC. (78)3.1.5
20140329o+Email use and participation in virtual communities altered common perception of ARPANET as communications system more than computing system, that is, a place for running programs; here computing descended into background both as internalizing interface use, evolved behavior Thrift attributes to coaction of technical unconscious with human endeavor. (111)3.1.5
20140329n+Mailing lists credited for creating and maintaining ARPANET user virtual community; compare to recent criticisms of using same term as locally congregating physical personal communities, as computer programming language is also noted as an ambiguous equivocation with human natural languages. (110)3.1.5
20140329m+User centered design through participation of non-expert users promoted by Lukasik such as adding features to mail readers since email was the most popular non-expert use. (109-110)3.1.5
20140329l+Users did not collaborate like model promoted by SRI NIC, using mostly email and file transfer due to their simplicity compared to NLS developed by Engelbart. (109)3.1.5
20140329k+Email a surprise success because network built for providing computer access shifting to connecting people. (109)3.1.5
20140329j+Social value of email practiced within ARPA and DoD. (107-108)3.1.5
20140329i+Ideal of resource sharing declined, and distributed computing never materialized; did need for administration of distributed computing resources lead to siren servers? (104)3.1.5
20140329h+Information sharing and enhanced collaboration noted by computer scientists as key benefits of networking, transforming how science was done; did their anonymous transfers and software theft become cultural norm? (100)3.1.5
20140329g+Datacomputer as early specialized network resource meant to dominate future of computing; Lanier siren server the model that succeeded. (98)3.1.5
20140329f+Failure of organized lobbying by USING. (95)3.1.5
20140329e+MIT turned its IMP into hub for a LAN, supporting many unplanned uses of ARPANET devised by its users, increasing its perceived value. (93-94)3.1.5
20140329d+ANTS terminal and peripheral interface was too difficult to debug and maintain. (92)3.1.5
20140329c+Ironic that TIP users wanted features of synchronous batch terminal designed for batch processing. (91)3.1.5
20140329b+Reliance on local knowledge led to development of online documentation, system announcements, email support that spread virtual community and became our habitual practices of interactivity. (89)3.1.5
20140329a+Challenge of using early ARPANET, contrary to ease of access and use taken for granted today with the Internet, transformed by virtual communities built by experiments building features like sharing information, support, recreation in the network environment. (84)3.1.5
20140329+Predictions by APRA about users benefits were wrong, so its success needs explained rather than taken for granted, focusing on active users who played a role in its development; go beyond simple view of consumers amassing after a technology has been delivered to the market. (83)3.1.5
20140327z+Computer scientists perceived ARPA as offering large degree of intellectual freedom. (77)3.1.5
20140327y+ARPA managers shielded research projects from often conflicting national politics while presenting pragmatic and security reasons to Congress for supporting projects. (75)3.1.5
20140327x+Roberts entrusted creating host protocols to relatively inexperienced researchers of the Network Working Group, which developed Requests for Comments as means of disseminating technical proposals to promote informal communication and sharing of ideas; informal evolution of formal standards though RFCs and NWG meetings. (73)3.1.5
20140327w+Disagreements between BBN and more theoretical groups, but in general the perceived joint effort argued to be unique in computer science at the time. (71)3.1.5
20140327v+BBN force by ARPA to make IMP source code freely available. (70-71)3.1.5
20140327u+National social networks develped through workshops and retreats. (69)3.1.5
20140327t+Core applications were telnet, ftp, and later, email; common formats for representing files and terminals addressed compatibility issues among different types of host machines. (68-69)3.1.10
20140327s+Host and application layers precursor to TCP/IP. (67)3.1.10
20140327r+NCC leader McKenzie promoted vision of ARPANET as computer utility, foreshadowing integration of computing and telecommunications systems; NCC managerial reinforcement of layering. (65)3.1.10
20140327q+Terminal IMP opened the network to users without ARPANET hosts. (64)3.1.5
20140327p+Remote monitoring and control and automatic recovery as key components of ideal distributed network. (63)3.1.10
20140327o+Enforcement of distinctions between network layers became way to manage social relations and reduce technical complexity. (62-63)3.1.10
20140327n+Routing the most difficult switching task, which was distributed so each IMP independently and adaptively decided where to send packets, making the system more robust, but also prone to unexpected interactions. (61-62)3.1.10
20140327m+Surprising reliability through acknowledgments and checksums using digital rather than analog system. (61)3.1.10
20140327l+Network Working Group supported UCLA PhD students Crocker, Cert, Postel under Kleinrock. (59)3.1.5
20140327k+Hope that Engelbart NLS at SRI would provide network information center. (59)3.1.5
20140327j+Basic infrastructure of time sharing hosts, packet switching IMPs, and leased lines; contract from IMPs to BBN, other contracts awarded less formally. (56-57)3.1.5
20140327i+Network itself provided new methods of coordination, though still an old boy network. (54)3.1.5
20140327h+Protocol stack model. (53)3.1.10
20140327g+Division of labor plan by principal investigator Clark led to subnet of IMP minicomputers. (52)3.1.9
20140327f+Layered system has technical and social implications; connect to diachrony in synchrony. (51)3.1.10
20140327e+Layered, decentralized, collegial management. (51)3.1.10
20140327d+Resistance by PIs who did not want to lose control over computing resources. (50)3.1.5
20140327c+Message protocol proposed to address variety of computers to be connected. (48)3.1.5
20140327b+Packet switching vetted by success of ARPANET. (47)3.1.5
20140327a+Unique technical and managerial strategies by Roberts. (47)3.1.5
20140327+Licklider inspiration for ARPANET as logical extension of time sharing. (43)3.1.5
20140326z+Packet switching seen as superior technique only after success of highly visible examples. (41)3.1.5
20140326y+Computer technologies become policy instruments in US and UK, though the US government was less inclined to manage domestic computer industry than UK. (40)3.1.5
20140326x+Roberts adopted some of NPL packet switching design, then encountered Baran book on distributed communications leading to routing revelation. (37)3.1.5
20140326w+IPTO [Information Processing Techniques Office] project office of ARPA funded establishment of computer science as a discipline in the US, and created research centers at universities whose connection the ARPANET intended. (36)3.1.5
20140326v+Conversational Computing on the South Bank generated public debate and user activism. (35)3.1.5
20140326u+Davies Mark I had only local impact. (33)3.1.5
20140326t+Design focused on interface for providing remote resources to business people with identical access procedures as local resources, a concept ahead of its time. (31)3.1.5
20140326s+Unable to gain support, Davies developed in house experimental network at National Physical Laboratory. (29)3.1.5
20140326r+Davies wanted to commercialize packet switching under Wilson economic revitalization plan, proposing national network offering numerous civilian services. (28)3.1.5
20140326q+Packet switching the communications equivalent of time sharing, achieving fairness in access. (27)3.1.5
20140326p+Davies awareness of inadequate data communications for interactive computing led to ideas of packet switching. (26-27)3.1.5
20140326o+Independent development in both UK and US, time sharing fomented excitement for interactive computing business models. (25-26)3.1.5
20140326n+Time sharing model addressed mismatch between human and computer paces of action. (24)3.1.5
20140326m+Davies priority was interactivity and user friendliness. (23)3.1.5
20140326l+Wilson in UK eager to enact economic and technological regime via Minitech. (22)3.1.5
20140326k+Baran presented and published his work, though academic computer scientists not focused on survivability. (21)3.1.5
20140326j+Baran more interested in building a distributed network for flexible transmission of bursty data, which called for time division multiplexing, than employing packet switching for its own sake. (18)3.1.5
20140326i+Packet switching method explained. (17-18)3.1.5
20140326h+Examining other state of the art messaging systems like ATT AUTOVON to tease out innovations of Baran ideas, in particular local intelligent routing of an all digital system using redundant components with lower quality communications links. (13-14)3.1.5
20140326g+Adaptive routing allows distributed nodes to make use of their extra links. (13)3.1.5
20140326f+Store and forward switching; see analysis of telegraph operations by Hayles. (11)3.1.5
20140326e+Baran envisioned multiplexed, distributed communications using multiple formats and media. (11)3.1.5
20140326d+Rand role in computer science research positioned it to develop military network communications. (10)3.1.5
20140326c+The movie Dr Strangelove highlighted vulnerability of existing communication channels. (9)3.1.5
20140326b+Adoption of packet switching dependent on social fit as much as technical criteria. (8)3.1.5
20140326a+Contested origins of packet switching include independent invention by Baran and Davies in US and England. (8)3.1.5
20140326+Packet switching that has become dominant network practice arose in ARPANET and other early networks from margins to center. (7)3.1.5
20130907c+Decentralized paradigm for proposing new features. (5)3.1.5
20130907b+Social construction: curious alliance of military and civilian interests, like taking a tank for a joyride. (2)3.1.5
20130907a+Practice and meaning of computing redefined by Internet long distance interaction, as Manovich argues emergence of personal computers led to cultural software. (2)3.1.5
20130907+Claim of unique SCOT approach applied to computer communication, involving narratives of origins, production and use. (4)3.1.5
adornofetish_character_in_music09 20118.202013091090%90%Y0
20130910g+New listeners have free time and no freedom, like housewives; degrades this retarded, master of none bricoleur. (294)2.1.2
20130910f+Blistering criticism of fetishistic listeners epitomized by radio ham as early version of fan culture. (292-293)2.1.2
20130910e+Musical childrens language for deconcentrated listeners suitable for surface enjoyment. (290)2.1.2
20130910d+New fetish in technical production of perfect performance, leading to personal worship of home theater. (284-285)2.1.2
20130910c+Reduction of work to signature melody that can be reified as intellectual property. (276-277)2.1.2
20130910b+Individual is liquidated between incomprehensibility and inescapability, consciousness defined by displeasure in pleasure. (275-276)2.1.2
20130910a+Listener converted into acquiescent purchaser, whose experience is ultimately shaped by fetishized monetary capital as the cost of listening. (273-274)2.1.2
20130910+Regression of listening, deconcentration foreshadow distracted attention characteristic of mobile technology; regressive listening music fans like sports fans. (286-287)2.1.2
20121007+Huxley also hints at the Nietzschean last man, the docile, repressed subject whose fetishism of music attends a corresponding regression of listening. (270-271)2.1.2
20110905+Negativland as artistic music like Mahler that seems to recycle existing light music: the WSS concealed by being encoded in custom protocols. (298)2.1.2
aloisiocalculation_of_easter_day12 20128.302013090990%90%Y0
20130909e+Definition of computing as calculating in accordance with effective methods, machine doing so automatically in succession of operations with intermediate storage; then transition from computing machine to computer. (47)3.1.5
20130909d+Divide and conquer and division of labor becoming key characteristic of computing; see citation by Kittler of Hasslacher on discretization. (46)3.1.5
20130909c+Logarithms, and calculating machines, likely developed for trigonometry for navigation, especially determining longitude, and compound interest for accounting (see Campbell-Kelley and Aspray). (45)3.1.5
20130909b+First machine computer a fictional fantasy in Swift Gullivers Travels. (44-45)3.1.5
20130909a+First English use made up from French to denote measurements of short time intervals. (44)3.1.5
20130909+Computer a suitable word for a Heideggerian hermeneutic phenomenological account, complemented by rigorous etymological and historical accounts like this one, noting this study does not stretch back to classical Latin usage. (42)3.1.5
20121206+Etymology and history of the use of the word computer: Borst reckon up, counting on fingers in use in early Roman times. (42)3.1.5
20061206+Jokes about the lack of planning by the Nicene council in creating such a confusing definition of Easter Day aiding the development of computing, curious parallel to need for ballistic tables aiding development of electromechanical computers. (42-43)3.1.5
applen_mcdanielrhetorical_nature_of_xml07 20128.302013091090%90%Y0
20130910s+Theorist-practitioner model combines technical and humanities competencies, with emphasis on leveraging custom code to explore and meet overall requirements derived from rhetorical analysis. (294)3.2.3
20130910r+Single sourcing may disrupt traditional craftsman process of earlier media practices as noted in third project whose bottom-up rhetorical approach seems like system-centric rather than task-oriented design. (281)3.2.3
20130910q+Rhetorical analysis in second project using Carliner physical, cognitive, affective information design framework. (261)3.2.3
20130910p+Ad hoc rhetorical approach for first project using a questionaire form and personas to answer them for imaginary information context. (241-242)3.2.3
20130910o+Strategy for incorporating substantial amount of working code in a humanities oriented text is judicious choice of PHP and extensible sample code. (228)3.2.3
20130910n+Comparing parser to ancient Greek rhetor, which means that sensitivity must be built into the design. (218-219)3.2.3
20130910m+Strategy and justification of programming customer parsers as tutor texts. (211)3.2.3
20130910l+XLink and XPointer still nascent technology due to cultural, political, and legal issues, including a Sun patent; compare to Engelbart hyperscope. (200)3.1.8
20130910k+Schema transformation via XSL represents another inroad for machine cognition into textual tasks performed by humans. (189)3.2.3
20130910j+Complex and simple typing and enforcing sequencing imposes structural constraints on XML-based texts (DOMs), supporting or engendering OCHO hypothesis; also apparent that basic XML syntax is based on English, for example minOccurs. (182)3.2.3
20130910i+Interesting contrast to Derridean play of ambiguities and collision problems that are avoided using namespaces, questions of dissemination for traveling XML documents, and involvement of working groups evolving specific RFC standards for imposing structural constrains on the language. (176)3.2.3
20130910h+Chunking information into discrete units using DITA and DocBook represent alternative form of writing that requires developing appropriate rhetorical skills; needs to be distinguished from Bogost unit operations. (174-175)3.1.8
20130910g+Visual basis of authority learned from web usage; note change from early days of Web 1-0 comparing to attention to visual appearance of print materials (Drucker and McVarish). (136)2.2.5
20130910f+Paradigm shift from document-centered to object-oriented conception of information, demonstrated by four levels of single sourcing. (109)2.2.5
20130910e+Importance of rhetorical choices about naming and arranging. (97)3.2.3
20130910d+Detailed introduction to XML resembling tutorial marks push for humanities scholarship towards technical competence, beginning with differentiation between HTML and XML. (42)1.3.4
20130910c+Teachers of new technology are keystone species in information ecology; many connections to other entities. (28)3.2.3
20130910b+Subjectivity diminished in network environment according to Birkerts. (27)2.2.5
20130910a+Learning progresses from tacit ignorance, explicit ignorance, explicit knowledge, reaching tacit knowledge; technical communicator must harvest information from SMEs to explain for beginners. (22)3.2.3
20130910+Social construction examples of DOS hierarchy and Microsoft business practices influencing technical tools, beliefs about them, and relationship to tacit knowledge. (12)3.1.8
20130124+Traditional contractive versus process intensive communication on both sender and receiver roles; meaningful examples of Derrida comparison of good and bad writing as theme of Phaedrus. (219-220)3.2.3
20130120+Machine transformations by XSLT connection familiar human textual practices with automation and computer programming, representing a point at which software takes command of language in a very literal sense by replacing pattern matching and transformation operations done by humans in the textual production process, a parallel to the original takeover of basic arithmetic operations by the first nonhuman computers. (211)3.2.3
20130115+Cookbook approach embracing dual scope of producer and consumer involves substantial working code; different type of digital literacy beyond reading code is writing code for machines, for example XML parsers. (216)3.2.3
20130108+Gradual editing evolving data display by modifying style sheets after initial classification and organization by definition of XML tags; relate to McGann making intellectual discoveries through iterations of structure of archive. (161)3.2.3
20130103+External DTD formation a type of procedural rhetoric, as is use of fixed XML attributes. (61)3.2.3
20121015+XML for symbolic-analysts doing critical reverse engineering. (8)3.2.3
barkerwriting_software_documentation02 20118.302013090890%25%Y0
20130908+Distrust may be a standard attitude of novice learners toward textbooks; try linking to success or failure of spreading general programming skills (Kemeny; comparison of early personal computer manuals). (150)3.1.5
barthesimage_music_text10 20118.40201112085%5%Y0
20111208+Pheno-text is externalized to Sterne. (189)Unused
20111023+Ironic that I heard a story on NPR this Sunday afternoon about architecture deliberately built to look like gutters wore out in the middle. (185)Unused
bartheslistening09 20118.402013090990%90%Y0
20130909+Is Barthes listening to the shimmering signifiers like Chion reduced listening; Turkle and Hayles also employ shimmering signifiers to speak about electronic media. (259-260)2.2.4
20110905+The three types of listening; relate to Suchman situated actions and difficulty of AI theorists with natural language. (246-247)4.1.2
barthesmyth_today07 20118.302013102490%90%Y0
20131024v+Rhetorical forms of bourgeoisie myth that help constitute modernist, liberal subject: innoculation, privation of history, identification, tautology, neither-norism, quantification of quality, statement of fact. (118)3.1.1
20131024u+Micro-climates in myths: does Barthes single out the petit-bourgeoisie if not to situate the scholar mythologist on myth of the right? (117)3.1.1
20131024t+Left-wing myth inessential. (115-116)3.1.1
20131024s+Zizek humor. (113)3.1.1
20131024r+Language-object speaks things; clear Influence of Barthes method on Latour science studies. (112-113)3.1.1
20131024q+Depoliticized speech permanently embodying defaulting. (111)3.1.1
20131024p+Bourgeois ex-nomination. (110)3.1.1
20131024o+Clear Foucault connection; later he refers to the insignificant ideology of the right: does bourgeois culture include classification systems as studied by Bowker and Star? (108-109)3.1.1
20131024n+Mythical significations epiphenomena of consumer capitalism; tie to Johnson cultural studies cycle. (106)3.1.3
20131024m+Traditional literature as voluntary acceptance of myth; how about myth of the personal computer? (103)5.2.1
20131024l+Think about use of Einstein cartoon in help systems and Greekish names of electronic devices; relate stolen language to puns and Derridean terms. (101)5.2.1
20131024k+Myth is pure ideographic system. (96-97)3.1.2
20131024j+Deformation key operation in literature (McGann) and media studies (Hayles, Kittler). (91-92)3.1.2
20131024i+Compare to Bogost unit operations, his invocation of Badiou count-as-one stripped of the human counter: the surplus apparently encoded in signifier via, among other operations, myth touches upon asymptotic approach of human sign system functions (recall parallel discussion of signification in Diogenes Laertius) and symbolic machine control operations; at the shimmering signifier boundary are hyperlinks. (90)3.1.2
20131024h+Myth operates upon established systems, meanings become forms, concepts through signs in signification: can this second order character of myth also supply methodology to other second-order systems, such as technological artifacts, including program-generated virtual reality phenomena? (86-87)3.1.2
20131024g+Barthes provides such wonderful examples of mythical speech, like Hayles tutor texts. (85-86)3.1.2
20131024f+Functional equivalence of all media as constitutive of language-objects because myths are second-order semiological systems. (85)3.1.3
20131024e+Signifier, signified sign are a triad like Lacan imaginary, symbolic, real. (83)3.1.2
20131024d+Study of myth involves sensitivity to semiology and ideology. (81)3.1.2
20131024c+Semiology a general science in the sense that he will arrive at an enumeration of rhetorical characteristics of myth; what more could we ask for? (81)3.1.2
20131024b+As a message, is myth therefore a subset of texts, are all myths textual? (80-81)3.1.2
20131024a+Myth always has a human narrative context, regardless of medium forming its text. (80)5.2.1
20131024+At the end he gives seven rhetorical aspects of myth: this cannot be of inconsequence to any academic discipline studying texts and technology, of which new (digital) media studies is either a subset, like PHI is to semiology, or intersects. (79)3.1.2
20121127+Users speak the object; mythologist condemned to metalanguage, simulacra. (125-126)5.2.1
20120408+Galaxies of meaning embedded in myths versus atomicity of first-order language objects transfers to actual computable supplementarity of encoded contexts dramatically transcending the range of possible semiotic operations, beginning with all the combinations of Landow ontology of hyperlinks, extending into alien temporalities of everyday machine operations playing their role in posthuman human machine symbiosis cyborg. (90)5.2.1
20110805+Diagram has Language econmpassing and Myth encompassing indicating the groupings, and second order sign whose signifer is another sign; imagine compared with Saussure and Lacan. (84-85)3.1.2
20110731+Just as SGML is not popular, whereas HTML and XML are, no semiology yet; make a footnote in dissertation. (81)5.2.1
20110730+If only natural language studies founding early AI work had this depth, the confusion with plans may not have occurred: perhaps that is why I was drawn to Barthes while reading Suchman. (86)3.1.2
barthesmythologies08 20158.30201612170%0% 0
20161217+This is the very idea today, so that Operation Margarine response shunts gender studies perspective, seems to quash thought. (41)7.18.1
20150822a+Standardization has its drawbacks, and we admit that our liberatory networking protocols were largely developed by a small clique of high school buddies in California. (41)0.0.0
20150822+Galloway invokes Operation Margarine to explain why standardization is the politically reactionary tactic that enables radical openness. (40-41)0.0.0
barthesstructuralist_activity05 20128.202013102590%90%Y0
20131025g+Manteia function of artist/analysis of Hegel: speak locus of meaning, does not name it. (154)3.1.10
20131025f+Functional category of object, different than real and rational, but man fabricating meanings, also in scientific objects. (153)2.2.1
20131025e+Work of art is what man wrests from chance; although Barthes uses units, Bogost may consider this the epitome of systems operations thinking. (152)2.1.2
20131025d+Dissection and articulation will become functionalism in a few paragraphs, separate from philosophy motivated by computer science and artificial intelligence research. (151)2.2.1
20131025c+Mimesis based on analogy of functions, Levi-Strauss homology. (150-151)2.1.2
20131025b+Compare reconstructing simulacrum of an object to Bogost using exploded view; he mentions units in the next paragraph. (149-150)3.1.10
20131025a+Definition of structuralism as an activity sounds like a programmed procedure. (149)3.1.1
20131025+Experience shared by analysts and creators, as shared by readers and writers. (149)2.1.2
20120514+Sounds like a permutation of Socrates method of division and collection in Phaedrus, also the exquisitely described operation of humans doing structuralist activity again foreshadows what is commonly done by software. (151)4.3.1
batailleaccursed_share12 20168.70201612170%0% 0
20161217+Take the program or be programmed, alone together, dumbest generation response; in acknowledging what is at stake we also strengthen our constitution as thus dissociated individuality. (139)7.18.1
batailleon_nietzsche12 20168.70201612260%0% 0
20161226+Laughing at oneself the best way to get lost in immanence. (xxvi)0.0.0
baudrillardsimulacra_and_simulation02 20128.202013091590%50%Y0
20130915l+Leaves opening in seduction of appearances on the television screen, transferred to the computer interface by Turkle, whereas I suggest the free, open source option jumping into the danger by doing humanities work through programming. (164)3.2.2
20130915k+Victory of the systemic nihilism, the third type after aesthetic and metaphysical forms. (164)2.1.1
20130915j+Terrorism only response to overpowering hegemonic system in which only revolutionary ruses are raised, defense of cooking; are free, open source practices any better? (163)2.2.5
20130915i+Ontology of things emits melacholia of hegemony. (162)2.1.1
20130915h+Theories float in uncertain stage of analysis assisting precession of simulacra growing the desert. (161)2.1.1
20130915g+Exotechnical esotechnical division acknowledges consummation of Nietzschean metaphysics, default mode of real virtuality production, an assault on subjectivity is built into media with which our identities coconstitute as an embodied consciousness such that media are no longer soul equipment but the locus of (in)authentic being; Baudrillard elaborates on psychotropic agents and drugs, unable to envision the Internet enabled cyborg of Castell network society that works on the perspectival space of representation in ways impossible for traditional drugs, recalling Phaedrus (or was it Alcibiades) who wished he could become wise merely by rubbing Socrates belly. (99-100)2.2.4
20130915f+Benjamin loss of aura through mechanized reproduction same effect of conversion of thinking human subject to thinking machine, like phenomenon Kittler resignedly concludes is at the heart of media convergence; the precession of the model is the formant algorithms overdetermining the range of possible phenomena. (97)2.2.1
20130915e+Joint act of procreation of cloner and clone in service of code matrix. (96)2.2.4
20130915d+Docility through socialization, implosive instead of explosive, deterrence of chance. (34-35)2.2.4
20130915c+Immanence is the type of law of the built environment; neglects awareness of messiness of software (Kittler, Chun). (34)2.2.4
20130915b+Simulation defined: no separation, implosion, indifferentiation of active and passive. (31)2.1.1
20130915a+No more subject because you are always already on the other side. (29)2.1.2
20130915+Loud family experiment anticipates reality TV and Truman Show. (27)2.1.1
20120906+Simulation generates hyperreal models, and precession of simulacra engenders history. (1)2.1.1
20120820+From system to units, operation of things, nihilism of transparency drives this change of views, to avoid pessimism and cynicism resulting from nihilism of realization of lack of mooring of transparent epistemology implicit in simulation based realities, that is, reality as media, virtual reality: the system generates default philosophies of computing though agency of irresolution of systems, for how else are we to emerge from descension into postmodern ideas invoked by Baudrillard here in this passage; let it be ontological finesse working code connecting Aarseth, Barthes, Berry, Bogost, Burks, Goldstine, von Neumann, Castells, Chun, Clark, Deleuze, Guattari, Derrida, Feenberg, Hayles, Heidegger, Iser, Janz, Neel, Ogorman, Ong, Ramsay, Stallman, Tanaka-Ishii, Turkle, Ulmer. (159)3.2.2
20120329+Overcome the cynical pessimistic outcome of early postmodern reasoning as well as address the ambivalence toward computer technology of Heidegger by positing possibilities of remediation into unimaginable virtual realities like the ensoniment of Plato Symposium as example of saving power in the danger because it generates a hyperreal auditory field by computing base material deeply rooted in and constitutive of our intellectual history: do a new take on the image so dear to Derrida of Plato instructing a Socrates who writes, new myths branch from the revelation by Alcibiades to a writing Socrates of alternate accounts of the historical Socrates in ways also suggested by Aristophanes and Diogenes Laertius, like Socrates as a great pirate publisher who would be a master hacker today. (16)5.3.1
baudrillardsimulations05 20128.002013091525%25% 0
20130915b+The key to second order simulacra is implicating humans in the interface as interlocutors, not just embodied affordances and constraints of the natural and built environment. (92-93)2.2.4
20130915a+Universal substitutability of stucco for other visual objects like universal Turing machine among order of simulacra. (87-88)2.1.1
20130915+Three orders of simulacra: counterfeit, production, simulation. (83)2.1.1
20130908+Structural law of value readily comprehended, epistemological transparent, in electronic computing machinery; thus it is not surprising that Turkle and others associate computer technology with postmodernism. (83)2.1.1
20120514+Obviously thinking of real robots, not fantasized near-human-equivalents like those portrayed in science fiction; this could be a panel topic of PCA conference philosophy and popular culture if it has not already happened in years past. (94)2.2.4
baudrillardsymbolic_exchange_and_death06 19948.002013060175%5% 0
20130601+Cynical commenting on contemporary knowledge practices can be overcome by considering participatory sense of tradition (Janz). (185)3.2.2
19940601+Later (in fn#42) Baudrillard contrasts the initiatory function of disease in the Dangaleat to our own practice of distance, non-relation, between doctor and patient (deconstruct these two words and you will understand more! (185)0.0.0
baudrillardtransparency_of_evil06 19948.202014042125%25%Y0
20140421j+Other as sustaining discourse so human does not have to repeat voice for ever strongly connects to Derrida archive and Kittler on recording media and his merciless roast of Lacan. (174)3.1.3
20140421i+Goal of interfaces becoming invisible that many philosophical programmers idealize is the same seduction Baudrillard deduces from the hold of objects on our attention, bound in the inexplicable secrecy of artifice, the fetishism of commodities, code and objects. (174)3.1.10
20140421h+Scintillation of being, which we know is related to the precession of simulacra, manifest by locus of vertiginousness that Baudrillard hardly dares utter everyday experience of shimmering signifiers: the concept Baudrillard struggles to present via terms of human seduction to otherness of objects better enshrined by arbitrary behaviors like writing and using computer user interfaces. (174)2.1.4
20140421g+Or now otherness based on AI operations are the seductive draw of our attention and labor: Gee on the crossover training logic, Turkle for reminding us that technology gets what it wants. (173-174)2.1.4
20140421f+Call it the turn to the vicissitudes of execution. (173-174)2.1.4
20140421e+Poles of disalienation and absolute exoticism both point toward interest in radical otherness, as evident by positions promoted by Harman, Bogost, Montfort, and others. (173)2.1.4
20140421d+The subject is too well known, or known to be shaped by the objects, which become the new site of philosophical studies as vanishing points; the diagram of the post-postmodern period is the object as strange attractor turned inside out as software ontology. (173)2.1.4
20140421c+Baudrillard legitimates SCOT, History and Philosophy of Science and other science studies as analysis of science to get a glimpse of the Object. (173)2.1.4
20140421b+Acknowledging distortion of instrumentation grounds strange attractor metaphor, which Zizek also touts. (172-173)2.1.4
20140421a+The irredeemabiliy of the Object gets cashed out in computational simulacra. (172)2.1.4
20140421+We feel long past the fixation with materiality that obsessed Baudrillard with otherness, we who in the post-postmodern period accept network ontology, enough to create its being would be the ultimate ontogenetic philosophical finesse. (172)2.1.4
20131207+Intelligent machines do not deploy artifice, they resynthesize according to models, revealing tension between acknowledging embodiment and rampant biochauvanism in Baudrillard and Lyotard. (52)2.2.1
20120613+Quintessential postmodern response to intelligence machines; or we are busy with our own creating and need slaves to do the boring storage/retrieval maneuvers that past thinkers had slaves (grad assistants and secretaries) to do; see Irigaray on secretary. (51)5.1.1
19940611c+Possible escape from eternal orbit return of the same when we go, try to go, seeking the not-self asymptotic relation between subject and object, narcissism again? (174)2.1.4
19940611b+In seduction, sovereign otherness of the Other can lead to our death since we may be baring our phallus to be loved. (173-174)0.0.0
19940611a+And we are so stuck with ourselves that we nave no power. (172-173)2.1.4
19940611+When you think about A. (52)0.0.0
bauerleindumbest_generation05 20148.102014061490%90%Y0
20140614b+Civic knowledge wound up in knowledge of events. (210)1.2.1
20140614a+Today war against young has passed to institutionally concretized electronic biopower of screen advertisements. (177)2.2.4
20140614+Mistake of concretizing self understanding on teenage peak years, in adolescence, is latent consequence of widespread digital media adoption as it happened in the United States from the 1970s onward. (168)1.2.1
20140613+Compare culture hooked on consumer goods to era Seneca criticized, then layer on Quintillian critique of Seneca and call for more serious style. (234)5.3.1
20140612p+Dim intellectual, civic understanding, liberal education futures; downward heading of American mind towards WALL-E characters net effect of social pressures and leisure preferences of young Americans of the dumbest generation. (233)1.1.1
20140612o+Shared belief in value of liberal education because lay support needed for liberal arts to flourish, part of democratic faith; ignoring society ennobling traditions makes ignorant citizens, highlighting effects of general population leisure trends. (232-233)1.2.1
20140612n+Need for pipeline of intellectuals for healthy society, eighty percent of lesser intellectuals as well as minority of superlative culture warriors. (231)1.2.1
20140612m+Role of intellectuals includes occupying middle ground between professional and lay discourses, mediating confluence of niches, maintaining public exposure and academic rigor, and also producing next generation of thoughtful intellectuals. (231)1.1.1
20140612l+Examples of College Republicans and updated SDS where exceptional youth are manifest comparable to examples of extreme minority of exceptionally creative and successful digital natives; actions of conservatives too focused on common foes with insufficient internal contention, leftists employing topical arguments with little appeal to philosophical tradition. (228-229)1.2.1
20140612k+Elegant argument why exceptionalism has unexpected effects on future generations who adhere to it. (226)1.2.1
20140612j+New Left culture war initiated the decline of intellectual life leading to dumbest generation by rejecting reading and learning obsolete and irrelevant topics; relates to my dilemma at heart of philosophy of computing that ignorance of technical details shunts formation of places for philosophical thought to occur, such as in working code of critical programming. (226)1.3.2
20140612i+Idealization of NY intellectuals as studied by Dorman are former model culture warrior whose success credited to youthworld of ideas and argument informed by liberal study. (224)1.2.1
20140612h+National implications of dumbest generation reached as culture war outcome of youth movement is young adults under thirty prepared to be culture warriors like Jefferson and print culture, for full, not just partial, civic life. (223)1.2.1
20140612g+Knowledge and tradition constrain culture wars, for example how 1955 to 1975 was apparently youth war against Establishment, by identifying key objects of attention and method of action. (222)1.2.1
20140612f+College professors avoid public attention but also only think and act within their niche, leading defeating disciplinary self-criticism to indulgence of student self interpretations ignoring traditional themes and examples: value of this proposition is as example of value of culture wars operations hearing other sides. (221)1.1.1
20140612e+Contention bred by knowledge in democratic society leading to transformative, sanative culture wars the internal sustaining mechanism of democracy. (217)1.1.1
20140612d+Connection between healthy vigilant citizenry and abundant knowledge. (215)1.1.1
20140612c+Expressive satisfaction of civic good actions alluded to by complex narratives taught to read through immersion in tradition for humans and machines; suggests correlation between quantity of short term associable long term cultural memory and moral satisfaction, as if insensible to dumbest generation lacking civic knowledge. (214)3.2.2
20140612b+Well explicated ironic, potentially tragic flaw of anonymous voting. (212-213)1.2.1
20140612a+Democracy based on civic knowledge continuance requires informed electorate, meeting paradoxical free choice to opt out of civic life preferred by addicted consumers in projective cities. (212-213)1.1.1
20140612+Lost twenty year range of humans dumbest generation PHI founds future philosophies of computing. (209)1.3.4
20140611c+Lack of experience in cultural knowledge the unnoticed complement of STEM deficit, both endangering future of American society. (203)1.2.1
20140611b+Admits no time to read classics; consider bootstrapping through philosophy and history of computing and technology as backdoor entry of missed liberal education. (201-202)1.3.4
20140611a+Too late for them to catch up on knowledge and culture traits from missed liberal education in their twenties due to encroaching adult responsibilities but only becoming partial citizens. (201-202)1.1.1
20140611+Ingredients in place for producing WALL-E humans from the dumbest generation: keen wit wasted on screen diversions, excessive ambitions but merging on consumer goals, alienation from adult world through immersion in peer stuff rather than countercultural ideas and radical mentors. (201)1.2.1
20140610b+Time magazine story about Twixters ignores quantity and quality of intellectual labor expended in nonproductive self-discovery period. (170-171)1.2.1
20140610a+Example of Art Show the twenty percent adolescents who believe their preferences bound authentic reality, but for the other eighty percent growth to age 17 unremarkable. (168)1.2.1
20140610+Sustained linear, hierarchical, sequential thinking in decline along with book reading. (140)1.2.1
20140607h+Challenge for philosophies of computing because it may not be felt there has been time for a tradition to form, or the whole argument of seeking insight from tradition is short circuited by belief in sequence of rapidly obsoleted technological generations devalues all but the state of the art; ironic that Seneca invoked on love, when there is value in revisiting when contemplating technology. (190)1.3.2
20140607g+Interesting the attitudes weakening tradition now attributed to shortcomings of cultural custodians rather than technologies. (188-189)1.1.1
20140607f+Are the criteria formative of Bauerlein inspirations still appropriate, and how do current users test out across all generations and beyond human into machinic. (113)5.1.1
20140607e+Curious how putative philosophers of computing fare in such tests deemed to constitute digital literacy by large commercial testing corporation, comparing to the skills assessment instrument I used for the midterm exam in my last course on digital communications networks. (113)5.3.1
20140607d+Benefits of programming could be compared to benefits of reading, and Matthew Effect ought to hold as well. (58)3.1.7
20140607c+Philosophers of computing likewise tasked with uncovering how potentials squandered as everyday programming declined in parallel with reading, or never got going in the first place. (37)1.3.2
20140607b+Compare paradox of dumbest generation to awareness Seneca had of Roman society immersed in technological conveniences losing touch with wisdom and tradition, only to be secondarily critiqued by Quintillian. (30)5.3.1
20140607a+Compare position that ingredients for making informed citizens in place to sweet spot for learning programming that peaked in 1980s, supplanted by postmodern interface enjoyment leveraging visual and tactile proficiencies over symbol manipulation as Manovich discusses Bruner and Kay. (10)1.3.4
20140607+Hazard of gamefication is displacement of ultimate goals with achieving results for discrete projects. (2)5.1.1
20140606i+Is the Dumbest Generation redeemable, or will their habits setting the course for a WALL-E future? (235)1.1.1
20140606h+Adults are blind or unconscionably unresponsive, and obliged to speak out to reverse moral poles. (235)1.2.1
20140606g+Depiction and diagnosis of the Dumbest Generation: tradition-infused intellectual life cannot compete with screen-mediated social life, the latter killing culture. (234)1.1.1
20140606+Unwilling versus ignorant lacks improvement mechanism; seems like echo of critique of writing in Phaedrus. (193)1.2.1
20140604l+Disabling narcissism prevents accurate self assessments of talents and competencies. (192-193)1.1.1
20140604k+Need for a critical filter, again ironically, like Quintillian of Seneca, a delicious detail missed by Bauerlein, who thinks away from technology whereas Latour and others develop science studies. (191)1.3.2
20140604j+Appeal to maturity of perspective gleaned from encountering tradition and adults beyond peers as knowledge quality filtering mechanism. (190)1.2.1
20140604i+Absence of student-teacher contact in learner-centered environments attributable to institutions treating students as commodities and instructors esteeming student knowledge at expense of deauthorizing their own. (188-189)2.2.4
20140604h+Mentors mistakenly assume approval leads to students working more to continue their inquiries; learner-centered classrooms do not lead students to seek out instructors outside class. (186)1.1.1
20140604g+Treating disaffected youth as injustice indulges them and downgrades authority position of mentors, devaluing remote traditions for having no bearing since their only prior justification was by the rhetoric of recanting mentors; intellectual independence sabotages tradition. (185)1.2.1
20140604f+Indulgence of youth weakens already fragile continuity of tradition; connecting adult thinking with unpopular war further weakened it. (182)1.2.1
20140604e+Effects of educators indulging youth are routine irreverence and knowledge deficits; implied argument is that educators are at fault for participating in pedagogical practices that take indulging youth as a given, justifying, for example, gamefication. (181)1.1.1
20140604c+Foreign policy reflected in culture war forms of control; compare to Edwards closed world. (179)1.2.1
20140604b+Poirier argument that discourse of counterrevolutionary intellectuals war against the young, a containment policy for which enclosure in readily manipulable digital media cocoons, the dumbest generation marks a plateau in human cognitive evolution. (177)1.2.1
20140604a+Indulgent attitude toward youth evident in school zones dogmatically accepted by custodians of culture. (174)1.1.1
20140604+Even the successful Art Show neglects cultural authority of artistic heritage, tradition carried by books by valorizing self-contained perspectives of student artists under influence of digital social media, thus by implicit a fortiori argumentation the eighty percent rest of mass communication is consumer oriented limited intelligence, restricted vocabulary outlooks as possible machine other perspectives. (173-174)2.2.4
20140603z+Youth more disengaged from culture the more mentors engage them in their own terms; digital technology fosters segregated social reality. (200)1.1.1
20140603y+Young Americans need teachers who give them less relevance, less indulgence, and more relevant, adult role models; Bauerlein believes this loss results in less time spent in out of class activities that complement class work. (199)1.1.1
20140603x+Development of healthy self criticism in light of tradition lost, not happening, and not being discussed; it is social and shortsighted. (198)1.3.4
20140603w+Overly optimistic assessments of student proficiency by high school versus college teachers one consequence of indulgence by mentors. (197)1.2.1
20140603v+Confidence and enjoyment do not entail achievement, as shown by achievement levels between nations; teens unable to appraise capabilities, and aptitude and ambition do not align. (195)1.2.1
20140603u+Twixter vision is social, peer oriented rather than knowledge oriented perspective cultivated by long habituation with books. (172)2.2.4
20140603t+Twixters are natives of projective city, their aimless lifestyle justified as journey of self-discovery before engaging in their ultimate life work project, for example plateauing with doctoral dissertation and discipline defining works. (170-171)2.2.4
20140603s+Reich gave deep interpretation to youth lifestyle of 1960s, but youth lifestyle under sway of American capitalist consumer experience reflects a different underlying intellectual depth and expanse. (169)1.2.1
20140603r+Bauerlein will argue that blame for the misuse of the digital realm falls on custodians of culture who promote its intellectual benefits, rather than the kids or their parents. (161)1.1.1
20140603q+Threshold into adulthood has changed because the rituals that used to introduce adulthood shunted by digital realm as used by young Americans. (160)1.1.1
20140603p+Compare analysis of Web users to Horkheim and Adorno mass consumers. (158)1.2.1
20140603o+Parallel loss of gains in consumer choice and talkback capacity. (156)1.2.1
20140603n+Desire for greatest amount of content for least amount of work, exemplified by intellectual style of Wikipedia prose, yielding uninspiring knowledge language in competition with amusing social language. (152)1.2.1
20140603m+Nielsen research highlights what works, reminding us that the Web is now a consumer habitat, not an educational one; children develop habits the undermine classroom goals. (149)1.1.1
20140603l+Nielsen Norman research shows Web reading less creative and complex than enthusiasts claim, forming reading and thought patterns focusing on retrieval and consumption. (148)2.2.4
20140603k+Nielsen Norman model of web users reveals little sustained linear, word for word reading habits, lack of concentration and otherwise insufficient reading habits for the 80 percent; to improve they need to develop more basic literacy and patience, not more computer literacy and screen time. (143-144)1.2.1
20140603j+Screen reading not a supplement for digital natives but replacement for linear thinking, its new habits taken as inevitable. (140)2.2.4
20140603i+Education requires worthwhile encounters outside personal interests, thus digital media cocoon stultifying; compare outcomes to traditional practices. (138)1.2.1
20140603h+Digital media affords autonomous adolescence of personalized reality based on programmed visions, striations mirroring adolescent desires. (137)2.2.4
20140603g+Maturity involves vertical modeling based on relations with older people and traditions, but digital media encourages horizontal modeling of peers. (136)1.2.1
20140603f+Limits of social life once managed by family unit surpassed by communication technologies; significance of Web is nonstop peer contact rather than a universe of knowledge. (133-134)1.1.1
20140603e+Peer absorption for identity building is greatest unmentioned vice of digital media. (133)1.1.1
20140603d+Poor quality and shallow content of teen writing ignored by adults who praise the depth and pace of immersion, but form bad habits. (132)1.2.1
20140603c+Criticism of visual media for minimizing expansion of verbal intelligence and skills building in favor of spatial intelligence, worsened by endorsement by young Americans whose technological tools resemble their beloved toys, and Web use reflects adolescent recreations. (130)2.2.4
20140603b+Dire intellectual effect of habitual consumption of low rare-word media; can a comparison be made to software monocultures? (129-130)1.2.1
20140603a+Progressive vocabulary expansion crucial to intelligence; rare word count of print far exceeds oral media. (129)1.2.1
20140603+Essential cultivation of oral mother tongue natural language depended upon for educational success harmed by digital practices; private zone verbal media should be appraised along with schools and teachers. (127)1.2.1
20140601s+Digital practices disrupt informal, physical settings where reading, discussions, and physical play took place for prior generations, stunting vocabulary growth. (126)1.1.1
20140601r+Time to analyze how worse intellectual dispositions of youth are strengthened by digital practices including gaming, blogging, manipulating devices. (126)1.1.1
20140601q+Criticism of emphasizing circumstantial factors in failure of studies to find positive benefits of digital literacy initiatives and their underlying theories, failing to check headlong dash to technologize everything. (124)2.2.4
20140601p+Studies evaluating elearning often use measure of student enthusiasm to judge educational benefits, and most digital initiatives fall short for lack of long term outcome differentials than nonparticipants; seems difficult to assess longer term outcomes for fleeting direction of techniques, which we call culture, learning environments, ultimately influencing development of learning styles and quality of lifelong learning itself. (119)2.2.4
20140601o+Situation of poor writing at school and energetic writing at home fails to consider negative effect of popular technologies. (118)2.2.4
20140601n+Information and Communications Technology literacy an appropriate rubric for rating knowledge activities accomplished with digital electronic technologies developed by Educational Testing Service for profit United States corporation, whose findings revealed poor digital literacy skills. (113)2.2.4
20140601m+Vocabulary, memory, analytic talents and erudition do not expand through online experience. (109-110)1.1.1
20140601l+No reciprocal effect for individual minds, which stall as collective machine intelligence augments. (107)1.1.1
20140601k+Sesame Street effect that only fun learning is good, also legitimating indiscriminate tinkering with electronic tools; each doing their part expanding collective intelligence seems appropriate. (106)1.1.1
20140601j+Belief that screen interactivity invites collaboration and activity where solipsistic, passive reading was the prior condition. (103)1.1.1
20140601i+Cornerstone of civilization replaced with dissimilar building block, imagination inspiring books with screen virtual realities; another ironic iteration of Platonic criticism of writing. (101)1.1.1
20140601h+Antagonism of books versus computers indicates replacement rather than complement; a zero-sum game for time and money of young people. (99)1.2.1
20140601g+Screen intelligence like interface intelligence leveraging visual and tactile modes over symbolic manipulation, does not transfer to non-screen experiences that build knowledge and verbal skills; ordinary book reading is rejected as alien and irritating. (95)2.2.4
20140601f+Bomer viewer literacy. (94)2.2.4
20140601e+Key to paradox of apparent rising IQs and stagnation of civic talents in learned content versus culturally reduced material. (93)2.2.4
20140601d+Flynn Effect of rising IQs seems linked to bias on spatial reasoning. (90-91)2.2.4
20140601c+Objections to Johnson include ignoring moral, psychological, and philosophical complexities below the surface. (89)2.2.4
20140601b+Screens praised for shaping consciousness, developing decision making skills in games, despite passing on juvenile content; likewise progressive complexity of television shows. (88)2.2.4
20140601a+Stress on learning side over fun side of digital media gives children discretion over judging how they best learn, invoking Gee and Johnson on complex formal elements embedded in popular culture that Bogost argues are absorbed via procedural rhetoric. (85)2.2.4
20140601+Claim is that screen time is cerebral, generating new forms of intelligence based on hyperalertness and multitasking, appealing to Jenkins distributed cognition, collective intelligence, and transmedia navigation. (84)2.2.4
20140531w+Parents seek relief for other household tasks by putting children in front of screens. (80-81)1.2.1
20140531v+Media use begets more media use, forming larger Gestalt environment, just as literary reading praised for begetting more reading. (80)2.2.4
20140531u+Bedroom has become multimedia center leading to more individualized, unmonitored use. (78)1.2.1
20140531t+Studies conclude leisure time kids spend with media equivalent to full time job. (77)1.1.1
20140531s+Contrast between uniformity of screen experience and uniqueness of each book. (76)2.2.4
20140531r+Technology expresses youth culture of Millennials, viewed as possessing innate ability to construct knowledge online. (72)2.2.4
20140531q+E-literacy derives from valorization of digital practices moreso than bibliphobia, yet knowledge and skill levels have not increased; echoes critique of writing in Plato. (66-67)1.2.1
20140531p+Viewer literacy shifts emphasis to technological aptitudes, treating digital literacy as full-fledged intellectual practice; compare to Hayles discussion of close, distant, and hyper reading. (65)2.2.4
20140531o+Problems of poor reading and writing skills of workplace entrants and need for remedial courses by college freshmen. (63)1.2.1
20140531n+Matthew Effect of childhood reading skills correlate to later reading and learning has sinister corollary for those who do not read as children. (59)1.2.1
20140531m+Benefits of reading books include providing place for reflection, finding role models, expressions of feelings, and moral convictions, sensing plot, character, argument structure, and aesthetic styles. (58)1.2.1
20140531l+Students do not realize connection between general intellectual interest and academic performance; compare to Kemeny valuing act of teaching the computer to perform calculations in place of doing them oneself. (54)1.2.1
20140531k+Kids reject books like vegetables, unconcerned that aliteracy poses career obstacle. (53)1.1.1
20140531j+Leisure reading correlates directly on reading comprehension scores and academic progress. (50)1.1.1
20140531i+Literary reader rates among 18-24-year-olds drop significantly in last twenty years, even with very low threshold for what counts as literary reading. (46)1.1.1
20140531h+Popular books like Harry Potter signal social happenings rather than intrinsic allure, and a steady withdrawal from other books. (43)1.2.1
20140531g+Current generation flaunts aliteracy as valid peer behavior, knowing but choosing not to read books because it is counterproductive. (40)1.2.1
20140531f+Task of humanist critics like Bauerlein to uncover how the Dumbest Generation systematically squanders its enormous potential, focusing on their time not spent in school. (37)5.1.1
20140531e+Young Americans are rich in material possessions and adolescent skills, poor intellectual possessions and adult skills; the occasions and tools available for learning but are brashly and habitually misused. (35)5.1.1
20140531d+Decline in general knowledge not noticed because most knowledge purveyors niche oriented. (34)1.2.1
20140531c+Paradox of slipping knowledge skills in abundance of resources. (30)1.2.1
20140531b+Philip Roth coined term Dumbest Generation in novel The Human Stain; Bauerlein applies to the large segment of young Americans entering adulthood ignorant and little concerned with liberal arts learning and civic awareness. (26)1.1.1
20140531a+Anti-intellectual outlook is a common, shame-free condition of American youth consumer culture enmeshed in juvenile matters; gives research findings from math/science/technology and fine arts. (16)1.2.1
20140531+Astonishing ignorance of young person on the street actively cut off from world affairs, encased in immediate realities, affirmed by standardized tests and other national surveys. (13)1.2.1
20140529l+Attention extended to virtual social space forming extensive, autonomous generational cocoon so that minds plateau at social joys of age 18, endangering civic health of the United States by ignoring cultural and civic inheritance. (10)1.1.1
20140529k+The closed American mind has not opened, although conduct has improved, producing sense that the kids are alright. (9)1.1.1
20140529j+Paradox of information age is idealization of knowledge and communications, accompanied by less reading and knowledge of traditional intellectual objects beyond artifacts of youth culture. (8)1.2.1
20140529i+Bauerlein claims his book focuses on examining empirical research that when collected reveals declining intellectual condition of young Americans rather than their behavior and values. (7)1.1.1
20140529h+No overall improvement for all the enhanced learning techniques; overall downward trend toward increasing leisure activities and less time spent reading. (5-6)1.2.1
20140529g+Beyond exceptional cases revealing systemic ill of competitive frenzy focusing on measurable results, most children spend more time with media than homework. (4)1.1.1
20140529f+Robbins found evidence of inescapable corporate rat race in precollege years of exceptional students, displacing other life questions; Brooks calls them Organization Kids, well matching inhabitants of Boltanski and Chiapello projective city, for which acts of gamefication producing results overshadow educational activities themselves. (2)1.3.4
20140529e+Displacement of old media and traditional literacy by new media communications technologies. (xii)1.2.1
20140529d+Opportunity cost of digital diversions that supplant prior limits to teen life. (xi)1.2.1
20140529c+Managing omnipresence the new habitus of the digital age; it interrupts cultivation of habits of analysis of reflection enjoyed by former generations. (x)2.2.4
20140529b+Kids need reprieve and mentoring, but adult efforts threatened by incessant peer-to-peer contact by digital tools. (ix)2.2.4
20140529a+Intellectual growth stunted by social demands heightened by technologies. (ix)1.2.1
20140529+Growing number of books criticizing digital tools and technologization. (viii)1.2.1
beck_and_adresextreme_programming_explained_second_edition09 20138.60201309090%0%Y16
20130909+Extreme programming gets a chapter in Mackenzie Cutting Code for revealing features contemporary software production and codescape.6.2.2
benjaminwork_of_art_in_age_of_mechanical_reproduction03 20118.202015021990%90%Y0
20150219+Levy hints at potential for virtual aura through feedback recovering art and observer from withered condition brought on by commodification. (IX)3.1.3
20130910j+Necessity of war to preserve property system and scarcity, for example famous shot of precision-guided bomb destroying a target; also looks to use of media by military. (XVI)2.1.1
20130910i+Participation shifts to passive consumption, reception in state of distraction; do movies invite a different kind of contemplation, or are they just amusements? (XV)2.1.2
20130910h+Extreme closeup and other techniques are ways perceptions change through technology moreso than society, although Dumit discusses the social aspects; recall comparison to magician and surgeon, link to NMR. (XIII)3.1.3
20130910g+Group reception including feedback is not possible with paintings and other individual pieces not easily reproducible or mass communicated. (XII)2.1.2
20130910f+This makes sense of gnomic formula by Aarseth contemporary empathy with the perceived political symbolism of the mode of mutation. (XII)3.1.2
20130910e+Cutting in film produces equipment-free reality, complete artifice impossible in theater. (XI)2.1.2
20130910d+Not just accidentally being in a news reel, occasional letter to the editor, or documentary subjects, but being able to reflect via electronic media the audience can provide the feedback lost. (X)2.2.5
20130910c+With Arnheim scream art has a new ground besides representing beauty; enter Baudrillard. (IX)2.1.2
20130910b+From free-floating contemplation to involvement in hidden political significance and specific approaches to appreciation. (VI)3.1.1
20130910a+With mechanical reproduction we thus make mass entertainment like cinema, radio, television, print rather than individual spectacles that cannot be recorded, and when spectacles, mass spectacles like rock concerts. (IV)2.1.2
20130910+Contrast his sense with emphasis on social causes to McLuhan; consider Manovich codetermination by cultural and technological aspects. (III)3.1.1
20120906+Withering aura of work of art picked up by many theorists, including Baudrillard. (II)2.1.2
20120403+Benjamin grounds much of critical media theory: theater, transformed into cinema, loses its dynamic interaction with the audience and art takes on more of a bureaucratic, industrial production process, invoking Marxist alienation of labor; however, something is regained in the present age if there can there be an virtual aura regained through feedback. (IX)2.1.2
berardisoul_at_work01 20168.702015020490%5%Y4
20150204b+Articulation of apparent freedom in coercion by control mechanisms also exemplifying loop around in temporal reading instances tied to their note taking after first pass done. (192)0.0.0
20150204a+Capital operating on depersonalized time explains embodied spirit behavior instrumenting media ecologies PHI. (192)0.0.0
20150204+Makes my blood boil to be a part of it, capture of wandering soul to dispose of its intelligence, creativity, language. (192)0.0.0
20150109p+Outline of the book. (24)0.0.0
20150109o+Alienation, estrangement and totalization compared to biopolitics and psychopathologies of desire. (23)0.0.0
20150109n+Reestablish relevance of Marxist language with respect to languages of post structuralism, schizoanalysis and cyberculture. (22)0.0.0
20150109m+To continue Foucault shift to new forms of alienation and precariousness of mental net work. (22)0.0.0
20150109l+Individual self realization and happy singularizations become shared possibilities and elaboration of forms of life in communism to come. (19)0.0.0
20150109k+Ideal of Marx really free working composing damned seriousness. (18-19)0.0.0
20150109j+Work exploiting desire as site of libidinal and narcissistic investment binds us to our own unhappiness. (17-18)0.0.0
20150109i+New communism endlessly constituting new poles of autonomy via therapeutic contagion rather than Engels administration of things, withering away the political. (16-17)0.0.0
20150109h+Marx general intellect reformatted to include emotion, affect, aesthetic deployed in contemporary experience of work as soul, attempting to decipher politics opened by paradigm of cognitive worker. (16)0.0.0
20150109g+Method of compositionism to distinguish from workerism. (14)0.0.0
20150109f+Importance of 1977 for Italian autonomia movement antagonistic will giving way to colonization of soul by logic of desire and its entry into the production process. (12-14)0.0.0
20150109e+Question is how has work become central locus of psychic and emotional investment. (12)0.0.0
20150109d+Invokes Gates speed of thought as mirror to form of governance of democratic imperialism. (11)0.0.0
20150109c+Depression occurs when social brain cannot manage accumulation of complexity and speed of flows of information. (10)0.0.0
20150109b+Psychopathology of collective soul. (10)0.0.0
20150109a+Soul at work moves center of gravity in cognitive capitalism to mobilization of mood. (9-10)7.11.1
20150109+Soul as clinamen of body; compare to Galloway protocol as chivalry of objects. (9)7.11.1
20150107a+Transition from industrial exploitation of body to Semiocapitalism exploiting mind, language and creativity. (21)0.0.0
20150107+Soul as vital breath converting biological matter into animated body, citing Epicurus. (21)0.0.0
berrycopy_rip_burn03 20168.702016030390%5%Y16
20160303a+From Heidegger legitimate method of expanding scope to include social practices and create rupture with stupefying assumptions of consumer technology. (xi)7.9.1
20160303+Worth noting preface begins with Heraclitus. (x)0.0.0
20160220+Berry begins with Heidegger. (xi)0.0.0
berryphilosophy_of_software06 20128.302015090390%90%Y0
20150903d+Slowing down to step by step execution entry point to phenomenology of computation. (38)3.1.9
20150903c+Think about code by sequential ticks through each statement, with attention to illusion of concurrency. (38)3.1.9
20150903b+Code work occurs in the mediated environment of software engineered for developing software means the appearance of code snippets on a printed page is actually a skeumorph of earlier times, and we only really experience working code through double mediation. (37)3.1.9
20150903a+Robin Miller comment that languages influence how programmers think about tasks evident in OOO. (33-36)3.1.9
20150903+Absolute versus real code to capture how programmers think computationally in hermeneutic circle. (33-36)3.1.9
20131025z+Lifestreams are Kitchin and Dodge capta trails, and can be studied phenomenologically for their impact on everyday life. (162-164)3.1.8
20131025y+Digital stream as one-dimensional flow of 0s and 1s becomes core of new computational subjectivity. (55)3.1.9
20131025x+Restructuring post-human subjectivity riding on top of network of computationally-based technical devices the key point of the book: is it a phenomenological result? (145-149)3.1.8
20131025w+Building computational subject as stream from Lyotard fables, Massumi affective fact, software avidities, Husserlian comet, processing multiple streams at once (Aquinas). (145-149)3.1.8
20131025v+Add computational to Sellars scientific and manifest image; per Harman, is materiality implied if do not fully withdraw? (131-132)3.1.8
20131025u+Phenomenological exploration of experience of digital technology. (121)3.1.8
20131025t+Quicksort example of code as image or picture begs for critical study like 10 PRINT. (48)3.1.9
20131025s+Symbols of stored program computer inspire picture meditations; finally a meaty example of quicksort algorithm as beautiful code, although no explanation of its operation so must be derivable from its own presentation. (48)3.1.9
20131025r+Shifting notion of calculation and computation from engine to symbolic processing: what is its current trajectory? (47-48)3.1.5
20131025q+Progress timeline: basic mechanical process, to which stored program computer is next stage, then multiprocessing and internetworking, then Web 2-0. (47)3.1.5
20131025p+Is this grammar of code method phenomenological, what kind of ontological division is this, any concern that not focusing on concrete historical examples defers serious engagement by philosophers of computing in working code? (51)3.2.2
20131025o+Domain of double mediation, calling for oscilloscopes and tcpdump (Kirschenbaum); also narratives of cyberspace constitution. (50)3.1.10
20131025n+Grand narratives and cultural tropes related to metaphorical code: engine, image, communication medium, container. (46)3.1.9
20131025m+Software continually breaks down; much never reaches working state, much is never used, much remains hidden in large code repositories; Chun also distinguishes these forms of code from that which executes. (40-41)3.1.9
20131025l+Code is manufactured, always unfinished projects being continually updated; thus political economy of software important; see Mackenzie. (39)3.1.9
20131025k+Definition based on sequential concept fetch and execute cycle; Manovich media performances processual context of code. (38)3.1.9
20131025j+Clever example of Alliance for Code Excellence version indulgences for bad code, like carbon offsets. (30-31)3.1.9
20131025i+Computational literacy that Manovich is milking also hinted as new academic goal (Whithaus). (24-26)3.1.8
20131025h+Computational hard core in all disciplines may be new paradigm; if not practicing working code, super-critical modes of thought circulate exclusively within consumer subjectivity, missing potential of creative control. (21)5.1.1
20131025g+Code as cultural technique affecting culture (Kittler, Kramer, Manovich). (17)3.1.9
20131025f+Most code experience is visual rather than haptic. (17)3.1.8
20131025e+Is double mediation a special case of Baudrillard simulacrum, or more, deserving fresh analysis? (16)3.2.2
20131025d+Similar to robotic moment of Turkle, but more encompassing, double mediation requires entrusting agency to software design. (16)5.1.1
20131025c+Hidden versus visible affordances complicate computational objects but also leave saving power of epistemological transparency. (15)3.1.8
20131025b+Distinguish the computational from computationalism, which seems orthogonal to the issues, providing useful metaphors (Hayles). (11)3.1.8
20131025a+Understand how being-in-the-world is made possible through application of computational techniques manifested in processes touched by software and code. (10-11)3.1.8
20131025+Derivation of computation from Latin computare. (10-11)3.1.5
20130912l+Final thought is Serres-inspired parasite subjectivity in symbiotic relationship to enormous machinery generating digital standing reserve, although I see flaw in this image because passing through underground cavity to surface waters involves reduction passing through porous solid material like sand, losing coherence of human navigating cyberspace as on a surfboard or automobile. (170-171)3.1.8
20130912k+Heideggerian danger includes reclassifying entities from persons to objects, so seeking to promote gathering; thus our mission as philosophers of computing is digital Bildung (self-cultivation), fostering super-critical, versus sub-critical and acritical subject positions. (167-169)3.1.8
20130912j+Default ontological insecurity, inability to distinguish knowing-how and knowing-that; relate to Turkle robotic moment of being alone together. (167)3.1.8
20130912i+Huge distributed machine cognized memory of lifestreams; think of how machine subjectivity arose in science fiction series Caprica from avatars. (165)3.1.8
20130912h+Consider other manifestations of computationalism such as through deliberate exercises for intuiting machine embodiment. (162)4.3.2
20130912g+Compare Gaussian risk to Zizek chocolate laxative; also latent risk in software bugs, sloppy integration, poor object modeling. (161)5.2.1
20130912f+Callon socio-technical network stabilizing financial subjectivity using Deleuze agencements (see Hayles on high frequency trading), focusing attention with an extended mind, cyborg subjectivity composite Latour plug-ins. (157)5.1.1
20130912e+Challenges to liberal humanist individual, noting Heidegger authentic time versus time of the computational stream; bounded rationality replaced by extended cognition, thus appeal to visual rhetoric to comprehend big data (Manovich). (153)3.1.8
20130912d+Role of technical objects in preference formation goes beyond mediating influence to structural foundation and efficient cause: Doel excess, Latour plasma, Kittler time axis manipulation. (152)5.1.1
20130912c+No computation without inscription, and some material apparatus, even if ultimately part of universal computer; compare Kittler Aufschreibesystem to Sterne transducer. (151-152)5.1.1
20130912b+Lyotard focus on speed up and technical time of the computer; examples of Nietzsche and Kittler. (150-151)3.1.3
20130912a+Riparian habitus of real time streams for new notion of subject, watching at multiple levels one component of digital literacy (ever just watch tcpdump), perhaps constituting narratives; makes sense that next type of philosophical production informed by technological imaginary (Zizek). (142-145)3.1.8
20130912+Switching costs of unready-to-hand technological comportment of running software affects contemporary subjectivity. (141)5.1.1
20130911z+Loose coupling network layers another good example of loosely independent connections thought in terms of Heidegger Gelassenheit, with abstraction taking place all the way down. (140)3.1.10
20130911y+Heim on vicarious causation relates to Turkle on surface enjoyment, what Berry calls screen essentialism, due to double articulation, and Hayles investigates through Oreo models of PET scan: these phenomena harbor Bogost units containing universes, and double articulation entails materiality of interface and substrate as well as the properly immaterial virtual reality of representational space within the device. (138-139)3.1.10
20130911x+Proposal to develop Lyotard distracted consciousness stream, Deleuze and Guatarri schizophrenic to computational way-of-being, perhaps as Turing super-cognition and Clark extended cognition, enabling exteriorization of cognition and reflexivity, while at the same time being careful to avoid screen essentialism. (133-135)5.1.1
20130911w+Time-sharing operating system example of transformation of present-at-hand into ready-to-hand; television and Atari VCS do similar work. (129-130)3.1.8
20130911v+Hegemony of computational understanding, decentered fragmentary subjectivity unified by devices; suggests Clark, Hayles, especially Turkle Alone Together. (128-129)2.2.4
20130911u+Heidegger circumspection mixed with symbolically sophisticated non-human actors yields unreadiness-to-hand phenomena, making evident how Berry casts danger inherent in technology. (124-126)3.1.8
20130911t+Bernard Stiegler interpretation of Heidegger, Simondon platform, and Wilfred Sellars phenomenology: materiality of code as it is tied to phenomena, whether prescriptively creating it or being part of it, must be understood in terms of not only its potentialities as a force, but also as a platform, only ever partially withdrawn (unreadiness-to-hand). (119)3.1.8
20130911s+Would a debugger example, which merges the close and distant readings, have been too tedious for this chapter on running code; is the book form itself holding back much richer approaches? (117-118)3.2.2
20130911r+Software makes docile voters (users); e-voting and so many other social transactions and networks depend Latour immovable mobiles that are doubly mediated by computer technologies where data seems immaterial but is always instantiated in something. (117)3.1.9
20130911q+Subject position of user in voting machinery; contrast system-centric, idealized voter to user-centric design (Norman, Johnson, Barker). (114)3.1.9
20130911p+Include issue tracking, news feeds and forums among FLOSS cultural objects besides voting machinery. (113)3.1.9
20130911o+Compare Miwa reverse-simulation examples of logic gates to symposia simulating virtual reality. (103)4.1.1
20130911n+Global address space implies mediation by networks and other processes to yield the illusion of linear spatial memory. (98)3.1.9
20130911m+Clock-based computers are the norm; this introduction could be broadened to define the stored program, fetch and execute sequential binary computer, that is, von Neumann architecture to make better sense of temporality and spatiality. (97)3.1.9
20130911l+Compare analysis of running code to network layer model. (97)3.1.9
20130911k+Analogical music by Miwa a curious example of exemplary code ethnography, later setting up reverse remediation theme; could learn more from mundane models used in Computer Organization course. (94)3.1.9
20130911j+We may joke that the obvious MSA equivalent of obfuscated code is early Heidegger and other philosophical writings. (83)3.1.9
20130911i+Materiality of source code as text itself foregrounded in underhanded, obscure and obfuscated code. (81)3.1.9
20130911h+Examples of writing code are based on contests. (75)3.1.9
20130911g+Through example of climate resource code, question raised: does democratization of programming requires competent citizens? (74)3.1.9
20130911f+Reading code example of leaked Microsoft source reveals corporate build process, hacks, role of APIs, which is developed by other authors as well. (68)3.1.9
20130911e+Software development life cycle from requirements and design to alpha, beta, release candidate and gold master; note emphasizing concrete design work in life cycle reflects the hard mastery programming style at the opposite pole of which Turkle presents the bricoleur style. (67)3.1.9
20130911d+Uses computer programming contests to situate his discussion of tests of strength; could also apply tests of strength to facticity of FOSS development communities for this validation. (66)3.1.9
20130911c+Latour trial of strength related to software engineering test case; locate materiality in trial of strength legitimation practices as opposite of atemporal perfect state of code that appears in a textbook to demonstrate an algorithm or to be reduced to mathematical forms such as lambda calculus, logical notation, or UTM. (65-66)3.1.9
20130911b+Realization of importance of finding good examples, not necessarily instructional because they may be tedious; similar difficulty to presenting examples in scholarly and scientific writing. (64)3.1.9
20130911a+Code located within material devices form technical devices; Hayles MSA-compatible definition of code as computational logic located within material devices. (63)3.1.9
20130911+Code lies on plane of immanent connections performing the network form (Bogost, Galloway, Callon). (62)3.1.9
20130910z+Object oriented thinking transcends need to conceive machine embodiment; immateriality in conceptual abstraction. (56)3.1.9
20130910y+Regarding digital data structure, embodiment of transducer and encoder matter in digitalization even if code is putatively immaterial; types include digital stream, code objects, functions and methods, network code. (54)3.1.9
20130910x+Hermeneutic and historical record most obvious in commentary ideal-type. (54)3.1.9
20130910w+Critical code is democratizing, liberating, and affords epistemological transparency. (53-54)3.1.9
20130910v+Weberian ideal-types of analytical categories to build grammar: data, code, delegated (source), prescriptive (software), critical, commentary. (51)3.1.9
20130910u+Code may compile but not work, or contain syntax errors, deprecated functions, or other flaws so it will not compile or run despite being programmatically correct; compare to Derrida refuting arbitrariness of language. (46)3.1.9
20130910t+Phenomenologically derived ontological characteristics from experience of programmers: habituation, structural constraints, shared knowledge. (43)3.1.9
20130910s+Software lifecycle includes moral depreciation of code borrowed from Marx; complexity through distributed authorship over many revisions means it is likely that nobody comprehends all of any given application. (42)3.1.9
20130910r+Interesting argument where factory practices most resisted and master craftsmanship most preserved, in the opposite of Manovich cultural software. (39-40)3.1.9
20130910q+Phenomenology of computation performed by reverse engineering discretizations, political economy, property relations, breakdowns, and moral depreciation concretized in code and software systems, although slowing down analysis not possible in systems with real-time requirements like high speed process control systems, even the Atari VCS; yet this sort of tracing analysis founds phenomenology of computation that is after the fact, reverse engineered. (38)3.1.9
20130910p+Code is more than textual files that reduce to mathematical representation like lambda calculus and UTMs due to double mediation; approach similar to Sterne, Latour, others, extending from discrete object analysis to cultural context, invoking Wardrip-Fruin as another philosopher of computing. (36-37)3.1.9
20130910o+Conceive absolute code like Marx absolute labor and problematic like Marxian analysis of industrial production; technical, social, material, and symbolic aspects. (33-36)3.1.9
20130910n+Code understood as textual and social practices of static source code writing, testing, and distribution, implying close reading; software processual operating form, implying distant reading. (31-32)3.1.9
20130910m+Perl vs C/C++ interpreted vs compiled, pretty example but does not do much; code as textual artifact and software the running process: rather than awkwardly quoting code in academic writing, do theory in situ in code repositories. (29)3.1.9
20130910l+Why this is philosophy of computing: role is to grasp the ontic and ontological. (28)3.1.5
20130910k+Orality, literacy, computationality, ontotheology; a bold philosophical position hinted at by Hayles, Turkle, and others. (27)2.2.4
20130910j+New distributed, computational subjectivity, necessarily dehumanizing, but also only potentially democratizing. (22)2.2.4
20130910h+Super-critical modes of thought yield not collective intelligence but collective intellect (Jenkins, Hayles); humanists should focus on determining appropriate practices, not specific ICT. (20)2.2.4
20130910g+Kittler sense of media convergence is translation into digital forms, whereas Berry senses new knowledge and productive potential because discretization not equivalent to immaterialism. (14-15)2.2.4
20130910f+Everyday computational comportment to be developed via digital Bildung. (14)5.1.1
20130910e+Important distinction between computationalist and instrumentalist notions of reason, locating the former in the materially entangled matrix operations of distributed cognition, and the latter in a more restricted sense of a type of agency. (13)2.2.4
20130910d+Paying attention to the computationality of code, tracing agentic path, is the crucial, effective position to join to other approaches: can only understand by reading and watching operation, the latter suggesting materiality or at least situatedness within instrumentalized world. (10)3.1.9
20130910c+Understanding software avidities affects human freedom, so therefore it is worthwhile to study, imbricating classic Socratic questioning for tracing agentic paths constituting human experience. (6-9)3.1.8
20130910b+Interesting new forms of scholarship around software studies, cultural analytics, and critical code studies, comparable to list Hayles makes in How We Think: platform studies, media archeology, software engines, soft authorship, genre analysis of software, graphical user interfaces, digital code literacy, emporality and code, sociology and political economy of the free software and open source movement. (4-5)3.1.8
20130910a+Stiegler, the newest significant philosopher of computing introduced following Heidegger and Kittler, offers materialist definition, dynamic of organized inorganic matter, inviting pass through Burks, Goldstine, von Neumann; mechanology is a new philosophical position introduced without fanfare here. (4)2.2.4
20130910+The built environment of late capitalist information society is supported by software and mostly happens by software for the sake of software even when serving human ends at the ends of its causal chains; materiality of code on account of its being in and affecting the physical world, spun like webs, largely database to database information. (1-2)3.1.8
20130512+Promotes an ethic of being a good stream, whose Serres parasitic subjectivity, although requiring thoughtful comportment to computer technologies, does not endorse outright learning and practicing programming as itself critically important to being a good stream the way literacy did for prior generations, or as a substantial component of humanities scholarship intellectual labor. (170-171)3.1.8
20130126+Materiality of code inscribed in programmers through long habituation, internalized to point of dreaming (Rosenberg), whereas materiality of software inscribed in users, for example multitasking synaptogenesis. (145-149)3.1.8
20130124+Guattari processual, device-dependent subjectivity; possible alternative computational theory of mind inclusive of Derridian archive checking against key arguments about delegating classes of cognitive duties to technical devices; involvement of code situated materially significant even if its goal is to strive to erase spatiality and temporality as in financial systems. (160)3.1.8
20120717+Hermenutic circle using Clausewitzian sense of absolute rather than real code: is this an oppositional favoring phenomenological processes as tiresome to contemplate and complex as any other highly complex thing like a roaring flowing river or household air conditioning; Berry follows Latour for wide range multiple conceptions of software. (33-36)3.1.9
20120715+Key part of the book on thinking computationally delegating classes of cognitive duties to technical devices: knowing-how versus knowing-that; connect Zuboff to Applen and McDaniel rhetorical XML; study materiality concretized in instrumentation, too; it is not completely hidden, and in fact must reveal its interface to be usable. (121-123)5.1.1
20120607+Pragmata of code entails situatedness if not materiality; phenomenological approach to problems that include ephemerality, both of source code revisions and entire operating environments, and high technical skill requirement. (5-6)3.1.9
bijker_hughes_pinchsocial_construction_of_technological_systems09 20138.302013102550%25%Y1
20131025a+Interpretative flexibility in design as well as reception and use. (40)3.1.4
20131025+Multidirectional model by studying development process as alternation of variation and selection; bicycle study reveals linear development a retrospective distortion. (28)3.1.4
20130905b+Example of advertised computer security solutions like virus scanners and firewalls to insecure operating environments as rhetorical closure. (44)3.1.4
20130905a+Parallel shift in subject of analysis of programmers and managers from norms, career patterns everyday practice (Rosenberg, Mackenzie). (18)3.1.4
20130905+Compare to Manovich on why there are no studies of cultural software, implying asymmetry between state of the art and prior versions in addition to commercial failures. (22-24)3.1.4
20130901b+Thick description looking into black box of technology. (5)3.1.4
20130901a+Three approaches of social constructivism, systems metaphor, actor networks. (4-5)3.1.4
20130901+Seamless web of society and technology. (3)3.1.4
blackibm_and_the_holocaust10 20138.102014071290%50%Y0
20140712o+IBM published but quickly withdrew promotional book on history of computing in Europe that detailed the exploits of famous employees on both American and Nazi sides, a very rare book indeed, which Black claims decades ago not even found in Internet libraries. (425)1.1.1
20140712n+America retook Dehomag using rhetoric that is assets and employees were property of an American enterprise, though took years of bureaucratic thrashing like poorly networked computer processes to change name to IBM Deutschland. (424)1.1.1
20140712m+As IBM enabled USSBS attributed to atomic bombing decision in 1945, Dehomag utilized to perform census of occupation once again on likely many of the same people but for a different customer than the Nazis, the occupying forces, whose collective action also resulted in horrific mass killing in Japan, neither really questioned for their meanness or inhumanity yet constituting significant bodies of both societies. (424)1.1.1
20140712l+Political decision to use atomic bombs supplied by forerunner technologies to which Gates applies same reasoning for putatively less lethal purposes. (423)1.2.5
20140712k+Reduction to researchable punch card data shapes thinking. (422)3.1.7
20140712j+SHAEF Bad Nauheim site perfoming social calculations on public reaction to severe bombing against Japan exemplifies collective thinking at national level made plain during war time, today revolving around information collection in concerned alignment with Black but acknowledging less severe outcome of dumbest generation. (422)1.2.5
20140712i+IBM has so far escaped even debate, so injecting into technology education helps ensure its corporate story not lost; history of computing, software, even programming could probe this primordial technological soup. (422)5.3.1
20140712h+Simultaneous translation likely complex human machine cyborg. (421)2.2.4
20140712g+Instead of being implicated in war crimes, IBM provided media services enabling Nuremberg Trials donated by Watson. (421)1.2.5
20140712f+Though other businessmen considered war criminals no IBM employees prosecuted, even top German Dehomag employees and shareholders. (420)1.2.5
20140712e+Watson and IBM kept out of reparations discourse to quietly continue working on computing machinery, quickly settling restitution resolution. (419)1.2.5
20140712d+Same equipment used by Nazis quickly repurposed for running the defeated government, a government acting upon the very people still operating it as when they did it under the Nazis; Black notes employees from corporations in other industries scrutinized for war crimes, at weak end of continuum with Eichmann at the other end. (416)1.2.5
20140712c+Evidence of long history of love of technologies a means of reading as diachrony in synchrony. (406)5.2.1
20140712b+Troops objective to save beloved Dehomag IBM machinery, anticipating movie Monuments Men. (406)1.2.5
20140712a+Computing lists becomes desire of technological unconscious in defense of retaining rather than Hayles switching to nonconscious. (398)5.3.1
20140712+Connect thinking of US to ancient use by Julius Caesar and Marcus Antonius. (398)5.3.1
20140330+The book IBM and the Holocaust by Edwin Black, a book the author attests was difficult to write and should be just as difficult to read, especially for American digital humanists who include it in their philosophy of computing canon, begins with a reproduction of a 1933 Dehomag advertisement featuring an all-seeing eye enlightening an IBM punch card used by early mechanical computers, a factory sporting a massive smokestack, and the words translated as, see everything with Hollerith punchcards, alludes to the commencement of a horrifying holocaust narrative implicating IBM machinery, its employees, its partners in America and Europe, with their bureaucratic counterparts in the murderous Nazi regime like the infamous Adolf Eichmann, symbolizing the evil latent in apparently benign technological devices. (vi)1.1.1
20140104+Note hollerith (IBM) is an adjective of punchcards the noun for computing machinery and related products. (vi)5.3.1
20131020i+Black awakens us from this predigital nightmare perpetrated by the German and American government war machines, and more shockingly IBM employees in subsidiaries of this budding transnational, to renewed fears in the Age of Realization that more lists will be compiled against more people, perhaps now dropping smart bombs from drones rather than operating death camps; it is important to think about how information is gathered and processed, whether by human programmers as steeped in evil as the vilest hacker, morally ambivalent like Eichmann, or blind to the purpose of their efforts, or perhaps the lists are already being made by machines on their own, leading to future genocides portrayed in science fiction apocalypses? (16)1.1.1
20131020h+Reexamine Holocaust scholarship with contemporary sensitivity to how technology can be utilized in war and peace, examining precursor to modern computing in the process. (16)3.1.4
20131020g+Narrative of how the research commenced and expertise required, noting degree of difficulty without initial cooperation from IBM. (12)3.1.4
20131020f+Confrontation with IBM Hollerith D-11 at US Holocaust Museum, which only mentioned IBM role in 1933 census. (11)3.1.4
20131020e+High-speed data sorting via punch cards used by Nazi Germany for people and asset registration, food allocation, slave labor identification, tracking, and managing, and most notably rail scheduling. (10)3.1.4
20131020d+IBM Germany racial census operations and people counting technologies produced lists Nazis used to round up Jews and others for deportation via train to camps. (10)3.1.4
20131020c+Custom-designed complex devices and specialized applications sanctioned by IBM New York bases argument that IBM knew what the Third Reich was doing with its machines and services. (9)3.1.4
20131020b+Punch card and sorting systems were used for the automation of human destruction by the Nazis under guidance of IBM Germany, which lucrative business, Black argues with voluminous documentary evidence, the parent company in the United States tolerated if not encouraged with a blind eye to its purposes. (8)1.1.1
20131020a+IBM was gripped by its amoral corporate mantra and dazzled by its universe of technical possibilities; collective intelligence, punch drunk with newly discovered organizational possibilities of automated high speed tabulating, sorting, and printing machinery, materialized in the German populace as what Hannah Arendt called the banality of evil, such that actors like Adolf Eichmann would fail to admit any sense of wrongdoing. (8)1.1.1
20131020+The book IBM and the Holocaust by Edwin Black, which American digital humanists ought to be obliged to read as part of their philosophy of computing canon, begins with a reproduction of a 1933 Dehomag (Deutsche Hollerith Maschinen Gesellschaft M-B-H-Berlin-Licterfelde) advertisement featuring the word “Überssicht” (oversee), an all-seeing eye enlightening an IBM punch card form of early mechanical computing, a factory sporting a massive smokestack, and the words “mit hollerith Lochkarten” (with Hollerith cards), alluding to the commencement of a horrifying holocaust narrative implicating IBM machinery and its employees and partners in America and Europe with their bureaucratic counterparts in the murderous Nazi regime like Adolf Eichmann, the subject of Hannah Arendt banality of evil; however, I find the human machine situation of WALL-E more indicative of the transformation of humanity by modern digital computing, comical future descendants of what Hayles refers to as the dumbest generation, whose comfortable spaceship utopia plays upon the horrific reality of the movie The Matrix whose human beings are never awake as embodied. (vi)1.1.1
bogostalien_phenomenology04 20128.302013102690%90%Y0
20131026c+Speculative realists must reject correlationism and abandon belief that ontology is mediated by human experience. (5)3.1.10
20131026b+Harman uses Heidegger tool analysis to construct object-oriented philosophy, putting things at center of their metaphysics while deprivileging human perception. (5)3.2.4
20131026a+Transfer of ontography from mytheme to philosopheme, beginning with homonym on Lewis. (35)3.1.10
20131026+Undestanding objects via Harman black noise similar to Zizekian curvative of space analogy. (32)3.1.10
20130910r+Emphasis on awe and wonder of STEAM against competition for STEM goals echoes Kay appealing to children of all ages rather than adults of all ages. (126)5.2.1
20130910q+Alien phenomenology implies deprivileging of human perception as that which defines objects, accepting that all objects recede interminably into themselves. (5)4.3.2
20130910p+New radicalism for philosophers: pick up soldering irons, how one philosophizes with computers, calling for cybersage. (110)5.2.1
20130910o+Alien probes perspective of Tableau Machine home computer as deliberate computational carpentry example; contrast to Turing Test. (106)3.1.10
20130910n+Explicitly connects software projects to critical code studies; platform studies that seem like critical programming studies include Bogost I am TIA, Fry Deconstructulator. (103)3.1.10
20130910m+Platform studies focuses on hardware and software as actors, inviting new ways of doing philosophy such as my approach to studying machine embodiment through reverse engineering pinball machines, or using pmrek log files to create simulation of the pinball machine control components. (100)3.1.10
20130910l+Philosophical questions raised by Latour Litanizer choices made in writing code such as a query that filters out (sexy OR woman OR girl): what better place/space to conduct such investigations than in source code comments and differences between revisions? (99)3.2.3
20130910k+Latour Litanizer example of critical programming in that it instantiates ideas about metaphorism; compare journal software system that ultimately generates the tapoc dissertation. (95)3.2.3
20130910j+Carpentry is metaphysician activity of practicing ontology, going beyond writing, invoking Ihde; compare to OGorman. (92)3.2.3
20130910i+Metaphorism goes beyond Husserlian bracketing human empirical intuition such that perception itself is metaphorical; great distinction for thinking about inner life of devices. (67)3.1.10
20130910h+Latour litany as word ontograph, In a Pickle game producing ontographs about words. (58)3.1.10
20130910g+Exploded view diagram suitable for ontography; example of Shore Scribblenauts photographs. (51)3.1.10
20130910f+Ontography, based on Tobias Kuhn method for depicting controlled natural languages, as general inscriptive strategy for uncovering object relationship; later he gives the example of his Latour litany and image toy programs that produce lists via broad rules of inclusion yet of specific things (data objects); compare and contrast controlled natural languages to programming languages. (38)3.1.10
20130910e+Alien phenomenology the practice of speculative realism examining black noise surrounding objects. (34)3.2.4
20130910d+Phenomenal (and phenomenological) limits of human embodiment should not define ontological boundaries. (30)3.1.10
20130910c+Units operate resolves problem of Badiou count-as-one ontology by answering what does the counting. (27)3.1.10
20130910b+Tiny ontology compresses flat ontology to infinite density of a dot, unit. (21-22)3.1.10
20130910a+Flat ontology acknowledges unequal ways all things exist; will give examples of how flat ontology answers what is ET the arcade cartridge. (11)3.1.10
20130910+Voodoo powers of computers exemplify Harman vicarious causation, except they were never alive to be corpses. (9)5.1.1
20130125+Point that most philosophical positions not expressed in form as books a good incentive to philosophize by creating software systems, given the material limits of written forms oriented towards human (system or unit) rhetorical operations. (93)3.2.3
20120416+See also his article on learning to program using simple, obsolete systems: connect wonder and awe to using original print manuals for such exercises rather than deploying state of the art platforms. (127-128)3.2.3
bogostpersuasive_games12 20128.302013102690%90%Y0
20131026d+Prefers persuasive games over serious so as not to exclude highly crafted commercial examples. (59)3.1.10
20131026c+Badiou terms situation, multiplicity, count-as-one, state, and event form basis of seriousness underlying structure of a system. (58)3.1.10
20131026b+Connect notion of serious to underlying system structure to critical code studies. (58)3.1.10
20131026a+Importance of enthymeme and example as rhetorical figures that will be applied to new media. (19)3.1.3
20131026+Wardrip-Fruin operational logics are set of standardized unit operations such as graphic logics packaged as game engine and textual logics as natural language parsers. (13)3.1.10
20130911t+Historical scale of meaning suggests games may be played and studied in the distant future, just as other humanities artifacts: consider what may be done after all copyrights expire, so that black boxes can be opened to explore both internal workings and iterative development processes. (340)4.2.2
20130911s+Humanities appeal of persuasive games tracing procedural construction of subjectivity. (339-340)2.2.5
20130911r+Conversation systems built into or around games is where deliberation often takes place, since not yet built into game logic itself: imagine my Macy Conferences game. (336)5.2.1
20130911q+Pinball and upright videogames, as well as their location, involved more bodily movement than home consoles before explicitly designed exergames. (295)4.3.2
20130911p+Bogost game for Cold Stone Creamery trains workers to benefit corporation but does expose corporate business model. (281)3.1.10
20130911o+Animal Cross simulates condition of debt and consumtion affluenza; design consequence forces asynchronous real time play, although system clock could be fooled. (267)3.1.10
20130911n+Educational games operate general purpose rhetorics, but also can reveal social aspect, as demonstrated by tutor text Mansion Impossible. (264)3.1.10
20130911m+NCLB procedural rhetoric generates social programs enacting conservative optimization for educational reform, being schooled versus educated; parents as complacent citizens manufactured by the bureaucratic market democracy. (262)3.1.10
20130911l+Beyond epistemic games to critical practice: developing procedural literacy and awareness of biased perspectives of how things work through direct engagement. (259)3.1.10
20130911k+Difference between videogames and narrative media is using models like orrery versus descriptions. (257-258)3.1.10
20130911j+Apply picking up specific cultural meanings to hacking older technologies and basic electronics. (256)3.1.10
20130911i+Play itself develops procedural literacy, good for developing understanding history like Diamond on proximate causes of European conquest. (255)3.1.10
20130911h+Procedural affordances of languages and operating systems, software in general; try to understand why Tanaka-Ishii chose Haskell and Java in this perspective. (251)3.1.10
20130911g+Do with electronics and programming early computers what Sayers did with Latin despite Bogost calling for a break from procedural literacy as programming. (249)5.2.1
20130911f+Worth revisiting studies on learning programming with wider scope in which play itself, and by extension ancillary behaviors to programming, have procedural learning functions. (247)3.2.4
20130911e+Short history of procedural learning from Logo to RAPUNSEL rejected because programming emphasis excludes built in procedurality of videogames experienced by merely playing them: making procedural literacy initiated by Mateas specific and emphasizing situated cultural aspects of technical mastery, not just dynamic systems. (244-245)3.1.10
20130911d+Procedural literacy addresses suggestion by Gee to reconcile subject-specificity and abstraction. (244)3.1.10
20130911c+Going meta technique offered by many videogames, whereas others foreclose the simulation gap. (240)3.1.10
20130911b+Performance before competence learning in Mindstorms and Microsoft Flight Simulator. (239)3.1.10
20130911a+Theories of education fall within behaviorism and constructionism, and their worldviews are transferred into videogames. (235)3.1.10
20130911+Analysis of Tapper procedural rhetoric defamiliarizes process of consumption. (220)3.1.10
20130910y+Simulation fever, ideally challenging experimentation with a product, with procedural enthymeme as space between the game rules and the player subjectivity. (214)3.1.10
20130910x+Logical rather than moralisitc system promoted by game procedural rhetoric like Tooth Protectors. (203)3.1.10
20130910w+Advergames simulate products and services. (200)3.1.10
20130910v+Claim that videogame product placement invites critical perspective. (191)3.1.10
20130910u+Summary argument is that videogames, rather than the Internet medium as an abstraction, offer culturally and procedurally relevant subject matters for communicating political rhetorical ideas. (143)3.1.10
20130910t+Use of voice commands as procedural rhetoric in Waco Resurrection; consider ideas like Macy Conferences game that traverses a long but specific topic for videogames based on specific moments in history, fashioned after documentary film. (128-129)3.1.10
20130910s+Imagine in a virtual reality game setting, to propose alternate forms of democracy, political action, and consumer engagement to explore philosophical question of how would a generation of casual programmers alter engagements with procedurality. (124)3.2.4
20130910r+Games still unterritorialized by ideology, yet have been part of political discourse all along. (120)3.1.10
20130910q+Rules of the game Tax Invaders construct unit operation for conservative frame on taxation; use of procedural enthymeme. (108)3.1.10
20130910p+Understanding code supplements, not essential to studying procedural rhetoric of videogames; address from top down through procedural literacy rather than bottom up through code literacy. (62-63)3.1.10
20130910o+Persuasive technology tools of captology are not critical deployments of rhetoric; foreground psychological manipulation, not dialectical user responses. (61-62)3.1.10
20130910m+Serious games designed for educational purposes but may not interrogate institutions and worldviews. (57-58)3.1.10
20130910l+Distinguish between persuasive games, persuasion to continue playing, and rhetorics of play: unusual Atari VCS Tax Avoiders game exemplary. (46)3.1.10
20130910k+Dialectics have broad media ecology: distinguish between ability to raise procedural objections by altering game play and emergence of dialectical reasoning about the subject whose proceduralities are represented in the videogame; example of The Grocery Game, which allows modification of rules of shopping by automating otherwise too costly behaviors for saving money with coupons and timed bulk purchases at particular grocery stores, and peripherally criticism of game mechanics in message boards substitutes for modifying code. (37)3.1.10
20130910j+Procedurality belongs between actual experience and moving images with sound on Hills vividness continuum from most to least vivid information, and they mount propositions with internal consistency of program execution; seems linked to ideal of living writing in antiquity as best rhetorical mechanism. (35)3.1.10
20130910i+Exemplar of procedural rhetoric is The McDonalds Videogame, whereas Grlpower Retouch and Freaky Flakes do not exhibit procedural rhetorics despite being provocative, must address vividness and dialectic; compare to active versus critical learning for Gee, and critical code. (29)3.1.10
20130910h+Does reaching this insight that procedural rhetoric is programmed call for focus on programming? (28-29)3.1.10
20130910g+Manovich replaces rhetoric with database logic, but fails to appreciate process intensity and favors hypertext over its supporting programmed systems. (26)3.1.10
20130910f+Criticizes digital rhetorics that abstract materialities of specific forms of computing. (25)3.1.10
20130910e+For Burke rhetoric extends to all forms of human symbolic systems. (21)3.1.10
20130910d+Example of Socrates trial for ideal of efficient causation in ancient rhetoric can be extended with favorite Cicero example; enthymeme and example are other rhetorical figures. (15)3.1.10
20130910c+Procedural tropes include natural language processing, text parsers, and models of user interaction: crucial to Bogosts thinking is their commensurability with forms of literary and artistic expression supporting the trope analogy. (13)3.1.10
20130910b+Software studies could go off and document the PLATO computer education system, which illustrates procedural rhetoric by simulating tenure acquisition. (1)3.1.10
20130910a+Crucial to note that Bogost focuses on human oriented rhetorical domains, whereas the path I steer is right into the inner workings of machines with the rhetorical outcome of instilling programming as problem solving and even a way of conducting humanities research. (ix)3.2.4
20130910+Procedural rhetoric defined as persuasion through rule-based representations and interactions. (ix)3.1.10
20130123+Procedural enthymemes complete the claim by playing the game, which may include listening; thus by procedural rhetoric games exercise often clever and unexpected biases in our actions, which when uncovered and critically engaged potentially inspiring radical change (Badiou event, and so on). (43)3.1.10
20130113+Interesting to think of target markets for future games as the elderly, who do not need to learn how to live well but genuinely wish to be entertained. (292)5.3.1
bogostunit_operations01 20128.302015082690%90%Y0
20150826k+Prefers to consider procedural over object aspect by moving to Murray procedural authority. (46)3.1.8
20150826j+Does not analyze all four concepts, giving very brief but believable starting points for abstraction and polymorphism. (45-46)3.1.8
20150826i+Discreteness a principle property of unit operations, relating to encapsulation. (43)3.1.8
20150826h+Landow use of Derrida privileges theory over technology, but well exemplifies fungibility of Derrida between philosohpical and technological discourse, as if could pass off as von Neumann or Kay. (42)3.2.2
20150826g+Distinction between unit analysis and system operation for criticism. (19)3.1.8
20150826f+Unit analysis of The Terminal reveals various modes of waiting. (16)3.1.8
20150826e+Difference between ontologies in computer science and philosophy is that the former enable functional relationships between constituent parts of software systems, but do not specify them. (14)3.1.8
20150826d+Definition of unit analysis as critical practice to discover unit operations. (15)3.1.8
20150826c+Unit forming procedurality ligature between computational and traditional representation. (13)3.1.8
20150826b+As Harman provides the contemporary treatment of Heidegger, Alain Badious application of set theory to ontology updates Spinoza. (11)3.1.8
20150826a+Spinoza network like superstructure for material relations. (9)3.1.8
20150826+Bogost prefers units to objects to include material manifestations of complex structures like racism. (5)3.1.8
20150825d+Schizoanalysis in relation to network theory provides analysis of freedom in large virtual spaces. (xiv)3.1.8
20150825c+Procedural subjectivity explores interaction between embedded representation and subjectivity, vaulting status of videogames between entertainment to social texts. (xiv)3.1.8
20150825b+Procedural criticism resembles Hayles MSA, exploring software and narrative structures of game engines. (xiv)3.1.8
20150825a+Situates the origins of unit analysis in classical philosophers from Aristotle to Spinoza, and contemporary philosophers Badiou and Harman, before drawing connections between compression and representation in poststructuralism to advances in computation. (xiii-xiv)3.1.8
20150825+Unit operations explained as discrete compressed elements of fungible meaning. (xiii)3.1.8
20131026v+Visionaries required to take changing public needs into account; therefore, plenty of work of videogame criticism. (180)5.1.1
20131026u+Example of Virtual U videogame funded by Sloan foundation as alternative to cutthroat commercial videogame landscape that ironically perpetuates traditional educational systems. (179)3.1.8
20131026t+Extend model of exchanging procedural unit operations form networking to research would yield postdisciplinary critical network. (176)5.1.1
20131026s+Web services exemplify original goal of interoperability of object technologies via defined unit operations using XML and SOAP forming network of networks. (174)3.1.8
20131026r+Virtual reality is dream of wiring ourselves into deliberately selected unit-system relationship. (150)5.1.1
20131026q+Nomadism calls for network-based subjectivity; compare to true emergent games like Go (Juul). (149)5.1.1
20131026p+September 12 game teaches lessons about simulation fever. (133)3.1.8
20131026o+Games that simulate adjustable value systems become rhetorical opinion texts. (121)3.1.8
20131026n+Simulation as gap between rule-based representation of source system and user subjectivity; Starr simulation resignation and simulation denial: compare to Turkle simulation anxiety and Derrida simulation fever. (107)3.1.8
20131026m+Paul Starr seduction of sim; link to Kittler on Phaedrus and of course to Derrida. (106)3.1.8
20131026l+Like Frasca and Bogost argue for studying videogames in social context, I argue it is why the study of childhood computer usage can be a modern echo of Freudian method. (99)5.2.1
20131026k+Frasca and Murray argue simulation extends narrative by immersion; also an ideological context is basic software studies premise, implicating subjectivity. (98)3.1.8
20131026j+Fitting that his instructional example unit operation is the chance encounter, only to deprecate the trope, replacing it with a new style of philosophizing, and tonight I started by musings with philosophy is the sexual partner of programming. (86)5.2.1
20131026i+Interpret software like The Sims in terms of the analogies he just made to poetry, fiction, and drama in Baudelaire. (86)3.1.8
20131026h+Unit analysis of Baudelaire through Bukowski poem. (79)3.1.3
20131026g+Important for developing critical programming that Mateas and Bogost are both theorists and practicing game designers. (65)1.3.4
20131026f+Formal relationship between games due to shared core portions of code accentuate merger of functionalism and materialism. (59)3.1.8
20131026e+Component objects developed to address growing mass of software libraries to encapsulate intellectual capital in black boxes. (38)3.1.8
20131026d+Examples of unit operations in Lacan and Zizek, dealing with threat of returning to systematicity; Harman criticizes Zizek for restricting causality to human perception. (32)3.1.3
20131026c+Invites investigation of software for creators and critics in digital humanities; does this go far enough in describing what can be done by writing computer programs to do intellectual work on our behalf, such as the symposia project I am proposing for cascading into popular digital culture? (30)3.2.2
20131026b+Von Neumann architecture beginning of unit versus system operational computation; why not consider both concurrently, following Suchman the plan (system) and situtated action (unit) or units are concurrent processes or threads in multiprocessing von Neumann architecture networks? (26)3.1.8
20131026a+Need to develop understanding of tension between unit and system operations; Saussure parole versus langue as example. (23)3.1.3
20131026+Badiou application of set theory to ontology, whom Zizek also invokes. (10)3.1.3
20130911i+Conclusion that videogame criticism instantiates Badiou thinking not just in text but in world as well to rejuvenate the university, inspiring dreams of new types of videogames produced by dissolving organizational divisions, especially between profit and nonprofits, and different educational institutions. (177-178)3.2.4
20130911h+Imagine unit-operational university transcending interdisciplinarity, which requires traditional disciplines, resembles software and project-based organizational structure, which he calls a postdisciplinary critical network; faced with new problems like interoperability leads to interesting discussion of web services, demonstrating ability of Bogost to argue in the technical register as will as the liberal, again hopefully cultivated through procedural rhetorics. (173-174)3.1.8
20130911g+Critical study of digital games both subject of derision and university programs, like OGorman remainder of scholarly discourse. (172)3.1.8
20130911f+Apply Foucault to Grand Theft Auto through unit analysis as active practice of power and discipline. (168)3.1.8
20130911e+Examples from Flaubert and Joyce of concurrent virtual realities encoded in a book showcases mastery by Bogost of traditional humanities literary discourse of course also demonstrate unit operations, hopefully enriched through developing awareness of procedural rhetorics. (160)3.1.8
20130911d+Connecting nomadism if rhizomatic theoretic model to unit operations constituting subjectivity via Badiou. (144)3.1.8
20130911c+Simulation fever as an autopoietic, emergent, reflective awareness between how game unit operations represent world and subjective understanding of player. (136)3.1.8
20130911b+Simulation fever compares to Feenberg invocation of de Certeau to arrive at his democratic rationalizations. (135)3.1.8
20130911a+Insightful combination of Iser, Barthes, Aarseth, Eskelinen, Hayles to raise specter of analysis devolving into simulacral system operations in cybertexts; the crucial task is exploring game rules manifest in player experience. (130-131)3.1.8
20130911+Social commentary of Southern California embedded in Star Wars Galaxies cantina and bazaar. (127)3.1.8
20130910x+Badiou subject constituting event reached playing biased videogames. (123)3.1.8
20130910w+Default philosopher of computing Koster has position similar to Gee, who refers this feedback as pleasantly frustrating but aims for its highest state as substantiating critical learning; to prove it out, we must imagine critical games could be used in a philosophically oriented digital humanities course. (118)3.1.8
20130910v+Engaging philosophical survey of play and fun affecting subjectivity, mainly to explain why it is difficult to deploy social commentary, and perhaps why scholars have ignored their deep study (excepting Gee) including Huizinga, Benjamin, Callois, Gadamer, Postman, Koster. (114-115)3.1.8
20130910u+Benjamin Arcades Project as intentional unit operational pseudo code calls for language machines to experiment with it, which fits McGann deformation prerogative. (113)3.1.3
20130910t+Can simulation fever and resignation be linked to free, open source ethic, for access to the source systems, since its rhetoric pull on subjectivity to follow its algorithms, founding preference formation, taking me back to my early interests in the free will problem. (107)3.2.4
20130910s+Experiences construct mental models of what the game includes and excludes; recall McGann criticizes Murray for providing four fundamental concepts that do not pertain exclusively to digital texts, and calls her work inspirational versus critical as he does Aarseth. (101)3.1.8
20130910r+Reflecting on ideological context most important aspect of videogame studies because it is where code operates upon the world via rhetorically engaging humans. (99)3.1.8
20130910q+Cellular automata as unit operations getting closer to computational objects and further from traditional literary objects. (93)3.1.8
20130910p+Benjamin figure that fascinates goes by other names by famous theorists: think of the exotic object on We Have Never Been Modern. (77)3.1.2
20130910o+Baudelaire motif, per Benjamin, is a unit operation to Bogost, and flaneur role is configurative. (74)3.1.8
20130910n+Displace narrative as heart of subjectivity using mirror neurons example. (70-71)5.1.1
20130910m+Programmer presence embedded in API exemplified by Micheal Mateas in Facade and its A Behavioral Language (ABL). (65)3.2.3
20130910l+Differences of unit operations and traditional literary relations, even new ones like remediation: legal, not discursive; material, not psychoanalytic. (61)3.1.8
20130910k+VCS focus foreshadows Racing the Beam and platform studies, making the staking that future scholars will muse about the experience of playing these games, as current scholars may muse about the original experience of drama, music, poetry, special types of books. (59)3.1.8
20130910j+Materiality of game engines lends them to unit analysis moreso than other literary objects while structuring possible narratives, going beyond remediation creating similarities between works based on literal sharing of components, exemplified by clever comparison to psychoanalysis for Half-Life and Quake. (56)3.1.8
20130910i+Critical bricoleur methodology for new discipline, while focusing on expressive, cultural aspects of videogames and other media. (54)3.1.8
20130910h+Early history of digital humanities mostly instrumental; enter Aarseth, OGorman, and videogame studies. (52)3.1.8
20130910g+Example of unit operations in banking customer-account relationship and licensing. (41)3.1.8
20130910f+Definition of OOP includes the four official properties, while putting socio-economic spin on it; compare to Manovich and others. (39)3.1.8
20130910e+Kittler and Postman inspired entry to understanding machine embodiment, calling for procedural literacy training. (36-37)3.2.4
20130910d+Digital computing conditional control transfer universalizes representations. (28)2.2.1
20130910c+Compare unit analysis compare to Hayles MSA. (15)3.1.3
20130910b+As simple as the return value of a function call instantiates Badiou count as one in software by programming. (11)3.1.8
20130910a+Harman provides a basis for extending human philosophy into machine being via Heidegger applied to the built environment, not really sensible in print and emulsion versus electronic media milieu. (5)3.1.8
20130910+Multiple small pieces relates to Derrida morsels, the other kind of byte, also mentioned by Landow. (3-4)3.1.3
20120917+Imagine doing unit analysis on early (8-32 bit, non internetworked) computer games (and what back then was not a game besides special purpose control systems) as Bogost does so masterfully with traditional literary studies interpreting literary texts metaphorically as programming: the degree of depth in critical functions of modern games that is practiced in philosophical study of past generations of computing machinery (platform studies) that Bogost performs with modern, web based games, is taken over into personal software projects. (79)3.2.4
20120906+Takes position as a philosopher of computing, providing a methodology useful to humanists and technologists by exploring relations of computation, literature, philosophy via new concept of unit operation. (ix)3.1.8
20120130+Badiou count as one referenced in Alien Phenomenology. (13)3.1.8
boltanski_chiapellonew_spirit_of_capitalism01 20148.202014061590%50%Y0
20140615+Third axiom is need to both stimulate and curb insatiability motivating capitalism, comparable to Rousseau by Derria, causing permanent tension, the wish to participate in projects. (487)3.1.10
20140323+Revisit treatment of Peirce triad by Tanaka-Ishii. (146)3.1.9
20140311b+Subjectivity in connexionist networks effect of constitutive links. (124)2.2.4
20140311a+Metaphors for rhizomorphous form include weaving, fluid flow, and biology of the brain; connect to Malabou. (118-119)2.2.4
20140311+Uses acute square brackets similar to BNF for grammatical terms derived from De la justification. (108)3.1.2
20140309x+Responses to critique of disenchantment by creating products attuned to demand, more personal forms of organization: compare to development of computer user interfaces combining personalization and surveillance (Kitchin and Dodge). (99)5.1.1
20140309w+Life skills over knowledge and savoir faire, facilitate an instrumentalization of human beings in their most specifically human dimensions. (98)2.2.4
20140309v+Change in focus of management literature strong evidence that spirit of capitalism has changed in last thirty years; seems obvious neo-management response to demands for authenticity and freedom aligns with artistic critique, setting aside issues of egoism and inequalities combined in social critique. (96)3.1.4
20140309u+Poor prognosis for mobilization in 1990s management literature for lack of terms of justice, relying on nascent value system of projective city. (96)3.1.4
20140309t+Development of business ethics management discipline related to anxiety that neo-management mechanisms be used ethically; reputation foregrounded. (95)3.1.4
20140309s+Danger of experience of coach encroaching on private life. (94)2.2.4
20140309r+Must address actors solely out for their own interests. (94)2.2.4
20140309q+Employability the capacity required to be called upon for projects. (93)2.2.4
20140309p+Replace hierarchical careers with succession of projects deployed to develop personal skills. (93)2.2.4
20140309o+Reward people on ability to work on a project, valuing interpersonal relations, flexibility and adaptability. (92)2.2.4
20140309n+Projects transgress all boundaries, feeding neo-management belief in individualism and personal development. (90)2.2.4
20140309m+Weak point in new spirit of capitalism proposing forms of security compatible with dominant requirement of flexbility. (89)2.2.3
20140309l+Security for cadres in career guarantees, welfare state for everyone else. (87)2.2.3
20140309k+Inhuman machines created by endeavor to relentlessly rationalize firms. (87)2.2.3
20140309j+Statistical software confirmation of their interpretation of content of two sets of management literature; now test them. (86)3.1.1
20140309i+Conclusion that bureaucracies are not only inhuman but unviable; reintroduce personal relations. (85)2.2.3
20140309h+Networks as form between hierarchical and markets as large firms do not dissolve into set commercial contracts; metaphor of network. (84)2.2.3
20140309g+Replacing hierarchical control with market control by outsourcing and autonomization of value stream focused on the customers order is hard to plan and depends on ability to react, organizational flexibility, and trust. (82-83)2.2.3
20140309f+Increase in productivity of investments drives replacement for Fordist mode of regulation (Aglietta), economic importance of worker awareness of good health of machines. (81-82)2.2.3
20140309e+Modalities of control in neo-management over liberated firms: transition from control to self-control via mobilization, recognizing customer is king, transferring control costs to wage earners and customers. (80)5.1.1
20140309d+Manager is the network man; other actors are coaches and experts. (78-79)2.2.4
20140309c+Obsolescence of cadres; replace with manager, distinguished from engineer. (76)2.2.4
20140309b+Important of information as source of productivity and profit. (75)2.2.4
20140309a+Re-engineering to align with network model, blurring boundaries of firm (Spinuzzi). (74-75)2.2.4
20140309+Lean, network, projects, vision, alliance, team are keywords. (73)2.2.3
20140306n+Ideological world picture of free Western European and United States versus planned economies of 1960s replaced by emergence of third capitalist pole in Asia challenging old capitalist countries in 1990s. (72)2.2.3
20140306m+Unscrutinized obsession with adaptation and flexibility. (71-72)2.2.4
20140306l+Distinctive problem of 1990s management literature were hierarchy, morality of domination, rigid planning, rapid technological change; network model becomes target. (70)2.2.4
20140306k+Delegitimation of traditional employers implicit in legitimation of cadres; transition from patrimonial bourgeoisie to bourgeoisie of managers. (68)2.2.4
20140306j+Foils of 1960s management literature pertain to logic of the domestic world in favor of results based impersonal judgment. (67)2.2.4
20140306i+Solutions by decentralization, meritocracy and especially management by objectives, which also furnishes criteria for measuring performance. (65-66)2.2.4
20140306h+Added layers of bureaucratic hierarchy and fear inspired by large firms; capitalism firm similar to collectivized and fascist firms. (65)2.2.4
20140306g+Cadres as technical specialists. (63)2.2.4
20140306f+Distinctive problems of 1960s management literature were dissatisfaction of cadres and managerial problems of giant firms; professionalization of management becomes target. (63)2.2.4
20140306e+Corporate profit not inspiring in either period to cadres or general workforce, who wanted genuine reasons for engaged commitement. (63)2.2.4
20140306d+Propose future work studying learning programming by examining textbooks versus content of online forums, blogs versus digging into structural components such as floss repositories, forums, where the correspondence would be textbook style knowledge promulgation. (60-61)5.2.1
20140306c+Comparative method placing emphasis on differences between the two corpora. (61)3.1.1
20140306b+Textual study with two phases of analysis based on two corpora of sixty texts per period: close reading by humans to define hypothetical characteristics of each period, and machine reading via Prospero analytical software to corroborate them. (60-61)3.1.1
20140306a+Management as professionalization of supervision. (59)2.2.4
20140306+Spirit of capitalism inscribed in management literature addressed to cadres for state of the art in running firms and managing humans. (57)2.2.4
20140304j+Capitalism readily submits to the exit critique. (42)3.1.1
20140304i+Cities as general convention of justification appropriate to exploration in computer games like Sim City and Civilization. (22)3.1.1
20140304h+Study observed variations in spirit of capitalism, which is taken as given. (10)2.2.4
20140304g+To Hirschman Enlightenment secular thinking justified profit making in terms of common social good; lucre became innocuous passion for subjugating more aggressive passions. (9-10)2.2.3
20140304f+Vocation as moral relationship to work (Weber). (9)2.2.3
20140304e+Spirit of capitalism is the ideology justifying engagement. (8)2.2.3
20140304d+Capitalism also characterized by voluntary subjection of wage earning class. (7)2.2.3
20140304c+Capitalists formally include those possessing property income, but limit to active profit maximizers of firms. (6)2.2.3
20140304b+Capitalism as unlimited, interminable accumulation of capital by formally peaceful means, distinguished from market economy that attempts to regulate it. (4)2.2.3
20140304a+Notion of spirit of capitalism essential to articulate dynamic relation between capitalism and critique. (4)3.1.4
20140304+Construe ideology nonreductively following Dumont as set of anchored, shared beliefs inscribed in institutions. (3)3.1.4
20140303l+Ends prologue with reminder by Weber of need for embodied, interested viewpoint to differentiate phenomena from the confused flow of events, connecting diachrony in synchrony addition to Montfort and Bogost layer model. (xliv-xlv)3.1.10
20140303k+Apply their methodology by opening black box of computer technology, which includes examining social groups, emerging digital humanities scholarship including Edwards, Ensmenger, Golumbia, Mackenzie, and so on layering on critical programming. (xliv)3.1.5
20140303j+Goal of changing mindset to perspective of multiple processes affecting reality, as combination of rhizomorphous and normativity. (xliv)3.1.10
20140303i+History as tool for denaturalizing the social. (xliv)3.1.4
20140303h+Possibilities to have an effect (Rushkin or Rushkoff, not sure if error). (xliv)2.2.3
20140303g+Fatalism the corollary of waning critique regardless of disposition in larger scale future trends. (xliii)2.2.4
20140303f+Interesting that technical specialists form large percentage of these positions yet are putatively seldom studied such that they are only now being noticed as important (Ensmenger). (xli)3.1.4
20140303e+Cadres, meaning career plans, key concept for the limit of the little people bordering great men epitomizing new spirit of capitalism in humans. (xl)2.2.3
20140303d+Multinational firms embody winners opposed to which the majority individuals are losers merely riding technological waves not steering it as cyberspace presence. (xxxvii)2.2.4
20140303c+Consider influencing power of concentrated assests as type of collective machinic presence, seemingly reflecting cognition. (xxxvi)2.2.3
20140303b+Deregulation of financial markets real effect of appropriated critique worsening social situation. (xxxvi)3.1.1
20140303a+The path to peak full employment and democratized republican school system diminishing under connexionist metanarrative. (xxxv)2.2.4
20140303+Eight axioms applied to computing: spirit voice, moral dimension, permanent tension, critique effects, transforming tendency, voice, crossing Big Other as critique changing capitalism, compared to which the final anticlimactic sources of indignation. (485)4.0.0
20140301+Overarching level laying down law of otherwise open networks should be part of diachrony in synchrony framework. (xxii-xxiii)3.1.10
20140227n+Utopian and dystopian outlooks of successful formation of projective city or increasing degradation, inequality, and political nihilism. (523)3.1.10
20140227m+City as self-referential critical mechanism limits strength. (523)3.1.10
20140227l+Formation of city as transition to regime of categorization, operators of justification and tests. (522)3.1.10
20140227k+Emergent justification by established group having consolidated its power leading to theoretical formulation of new form of common good they contribute: worlds precede cities. (521)3.1.10
20140227j+City as metaphysical political entity and symptom: on lifecycle of cities think of Sim City games providing philosophical finesse of simulation tests in virtual realities. (520)5.3.1
20140227i+External force of law backed up by coercive state required to establish new mechanisms of justice, not force of critique alone. (519)3.1.10
20140227h+New protest mechanisms coming ahead of critique tend to become isomorphic to objects to which they are applied, such as cool studies. (518)5.2.1
20140227g+Critique contributed theory of exploitation of little people by responsible great men. (518)3.1.10
20140227f+Interpretative schemas sought by critics in conjunction with firms and consultants, such as development of network metaphor for connexionism that new spirit of capitalism mobilized. (517)3.1.10
20140227e+Destructive effects of unconstrained capitalism revive critique. (516)3.1.10
20140227d+Critical movements from without inform capitalism of dangers. (514)3.1.10
20140227c+Always new actors entering as consumers or producers. (513)3.1.10
20140227b+Impoverishment reduces consumption, creating risk; new spirit required from humanist viewpoint of reducing suffering and internal need to continue accumulation process. (513)3.1.10
20140227a+Risk of dealignment of capitalism and the state by displacements such a deregulation of financial markets and network forms of organization; capitalism relies on the state. (512)3.1.10
20140227+More complex rhetorical presentation after simple enumeration of axioms involves alternation of general moments of change and features of period studied in indented passages. (492)3.1.10
20140226b+Obviousness of these states could be world creating components of virtual realities putatively embedded in old versions of popular commercial entertainment simulation software. (487)3.2.2
20140226a+First axiom, first of n sequence of axioms, is the necessity of capitalism having a voice, having spirit for subvocalization of leading the soul with words to engage people. (485)3.1.10
20140226+At reaching formation of new spirit of capitalism at the end it prepares to repeat. (485)3.1.10
20140223z+Risk of disengagement by workers, creators, consumers, investors. (511)3.1.10
20140223y+Capitalism has no reason to take account of general interests, leading to historical moments of revolution. (510)3.1.10
20140223x+Effect of information deficit on markets precipitated financial crisis. (509)3.1.10
20140223w+Displacements of capitalism render supervision of tests more difficult, such as by multiplying small calculation centers while maintaining integration of information at managerial level. (508)3.1.10
20140223v+Difficult to change accounting frameworks via critical mechanisms. (508)3.1.10
20140223t+Monopoly on accounting systems and Latour calculation centers creates asymmetries between workers and management. (507-508)3.1.10
20140223s+Hysteresis of critical mechanisms. (507)3.1.10
20140223r+Artistic and social critiques helped uncouple capitalism from the state, tradition, family, grand narrative. (504)3.1.10
20140223q+Capitalism exploits ambiguity. (503)3.1.10
20140223p+Beneficial interpretations of displacements had to be developed rhetorically. (502)3.1.10
20140223o+Organizational shifts were not occult strategy of firms but experts. (501)3.1.10
20140223n+New capitalism uncoupled itself from the state, civic world and domestic arrangements, making nuclear family the boundary of private space. (500)2.2.3
20140223m+Greater strictness of established tests produce unequal advantages and prompt amoral exploration of opportunities for alternative investment. (496)3.1.10
20140223l+Tests of legitimacy during period involved unmasking infringements of justice in wage-profit relationship, legitimation of power asymmetries, and social selection. (492)3.1.10
20140223k+Voice gets its due because prices cannot express all dissatisfaction. (492)3.1.10
20140223j+Eighth axiom energizes critique by indignation, emotional expressions of meta-ethical anchorage, whose political exigency arose in Enlightenment. (491)3.1.10
20140223i+Seventh axiom is ability of critique to change capitalism beyond its spirit: by engendering displacements, shifting weights of tests, altering forms of accumulation. (490)3.1.10
20140223h+Sixth axiom is critique as voice is principal operator, intervening to tighten tests but then subject to being ignored or recuperated. (489)3.1.10
20140223g+Fifth axiom is transforming tendency, which may make the spirit radical to the point of mobilizing as they accumulate. (489)3.1.10
20140223f+Fourth axiom is that critique has real effects, mechanisms beyond illusion of ideology. (488)3.1.10
20140223e+Capitalism must resort to cities providing external justification due to absence of provable moral connection for insatiable accumulation. (487)3.1.10
20140223d+Contrary to Durkheim insatiability belongs to systemic capitalism not human nature due to competing desires. (487)3.1.10
20140223c+Insatiable capitalism must tempt satiable humans; compare insatiablity satiability distinction to Rushkoff on difference between computer and human senses of time. (486)3.1.10
20140223b+Second axiom is moral dimension of which tests play a role though tests exist immanently as part of the overall interior logic of capitalism, expressed as its insatiability. (486)3.1.10
20140223a+Capitalism must convince people to engage it. (485)3.1.10
20140223+Condensation of book via typesetting conventions of the printed page. (485)3.1.10
20140125x+Critique seemed to miss advance of new network mechanisms of capitalism besides condemnation of exclusion, until recently, though its 1970s vanguard emerge as promoters of the transformation. (156)3.1.1
20140125w+Premium on activity in relationship to work replacing rational asceticism and responsibility of prior spirits. (155)2.2.3
20140125v+Liberal conception of property taken to its conclusion, individuals owning themselves as product of labor of self-fashioning. (154)2.2.3
20140125u+Licensing like renting for sphere of information; intellectual rights as rental contracts. (153)2.2.3
20140125t+Washida definition of property foregrounding rented availability appropriate to separation of ownership and control. (152)2.2.3
20140125s+Time the basic resource to be save and constantly reinvested. (152)2.2.3
20140125r+Change in terms relating to money and work from saving and competence from first two spirits. (151)2.2.3
20140125q+Historicist and naturalist efforts to construct scientific sociology based on networks, reducible to reticular organization of knowledge. (150)3.1.1
20140125p+Traditional political philosophy has not yet attempted to justify the network, connexionist order; consider recent Lanier as example arising from technologists. (148-149)3.1.1
20140125o+Less radical American network logics attached to pragmatism, radical empiricism, semiotics, based on Peirce triad. (146)2.2.3
20140125n+Network approach developed with ontological primacy of philosopheme of event of connection, Deleuze encounter, giving langauge to Latour and Callon sociology of science. (145)2.2.3
20140125m+Network approach identified with radical empiricism, against reductionism apriorism implied by structuralism. (144)2.2.3
20140125l+Interest in relational properties and ontologies, philosophy of science in France; try to position in Hayles three eras of cybernetics. (143)2.2.3
20140125k+Network formerly referred to constraints. (141)2.2.3
20140125j+Traces of 1970s Illich although rarely cited by management authors. (139)3.1.1
20140125i+Few management texts reference authors from human sciences and philosophy, mostly each other; communication, complexity, chaos are predominant terms. (139)3.1.1
20140125h+Network metaphor extending to general representation of societies: connection and disconnection, inclusion and exclusion, openness and solitude. (138)2.2.3
20140125g+Textual analysis brings network logic to top position. (137)3.1.1
20140125f+Mapping grammars of seven worlds via word categories shows dominance of industrial logic in both eras, and network logic overtaking domestic logic for second place in 1990s. (136)3.1.1
20140125e+Based on these analyses and software analysis of 1990s management literature, projective city constitutes original mode of justification. (135-136)3.1.1
20140125d+Flexibility and adaptability more advantageous than technical expertise and experience of industrial city. (135)2.2.3
20140125c+Forms of control and gratification of domestic city defined by hierarchical position; in projective city mobility more important. (133)2.2.3
20140125b+Links lack transparency of reputational city. (132)2.2.3
20140125a+Transformative usefulness of links, information transmission means products not distinctly separated from persons as in commercial city. (131)2.2.3
20140125+Familiar characterization of innovation based on distributed recombination by rather than ex nihilo by individual actor of inspirational city. (129)2.2.3
20140124+Critique is not monolithic, it generates new ethical questions; capitalism like technology exploits ambiguity. (503)3.1.10
20140121x+Network form in firms formerly associated with organized crime, now rehabilitated. (128)2.2.3
20140121w+Networks appeal to desire to connect as basic property of human nature, as well as wanting to be simultaneously free and engaged. (127)2.2.3
20140121v+Existence is relational attribute; disaffiliation is sole sanction. (126)2.2.4
20140121u+Model tests at end of a project. (125)3.1.1
20140121t+Sacrifices personality to be connexionist being, chameleon; quiddity of self enterprise derives from constellation of established connections. (124)2.2.4
20140121s+Authority depends on competence. (124)2.2.4
20140121r+Prefer renting to ownership; avoids being trapped by institutions. (124)2.2.4
20140121q+Great man is a nomad, sacrificing impediments to availability, abandoning disinterested friendship, streamlined, ambivalent about moralizing. (122)2.2.4
20140121p+Relation between great and little people just when trust of the former results in enhancing employability of the latter. (121)2.2.4
20140121o+City falls when networks close, only benefiting some people, distorting tests by permitting privileges. (120)2.2.4
20140121n+Little people in projective city are rigid, cannot be engaged, employable on a project, incapable of changing projects; may be rigid because of attachment to a single project, place, preferring security at expense of autonomy. (119)2.2.4
20140121m+Interpersonal organizational mechanisms. (117)2.2.4
20140121l+Scientists and artists as models; experts have personal, integrated knowledge but are less adaptable than the project head. (115)2.2.4
20140121k+The great are integrators, enhancers of life; project heads, managers and coaches in contrast to cadres. (114-115)2.2.4
20140121j+Must be able to interest others, be at ease and be local. (113)2.2.4
20140121i+Flexibility and adaptability derive from autonomy,with an intuitive talent for knowing how to select and plunder ideas, not from obedience. (112)2.2.4
20140121h+Great man knows how to engage in a project enthusiastically, and is adaptable and flexible, thus employable. (112)2.2.4
20140121g+Life as succession of projects, with the aim of extending networks by multiplying connections and proliferating links. (110)2.2.4
20140121f+Key activity is generating or integrating oneself into projects, networks, putting an end to isolation. (110)2.2.4
20140121e+Common superior principle in projective city is activity. (108)2.2.4
20140121d+Autonomization and valuing art of mediating and making connections. (108)2.2.4
20140121c+In projective city people are encouraged to forge links but only respect maxims specific to projects. (107)2.2.4
20140121b+Projects delineate spaces of mini-calculation within otherwise indeterminate network. (106)2.2.4
20140121a+Project form of social organization as new apparatus of justification. (105)2.2.4
20140121+Network and projects mobilized by rhetoric of capitalism. (104)2.2.3
20140119z+Modernist and antimodernist aspects. (39)3.1.1
20140119y+Artistic critique foregrounds loss of meaning, sense of beautiful; Baudelaire bourgeoisie and the dandy exemplifying attachment and detachment. (38)3.1.1
20140119x+Artistic and social critique. (38)3.1.1
20140119v+Domain of emotions and reflexive levels of expression of critique. (36)3.1.1
20140119u+Two stage birth of new spirit of capitalism. (35)3.1.1
20140119t+Reformist and revolutionary critique depending on how it affects tests. (33)3.1.1
20140119s+Critique and tests intimately related in affecting capitalism. (32)3.1.1
20140119r+Power conveyed by determination by tests of degree of amoral strength or just character status. (31)3.1.1
20140119q+Four sources of indignation: disenchantment and inauthenticity, oppression, poverty and inequalities, opportunism and egoism. (37)3.1.1
20140119p+The test. (30)3.1.1
20140119o+Model of change through interplay of three terms of critique, organizing work, maintaining space between means and justice. (29)3.1.1
20140119n+Critique can also cloud the issue. (29)3.1.1
20140119m+Critique can justify capitalist processes in terms of common good. (28)3.1.1
20140119l+Critique can delegitimate previous spirits. (28)3.1.1
20140119k+Take justification of capitalism to common good seriously to distance from polarizing critical approaches. (26)3.1.1
20140119j+Seventh city modeled on 1990 management texts for cadres and concrete proposals for improving French social justice. (24)2.2.4
20140119i+First spirit rooted in compromise between domestic and commercial, second industrial and civic cities. (24)2.2.4
20140119h+Six logics of justifications of social arrangements articulated as cities with privileged forms of expression by their great men: inspirational, domestic, reputational, civic, commercial, industrial. (23)2.2.4
20140119g+Third characterization of globalized capitalism employing new technologies. (19)2.2.3
20140119f+Second characterization developing between 1930s and 1960s emphasized the organization and heroic manager; control transferred to technostructure. (17-18)2.2.3
20140119e+First characterization of capitalism focused on person of bourgeois entrepreneur at end of nineteenth century; its amalgam of incompatible propensities led to charges of hypocrisy. (17)2.2.3
20140119d+Spirit of capitalism peculiar to each age must assuage anxiety provoke by questions of autonomy, security, common good. (16)2.2.3
20140119c+Constraint of maintaining tolerable distance between cadres and workers. (15)3.1.1
20140119b+Cadres and engineers are primary recipients of management discourse. (14)3.1.1
20140119a+Commoditization of services by competitive private enterprise deemed socially optimal solution because of dual drive to maximize profit through reducing waste and satisfy customers, including anticipating their expectations. (13)2.2.3
20140119+Utilitarianism incorporated into economics connected profit creation with common good serving society. (12-13)2.2.3
20140118z+Ideological disarray; critical thought cannot keep up (Latour). (xlii)2.2.4
20140118y+No substitute for belief in progress, which has sustained the middle class. (xlii)2.2.4
20140118x+Point as been reached that cadres and their education-based plans losing advantage. (xli)2.2.4
20140118w+Bourgeoisie supported by inheritance income in addition to salary, which is now primary source; now wage earning class of cadres career plans can live the bourgeois life. (xl-xli)2.2.4
20140118v+Family became more fluid and fragile, transferring social task of reproduction to schools, compounding insecurity. (xl)2.2.4
20140118u+World capitalism healthy, societies in poor shape situating populations of declining human intelligence, which will be called social regression. (xxxviii)2.2.4
20140118t+Flexibility in OECD countries whittling down social security via temporary workforce, flexible hours, reduced benefits, outsourced management. (xxxviii)2.2.4
20140118s+Operates in same milieu provoking Latour to announce why critique has run out of steam and need to update analytical tools. (xxxv)3.1.4
20140118q+View the book as research program subject to future clarification. (xxvii)2.2.3
20140118p+Formulating autocritique from flaw noted in their exposition: capitalism and critique simultaneously and interactively take charge of definition and categorization of the world through their capacities for displacement and inventiveness. (xxvi)3.1.1
20140118o+Model of change seeks to integrate these paradigms, regime of categorization for normative and regime of displacement for rhizomorphous, in a single framework. (xxv)3.1.10
20140118n+Ontology of the social reveals two paradigms, rhizomorphous plane of immanence, and normative two tier permitting comparison of singular entities but therefore accused of succumbing to illusion of transcendence. (xxiii-xxiv)3.1.10
20140118m+Interesting invocation of Internet and free software as examples of self-organizing emancipatory force within networks, but doubts they can provide acceptable solutions to found a new city for lack of addressing the marginalized and disconnected. (xxiii)5.2.1
20140118l+Openness of networks makes it difficult to establish scale of justice, though members must accept regulatory instance, or state laying down the law; Galloway protocol would help here. (xxii-xxiii)3.1.10
20140118k+Social effects of network architecture based on Durkheim, emphasizing social conflicts provoking development; what is new is the societal project to make the network a normative model. (xxii)2.2.4
20140118j+Follow Latour analyses to demonstrate social dimensions of technological change. (xix)2.2.4
20140118i+Plenty of critiques of globalization but stagnation in establishing mechanisms to control new forms of capitalism. (xvi)3.1.1
20140118h+Projective city. (xv)2.2.4
20140118g+Reformist analyses but not revolutionary; capitalism assimilates critique. (xiv)2.2.4
20140118f+Analysis of the French case to limit scope of details and for lack of resources; compare to later discussion of asymmetry of Latour calculation centers. (xiv)3.1.4
20140118e+Practical implications limited to twelve page Postscript. (xiv)2.2.4
20140118d+Distinction between social and artistic critique, emphasizing exploitation and dehumanization as its targets. (xiii)3.1.1
20140118c+Revival of capitalism following crisis led to construction of new normative fulcrum of projective city; compare range of years to rise of personal computer and Internet. (xiii)2.2.4
20140118b+Critical sociology replaced by sociology of critique for indifference to actors. (xi)3.1.1
20140118a+Marxist and Althusser dominant paradigm in 1960s and 1970s; dual orientation of positivism and tradition. (ix-x)3.1.1
20140118+Capitalism seems to have fallen out of critical discourse, so look at its use in French sociology over last thirty years. (ix)3.1.1
20140104c+Acknowledge roles played by Prospero@ software, its inventors, and human preparation of files of management texts for processing. (xxix)1.3.4
20140104b+Study proposes theoretical framework for alteration of ideologies associated with economic activity. (3)3.1.4
20140104a+Book inspired by perplexity over coexistence of declining social position of masses and booming capitalist economies. (xxxv)3.1.1
20140104+Construct framework for combining critical and pragmatic sociology based on analytic framework of De la justification affording analysis of supra-individual entities, focusing on 1965 through 1995. (xii-xiii)3.1.1
bolterwriting_space09 20088.302013111790%90%Y0
20131117+Turkle also connects philosophizing with computers as applied deconstruction and postmodern theory. (182-183)3.2.2
20131026h+Metaphors of writing including memory as writing space, writer Cartesian homunculus mind, Mystic writing pad. (193)2.1.2
20131026f+Computer programming embodying semiosis suggestive of Bogost procedural rhetoric; see Tanaka-Ishii. (176)3.1.9
20131026e+Written text structures space while implying a structure in time; significance of spatial structure in medieval codex, printed books and computer windows as part of thorough reading. (99)3.1.3
20131026d+Pictorial and verbal space common in Chinese landscape and Greek vase painting remediated in electronic picture writing. (63-64)3.1.3
20131026c+USA Today bar chart of safety razors example of visual metaphor. (52)3.1.3
20131026b+Hypermediacy intense awareness of medium. (25)3.1.3
20131026a+Remediation when new media takes place of older one while borrowing and reorganization many characteristics. (23)3.1.3
20131026+Writing as technology for arranging verbal ideas in visual space. (15)3.1.3
20130910j+Doubtful that Cartesian paradigm could survive in networked era, notwithstanding arguments of Edwards and Golumbia, invoking new metaphors of materiality and subjectivity. (201)2.2.5
20130910i+Goes counter to concern by Heim that contemplative, deeply informed reading is shunted by the psychic framework of word processing, although this procedure suggests an improvement on reading by altering the layout of a typographically formated text that was not laid out that way originally, such as Aristotle lecture notes and Plato dialogues. (110)2.2.5
20130910h+The network structure as well as the linear-hierarchical order enforced by the underlying computer code and organization lends additional credibility to the authors work by fulfilling these layouts and not merely presenting words that, if read in a certain way, represent such structures; however, as Heim points out, these gains are accompanied by losses. (105)3.1.3
20130910g+Etymology of reading suggests gathering signs and moving over writing surface, recalling Socrates claim in Xenophon that once he learned to gather together all the spoken things (xunienai ta legomena) he never failed to investigate any study. (100)3.1.2
20130910f+Virtual reality and dynamic content generation in general represents a new form that does more than remediate statically produced media, even if they are moving (Manovich). (70)3.1.3
20130910e+The progress of HTML and other hypermedia languages is tied to culture, corporations, and their values; for example, the unreflective, default approach or best tool for the job versus crafting web pages that render well in a heterogeneity of systems. (69)3.1.3
20130910d+Fleshes out details of the interface, surface level that Turkle argues embodies postmodern ideas in artifacts. (67-68)2.2.5
20130910c+Is this taking speech balloons too far, applying remediation to Greek vase painting? (64)3.1.2
20130910b+Ekphrasis and reverse ekphrasis manifest desire for natural sign. (56)3.1.3
20130910a+Is Heim naive in assuming that word processing relieves the writer of the materiality of writing? (13)3.1.3
20130910+The strict requirement of textual unity and homogeneity is relatively recent. (10)3.1.2
20120906+Text may become associated with qualities of computer rather than print; however, what goes in the parenthesis differentiating computer from text must not be assumed. (3)1.3.2
20120331+Deconstruction, although playful, require seriousness, which complicates criticism of hypertext works. (182-183)3.1.3
bolter_and_gromalawindows_and_mirrors03 20118.302013090825%25%Y0
20130908+Compare Laurel lack of single essence to essence of technology theorized by Heidegger, then variable ontology of Smith, Bogost. (45)3.1.3
20110528+Did Turkle really endorse symbol manipulation as the essence of human being? (50-51)3.1.3
borkexam1_question110 20128.00201401120%0% 0
20140112+I want to use debate between modernist and postmodern positions as a place to comment upon the experience of doing philosophy while programming, and specifically in the second chapter. (1)2.1.1
20130908+McGann as the good modernist who experiments with programming XML. (2)3.2.3
20121117+As the committee response follows, this is my turning their text into code in a process I call fossification or flossification. (158)4.2.2
borkexam1_question310 20128.00201309070%0% 0
20130907+Connections between Bogost unit operations and programming practice. (131)3.2.3
borkexam2_question112 20128.00201212040%0% 0
20121204+The comment noted today is how it was originally responded, which is what the committee members read long before anyone else in the group read it. (152)0.0.0
borkexam2_question212 20128.002014011725%25% 0
20140117+Sets the stage for consuming back thoughts long past in ways substantially different from memory as any human types. (np) 5.2.1
20130908+Groundwork for moving from Heideggerian philosophy of technology towards humanities plus technology stance. (np) 3.1.7
borkexam3_question212 20138.00201312240%0% 0
20131224+In one such possible galaxy of meaning where I answer as theorist-practitioner about one of my own projects aimed at advancing scholarship in the humanities, namely this dissertation. (np) 3.2.3
borkexam3_question302 20138.00201304140%0% 0
20130414+Derrida can be read using Kittler method, latching onto his telephone call, Macintosh, and Freudian archive, despite his default legacy characterization as a traditional humanities theorist who does not program; in fact, the parasite ethic Berry reaches is wholly consistent with the Derridean approach deployed by Landow. (31-32)5.2.1
20130228+Galloway fills in some of the ambiguity of what is meant by materiality, although his aesthetic (phenomenological? (95)3.1.5
borkexam3_question402 20138.00201304240%0% 0
20130424+Deleuzeian vision of micropolitics would be the programmer perspective for living in the network, to which they identify as mechanosphere, along with Berry version of Serres parasite being good streams. (np) 2.2.5
20130303+The new kind of pharmakon imagined combining tapoc and symposia cannot be readily experienced until a dissertation can be submitted as virtual machine archive. (np) 4.2.1
20130228+Agreeing with McDaniel I aim to raise engagement with programming languages forming the language machines manipulating the texts upon which others fixate (Derrida, and oddly, Kittler, too); the discourse network of 2000 contains much code and may need to be machine read, both for analysis and execution, along with human reading. (np) 1.3.4
borkknowledge_and_learning_in_project_based_organizations07 20098.00201302110%0% 0
20130211+Important to remember that lifelong learning is connected to studying how networking machines, understood as machine and human hybrids keyboard, monitor interfaces running software, learn and exercise knowledge skills in their workplaces. (2008)5.1.1
bowker_and_starsorting_things_out07 20118.302013091225%25%Y0
20130912a+Moral and ethical agenda in querying classifcatory systems; Heim and Feenberg discuss gains and losses. (5-6)3.1.4
20130912+Baudrillard ignores details of constructing simulations to which Manovich seems attentive. (9-10)3.1.4
20120906+Interesting appeal to the hypertextual world as a place where hybrid approaches are deployed for analysis. (32)3.1.4
20110707+Clear link to Foucault Order of Things as well as gap to fill. (5)3.1.7
bracha_et_alcomputerized_pin_ball_machine02 20138.402013021150%5% 2
20130211+Reiterating US patents as a protocological form on account of its openness, from this or previous claims describe the structure of the Bally pinball platform and begin to derive its affordances and constraints, noting mention of switch matrix, SCRs, solenoids, digital displays, microprocessor, PIA, read-only programmable ROM, and so on, as topics of consideration. (np) 4.3.1
bravermanlabor_and_monopoly_capital01 20178.702017012950%5%Y0
20170129+Three aspects marketing structure of management social coordination function of PHI Foucault biopower in an almost cookie cutter verbiage listing PHI as good old Socratic method wondering what affects organizational structure both historically and in future conditions. (184)0.0.0
20170123+Reiterate in internet age neoliberalism making diverse deported and emigrating American creative workers to Chinese substitutions to explain next great shift after scientific reasoning. (114)0.0.0
brinwhy_johnny_cant_code04 20138.102013091290%90%Y0
20130912f+The assumption that BASIC is obsolete and kids will find more relevant learning platforms in contemporary operating environments like OLPC is false. (np) 5.2.1
20130912e+Little explored material specific epistemological situation of human, not machine, readable simple programs in print. (np) 5.2.1
20130912d+Are the conditions for spontaneous evolution of the type of expertise apparently required to become a programmer like WWII generation automobile tinkerers? (np) 5.2.1
20130912c+Recognizes this is an undesirable, self inflicted global condition like tragedy of the commons devouring seed corn, and although this profoundly affects global evolution, it has gone unnoticed in a way Heidegger feared would happen, perhaps retarding further human intelligence augmentation in the symbolic register that coincidentally allows machines to continue to get smarter; we could all fall into new dark ages if the global supply of capable technologists diminishes beyond a critical threshold, or the machines take over as dramatized in many science fictions. (np) 1.2.3
20130912b+Absence of modern programming languages providing easy, effective, interesting pedagogy like BASIC. (np) 1.2.4
20130912a+Argues seems sound that skills learned by line-coding level on early personal computers transfer and improve contemporary professionals, as extreme pole of Bogost procedural literacy. (np) 3.1.8
20130912+Everyday computers no longer come ready to learn programming. (np) 1.2.3
20130430+Argument that learning line coding, which is concretized deep fabric holding up world of OOP, worth studying, rather than something to put down (Seneca); my layer model recognizes platform knowledge no different than layered mathematical or any other language comprehension knowledge. (np) 3.2.2
brooksmythical_man_month04 20138.602015081390%25%Y4
20150813j+Extended example of regenerative schedule disaster from adding manpower yields famous law, demythologizing the man month. (25)3.1.6
20150813i+Common practice of scheduling to match date desired by patron. (21)3.1.6
20150813h+Brooks uses one third planning, one sixth coding, one quarter component test, one quarter system test as scheduling rule of thumb, although few of the conventionally scheduled projects he studied allowed one half for testing. (20)3.1.6
20150813g+Testing usually most misleading part of schedule because of optimistic expectation of less bugs. (19-20)3.1.6
20150813f+Communication quickly dominates task time when workers are added. (19)3.1.6
20150813e+Communication adds burden of training and intercommunication. (18)3.1.6
20150813d+Sequential constraints also prevent task partitioning, like bearing a child. (17)3.1.6
20150813c+Men and months only interchangeable when task can be partitioned with no communication needs. (16)3.1.6
20150813b+Unlike cost progress does not very by number of men and months, making man month deceptive unit for measuring size of a job. (16)3.1.6
20150813a+Expectation of tractable medium for software breeds fallacious thought mode of pervasive optimism, but faulty ideas lead to bugs. (15)3.1.6
20150813+Success of software projects largely impacted by lack of calendar time due to poor estimating, confusing effort with progress, poor monitoring, and finally adding manpower when slipping noticed; ironically, forty years later these comments are still appropriate for the mid size software development firm where I work. (14)3.1.6
20130912i+Research shifted to virtual environments. (viii)6.2.2
20130912h+Original of time sharing in debugging, a programming activity, sets stage for GUI and myriad other ways of human and computer interaction. (146)6.2.2
20130912g+Compare value of managerial documents to Caesear notebooks used by Antony. (111)5.3.1
20130912f+Social aspect of technological unconscious includes very shape of systems reflecting organizational communication structures, from primitive workshops to networks; contemplate this supposition that programming systems reflect the communication structures of the organizations creating them with respect to individual projects as an obvious passage into programming style. (111)6.2.2
20130912e+Holistic, user oriented attitude crucial characteristics of programming manager. (100)6.2.2
20130912d+Does use of gendered abstract noun man fail to properly consider role of women in programming, the true long hairs, or does Brooks innocently equivocate and intend to include all humans? (80)5.3.1
20130912c+Prevalence of producers and technical directors in network organizations; rarity of thinkers, doers, and thinker-doers. (80)6.2.2
20130912b+Network communications natural state in large organizations, including programming projects. (79)6.2.2
20130912a+Value of consistent design philosophy is conceptual integrity; integral systems take less time to build. (49-50)6.2.2
20130912+Unapologetic about control of architectural specification by a small group, aristocracy, versus majority of implementors; similar arguments made in Dreaming in Code but also complicates analysis of free software open source bazaar ethic. (46)6.2.2
20130422+Where metaprogramming descends back into interface, user has option to become less intellectually challenged as to have to consider how these things constituting thought are arranged. (285)6.2.2
20130421+Foresees but does not name the emergence of the free, open source option, whole operating systems built from these components, in a programming platform statement anticipating floss; metaprogramming is the organizational discipline appropriate to range over configuration of personal operating environments, with unreflective consumption at the other pole. (284)6.2.2
20130420+Is delegated power like distributed control an important question arising from crossing Brooks with Berry and fortuitously Janz while writing code, in the midst of working code is where philosophy multipurposively crosses over into technology. (279)5.2.1
20130415+Definition of program/programming invicts materiality of programming, noting category mistake to cycle around code this good description sets stage for later thought in philosophy of computing see how we are going tapoc into working code trance knowledge state cycling through systems of machine and human conspiracy, for example C and English, C++ and ancient Greek, Perl and Latin, and so on; I suggest today that in the complexity of program products as deployed solutions we miss communicating with the machine as programmers, exemplified by workplaces lacking weekly seminars on deployed solutions products. (164)3.1.7
brown_duguidsocial_life_of_information03 20128.302013091290%75%Y0
20130912t+Free, open source movement counters swing back toward corporate control of intellectual products built into software code recognized by Lessig. (250)3.1.8
20130912s+Connect to reading the background to Clark extended mind. (205)3.1.8
20130912r+Suggest most important uses of information technology are helping people interact in the physical world, atoms to bits to atoms. (146)3.1.8
20130912q+Division into broad networks of practice and close communities of practice detail does not seem present in Castells network concept; check Spinuzzi. (143)3.1.4
20130912p+Polanyi explicit and tacit dimensions reinforce need for practice within community of practitioners to produce actionable knowledge in people. (134)3.1.4
20130912o+Loss of collective memory from downsizing because organizational knowledge more in people than databases. (122)3.1.4
20130912n+Innovations often hidden due to processes and forms; much can be learned from improvisations. (110)3.1.4
20130912m+Local workplace cultures, chatting, discouraged by process reengineers because they do not see the value of their linkages. (98)3.1.4
20130912l+Importance of knowledge in organizations, which no doubt has social characteristics, must be considered with process reengineering. (93)3.1.4
20130912k+Classic designer view versus user-centric, task-oriented bases argument for failure of technology driven designs and productivity paradox. (85)3.1.4
20130912j+Office life reveals combination of technological frailty and social resourcefulness; a different explanation of why telecommuting has not supplanted the traditional office setting than Castells. (77)3.1.4
20130912i+Look to reliability of machines in the institutions and organizations they represent rather than the technological artifact itself. (62)3.1.4
20130912h+Bleak outcome separating autonomy and accountability if agency is not better modeled. (55)3.1.8
20130912g+Bot negotiation has become the model of human negotiation mediated by technology, but it is clumsy; tie in Malabou. (50)3.1.8
20130912f+Lack of technological transparency of agential intention an issue concealed by ease of use. (45)3.1.8
20130912e+Ranks of agents: information brokering, product brokering, merchant brokering, negotiating; enter Turkle Alone Together. (39)3.1.8
20130912c+Compare to dimensions of 6 Ds of network age to analysis by Castells. (27)3.2.2
20130912b+Microsoft rhetoric echoes ancient call to take on the complexion of the dead. (20)2.2.5
20130912a+Tie RFCs to learning about digital communications. (xxi)3.2.2
20130912+Absence of GNU in positive account of free, open source software as exemplifying a robust and epistemologically transparent social life of information. (xvii-xviii)3.1.5
20120924+Gee also emphasizes community of practice for situated learning. (126)3.1.4
20120819+Importance of nontechnological innovations like using publicly moderated request for comments RFCs to democratize technological change, such as the development of communications protocols, although RFCs in particular were electronically disseminated. (xx-xxi)3.1.7
20120316+Recent hype at THATCamp of the next version of Apple electronic book software for transforming reading in education, for example. (xii)3.1.3
buck_morssdream_world_of_mass_culture11 20128.302013102690%90%Y0
20131026o+Conceptual extremes illustrated by quadrant diagram: petrified/transitory nature, dream/waking, fossil/fetish, wish-image/ruin. (314-316)3.1.3
20131026n+Benjamin dialectics of seeing. (309)3.1.3
20131026m+Imagine as a project for augmented reality, transforming visual perception of built environment through complex processing of dialectical images. (334)5.2.1
20131026l+Compare this non-bricoluer confidence in montage design to directedness of software engineering. (334)5.2.1
20131026k+Freedom as ability to consume as bourgeois dream of democracy now expressed as media access, the digital divide. (332)5.2.1
20131026j+Preference formation in concrete, historical archetypes. (328)3.1.3
20131026i+Utopian wish slumbering within objects reactivated through child fantasy play. (327)3.1.3
20131026h+Do with early personal computers, including the potential of learning programming as a home economic, having become part of human experience the way writing and other basic activities did for the United States, noting arcades the early Internet that arose from the prior generation of personal computing: I am trying to recover fantasies from that former era, including the radically democratizing potential of habituation to working code to solve problems and pleasurably hobby as a basic intellectual activity. (326)5.2.1
20131026g+Turkle may be the first to attach to digital objects the transgeneration communication of socially formed collective unconscious fantasies. (326)3.1.3
20131026f+Trick in fairy tale is to interpret unconscious past of collective out of mass culture discards; compare to Lyotard parology. (325-326)3.1.3
20131026e+Modern computer technologies democratize producer potential of unconscious analysis, where participation limited to interpretations based on mass consumption only. (323-324)5.2.1
20131026d+Compare reterritorialization of mundane objects to salvation of standing reserve of decades past, now orbiting free, open source software and expiration of all copyrights. (321)5.2.1
20131026c+Theory of cognition based on childhood tactile, active, experimental experience of world wonder; compare to Lyotard. (321)3.1.3
20131026b+Under conditions of capitalist industrialization, reenchantment of social world through reactivation of mythic powers at dream level; Arcades project intended to practice dialectics of seeing to enable waking from that dream. (317)3.1.3
20131026a+Is this reality transforming charged force field vestige of Socrates divine sign logotropos as like not only hyperlink but all programmed control operations; perhaps my contribution is to foreground technical competence over metaphorical critical interpretation. (312)5.2.1
20131026+Mass publication emblem books influence montage panoramic representation of dialectical images intuited as Urphenomena. (311-312)3.1.3
20121020+Public access to urban brilliance and luxury via Paris arcades, in which crowd itself became spectacle; tempting link to Internet. (310-311)3.1.5
bukatmanterminal_identity06 19948.202013091225%25% 0
20131026b+According to Debord, Society of the Spectacle declares new mode of phenomenological and commercial existence. (35)3.1.1
20131026a+Textuality now an explicit theme; Hayles considers Bukatman. (30)3.1.2
20130912c+The collective consciousness cannot think itself due to expansion of data; it goes under, unconscious (Baudrillard, Debord). (34)3.1.3
20130912b+This threatening overthrow of the Word, regression to infantilized science fiction, alludes to Derrida, Benjamin, and Horkheimer and Adorno, and countless other media theorists, philosophers of technology, and social critics whose sad diagnosis of the human situation foresees a future of diminished depth, dividuated dispersion of identity. (29)3.1.3
20130912a+Everything exists as spectacle; we are all spectators, albeit active consumers. (26)3.1.1
20130912+Consider analysis of science fiction by Hayles to study subjectivity. (3)3.1.2
20130908+Jameson periodization of culture. (3)2.1.1
bull_and_backauditory_culture_reader08 20118.402013102650%25% 0
20131026h+Bassett: the mobile phone structures space like a map, dream, prayer. (354)5.1.1
20131026g+Bassett: decrease in percentage of database usage that terminates with a human operator as intraprocess and interprocess communication short circuits the computer-human symbiosis; as Manovich and Kittler say, software takes command. (354)5.1.1
20131026f+Bassett: mobile phone as mnemonic operator: rethink with smartphones? (352-353)5.1.1
20131026e+Bassett: narrativizing inventory challenges Manovich claim of ontology of unordered database. (352)5.1.1
20131026d+Thibaud: close to Serres quasi-objects. (337)5.2.1
20131026c+Thibaud: three movements to listening of elsewhere from visible to audible, perception to action, private listening to public secret: why not consider it via comparison to micro-ecology of visual navigation by comparing to reading while walking in Symposium, as all three movements occur walking reading for vision as hearing with mobile sound reproduction devices; for reading versus hearing another read edges upon oneself reading another. (329)5.2.1
20131026b+Thibaud: long texts could be stored in long walks, and then when writing removed the need for the long walk because a stationary anything would suffice, texts began eulogizing that loss of enjoyment in the present moment: this is the sound of memory going from working memory into the environment and long-term memory. (331)5.2.1
20131026a+Tonkiss: perhaps spoken and written language bias symptom of available media before computable text and sound, that is, recent print literature: new thinking possible with sound reproduction artifacts and technologies. (306)4.1.1
20131026+Tonkiss: for Benjamin, hearing as sense of memory, recording. (306)4.1.1
20130909+Tonkiss: we get to include sounds with writing, which texts and technology studies correctly recognize, but have to also include programming; Sterne gives us a methodology, but working code must also be written, we (humanities scholarship) must go beyond literary criticism into technomedia learning and practicing programming. (307)4.1.1
20110927+Bassett: Crary gives us imaginary virtual of Zizek; use these two concepts of Crary and Perec to refute a sloppy pronouncement by Manovich. (346)4.1.1
20110917+Thibaud: comparison to reading while walking, reading in public had seeing to public secret as hearing to public secret: who would think that two people talking while walking would be reading aloud? (331)4.1.1
burks_goldstine_von_neumannlogical_design_of_electronic_computing_instrument01 19988.602015080475%75% 0
20150804+Importance of system clock will go beyond maintaining sequential processing to time axis manipulation and alien temporalities. (32)3.1.5
20140906+Limit scope of this first report to building the machine; next report will be about programming, a statement about how we will think as machines, quite a feat for 1940s humans. (ii)6.1.1
20140209+Numbers and programs the first things we entrust to computing then by 32 bit Internet dreaming in code is possible. (29)5.1.1
20131026z+Mention of floating decimal point solutions proposed for other digital computers in America and England. (8)6.1.1
20131026y+Suggestion that technologists will train themselves to use base 2, 8 or 16 numbers points out entrenchment of decimal system in our culture. (8)3.1.5
20131026x+Parallel memory storage an aspect of von Neumann architecture maintained today for RAM but abandoned for other storage devices like secondary storage (SATA hard drives). (5)3.1.5
20131026w+Key decision to use binary number system instead of traditional decimal system, as well argued design affordance that requires an alien perspective; contrast to Babbage decimal machinery, which for its own part introduced the strange system of differential arithmetic retained by these newer binary devices. (7)3.1.5
20131026v+Secondary storage medium part of input-output system demonstrating additional fuzzy borders between the canonical division of the stored program computer. (7)6.1.1
20131026u+Proposal for storing 4000 words using 40 Selectrons for two to the twelfth power forty binary digit words. (5)6.1.1
20131026t+One feasible memory organ was dielectric plate inside a cathode-ray tube, putatively a two-dimensional matrix. (4)6.1.1
20131026s+Sense of technical determinism based on selection of memory unit, although history demonstrated multiple, divergent solutions invented worldwide. (4)6.1.1
20131026r+Introduction of conditional and unconditional transfers as basic control structures besides sequential processing. (3)3.1.5
20131026q+Basic sequential program counter operation from current place adding one. (3)3.1.5
20131026p+Transfers into memory as total substitution of contents and partial substitutions of operators to orders (memory location numbers). (3)6.1.1
20131026o+Input and output organs permitting machine signaling to and manipulation by humans final constituent of stored program computer. (1)3.1.5
20131026n+Arithmetic organ as the physical instantiation of basic logical operations grounding mathematics, representing unavoidable materiality of electronic circuits performing the work of imagined code. (1)3.1.5
20131026l+Early design decision to separate storage from control, while treated as ontological characteristic of stored program computers to this day, became fuzzy as soon as caches where added to CPUs. (1)6.1.1
20131026k+Control organ differentiated from storage organ rather than building the two features into the same device. (1)6.1.1
20131026j+It should also be reread by philosophers of computing, both to get a sense of the social, cultural, and personal contexts of its authors and their milieu and to invite new thinking in the state of the art. (1)3.2.2
20131026i+Only after thirty two bits (represented as 32, 0x20, 10000) do we think with Internet technologies; thus, these ancient authors of electronic computing thought with different intentions in part because of the address bus widths with which they built their machines. (1)3.2.2
20131026h+Storage of numbers and orders in the same memory device implies variable ontology impossible in written texts. (1)3.2.2
20131026g+Ability to instruct all-purpose machine to carry out any computation that can be formulated in numerical terms, implying memory and processor. (1)3.1.5
20131026f+Finally, note anthropomorphized word choices understand for the CPUs ability to fetch and execute. (1)6.1.1
20131026e+Note difference between special purpose and general purpose computer intertwined with semiotics, language as beyond special purpose wetware, what Nietzsche referred to as instinct. (1)6.1.1
20131026d+Let us continue this romp through early thinking in the manner Heidegger teaches for Greek thinking (noein legein and ekphanestaton phusis), where the principle components of the stored program digital electronic computing are enumerated as if by logical necessity in order to fulfill general purpose criterion, touching on same basic nature of computability questions as Turing but in actionable technical detail. (1)6.1.1
20131026c+It is not an exciting intelligence like human consciousness, nascent for so long, latent in designs and physical structures, only coming to life with the emergence of higher address bit width systems. (1)3.2.2
20131026b+Thus, this early document we scan to ground our understanding of terms like stored program associated with the human author (rather than the machine hardware) von Neumann originally served to document knowledge that still resided primarily in human brains and printed materials, as Kittler makes so clear in There Is No Software, by the early 1970s shepherding the thoughts expressed by the many pages describing binary arithmetic operations resided in electronic circuits and their representations, blueprints for making new circuits and for CAD language games. (1)6.1.1
20131026a+Control to autonomously automatically execute orders stored in memory like a reader to a book or player piano to scroll. (1)3.1.5
20131026+Fully automatic independent of human operator after the computation starts key characteristic ascribed by most contemporary theorists including Kitchin and Dodge. (1)3.1.5
20130912v+Last page is table of 21 machine operations.6.1.1
20130912u+Interactivity between machine and human limited to typewriter input for ad hoc data input, and a single machine instruction deployed to halt computer and notify completion by flashing a light or ringing a bell. (41)6.1.1
20130912t+Deterministic, lossless translation between binary and decimal representation of numbers. (40)6.1.1
20130912s+Serial transfer for starting up the machine; no concept of parallel (tetrad) long term memory. (39)6.1.1
20130912r+Strict enforcement of separation between internal operations and those involving input or output beyond the computer; many pages of detail on control, but not as detailed as that of the arithmetic unit, admittedly only an overview. (33)6.1.1
20130912q+Control counter is heart of state transition machine, along with its clock source. (31)3.1.5
20130912p+Memory address decoder design reflected in command decoding, with strong sense of materiality of code by decoding machine operation numbers to physical circuits; clever use of error checking making connections to unused outputs. (30)6.1.1
20130912o+Tetrads as proto-bytes. (30)6.1.1
20130912n+Decoding defined as many-to-one function table crossing dual implementations as circuitry and software running code. (29)6.1.1
20130912m+Basic machine operations of fetch and execute, store, and input/output beyond Selectron memory. (29)6.1.1
20130912l+Twenty pages of detail on hard wiring of basic arithmetic operations attests to materiality of even stored program computation and hence all code; example of representing negative numbers by complementation invites variable ontology view where both negative numbers and complementation operations exist at same level, not one inscribing the other. (9)6.1.1
20130912k+Principle of incorporating in physical circuits only the necessary or most frequently used logical concepts, such as Accumulator. (9)6.1.1
20130912j+Away from human decimal standard towards what seems more appropriate for machine computation, 2, 8, 16 (binary, octal, hexadecimal); noted ambivalence of floating point capability as another human convenience. (8)6.1.1
20130912i+Critical programming insight: I/O bounds memory bus and physical bus developed by Uffenbeck. (7)4.3.1
20130912h+Parallel storage of memory words versus serial storage by EDVAC. (5)6.1.1
20130912g+Three levels of memory as compromises between localization within working memory and responsiveness of long term memory. (4)6.1.1
20130912f+Acknowledgment of materiality as initial design decisions concretize structural constraints and affordances, like Derrida describing struggle by Plato to wrest mythemes from historical context to transform into philosophemes. (4)6.1.1
20130912e+Acknowledge starting from first principles to conceive code would be a digression, so electronic computing is philosophically shortchanged from the start. (3)3.1.5
20130912d+Use of communication to describe human machine relationship: that the final paragraph suggests ringing a bell or flashing a light to signal to the humans that the computation is complete, or has halted (Turing), of course reflects limited capabilities of the time but also institutes a human centric locus of the interface; other theorists and science fiction writers till take up the other possibility, that humans adapt to the machines, to the extent of synaptogenesis and into the technological nonconscious of the latest Hayles. (1)6.1.1
20130912c+Arithmetic organ differentiated from background control organ: the architecture being proposed here not only exhibits multipurposive program and data storage but also division of functional units characteristic of industrial machinery; elementary operations are wired into the machine, and there is already acknowledgment of compromises between speed, complexity, cheapness. (1)6.1.1
20130912a+Economic origin of stored program concept that, ironically, was solved positionally, by agency of discrete, deterministic program counter state changes built into the control. (1)6.1.1
20130912+This first page on the principle components of the machine should be required viewing by any philosopher of computing, for it articulates the essentials of traditional, mainstream computer organization present in everyday devices: memory, control, arithmetic, input, output. (1)3.1.5
20130131+Situated problems guided situated cognition of response; analysis of this problem space, not computing in general, although today a workspace of 4000 40-bit, twelve decimal precision mathematical computations is completely inadequate for the problems for which computers are designed, nor is anything like distributed network control conceivable, means that problem space now encompasses legacy, to the extent that not dead, as well as 64 bit address and timer width distributed control (Galloway protocological) computing, again not computing in general. (2)6.1.1
20121221+Bulk of this document covers details of arithmetic computation because it is encoding that human-machine thought operation; these original circuits still present but at larger address bit widths. (1)6.1.1
20120824+Having transcended formulating everything in numerical terms, such that larger address bit widths afford qualitatively different fantasies of machine operations including internetworked, distributed, object oriented processing of modern cyberspace, while still encoding everything in just that, reveals the fact that we have not left the basic ontology of computing posited by Burks, Goldstein and von Neumann. (1)6.1.1
burnard_okeefe_unsworthelectronic_textual_editing03 20128.302013102790%75%Y0
20131027e+Deegan: program and interface least durable parts of electronic editions, however this division of intellectual capital that externalizes program and interface dissolves with inclusion of digitally native, electronic literature as the subject of scholarly editions. (365-366)4.2.2
20131027d+Vanhoutte: answering what is a text, ontology matters for noncritical operations, such as transcription, especially if it turns out to be non-nesting, non-hierarchical. (171)3.1.2
20131027c+Vanhoutte: dossier genetique resorts to internal creative process as internal monologue of the editor, and thus a form of speech, points to attempt to reconstruct final software product from long history of revisions and contested negotiations. (168-169)3.2.3
20131027b+Case and Green: SCO UNIX case is a prime example of difference between transfer of ownership of object versus copyright. (352)3.1.5
20131027a+Fraistat and Jones: dynamic collation of Graver and Tetreault hints at single sourcing and RCS features. (114-115)3.2.2
20131027+Fraistat and Jones: TEI for encoding poetic text at level of structure, describing in ordered hierarchy. (111)3.1.2
20130913a+Case and Green: lack of authoritative search for ownership and rights from Library of Congress further complicates transmedia events such as sounds in virtual realities that are generated from copyrighted text via text to speech synthesis. (354)3.1.2
20130913+Case and Green: concern raised that extensive monitoring capabilities will make it harder for scholars to secure permissions from publishers; imagine when reach goes into real time, perspectical virtual worlds. (351)3.1.2
20130912z+Crane: extracting place and date information to identify events hints at Manovich big data analysis. (286)3.2.3
20130912y+Crane: invitation to studying problems of managing annotations encrusting heavily studied texts; suggests lexicon can become a commentary. (284)3.2.3
20130912x+Crane: argues persistent linking schemes for print citations exemplify pre-digital solutions, whereas PDLS developed abstract bibliographic object concept from which bidirectional links can be generated. (283)3.2.3
20130912w+Crane: overview of design and programming considerations going into Perseus Digital Library System (PDLS) crosses humanities scholarship into philosophical programming. (277)3.2.3
20130912v+Huitfeldt: Wittgenstein Nachlass a forty man-year project, like a modern videogame or other software application, exceeds the capability of any single individual to produce; see Hayles on collaborative aspects of electronic literature. (186)3.2.2
20130912u+Huitfeldt: argues Wittgenstein manuscripts provide almost every imaginable complicating variation for textual markup and requiring keen awareness of of nuances of diplomatic reproduction. (182)3.1.2
20130912t+Vanhoutte: even considering RCS commits as speech acts, still problem of non-nesting information of BNF-style grammars to keep theorists busy; encoding becomes a form of noncritical close reading, for example Greg Crane describing how the PDLS lookup files mitigate. (176-177)3.2.3
20130912s+Vanhoutte: three categories of genetic criticism are transversal, horizontal, vertical. (174)3.1.2
20130912r+Vanhoutte: explores need for better ways to handle temporal elements via spatialization in digital data (Castells), and the choice to use only digital facsimiles acknowledges the limits of TEI, and is punting; multiple versions model of text lends itself to encoding via revision control system as well as TEI. (172)3.2.3
20130912q+Vanhoutte: argues modern texts often feature non-nesting problems from time and overlapping hierarchies. (171)3.1.2
20130912o+Vanhoutte: addresses new aspects of documenting how the edition was created, such as linkeme methodology, and new ways of reading provided by automagic of sed and awk, tracing cultural boundaries between digital humanities scholarship and IT, which are foregrounded by emphasizing noncritical operations. (168)3.2.3
20130912n+Van Hulle: discusses versions and variants comparable to source control systems and versioning in word processors to deal with self-generative, algorithmic character of traditional text (McGann). (158)3.2.3
20130912m+Van Hulle: proposes Vanhoutte linkable unit linkeme a basic concept of electronic texts (see if Landow covers). (156)3.1.2
20130912l+Van Hulle: argues transclusive flexibility afforded by not only digital format but nonproprietary format so that it can be machine processed in new ways. (155)3.1.2
20130912k+Flanders: consider this notion of readerly discovery promoted by Flanders for software and critical code studies. (139)3.1.2
20130912j+Gants: detailed examples of tag usable and working code examples for encoding drama, fleshing out problem of multiple hierarchies as the major challenge to text encoding. (134-135)3.2.3
20130912i+Rosenberg: recounts development of a major scholarly editing project of Edison Papers that includes its technological evolution. (92)3.1.2
20130912h+Fraistat and Jones: MOOzymandias virtual reality experiment enacts the autopoietic functions of social texts envisioned by Buzzetti and McGann, demonstrating similarities between editing and programming. (116)3.1.2
20130912g+Fraistat and Jones: give sizable examples of working code to illustrate the devils bargain with HTML as well as creative layout of text and critical apparatus. (107)3.2.3
20130912f+Robinson: inspires comparing open transcription policy to four freedoms enshrined in GPL. (89)3.2.3
20130912e+Robinson: inspires comparing repeatability of analysis to software quality assurance methodologies exemplified by development of Anastasia software tool for Javascript rendition of XML encoded files. (86)3.2.3
20130912d+Robinson: propositions reached from Canterbury Tales project digital edition: specificity of research context, inclusion of full-text transcription, restoring exhaustive historical criticism, editing and reading altered, adopt open transcription policy. (77)3.1.2
20130912c+Buzzetti and McGann invoke pragmatistic, existential imperative to build devices. (69)3.1.2
20130912b+Buzzetti and McGann see markup as highly reflexive act, oscillating indeterminacy like self-organizing systems; in line with videogame studies, electronic literature. (67)3.1.2
20130912a+Buzzetti and McGann discuss insufficiency of OHCO thesis for missing structural mobility, assuming meaning embedded in syntactic form, assuming coincidence between syntactic and semantic forms. (66)3.1.2
20130912+MLA CSE guidelines a goldmine of work for a future generation of humanities scholars. (17)3.1.2
20120909+Deegan: CCS link of cultural bias in encoding recommends ASCII entity references over direct Unicode; see Case and Gee. (367)3.1.2