From the Foreward to A Companion to Digital Humanities by Roberto A. Busa:
Only a computer census of the syntactic correlations can document what concepts the author wanted to express with that word. Of a list of syntactic correlations, the "conceptual" translation can thus be given in modern languages. .. To give one example, in the mind of St Thomas ratio seminalis meant then what today we call genetic programme. Obviously, St Thomas did not know of either DNA or genes, because at the time microscopes did not exist, but he had well understood that something had to perform their functions.
He claims to be one of the first to use electronic computers in humanities studies with his Index Thomisticus project begun in 1949. Use this as something ongoing to supplement Ongs hypotheses. He calls it "textual hermeneutic informatics." According to the introduction, the point of the collection is to help establish Digital Humanities as a discipline in its own right.
1 3 3 (900) [-4+]mCQK busa-perspectives_on_digital_humanities (xvii) 20140914 0 -1+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Following first perspective of technological miniaturization, making gadgets, the second of textual informatics itself has three branches: documentaristic, which includes media production, editorial, from what critical editions arise in media production, finally hermeneutic, for philosophies of computing.
1 3 3 (1000) [-4+]mCQK busa-perspectives_on_digital_humanities (xvi) 20140903a 0 -5+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Gives credit to Zampolli whose work maps plateaus in computational linguistics, his sense of humanities computing.
1 3 3 (1100) [-4+]mCQK busa-perspectives_on_digital_humanities (xvii) 20140903f 4 -1+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
All computers used through first two epochs of technological miniaturization of his project were IBM equipment.
1 3 3 (1200) [-6+]mCQK busa-perspectives_on_digital_humanities (xvii) 20140903e 0 -5+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Hilarious thankfulness for invention of magnetic tapes. "In His mercy, around 1955, God led men to invent magnetic tapes. . . . I used all the generations of the dinosaur computers of IBM at that time." (xvii)
1 3 3 (1300) [-4+]mCQK busa-perspectives_on_digital_humanities (xvii) 20140903g 0 -4+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Latest version of project fits on a single Hufmann method compressed CDROM.
1 3 3 (1400) [-4+]mCQK busa-perspectives_on_digital_humanities (xvi-xvii) 20140903d 0 -3+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Perspective of technological miniaturization akin to progression from eight to sixty four bit address widths, here applied to phases of his project from punched cards, magnetic tape, finally CD-ROM.
1 3 3 (1500) [-4+]mCQK busa-perspectives_on_digital_humanities (xvii-xviii) 20140913a 0 -7+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Only in a computer could the computation operations Busa describes for his LTB digital humanities project.
1 3 3 (1600) [-4+]mCQK busa-perspectives_on_digital_humanities (xviii) 20140914e 0 -1+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Claims his computing project Index Thomistics an intentional act establishing hermeneutic informatics, and links it to IBM through Watson providing a highly engineered solution.
1 3 3 (1700) [-4+]mCQK busa-perspectives_on_digital_humanities (xxi) 20140913f 1 -4+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Textual hermeneutics summarized descriptively by three periods, from Index Thomisticus to Alpac fragmentation envisioning global collaborative universal language programming; an emergent branch of philosophy.
1 3 3 (1800) [-4+]mCQK busa-perspectives_on_digital_humanities (xvii) 20140914a 0 -4+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Editorial where most digital humanities of dumbest generation sticks; must keep in mind Busa experienced that technological era along with the dumbest generation.
1 3 3 (1900) [-4+]mCQK busa-perspectives_on_digital_humanities (xvii) 20140914b 0 -4+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Busa names first current of textual informatics documentaristic, naming computing centers phenomena I refer to as collective intelligence.
1 3 3 (2000) [-6+]mCQK busa-perspectives_on_digital_humanities (xviii) 20140914j 0 -1+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Project description in geek speak of his time. "Schematically, this implies that, with integral censuses of a great mass of natural texts in every language, in synchrony with the discovered data, methods of observation used in the natural sciences should be applied with the apparatus of the exact and statistical sciences, so as to extract categories and types and, thus, to organize texts in a general lexicological system, each and all with their probability index, whether great or small." (xviii) Answers to schematism of perceptibility describing its programming design; probability index at core resembles Socrates discussion of ideal rhetoric in Phaedrus.
1 3 3 (2100) [-4+]mCQK busa-perspectives_on_digital_humanities (xviii) 20140914k 0 -5+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Recall automatic translation mentioned by Black, as if Watson fed to Busa: can the programming project survive, should ancient code revisions remain extant, forms ethical and philosophical question place.
1 3 3 (2200) [-4+]mCQK busa-perspectives_on_digital_humanities (xviii) 20140914n 0 -6+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
MIT launched magazine Mechanical Translation offered as digital humanities study content along with IEEE Annals.
1 3 3 (2300) [-6+]mCQK busa-perspectives_on_digital_humanities (xix) 20140914p 0 -3+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Ironically Alpac Report canceled machine translation funding not for technological as in hardware limitations but ontological deficits foreshadowing OOP as in software engineering dooming them. "Unfortunately, in 1966, as a result of the Alpac Report, the Pentagon cut off all funding. This was not because computers at that time did not have sufficient memory capability or speed of access, but precisely because the information on the categories and their linguistic correspondences furnished by the various branches of philology were not sufficient for the purpose. The machine required greater depth and more complex information about our ways of thinking and modes of expression!" (xix) These are ultimately philosophy of computing territories suggesting Socratic question deeply tangling synaptogenesis and technogenesis.
1 3 3 (2400) [-4+]mCQK busa-perspectives_on_digital_humanities (xix) 20140914q 0 -3+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Busa notes shortcomings of philology implying tracy of electracy of his time lacking.
1 3 3 (2500) [-4+]mCQK busa-perspectives_on_digital_humanities (xix) 20140914t 0 -1+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Notes lean funding for his sort of digital humanities projects in renewed war on terrorism; many other projects likely continue by intelligence collection and analysis computing centers, and we could wonder about the neutrality or evil inherent in either group.
1 3 3 (2600) [-6+]mCQK busa-perspectives_on_digital_humanities (xix) 20140914r 0 -4+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Invokes Delphic know thyself in call for comprehensive global collective cognition heavily afforded by directed informatics, Engelbart Type C activity, rather than using old tools. "We are far from having exhausted the precept inscribed on Apollos temple at Delphi, Know thyself. It seems, therefore, that the problem must be attacked: in its totality with comprehensive, i.e., global, research; collectively by exploiting informatics with its enormous intrinsic possibilities, and not by rushing, just to save a few hours, into doing the same things which had been done before, more or less in the same way as they were done before." (xix)
1 3 3 (2700) [-4+]mCQK busa-perspectives_on_digital_humanities (xix) 20140914s 0 -4+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Tension between totality as global research and collectively as thoughtful computing system design, doing more than saving time doing the same old things.
1 3 3 (2800) [-4+]mCQK hockey-history_of_humanities_computing (3) 20140913 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Initial scope of humanities computing as applications to research and teaching within humanities arts subjects, with bias for textual sources.
1 3 3 (2900) [-4+]mCQK hockey-history_of_humanities_computing (5) 20140913f 0 -1+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Early humanities computing work by Mosteller and Wallace of authorship of disputed Federalist Papers interested in statistical methods, demonstrating consciousness of purposes as well as reflection on expansion of techniques.
1 3 3 (3000) [-4+]mCQK hockey-history_of_humanities_computing (5) 20140913g 0 -1+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Data input, storage, and representation recognized as key technological limitations; nod to Unicode as breakthrough.
1 3 3 (3100) [-4+]mCQK hockey-history_of_humanities_computing (6) 20140913h 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Serial processing limitation of magnetic tape affected encoding of historical material, forcing into single linear stream.
1 3 3 (3200) [-4+]mCQK hockey-history_of_humanities_computing (6) 20140913j 0 -2+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
One off IBM conference in 1964 forerunner of later humanities computing conferences.
1 3 3 (3300) [-4+]mCQK hockey-history_of_humanities_computing (7) 20140913m 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Dedicated computing centers established for humanities research in 1960s; TuStep software set high standards.
1 3 3 (3400) [-4+]mCQK hockey-history_of_humanities_computing (7) 20140913n 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Key problems focus on textual material, the symbolic, inherited form early period.
1 3 3 (3500) [-4+]mCQK hockey-history_of_humanities_computing (9-10) 20140913u 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Preponderance of vocabulary studies leveraging concordance programs.
1 3 3 (3600) [-4+]mCQK hockey-history_of_humanities_computing (6) 20140913i 0 -7+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
COCOA concordance program provided markup and economical file space usage; fixed format coding the other major citation technique.
1 3 3 (3700) [-4+]mCQK hockey-history_of_humanities_computing (9) 20140913t 0 -6+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Disk storage and relational technologies still created problems in forcing information into tables.
1 3 3 (3800) [-4+]mCQK hockey-history_of_humanities_computing (8) 20140913o 0 -8+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Widening range of interests at conferences and consolidation of common software platforms like Oxford Concordance Program noted during second period from 1970s to mid 1980s.
1 3 3 (3900) [-4+]mCQK hockey-history_of_humanities_computing (8) 20140913p 0 -3+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Oxford Text Archive an initiative to avoid duplication of effort in text archiving and maintenance; text preparation rather than programming began to take majority of project time.
1 3 3 (4000) [-4+]mCQK hockey-history_of_humanities_computing (7) 20140913l 0 -1+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Computers and Humanities journal started publication in 1966.
1 3 3 (4100) [-4+]mCQK hockey-history_of_humanities_computing (6-7) 20140913k 0 -1+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
ALLC/ACH conferences began in 1970.
1 3 3 (4200) [-4+]mCQK hockey-history_of_humanities_computing (8-9) 20140913q 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
TLG quintessential project focused on creating a new research archive versus preserving individual projects by others.
1 3 3 (4300) [-4+]mCQK hockey-history_of_humanities_computing (9-10) 20140913v 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Dissemination through conferences and journals the other primary feature of second period.
1 3 3 (4400) [-4+]mCQK hockey-history_of_humanities_computing (10) 20140913w 0 -3+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Personal computer period of mid 1980s to early 1990s freed humanities computing from the computing centers, their expertise and scrutiny; result was much duplication of effort but also innovation, comparable to cathedral versus bazaar models of software development.
1 3 3 (4500) [-4+]mCQK hockey-history_of_humanities_computing (10-11) 20140913x 0 -7+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Macintosh attractive for ability afforded by GUI to display non standard character sets and build hypertexts via Hypercard programming tool.
1 3 3 (4600) [-4+]mCQK hockey-history_of_humanities_computing (10-11) 20140913y 0 -7+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Hypercard first simple programming tool available to humanities scholars.
1 3 3 (4700) [-4+]mCQK hockey-history_of_humanities_computing (11) 20140913z 0 -1+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Electronic mail shared at 1985 conference led new era of immediate communication, later Humanist ListServ in 1987.
1 3 3 (4800) [-4+]mCQK hockey-history_of_humanities_computing (11) 20140914 1 -7+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Humanist the model electronic discussion list, credited for developing and maintaining distributed scholarly community defining humanities computing.
1 3 3 (4900) [-4+]mCQK hockey-history_of_humanities_computing (12) 20140914a 0 -2+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Development of TEI from SGML major intellectual development of third period, inspired by 1987 meeting at Vassar to ponder standard encoding scheme.
1 3 3 (5000) [-4+]mCQK hockey-history_of_humanities_computing (12) 20140914b 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Text Encoding Initiative reflects interest in markup in addition to providing systematic attempt to categorize and define all features of humanities texts of interest to scholars, yielding over 400 tags.
1 3 3 (5100) [-4+]mCQK hockey-history_of_humanities_computing (13) 20140914d 0 -2+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Impact of Web initially missed by entrenched humanities computing practitioners, just as Microsoft did; TEI adherents criticized HTML as weak, appearance based markup system like word processor formats.
1 3 3 (5200) [-4+]mCQK hockey-history_of_humanities_computing (13) 20140914e 0 -1+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Delivery of scholarly material over Internet became new focus.
1 3 3 (5300) [-4+]mCQK hockey-history_of_humanities_computing (14) 20140914f 0 -1+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Libraries new players in putting collections on the Internet.
1 3 3 (5400) [-4+]mCQK hockey-history_of_humanities_computing (14-15) 20140914g 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Example of Orlando Project creating new material and forms of scholarly writing.
1 3 3 (5500) [-4+]mCQK hockey-history_of_humanities_computing (15) 20140914h 0 -6+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
New collaborative projects made possible by Internet technologies; importance of project management underappreciated.
1 3 3 (5600) [-4+]mCQK hockey-history_of_humanities_computing (15) 20140914i 0 -3+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
TEI extensibility clashed with needs of libraries for durable, closely followed standards, raising questions about philosophy of TEI.
1 3 3 (5700) [-4+]mCQK hockey-history_of_humanities_computing (16-17) 20140914o 0 -3+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
TEI credited with influence on development of XML, especially its hyperlinking mechanisms.
1 3 3 (5800) [-4+]mCQK hockey-history_of_humanities_computing (15) 20140914j 0 -5+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Addition of multimedia added new dimension to humanities electronic resources, but at time of writing mostly limited to manuscript images, awaiting ubiquitous high speed access, perhaps through convergence with television.
1 3 3 (5900) [-4+]mCQK hockey-history_of_humanities_computing (16) 20140914m 0 -2+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Introduction of academic programs final symptom of emerging discipline; compare to Hayles survey in How We Think.
1 3 3 (6000) [-4+]mCQK hockey-history_of_humanities_computing (13) 20140914c 0 -7+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Divergence of spin off disciplines like computers and writing, and linguistic computing, which served defense and speech analysis communities without much communication between them.
1 3 3 (6100) [-6+]mCQK hockey-history_of_humanities_computing (16) 20140914k 0 -4+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Media theorists began studying electronic resources themselves, especially hypertext. "Electronic resources became objects of study in themselves and were subjected to analysis by a new group of scholars, some of whom had little experience of the technical aspects of the resources. Hypertext in particular attracted a good many theorists. This helped to broaden the range of interest in, and discussion about, humanities computing but it also perhaps contributed to misapprehensions about what is actually involved in building and using such a resource. Problems with the two cultures emerged again, with one that was actually doing it and another that preferred talking about doing it." (16)
1 3 3 (6200) [-4+]mCQK hockey-history_of_humanities_computing (16) 20140914n 0 -1+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Other parties trying to define the field and provide research agendas.
1 3 3 (6300) [-4+]mCQK hockey-history_of_humanities_computing (16) 20140914l 0 -4+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Noticeable gap between sayers and doers among media theorists.
1 3 3 (6400) [-4+]mCQK hockey-history_of_humanities_computing (17) 20140914p 0 -2+ progress/2014/09/notes_for_hockey-history_of_humanities_computing.html
Humanities computing can grow interest in cultural heritage among lifelong learners and general public, which Bauerlein should praise.
1 3 3 (6500) [-4+]mCQK crane-classics_and_the_computer (46) 20130913 0 -1+ progress/2012/03/notes_for_crane-classics_and_the_computer.html
Classicists are ideally positioned to inform texts and technology theories.
1 3 3 (6600) [-4+]mCQK crane-classics_and_the_computer (53) 20120324 0 -1+ progress/2012/03/notes_for_crane-classics_and_the_computer.html
Prospects beyond 2003 include visualizations, language technologies, annotation managers, library repositories.
1 3 3 (6700) [-4+]mCQK crane-classics_and_the_computer (55) 20130913g 0 -2+ progress/2012/03/notes_for_crane-classics_and_the_computer.html
Part of cynicism is presupposing minority participation by classicists in democratic rationalization.
1 3 3 (6800) [-6+]mCQK feenberg-questioning_technology (180) 20120925s 0 -2+ progress/2009/11/notes_for_feenberg-questioning_technology.html
Technical devices and programs must be informed by collective choices about the good life or they have no reason to be conceived. "Thus
[working code css]
jbork@alkibiades:~/src/tapoc$ sudo wireshark
PHI://www.ebay.com/itm/281609933166?forcerRptr=true&item=281609933166&viewitem=&sspagename=ADME:B:WNA:US:1653&autorefresh=true
jbork@alkibiades:~/public_html/progress/2015/03$ svn add screenshot_20150303.png
jbork@alkibiades:~/src/tapoc$ sudo make web-localhost
[working code css]
It becomes the meaning of working code PHI. Between each is a gulf of time while I did other things than working code. Amazing it has been a month since I have done working code PHI style philosophizing. There you go Bruce Janz that is speaking back from places that gave it philosophy and it standing reserve real virtualities PHI now also threatened to extent Heidegger purged from the system. Also have tcpdump going to see what commercial third party cyberspace does in my personal computing space, for once the PHI becomes http the code is activated that thinks the thoughts of machine cognition PHI. What if it is improper to call as is dividual cyborg because that term is not defined until chapter three becomes philosophical composition question more like engineering design than ethical, epistemological, metaphysical, ontological, more like phenomenological, speculation PHI. It is bigger than Heidegger it includes the death camp railroad telephone system IBM machinery PHI. What if I were to end chapter two admitting I had yet to articulate network dividual cyborg as ts situation suspending that cognition to first run through a theoretical framework and methodology, that is, chapter three content can I get them to sign off on proposal and take draft of chapter two. Network dividual cyborg is what the human immured in technocapitalist networks ought to escape the absolute overdetermining sway of which influence PHI. Is Heidegger flushed with all the other chuckleheads who did not program becomes hinge for logotropos sieve strainer division function, remembering Maner likewise threatened by Johnson. The concept of network itself emanates from technological networks as highly engineered human environments. What can you catch your computer doing in this monitored network environment clues you in on what happens in cyberspace along with what you think happens, for you cannot think must high speed protocological processes making reality.
2 2 1 (300) [-6+]mCQK bork-journal 20150302 20150302 0 -9+ journal_2015.html
Hayles posthuman cyberpunk bounded by sixty four bit broken down time PHI. My dissertation does not depend on Heidegger less so than Fuchs disavowal includes in references cited. I am going to keep the quoting of certain theorists at a minimum without abjecting those who do so at some length even thought it is now deprecated like computer code for extermination camps, that is where evil crosses human computing and the danger shines and a little hope lurks, reflecting H ontotheology. Before Turing laid out his criteria, before Weiner conceived theoretical technological cybernetic networks that could take on their lives of their own, and other putative pioneers of digital computing their steering insights, Shannon conceived theoretical technological communications networks that made sense of a fundamental ontological constituent of noise, while we, following the same tradition as quaint literary thinkers are still more familiar with discrete units, beings, as possessing meaning, and are just making sense of the obsession of Derrida on traces generating meaning. This was the hegemony of Heidegger that we deprecate along with his antisemitism, which contaminates it and reflects the same crude structure we wish to transcend, along with its evil no matter how banal. Note also that textuality spans this continuum as the overarching materiality of media, software. Before all that present the McLuhan Schmoo, which must be on, part of, a slide in the presentation, going with that same materiality of presence granting the truth and phenomenal instantiation of PHI. It is the decontextualized, generic bland essence of technology many have been fearing fills our waking intellectual life, consonant with the dumbest generation fed on phenotype/genotype synthetic essential inauthenticity, precession of simulacra real virtuality, again that which I refer to as PHI now cyberspace. Doing some cow clicking, which is now an occasional but well practiced daily task, engenders practical rule of not setting refinement level until writing chapter to which units are assigned during repetitive clicking activities.
2 2 1 (400) [-7+]mCQK mcluhan-understanding_media (60) 20131006f 0 -6+ progress/1994/08/notes_for_mcluhan-understanding_media.html
Central nervous system externalized, making our lives information processes; Kittler equipment for souls. (60) Our private and corporate lives have become information processes because
Hayles:
problems with dynamic transformation,
Varela,
Brooks subsumption architecture,
Lyotard,
Suchman: planning models,
shared interaction,
opaque functionalism,
linguistic control,
documentary method.
Winograd further criticizes linguistic assumption that it goes all the way down.
Compare to Neel on Plato. Hayles discussion of subvocalization enteratins embodiment but is still fundamentally linguistic.
Hansen visual primacy also fails.
Shift to Clark extended cognition:
Bluefin tuna,
Gibson affordances,
foveation example,
radical emobidment tenets,
hybrid model.
Extended mind needs segue to Hayles on Bourdieu habitus.
Rushkoff.
Bogost voodoo.
Residual Golumbia skepticism leads to Hayles and Malabou layering in social factors to introduce technocapitalist networks. That is the sequence wished for the current place in the semiautomatic dissertation writing method developed and tested as part of the philosophical inquiry of the dissertation itself, a substantial part of its research.
2 2 2 (400) [-5+]mCQK bork-journal 20140322 20140322 1 -1+ journal_2014.html
Hayles argues that recognizing significances of contested aspects that later became the canonical history of cybernetics improves our understanding of our own posthuman embodiment as it is already thoroughly connected to information systems, machinery, and the built environment.
2 2 2 (500) [-4+]mCQK hayles-how_we_became_posthuman (147) 20130929d 5 -5+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
Problem with dynamic transformation.
2 2 2 (600) [-4+]mCQK hayles-how_we_became_posthuman (222) 20130930a 0 -1+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
Varela bridges second and third waves of cybernetics.
2 2 2 (700) [-6+]mCQK hayles-how_we_became_posthuman (235) 20130930c 0 -9+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
Rodney Brooks robot subsumption architecture relates to philosophies of embodiment. "Whereas Moravec privileges consciousness as the essence of human being and wants to preserve it intact, [Rodney]
This view was anticipated by various theorists, including Foucault, duos Deleuze and Guattari, Hardt and Negri, Boltanski and Chiapello, and others. It presents a metaphysic of technogenesis and synaptogenesis, using Hayles terms as she interprets Malabou, suggesting a synthetic, maker perspective. It provides a robust analytic adequate for networks by crossing multiple domains acknowledging massively parallel distributed nature of cyberspace. It transcends logical models based on literacy, single process threads, brittle requirements of exact reproducibility to remain intact. It provides meaningful conjunction of software engineering practices and philosophy, supporting concurrent, multipurposive, perspectival explanatory models that are insufficient by themselves or contradictory. It will be helpful to compare diachrony in synchrony to contemporary epistemologies and metaphysics expressed by Galloway, Thrift, Bogost, Harmann, Smith, and Janz. Rejoining rhetoric habitual application of understanding diachrony in synchrony through the machine experience as well as the human leads to the hypothesis that habitual programming promotes synaptogenesis. While consideration will be given for meager findings from prior teaching programming research, it seems reasonable to demand a second look at programming now that computers again come equipped with a development environment for immediate, command line programming. Philosophical programmers are the new ontologists, from the platform level of languages back through Burks, Goldstein, von Neumann through Stroustrup, Linux, interface shaping application developers, and unthought plethora multiplying programming style distinctions from the binarism enshrined by Turkle. The detailed example I will give in the presentation is what is known as broken down time characteristic of C, and implicitly C++, and other modern Internet era programming languages. Thread between default philosophies of computing and foss hopes, considering that a golden age may have passed while a new one has just begun. Have to reach virtual machines supplanting print and screen, even active browser, basis of scholarship and philosophical middle work, to get to critical use. Working code places become new site for philosophical production. Numerous digital humanities scholars anticipated foregrounding of involving significant work in programming languages in addition to natural human languages, radically shifting plateaus of discourse from traditional academic sources to free, open source software project repositories, building itself from revisions of custom software written over a lifetime to work with ones thoughts. Arrive at critical programming and tapoc as synthetic disciplines.
3 0+ 0 (1700) [-6+]mCQK bork-journal 20150205 20150205 4 -21+ journal_2015.html
The highly engineered Memex Vannevar Bush proposed in 1946 is often invoked to index human fantasies about future human computer symbiosis at the height of the electromechnical, predigital First World society of post WWII America. "/span>. Synaptogenesis is the corresponding term for changes in human brains over individual life spans in response to environmental conditions, singling out Catherine Malabou for realizing the deep entanglement of capitalism and current neurological theories. Importantly, the temporal order of magnitude at which changes are noted occur within human lives, especially during infancy through adolescence, versus far longer time frames spanning many generations typically associated with evolutionary theories. Guattari prefigures in his presentation of machinic heterogenesis to treat complex machines prior to technics by recognizing the extreme human social and cultural span bestiary accompanying any artifact that is part of any technological system, as he gives with the key and lock better understood through integration of functions, and makes the nice twist of assimilating machine into living or living into machine. Hayles explains that technogenetic spiral includes anticipatory models that work like technology, such as mysterious nature of electricity, now computational metaphors, a flip side of skeumorphs. Assumptions replicate through temes, techincal objects, forming conventions of software, particularly Manovich. Technogenesis is the new theory of evolution, its ontology that of Simondon technical objects for which concretization is the motive force for change. Synatpogenetic trends like hyper attention seem inevitable, although Hayles cleverly points out the example of Catherine Malabou pondering the coextensiveness of capitalism and neurology to offer a political response to determinism, what I call default philosophies. The diachrony in synchrony model well expresses concretization by sustaining invisible forms like the deep structure of electronic machinery sustaining what was once held by printed visual media. New concept of layers of codes and languages. Malabou makes the ultimate argument for plasticity versus flexibility as preferred comportment having potential for resistance, not just passive accommodation, which Hayles turns into a call for Big Humanities projects. Importantly, her model views database and narrative as symbionts, not combatants. Like this decades long engagement between philosophy and computing, sundry interdisciplinary collaborations suggest themselves.
Bruce Janz is my key philosopher for articulating software engineering philosophical places spaces. His studies from the African continent and outer space prepare us for attempting to intuit machine embodiment, take on the complexion of cyberspace. Contemporary metaphysics and epistemologies by Bogost, Smith, and retrospectively a litany of new ontologists among philosophical programmers as those who built current technological milieu in which we live. Machine experience toward a philosophy of computing through procedural rhetoric from study and shared experience as engineers with philosophical programmers, making run time ontologies such that cyberspace is that which exists in such networks. My goal is to also transcend default philosophies of computing, including the binarism Turkle imposes on types of programming styles. Beyond hard mastery and briocolage are nuanced, beyond the default as I am concerned multitude possible failure points, after considering there are at least ten for four wires, precludes study of electronic circuits so we never get to digital humanities following OGorman picking up soldering irons: this is to me a philosophical problem." (89) Its title As We May Think indicates contours of what humans believed their thinking constitutes through describing its perfected condition conjoined to the epitome of office technology: associative memory, link trail blazing, networked sharing and collaboration. In her 2012 update to Bush, How We Think, the evolution of technology and human brains are tightly connected. Hayles uses the term technogenesis to describe the mechanism by which the inhuman side of things evolves, leaning on Gilbert Simondons theory of technical change in which innovations tend toward concretization, integrating conflicting requirements into multipurposive solutions that enfold them together into intrinsic and necessary circular causalities
3 0+ 0 (1800) [-6+]mCQK bork-journal 20150130 20150130 1 -23+ journal_2015.html
Procedural Rhetoric of Diachrony in Synchrony.
-revealed from current digital humanities practices informed by texts and technology studies.
-Bogost procedural rhetoric from software studies defined as persuasion through rule based representations and interactions, looks beyond programming and epistemic games to developing procedural literacy and awareness of biased perspectives of how things work through direct engagement.
-OGorman referencing Lecercle.
-include source code where Lecercle, Ulmer, OGorman and others emphasize polyglot puns and images.
-Montfort and Bogost layers.
-network layer model.
-code space.
-anticipated by various theorists: Foucault, Deleuze and Guattari, Hardt and Negri, see literature review.
-technogenesis and synaptogenesis: Hayles, Malabou.
-synthetic, maker perspective.
-discipline of critical programming.
-robust analytic adequate for networks.
-transcends logical models based on literacy, single process threads.
-provides meaningful conjunction of software engineering practices and philosophy.
-supports concurrent, multipurposive, perspectival explanatory models that are insufficient by themselves or contradictory.
-compare to other contemporary epistemologies and metaphysics: Bogost, Harmann, Smith, Galloway, Thrift, Janz.
-habitual programming promotes synaptogenesis; contrast to meager findings from teaching programming research.
-philosophical programmers as the new ontologists.
-broken-down time example.
-working code places.
-arrive at critical programming and tapoc as synthetic disciplines.
GO THROUGH LITERATURE REVIEW.
3 0+ 0 (1900) [-6+]mCQK bork-journal 20150201 20150201 1 -17+ journal_2015.html
Imagine the proposal iterates between timestamp other file and journal objects PHI is where new philosophies of computing begin with procedural rhetorics of diachronies in synchronies playing on textual linguistic and now computable as real virtualities code variations PHI becomes the proposal to articulate by about twenty sentences. Bauerlein criticizes individuals while I technological environments as do contemporary digital humanities studies. Thinking through programming is a unique way to philosophize whereas the default exemplified in Johnson dismissing Maner for failing to create unique ethical problem solving means machines have been ignored, what I call intuiting machine embodiment. " To me the term aptly describes an epistemology and metaphysics resembling the network layer model that transcends single threaded low speed logical methods learned through literacy, affording a robust analytic adequate for networks. I point to how Montfort and Bogost articulate a model of synchronic analytical layers, descending from the literary to the formal, then software, and finally platform, phenomenological basis (Racing the Beam ). At every layer simultaneously diachronic states of affairs transpire as a result of and affecting the production of reality. This concept is well alluded to by the OSI network layer model from early Internet computer science, portraying its being as concurrent layers built from applications, protocols, down to electronic circuits. The same instant can be explained at various orders of temporal and physical magnitude as the constituents of the present as it happens in cyberspace, each necessarily occurring through time by their abiding protocol or electrical path of least resistance. (Note reticence in Kittler to explore machine languages.)
Following Derrida, Delueze and Guattari, Ulmer, and other theorists who dwell on polyglot puns to constitute desiring machines, subjectivities, awareness, I include source code." (Ecrit 12) I want to reclaim this discarded approach by recommending life long programming for humans. Considering and constructing latest CAP proposal also chapter three and the crux of my synthetic thought. It makes sense for concurrent AI research to include texts in their own languages, acknowledging ordinary machine cognition apart from its explicit attempts to generate literary texts for human reading. The rare literary corpus produces such consistency as to warrant scholarly reading, yet every machine assemblage reflects sound operation.
Extended Abstract for Procedural Rhetoric of Diachrony in Synchrony
Thinking through programming is a unique way to philosophize, whereas the default, exemplified in Johnson dismissing Maner for failing to create unique ethical problem solving, means machines have been ignored, what I call intuiting machine embodiment, as an otherness capable of thought besides what happens in humans; I want to reclaim this discarded approach by recommending life long programming as a practice generating working code places toward a philosophy of computing.
Procedural rhetorics of diachrony in synchrony are revealed from digital humanities practices informed by texts and technology studies. Bogost conceptualizes procedural rhetoric from software studies, PHI. OGorman, referencing Lecercle, describes diachrony in synchrony as linguistic phenomena, found in pun and metaphor, as the class of phenomena that interrupt synchronic, contextual understanding of words by invoking diachronic associations
3 0+ 0 (2000) [-6+]mCQK bork-journal 20150202 20150202 0 -17+ journal_2015.html
What are awkward and liminal for textuality and even images fits naturally with digital network phenomena. Critical programming reveals a new philosophical method I call procedural rhetoric of diachrony in synchrony. Where Maner failed engaging ethics enter from logic, epistemology, metaphysics while foregrounding working code over codework and literary textuality, to encompass ranges constituting the as is condition I present as post postmodern network dividual cyborg. My response to RM on availability of internet based learning environments shunting study of high speed process control operations such as those supporting the very computing processes these researchers wish to study. Manipulation of microsegmentation affords virtual LANs. As a funny association epitomizing diachrony within synchrony for OGorman, listening to 1980 Roger Waters hints at PHI date PHI. Identify next deliverable as revised chapter one and completed two while considering main research methodological PHI as procedural rhetoric of diachrony in synchrony explaining everything simultaneously down to real virtualities like public radio and private LAN production such as via digital sound generators as replayers versus true synthesis as in formant synthesis speech synthesis versus other methods, and garage bands. Let the critical fundamental steering concept for critical programming toward a philosophy of computing be diachrony in synchrony, developed from Bogost and OGorman crossing digital humanities with real time ongoing computer programming projects generating real virtualities PHI. Procedural rhetoric of diachrony in synchrony, what does that mean, leads to Bogost in Persuasive Games introducing procedural rhetoric defined as persuasion through rule-based representations and interactions, and literally authoring arguments through processes, and through programming " What is important is that internalization, knowledge of, object ontologies, how things occur and why they are, epitomized by computer programming as well as playing games and other everyday activity, is required to get the point of the argument. That is the rhetoric of procedural rhetoric, and it demonstrates a common pattern of multivariant, creative, meaning making activity yielding productivity similar to schizophrenic forms under earlier intellectual epochs, what Lecercle calls indirection. Philosophy must dive into code in the sense that scholarship in C++, XML, shell script, and so on, accompanies natural human languages, while using them to exuberantly perform their arts and crafts. Their conjunction may be more apparent in scripting languages and different facets of their constitution, in this case literal detail over logical, syntactical structure. Where others characterize the situation in terms of asking what has been lost by humans as machines have evolved, and am making the stronger argument that we passed through a dumbest generation from which we will never return any more than to an ancient technological milieu, for a critical window of possibility open and closed when programming meaningfully crossed the machine and assembly levels, full of high speed repetitions of procedural sequences in the 1980s. I repeat, casting all learning and use in the Internet device era precludes developing deep working knowledge of the encircling technological constituents. If the engineering knowledge learning deficit of the dumbest generation is not irreversible, as RM points out it it seems pretty easy to get into coding in 2015, especially with initiatives such as Hour of Code and other online tutorials. Either retain specificity distinction or admit a shadow can now be traced of the wake of the dumbest modes of technological comportment the reigned between the 1980s and today, noting my earlier projections about foss have happened." (ix; 28-29)
3 0+ 0 (2100) [-6+]mCQK bork-journal 20140126 20140126 0 -4+ journal_2014.html
My proposed framework strikes new ground by being embodied in a free, open source software project, involving substantial code composition and review components along with traditional humanities practices such as critique and ethnographic reflection. Based on themes emanating from critical theory, textuality, media studies and the social construction of technology now common in digital humanities discourses, I examine the history of computers, networking, and software to undergird the machinic and complement the human aspects of the cyborg dividual developed in the previous chapter. This sets the stage for review of the related disciplines of software studies, critical code studies and platform studies, arriving at a critical framework for revisiting cyborg identity deeply intertwining human and machine practices and concerns, taking seriously the technogenesis and synaptogenesis at work co-constituting the present condition. It combines critical theory and scholarship by invention, embodying theory as poiesis "by theorist practitioners (Applen and McDaniel) doing big humanities (Hayles)." (McGann)
3 0+ 0 (2200) [-6+]mCQK bork-journal 20130308 TAPOC_20130308 0 -10+ journal_2013.html
The ontic framework of my proposal resembles the layered models of computer networking, a cross between the OSI and four-layer Internet models " and the five layers Montfort and Bogost delineate in their articulation of platform studies. At the top layer of reception and operation circulate philosophical concerns (Floridi; Landow). The interface level foregrounds social, cultural, industrial, and embodiment concerns (Deleuze and Guatarri; Sterne; Hayles). Emphasizing the form and function level are software studies, game studies, procedural rhetoric, even algorithmic criticism (Bogost; Manovich; McGann; Ramsay). Below these, considering the level of code and programming languages, theorize critical code studies and semiotics of programming (Marion; Tanaka-Ishii). And finally the base level is plumbed by platform studies and media studies (Monfort and Bogost; Kittler; Bogost). It is important to distinguish these layered models from developmental models that suggest a progression, for an update to hermeneutic phenomenology must imbricate all of these layers concurrently. Critical programming embraces all of these levels as matters of concern, taking the position of creative theorist-practitioner, in addition to the position of reactive consumer common to other forms of criticism. Thus Latour is also key to my proposal, providing its ethical framework, along with David Berry and others who focus on various levels of human computer symbiosis, and David Ramsay who invites this style of engagement. Using this framework, I propose repeating the historical/mythical narrative from the origin of electronic computing, the software industry, networking, personal computers to the free Internet, now into closing by proprietary forms once more, with an emphasis on code, coding practices, specific languages, platforms, individual and collective programming styles, arriving at a new digital humanities practice called critical programming." (Galloway; Hafner and Lyon)
3 0+ 0 (2300) [-6+]mCQK bork-journal 20130309 TAPOC_20130309 0 -5+ journal_2013.html
A methodological framework is suggested by merging professional software development processes with familiar practices in literacy criticism, cultural studies, and ethnography to form projects that Hayles calls Big Humanities. My working hypothesis is that critical programming, by attending to the distinctions articulated by the ontic framework, by answering the call of the ethical framework, and by adopting and modulating practices of the methodological framework, may generate new exemplars of Big Humanities scholarship. The ontic layers are treated synchronically while paying heed to the diachronic intermingling of technogenesis and synaptogenesis in order to discern the trajectories of the present human computer symbiosis. The significance of this work includes kick starting a series of innovative projects to counter the stagnation that has been the bane of humanities in recent years and the source of popular dismissals of irrelevance. Moreover, critical programming offers a broad, dynamic approach towards a philosophy of computing.
3 0+ 0 (2400) [-6+]mCQK bork-journal 20130508 20130508 0 -3+ journal_2013.html
Not only does Hayles endorse big humanities projects that encompass software development as a critical operational part, but she also argues that developing new and unexpected forms of human computer intermediation is part of our forward evolution. As scholarship continues to extend further beyond traditional literary subjects into ares foregrounding texts and technology, software studies, critical code studies, and platform studies are likely developments. Motivation for developing CPS includes noticing much digital humanities research and scholarship includes substantial programming components, from McGanns iterative development of the Rossetti Archive to Mark Pollitts recent dissertation.
3 0+ 0 (2500) [-4+]mCQK bork-journal 20130322 20130322 5 -12+ journal_2013.html
I asked Mark about his memories of the developing software for analyzing his data, if he remembered progressing through revisions and whether that work affected the higher level layer, for clearly from a diachronous perspective that revision history tells a story as much as the data he studied.
3 0+ 0 (2600) [-6+]mCQK bork-journal 20150504 20150504a 2 -1+ journal_2015.html
Deprecate Kittler on account of his predominately thirty two and fewer bit computing experiences rather than his association with Heidegger, likewise dispose of Derrida and others for being born too soon as we do the presocratics literacy: this philosophical approach avoids perhaps at its own peril excursions into why we must blacklist Heidegger and forget his work by dismissing on shared imbrication with artifacts of the same particular global technological epoch.
3 0+ 0 (2700) [-5+]mCQK bork-journal 20140408 20140408a 6 -4+ journal_2014.html
Kittler thought suspiciously about programming computing, however he is both dead and speaks from sixteen to thirty two bit computing. Today we have the Matrix movie to speak about horrible outcomes for humans, though optimal for computers, or is this an implicit
This view was anticipated by various theorists, including Foucault, duos Deleuze and Guattari, Hardt and Negri, Boltanski and Chiapello, and others. It presents a metaphysic of technogenesis and synaptogenesis, using Hayles terms as she interprets Malabou, suggesting a synthetic, maker perspective. It provides a robust analytic adequate for networks by crossing multiple domains acknowledging massively parallel distributed nature of cyberspace. It transcends logical models based on literacy, single process threads, brittle requirements of exact reproducibility to remain intact. It provides meaningful conjunction of software engineering practices and philosophy, supporting concurrent, multipurposive, perspectival explanatory models that are insufficient by themselves or contradictory. It will be helpful to compare diachrony in synchrony to contemporary epistemologies and metaphysics expressed by Galloway, Thrift, Bogost, Harmann, Smith, and Janz. Rejoining rhetoric habitual application of understanding diachrony in synchrony through the machine experience as well as the human leads to the hypothesis that habitual programming promotes synaptogenesis. While consideration will be given for meager findings from prior teaching programming research, it seems reasonable to demand a second look at programming now that computers again come equipped with a development environment for immediate, command line programming. Philosophical programmers are the new ontologists, from the platform level of languages back through Burks, Goldstein, von Neumann through Stroustrup, Linux, interface shaping application developers, and unthought plethora multiplying programming style distinctions from the binarism enshrined by Turkle. The detailed example I will give in the presentation is what is known as broken down time characteristic of C, and implicitly C++, and other modern Internet era programming languages. Thread between default philosophies of computing and foss hopes, considering that a golden age may have passed while a new one has just begun. Have to reach virtual machines supplanting print and screen, even active browser, basis of scholarship and philosophical middle work, to get to critical use. Working code places become new site for philosophical production. Numerous digital humanities scholars anticipated foregrounding of involving significant work in programming languages in addition to natural human languages, radically shifting plateaus of discourse from traditional academic sources to free, open source software project repositories, building itself from revisions of custom software written over a lifetime to work with ones thoughts. Arrive at critical programming and tapoc as synthetic disciplines.
3 0+ 0 (1700) [-6+]mCQK bork-journal 20150205 20150205 4 -21+ journal_2015.html
The highly engineered Memex Vannevar Bush proposed in 1946 is often invoked to index human fantasies about future human computer symbiosis at the height of the electromechnical, predigital First World society of post WWII America. "/span>. Synaptogenesis is the corresponding term for changes in human brains over individual life spans in response to environmental conditions, singling out Catherine Malabou for realizing the deep entanglement of capitalism and current neurological theories. Importantly, the temporal order of magnitude at which changes are noted occur within human lives, especially during infancy through adolescence, versus far longer time frames spanning many generations typically associated with evolutionary theories. Guattari prefigures in his presentation of machinic heterogenesis to treat complex machines prior to technics by recognizing the extreme human social and cultural span bestiary accompanying any artifact that is part of any technological system, as he gives with the key and lock better understood through integration of functions, and makes the nice twist of assimilating machine into living or living into machine. Hayles explains that technogenetic spiral includes anticipatory models that work like technology, such as mysterious nature of electricity, now computational metaphors, a flip side of skeumorphs. Assumptions replicate through temes, techincal objects, forming conventions of software, particularly Manovich. Technogenesis is the new theory of evolution, its ontology that of Simondon technical objects for which concretization is the motive force for change. Synatpogenetic trends like hyper attention seem inevitable, although Hayles cleverly points out the example of Catherine Malabou pondering the coextensiveness of capitalism and neurology to offer a political response to determinism, what I call default philosophies. The diachrony in synchrony model well expresses concretization by sustaining invisible forms like the deep structure of electronic machinery sustaining what was once held by printed visual media. New concept of layers of codes and languages. Malabou makes the ultimate argument for plasticity versus flexibility as preferred comportment having potential for resistance, not just passive accommodation, which Hayles turns into a call for Big Humanities projects. Importantly, her model views database and narrative as symbionts, not combatants. Like this decades long engagement between philosophy and computing, sundry interdisciplinary collaborations suggest themselves.
Bruce Janz is my key philosopher for articulating software engineering philosophical places spaces. His studies from the African continent and outer space prepare us for attempting to intuit machine embodiment, take on the complexion of cyberspace. Contemporary metaphysics and epistemologies by Bogost, Smith, and retrospectively a litany of new ontologists among philosophical programmers as those who built current technological milieu in which we live. Machine experience toward a philosophy of computing through procedural rhetoric from study and shared experience as engineers with philosophical programmers, making run time ontologies such that cyberspace is that which exists in such networks. My goal is to also transcend default philosophies of computing, including the binarism Turkle imposes on types of programming styles. Beyond hard mastery and briocolage are nuanced, beyond the default as I am concerned multitude possible failure points, after considering there are at least ten for four wires, precludes study of electronic circuits so we never get to digital humanities following OGorman picking up soldering irons: this is to me a philosophical problem." (89) Its title As We May Think indicates contours of what humans believed their thinking constitutes through describing its perfected condition conjoined to the epitome of office technology: associative memory, link trail blazing, networked sharing and collaboration. In her 2012 update to Bush, How We Think, the evolution of technology and human brains are tightly connected. Hayles uses the term technogenesis to describe the mechanism by which the inhuman side of things evolves, leaning on Gilbert Simondons theory of technical change in which innovations tend toward concretization, integrating conflicting requirements into multipurposive solutions that enfold them together into intrinsic and necessary circular causalities
3 0+ 0 (1800) [-6+]mCQK bork-journal 20150130 20150130 1 -23+ journal_2015.html
Procedural Rhetoric of Diachrony in Synchrony.
-revealed from current digital humanities practices informed by texts and technology studies.
-Bogost procedural rhetoric from software studies defined as persuasion through rule based representations and interactions, looks beyond programming and epistemic games to developing procedural literacy and awareness of biased perspectives of how things work through direct engagement.
-OGorman referencing Lecercle.
-include source code where Lecercle, Ulmer, OGorman and others emphasize polyglot puns and images.
-Montfort and Bogost layers.
-network layer model.
-code space.
-anticipated by various theorists: Foucault, Deleuze and Guattari, Hardt and Negri, see literature review.
-technogenesis and synaptogenesis: Hayles, Malabou.
-synthetic, maker perspective.
-discipline of critical programming.
-robust analytic adequate for networks.
-transcends logical models based on literacy, single process threads.
-provides meaningful conjunction of software engineering practices and philosophy.
-supports concurrent, multipurposive, perspectival explanatory models that are insufficient by themselves or contradictory.
-compare to other contemporary epistemologies and metaphysics: Bogost, Harmann, Smith, Galloway, Thrift, Janz.
-habitual programming promotes synaptogenesis; contrast to meager findings from teaching programming research.
-philosophical programmers as the new ontologists.
-broken-down time example.
-working code places.
-arrive at critical programming and tapoc as synthetic disciplines.
GO THROUGH LITERATURE REVIEW.
3 0+ 0 (1900) [-6+]mCQK bork-journal 20150201 20150201 1 -17+ journal_2015.html
Imagine the proposal iterates between timestamp other file and journal objects PHI is where new philosophies of computing begin with procedural rhetorics of diachronies in synchronies playing on textual linguistic and now computable as real virtualities code variations PHI becomes the proposal to articulate by about twenty sentences. Bauerlein criticizes individuals while I technological environments as do contemporary digital humanities studies. Thinking through programming is a unique way to philosophize whereas the default exemplified in Johnson dismissing Maner for failing to create unique ethical problem solving means machines have been ignored, what I call intuiting machine embodiment. " To me the term aptly describes an epistemology and metaphysics resembling the network layer model that transcends single threaded low speed logical methods learned through literacy, affording a robust analytic adequate for networks. I point to how Montfort and Bogost articulate a model of synchronic analytical layers, descending from the literary to the formal, then software, and finally platform, phenomenological basis (Racing the Beam ). At every layer simultaneously diachronic states of affairs transpire as a result of and affecting the production of reality. This concept is well alluded to by the OSI network layer model from early Internet computer science, portraying its being as concurrent layers built from applications, protocols, down to electronic circuits. The same instant can be explained at various orders of temporal and physical magnitude as the constituents of the present as it happens in cyberspace, each necessarily occurring through time by their abiding protocol or electrical path of least resistance. (Note reticence in Kittler to explore machine languages.)
Following Derrida, Delueze and Guattari, Ulmer, and other theorists who dwell on polyglot puns to constitute desiring machines, subjectivities, awareness, I include source code." (Ecrit 12) I want to reclaim this discarded approach by recommending life long programming for humans. Considering and constructing latest CAP proposal also chapter three and the crux of my synthetic thought. It makes sense for concurrent AI research to include texts in their own languages, acknowledging ordinary machine cognition apart from its explicit attempts to generate literary texts for human reading. The rare literary corpus produces such consistency as to warrant scholarly reading, yet every machine assemblage reflects sound operation.
Extended Abstract for Procedural Rhetoric of Diachrony in Synchrony
Thinking through programming is a unique way to philosophize, whereas the default, exemplified in Johnson dismissing Maner for failing to create unique ethical problem solving, means machines have been ignored, what I call intuiting machine embodiment, as an otherness capable of thought besides what happens in humans; I want to reclaim this discarded approach by recommending life long programming as a practice generating working code places toward a philosophy of computing.
Procedural rhetorics of diachrony in synchrony are revealed from digital humanities practices informed by texts and technology studies. Bogost conceptualizes procedural rhetoric from software studies, PHI. OGorman, referencing Lecercle, describes diachrony in synchrony as linguistic phenomena, found in pun and metaphor, as the class of phenomena that interrupt synchronic, contextual understanding of words by invoking diachronic associations
3 0+ 0 (2000) [-6+]mCQK bork-journal 20150202 20150202 0 -17+ journal_2015.html
What are awkward and liminal for textuality and even images fits naturally with digital network phenomena. Critical programming reveals a new philosophical method I call procedural rhetoric of diachrony in synchrony. Where Maner failed engaging ethics enter from logic, epistemology, metaphysics while foregrounding working code over codework and literary textuality, to encompass ranges constituting the as is condition I present as post postmodern network dividual cyborg. My response to RM on availability of internet based learning environments shunting study of high speed process control operations such as those supporting the very computing processes these researchers wish to study. Manipulation of microsegmentation affords virtual LANs. As a funny association epitomizing diachrony within synchrony for OGorman, listening to 1980 Roger Waters hints at PHI date PHI. Identify next deliverable as revised chapter one and completed two while considering main research methodological PHI as procedural rhetoric of diachrony in synchrony explaining everything simultaneously down to real virtualities like public radio and private LAN production such as via digital sound generators as replayers versus true synthesis as in formant synthesis speech synthesis versus other methods, and garage bands. Let the critical fundamental steering concept for critical programming toward a philosophy of computing be diachrony in synchrony, developed from Bogost and OGorman crossing digital humanities with real time ongoing computer programming projects generating real virtualities PHI. Procedural rhetoric of diachrony in synchrony, what does that mean, leads to Bogost in Persuasive Games introducing procedural rhetoric defined as persuasion through rule-based representations and interactions, and literally authoring arguments through processes, and through programming " What is important is that internalization, knowledge of, object ontologies, how things occur and why they are, epitomized by computer programming as well as playing games and other everyday activity, is required to get the point of the argument. That is the rhetoric of procedural rhetoric, and it demonstrates a common pattern of multivariant, creative, meaning making activity yielding productivity similar to schizophrenic forms under earlier intellectual epochs, what Lecercle calls indirection. Philosophy must dive into code in the sense that scholarship in C++, XML, shell script, and so on, accompanies natural human languages, while using them to exuberantly perform their arts and crafts. Their conjunction may be more apparent in scripting languages and different facets of their constitution, in this case literal detail over logical, syntactical structure. Where others characterize the situation in terms of asking what has been lost by humans as machines have evolved, and am making the stronger argument that we passed through a dumbest generation from which we will never return any more than to an ancient technological milieu, for a critical window of possibility open and closed when programming meaningfully crossed the machine and assembly levels, full of high speed repetitions of procedural sequences in the 1980s. I repeat, casting all learning and use in the Internet device era precludes developing deep working knowledge of the encircling technological constituents. If the engineering knowledge learning deficit of the dumbest generation is not irreversible, as RM points out it it seems pretty easy to get into coding in 2015, especially with initiatives such as Hour of Code and other online tutorials. Either retain specificity distinction or admit a shadow can now be traced of the wake of the dumbest modes of technological comportment the reigned between the 1980s and today, noting my earlier projections about foss have happened." (ix; 28-29)
3 0+ 0 (2100) [-6+]mCQK bork-journal 20140126 20140126 0 -4+ journal_2014.html
My proposed framework strikes new ground by being embodied in a free, open source software project, involving substantial code composition and review components along with traditional humanities practices such as critique and ethnographic reflection. Based on themes emanating from critical theory, textuality, media studies and the social construction of technology now common in digital humanities discourses, I examine the history of computers, networking, and software to undergird the machinic and complement the human aspects of the cyborg dividual developed in the previous chapter. This sets the stage for review of the related disciplines of software studies, critical code studies and platform studies, arriving at a critical framework for revisiting cyborg identity deeply intertwining human and machine practices and concerns, taking seriously the technogenesis and synaptogenesis at work co-constituting the present condition. It combines critical theory and scholarship by invention, embodying theory as poiesis "by theorist practitioners (Applen and McDaniel) doing big humanities (Hayles)." (McGann)
3 0+ 0 (2200) [-6+]mCQK bork-journal 20130308 TAPOC_20130308 0 -10+ journal_2013.html
The ontic framework of my proposal resembles the layered models of computer networking, a cross between the OSI and four-layer Internet models " and the five layers Montfort and Bogost delineate in their articulation of platform studies. At the top layer of reception and operation circulate philosophical concerns (Floridi; Landow). The interface level foregrounds social, cultural, industrial, and embodiment concerns (Deleuze and Guatarri; Sterne; Hayles). Emphasizing the form and function level are software studies, game studies, procedural rhetoric, even algorithmic criticism (Bogost; Manovich; McGann; Ramsay). Below these, considering the level of code and programming languages, theorize critical code studies and semiotics of programming (Marion; Tanaka-Ishii). And finally the base level is plumbed by platform studies and media studies (Monfort and Bogost; Kittler; Bogost). It is important to distinguish these layered models from developmental models that suggest a progression, for an update to hermeneutic phenomenology must imbricate all of these layers concurrently. Critical programming embraces all of these levels as matters of concern, taking the position of creative theorist-practitioner, in addition to the position of reactive consumer common to other forms of criticism. Thus Latour is also key to my proposal, providing its ethical framework, along with David Berry and others who focus on various levels of human computer symbiosis, and David Ramsay who invites this style of engagement. Using this framework, I propose repeating the historical/mythical narrative from the origin of electronic computing, the software industry, networking, personal computers to the free Internet, now into closing by proprietary forms once more, with an emphasis on code, coding practices, specific languages, platforms, individual and collective programming styles, arriving at a new digital humanities practice called critical programming." (Galloway; Hafner and Lyon)
3 0+ 0 (2300) [-6+]mCQK bork-journal 20130309 TAPOC_20130309 0 -5+ journal_2013.html
A methodological framework is suggested by merging professional software development processes with familiar practices in literacy criticism, cultural studies, and ethnography to form projects that Hayles calls Big Humanities. My working hypothesis is that critical programming, by attending to the distinctions articulated by the ontic framework, by answering the call of the ethical framework, and by adopting and modulating practices of the methodological framework, may generate new exemplars of Big Humanities scholarship. The ontic layers are treated synchronically while paying heed to the diachronic intermingling of technogenesis and synaptogenesis in order to discern the trajectories of the present human computer symbiosis. The significance of this work includes kick starting a series of innovative projects to counter the stagnation that has been the bane of humanities in recent years and the source of popular dismissals of irrelevance. Moreover, critical programming offers a broad, dynamic approach towards a philosophy of computing.
3 0+ 0 (2400) [-6+]mCQK bork-journal 20130508 20130508 0 -3+ journal_2013.html
Not only does Hayles endorse big humanities projects that encompass software development as a critical operational part, but she also argues that developing new and unexpected forms of human computer intermediation is part of our forward evolution. As scholarship continues to extend further beyond traditional literary subjects into ares foregrounding texts and technology, software studies, critical code studies, and platform studies are likely developments. Motivation for developing CPS includes noticing much digital humanities research and scholarship includes substantial programming components, from McGanns iterative development of the Rossetti Archive to Mark Pollitts recent dissertation.
3 0+ 0 (2500) [-4+]mCQK bork-journal 20130322 20130322 5 -12+ journal_2013.html
I asked Mark about his memories of the developing software for analyzing his data, if he remembered progressing through revisions and whether that work affected the higher level layer, for clearly from a diachronous perspective that revision history tells a story as much as the data he studied.
3 0+ 0 (2600) [-6+]mCQK bork-journal 20150504 20150504a 2 -1+ journal_2015.html
Deprecate Kittler on account of his predominately thirty two and fewer bit computing experiences rather than his association with Heidegger, likewise dispose of Derrida and others for being born too soon as we do the presocratics literacy: this philosophical approach avoids perhaps at its own peril excursions into why we must blacklist Heidegger and forget his work by dismissing on shared imbrication with artifacts of the same particular global technological epoch.
3 0+ 0 (2700) [-5+]mCQK bork-journal 20140408 20140408a 6 -4+ journal_2014.html
Kittler thought suspiciously about programming computing, however he is both dead and speaks from sixteen to thirty two bit computing. Today we have the Matrix movie to speak about horrible outcomes for humans, though optimal for computers, or is this an implicit
Characterizations of computing, programming, technology: Brooks, Castells, Deleuze, Uffenbeck.
Benefits of programming, often comparing it to literacy: Bauerlein, Campbell-Kelly.
Shaping thinking in reductive fashion: Black on punch cards.
More sophisticated shaping thinking: Weinberg, Brown and Duguid, Hafner and Lyon, Bogost.
Network effects: Campbell-Kelly.
Democratic rationalization, social revolution: Crane, Feenberg, Harper.
Feminist: Haraway.
Miscellaneous philosophers of technology: Foucault, Heidegger, Heilbroner, Ihde, McLuhan, Mitcham, Norman, Scharff and Dusek, Seneca.
Then the major theorists:
Weizenbaum presents major issues
Heim electric language;
Floridi critical constructivism;
Turkle evocative objects, robotic moment, realtechnik;
Edwards closed world;
Golumbia cultural logic of computation;
Galloway protocal;
Hayles embodied cognition, technological unconscious, hypertext, MSA;
Rushkoff importance of programming.
3 1 7 (200) [-6+]mCQK galloway-protocol (244) 20130209 0 -5+ progress/2013/01/notes_for_galloway-protocol.html
No longer threat of Microsoft monopoly but multiplicities of proprietary protocols riding atop IP replacing core TCP RFCs. " (244) It is very likely if not inevitable that the core Internet protocols, today largely safe from commercial and state power, will be replaced by some type of proprietary system. (The fact that Microsoft has not yet replaced TCP/IP with a commercial product of its own is one of the miracles of computer history. Chances are this will happen very soon.)
(245) It is a physical logic that delivers two things in parallel: the solution to a problem, plus the background rationale for why that solution has been selected as the best. Like liberalism, or democracy, or capitalism, protocol is a successful technology precisely because its participants are evangelists, not servants." (telephones, tablets, and so on) Precisely this exists today with mobile device applications that utilize proprietary, likely encrypted protocols atop IP, which can be tested by watching wireless network traffic via tcpdump and etherape in the vicinity of mobile devices
3 1 7 (300) [-6+]mCQK deleuze-postscript_on_the_societies_of_control (6) 20130914d 0 -19+ progress/2012/08/notes_for_deleuze-postscript_on_the_societies_of_control.html
Deleuze puts it beautifully in stating computers emblematic of societies of control, which are continuous, short-term in contrast to discontinuous, long duration discipline, with jamming, piracy, and viruses as its dangers. "Types of machines are easily matched with each type of society . . . the societies of control operate with machines of a third type,
Foucault population thinking.
(214) In the [concentration] camps human beings were reduced to something less than the full status which we typically want to accord to each one of us; and what Foucault calls population thinking, which certainly is associated with a widespread reliance on computational techniques, was dramatically in evidence in German practice.
(214) In the early modern era, when lords really did have fiefdoms, what licenses the proclamation that communication was centralized and not networked ?" (213)
3 1 7 (8000) [-4+]mCQK golumbia-cultural_logic_of_computation (217) 20130819m 0 -16+ progress/2013/08/notes_for_golumbia-cultural_logic_of_computation.html
Hobbes Leviathan foreshadows computationalism.
3 1 7 (8100) [-4+]mCQK golumbia-cultural_logic_of_computation (221) 20130819n 0 -1+ progress/2013/08/notes_for_golumbia-cultural_logic_of_computation.html
Method is ultimately to described ideological phenomena.
3 1 7 (8200) [-4+]mCQK golumbia-cultural_logic_of_computation (224) 20130820a 0 -11+ progress/2013/08/notes_for_golumbia-cultural_logic_of_computation.html
Environments full of clearly indicated goals limits to play and development of self regulation, which affects participation in democratic society.
3 1 7 (8300) [-4+]mCQK golumbia-cultural_logic_of_computation (155) 20130818a 0 -6+ progress/2013/08/notes_for_golumbia-cultural_logic_of_computation.html
Classic critical position leaves open whether direct participation is a legitimate role of the scholar, whether in form of managing or engineering.
3 1 7 (8400) [-4+]mCQK golumbia-cultural_logic_of_computation (203-204) 20130819f 0 -5+ progress/2013/08/notes_for_golumbia-cultural_logic_of_computation.html
Questionable position of holding back new media studies to clarify position transcends conservative stereotypes.
3 1 7 (8500) [-6+]mCQK bork-journal 20150819 20150819 0 -6+ journal_2015.html
Among philosophical perspectives of non programmers only learning to code Galloway exceeds Golumbia in subtlety of purview, demonstrating how one barely familiar with code may interpret the living world of PHI by announcing chivalry of objects demonstrates knowledge of OOP not evident in Golumbia more of a sequential structured programmign style PHI. For example, Golumbia identifies weaknesses in XML without proposing alternative, whereas protocol theorists accept unit operation model of hyperlink as part of definition of cyberspace PHI rather than reducing them in further abstraction of other layers in PHI. No surprise last year I was thinking with recent reading Golumbia. Weizenbaum provides tips for working code, such as what kind never to write. Is Weizenbaum personally breaking own ethic with ELIZA? When Galloway recommends reading code by decoding its structure of control as if film or novel it is odd that he does not suggest reading code as a programmer would be working it, working with it, working code.
3 1 7 (8600) [-6+]mCQK harper-smash_the_strata (129) 20130924h 0 -7+ progress/2012/08/notes_for_harper-smash_the_strata.html
Itinerant rhizome community membership ties to social media, ease of assembly, connecting, disconnecting, recycling, multitasking distractedness. "In opposition to the state, the smooth, nomadic space of the political assemblage can be conceived as community. Compared to the state, a community is a rhizome. . . . So long as it remains molecular, rhizomatic, it remains smooth; in a sense it remains smooth entirely because community membership is itinerant rather than arbitrary. The multiplicity of possible connections, networks and interfaces is precisely what makes such models of organization emancipatory." (129) Interesting to differentiate itinerant and arbitrary, invoking Arendt.
3 1 7 (8700) [-6+]mCQK galloway-protocol (xii) 20130921 0 -10+ progress/2013/01/notes_for_galloway-protocol.html
Isomorphism of technological and social/political. "Throughout the discussions on power, control, and decentralization, Protocol consistently makes a case for a material understanding of technology. . . . In short, the technical specs matter, ontologically and politically. . . . Code is a set of procedures, actions, and practices, designed in particular ways to achieve particular ends in particular contexts. Code = praxis." (xii) Therefore material understanding of technology.
3 1 7 (8800) [-6+]mCQK galloway-protocol (120-121) 20131031e 0 -11+ progress/2013/01/notes_for_galloway-protocol.html
Most literature on protocol relation to bureaucracy and law, such as Lessig. "To date, most of the literature relating to my topic has covered protocol through these issues of law, governance, corporate control, and so on. Lawrence Lessig is an important thinker in this capacity. . . . Bureaucracy is protocol atrophied, while propriety is protocol reified.
(121) The argument in this book is that bureaucratic and institutional forces (as well as proprietary interests) are together the inverse of protocols control logic. . . . Protocol gains its authority from another place, from technology itself and how people program it." (120-121) Galloway emphasis on technology and use.
3 1 7 (8900) [-6+]mCQK galloway-protocol (xiii) 20130921b 0 -10+ progress/2013/01/notes_for_galloway-protocol.html
Code always process based. "The first point is that networks are not metaphors. . . . Networks are not tropes for notions of interconnection. They are material technologies, sites of variable practices, actions, and movements. . . . A code, in the sense that Protocol defines it, is process-based: It is parsed, compiled, procedural or object-oriented, and defined by ontology standards." (xiii)
3 1 7 (9000) [-6+]mCQK galloway-protocol (xv) 20130921d 5 -15+ progress/2013/01/notes_for_galloway-protocol.html
Answers question how does the Internet work with analysis of TCP/IP and DNS. " It asks how a particular type of network functions the information networks that undergird the Internet. It shows how a network is not simply a free-for-all of information out there, nor is it a dystopia of databanks owned by corporations. It is a set of technical procedures for defining, managing, modulating, and distributing information throughout a flexible yet robust delivery infrastructure. . . . It is constituted by a bi-level logic that Protocol explains. . . . Understanding these two dynamics in the Internet means understanding the essential ambivalence in the way that power functions in control societies. . . . To grasp protocol is to grasp the technical and the political dynamics of TCP/IP and DNS at the same time." (xv)
3 1 7 (9100) [-6+]mCQK galloway-protocol (xvi) 20130921e 0 -2+ progress/2013/01/notes_for_galloway-protocol.html
Political character of protocol displayed in moment of disconnectivity as others emphasize glitches, blips and breakdowns. "The moment of disconnectivity is the moment when protocol most forcefully displays its political character.
(xvi) Again, the mere technical details, such as RFCs, suddenly become the grounds for contesting the way in which control takes shape in the materiality of networks." (xvi)
3 1 7 (9200) [-7+]mCQK galloway-protocol (10) 20131031a 0 -4+ progress/2013/01/notes_for_galloway-protocol.html
Distributed network is native landscape of protocol, whose content is another protocol, thus important Deleuzean diagram. (10) To steal an insight from Marshall McLuhan, the content of every new protocol is always another protocol.
(11) Protocols native landscape is the distributed network. Following Deleuze, I consider the distributed network to be an important diagram for our current social formation. Deleuze defines the diagram as a map, a cartography that is coextensive with the whole social field.
3 1 7 (9300) [-6+]mCQK galloway-protocol (xviii) 20130921f 0 -4+ progress/2013/01/notes_for_galloway-protocol.html
Foucault political technologies and Deleuze diagram. "Protocol considers networks through a diagram, a term borrowed from Gilles Deleuze. Protocol considers first a network as a set of nodes and edges, dots and lines.
(xix) If we are indeed living in a post-industrial, postmodern, postdemocratic society, how does one account for political agency in situations in which agency appears to be either caught in networks of power or distributed across multiple agencies?
(xix) By looking closely and carefully at the technical specifications of TCP/IP and DNS, Protocol suggests that power relations are in the process of being transformed in a way that is resonant with the flexibility and constraints of information technology." (xviii)
3 1 7 (9400) [-6+]mCQK galloway-protocol (xxi-xxii) 20130921g 0 -6+ progress/2013/01/notes_for_galloway-protocol.html
Use of ontology standards outside philosophy as foundation of portability and layering in networks materialized in protocols. "Ontology standards is a strange name for agreed-upon code conventions, but in some circles it is regularly used to signify just that. Newer, more flexible markup languages such as XML have made it possible for researchers (be they biologists or engineers) to come up with a coding schema tailored to their discipline. . . . If layering is dependent upon portability, then portability is in turn enabled by the existence of ontology standards." (xxi-xxii)
3 1 7 (9500) [-6+]mCQK galloway-protocol (5) 20130921i 0 -7+ progress/2013/01/notes_for_galloway-protocol.html
Distributed agency of Baran packet-switching network in surrounding equipment. "[Paul] Barans network was based on on technology called packet-switching that allows messages to break themselves apart into small fragments. Each fragment, or packet, is able to find its own way to its destination. Once there, the packets reassemble to create the original message.
(6) In the early 1980s, the suite of protocols known as TCP/IP (Transmission Control Protocol/Internet Protocol) was also developed and included with most UNIX servers.
(6) At the core of networked computing is the concept of protocol. A computer protocol is a set of recommendations and rules that outline specific technical standards. The protocols that govern much of the Internet are contained in what are called RFC (Request For Comments) documents." (5) The packets themselves do not find their own ways.
3 1 7 (9600) [-6+]mCQK brown_duguid-social_life_of_information (xx-xxi) 20120819 0 -2+ progress/2012/03/notes_for_brown_duguid-social_life_of_information.html
Importance of nontechnological innovations like using publicly moderated request for comments RFCs to democratize technological change, such as the development of communications protocols, although RFCs in particular were electronically disseminated. "The printing revolution, in short, involved social organization, legal innovation, and the institutional creativity to develop what appears now as the simple book and the self-evident information it contains. Contrary to assumptions that all it takes is technological innovation, a digital revolution too will need similar nontechnological innovations to fulfill its potential." (xx-xxi)
3 1 7 (9700) [-6+]mCQK galloway-protocol (6) 20130921j 0 -9+ progress/2013/01/notes_for_galloway-protocol.html
Protocols are core of networked computing governed by organizations like IETF and W3C who freely publish them as RFCs and other document types. "The RFCs are published by the Internet Engineering Task Force (IETF). They are freely available and used predominantly by engineers who wish to build hardware or software that meets common specifications. . . . Other protocols are developed and maintained by other organizations. For example, many of the protocols used on the World Wide Web (a network within the Internet) are governed by the Word Wide Web Consortium (W3C).
(7) Etymologically it refers to a fly-leaf glued to the beginning of a document, but in familiar usage the word came to mean any introductory paper summarizing the key points of a diplomatic agreement or treaty.
(7) What was once a question of consideration and sense is now a question of logic and physics." (6)
3 1 7 (9800) [-6+]mCQK galloway-protocol (8) 20130921k 0 -4+ progress/2013/01/notes_for_galloway-protocol.html
Key theme of book is contrast between distributing TCP/IP and hierarchizing DNS. "Emblematic of the second machinic technology, the one that focuses control into rigidly defined hierarchies, is the DNS.
(9) All DNS information is controlled in a hierarchical, inverted-tree structure. Ironically, then, nearly all Web traffic must submit to a hierarchical structure (DNS) to gain access to the anarchic and radically horizontal structure of the Internet.
(9) Because the DNS system is structured like an inverted tree, each branch of the tree holds absolute control over everything else." (8)
3 1 7 (9900) [-6+]mCQK galloway-protocol (11) 20130921l 0 -4+ progress/2013/01/notes_for_galloway-protocol.html
Distributed network the Deleuze diagram of current social formation. "A distributed network differs from other networks such as centralized and decentralized networks in the arrangement of its internal structure.
(11-12) The network contains nothing but [quoting Hall Internet Core Protocols] intelligent end-point systems that are self-deterministic, allowing each end-point system to communicate with any host it chooses. Like the rhizome, each node in a distributed network may establish direct communication with another node, without having to appeal to a hierarchical intermediary. Yet in order to initiate communication, the two nodes must speak the same language." (11)
3 1 7 (10000) [-4+]mCQK galloway-protocol (16) 20130921n 0 -3+ progress/2013/01/notes_for_galloway-protocol.html
Danger of protocol like danger of technology for Heidegger, pharmakon for Plato/Derrida; efforts must be guided through protocol, not against it (Licklider symbiosis, Heim component, Hayles coevolution).
3 1 7 (10100) [-6+]mCQK galloway-protocol (17-18) 20130921o 0 -3+ progress/2013/01/notes_for_galloway-protocol.html
Focus on bodies and material stratum of computer technology rather than minds and epistemology. "I draw a critical distinction between this body of work [Minsky, Dennett, Searle, Dreyfus], which is concerned largely with epistemological and cognitive science, and the critical media theory that inspires this book. Where they are concerned with minds and questions epistemological, I am largely concerned with bodies and the material stratum of computer technology.
(18) While my ultimate indebtedness to many of these authors will be obvious, it is not my goal to examine the social or culturo-historical characteristics of informatization, artificial intelligence, or virtual anything, but rather to study computers as Andre Bazin studied film or Roland Barthes studied the striptease: to look at a material technology and analyze its specific formal functions and dysfunctions." (17-18) Like Bazin, Barthes and Hayles analyzing material specific formal functions and dysfunctions.
3 1 7 (10200) [-6+]mCQK galloway-protocol (20) 20130921q 0 -1+ progress/2013/01/notes_for_galloway-protocol.html
Reading code as a natural language, but likely employing close, hyper, and machine techniques. "Indeed, I attempt to read the never-ending stream of computer code as one reads any text (the former having yet to achieve recognition as a natural language), decoding its structure of control as one would a film or novel." (20)
3 1 7 (10300) [-4+]mCQK galloway-protocol (20) 20130921r 0 -4+ progress/2013/01/notes_for_galloway-protocol.html
Broad periods of sovereign, disciplinary, and control societies with characteristic political and technological forms.
3 1 7 (10400) [-6+]mCQK galloway-protocol (26) 20130921s 0 -8+ progress/2013/01/notes_for_galloway-protocol.html
Protocol the technical theory of Hardt and Negri Empire as social theory. "The computer protocol is thus in lockstep with Hardt and Negris analysis of Empires logics, particularly the third mode of imperial command, the managerial economy of command. . . . In fact, one might go so far so to say that Empire is the social theory and protocol the technical.
(26) Further to these many theoretical interventions Foucault, Deleuze, Kittler, Mandel, Castells, Jameson, Hardt and Negri are many dates that roughly confirm my periodization.
(27) At best, periodization theory is an analytical mindgame, yet one that breathes life into the structural analyses offered to explain certain tectonic shifts in the foundations of social and political life. My book implicitly participates in this game, mapping out certain details of the third, control society phase, specifically the diagram of the distributed network, the technology of the computer, and the management style of protocol." (26)
3 1 7 (10500) [-7+]mCQK galloway-protocol (74) 20130923d 0 -9+ progress/2013/01/notes_for_galloway-protocol.html
Protocol as universal description language of objects, chivalry of objects. (74) Protocol is a universal description language for objects.
(74-75)
Bogost unit operations, OOP, with Applen and McDaniel qualification; game criticism, unit university.
Bogost procedural rhetoric, persuasive and serious games (Golumbia software studies), simulation fever, procedural literacy.
Berry general comments on philosophy of software (most Berry moved to Code Studies).
Kittler there is no software, Chun programmed visions (On Sourcery moved to Codes Studies), complicating Feenberg." (Behind the Blip and Software Studies) 0in; line-height: 100%">Manovich, Frasca, Gee, Fuller
3 1 8 (200) [-6+]mCQK bork-journal 20150709 20150709 0 -9+ journal_2015.html
I am wagering that it is important that we did not program did not philosophize by working code, in part because of minor fud from Kittler as a pessimist philosopher of programming, and now ought to, creating new phenomenological fields containing C++ along with conversational English. What I want to say using popular books about history of computing lacking nuance of research incorporating theoretical framework articulated above like Abbate is that we need new narratives for the same technological historical period. Need, as if this were an introductory lecture course, to include Burks, Goldstein, Von Neumann here though not showing up in literature review table for 3.2.3 which is where we are now in the old schema embedded in the tapoc software versus word processor reference version being typed by human, even if as less sophisticated example on par instead with the philosophical programmers, which we discover when we realize we have to first visit classics of the philosophy of programming from early users of 1940s, for instance. What differentiates the legitimacy of ancient authors is they were there at the beginning making ancestors of machines used now, many of whose affordances, quirks, and perhaps evils remain immanent arising now and then making waves in the ether of thirty two and sixty four bit cyberspace for the duration of our technological era say our machine human souls PHI, in contrast to Bill Gates, who must be excused for being shrouded in philosophies of computing privileging wealth creation to free use by everyone as a gift like foss. Yet there are foss hopes, too, and we must be circumspect with those writers as well, and our own fantasies of what can be done working code that I offer as critical programming, for this is the danger lurking in the saving power in the danger, which Chun derisively calls programmed visions. Implicit excitement in drab final lectures by Kittler if you think at the technical competency still inherent in his stumbling discourse. The methodology calls for including classical texts like this enduring declaration of how computers work.
3 1 8 (300) [-6+]mCQK bork-journal 20150603 20150603 0 -13+ journal_2015.html
Can software be innocent? I dont think this question is nonsensical for it forces us to look at our PHI. The question can software be innocent could involve considering whether it inherits the evils of its operating system, or and reflect a revision history back to concentration camps in its code. Even with human elements mostly bracketed out at electronic circuit levels, incomprehensible frequencies, except that humans made them, at least in paradigmatic late twentieth century curving thirty two bit Unix time of von Neumann architecture internetworked personal computers. Do we resign ourselves like Kittler to think that the Big Other now immanent in software has gone on to begin its own nameless high commands? Is talking about code itself reflecting entrenched biases of privileged, gendered colonial discourses? There are many ways it could be answered and asked, and we need an adequate theoretical framework and methodology. It is a question for programming philosophers. McGann for methodology, and Applen and McDaniel, Hayles, etc. -> [arrow] procedural rhetoric of diachrony in synchrony. And doesnt this affect how we philosophize freedom zero? Delta working code spaces or space PHI. Next step is Janz now beginning final chapter.
3 1 8 (400) [-4+]mCQK berry-philosophy_of_software (4-5) 20130910b 0 -1+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Interesting new forms of scholarship around software studies, cultural analytics, and critical code studies, comparable to list Hayles makes in How We Think: platform studies, media archeology, software engines, soft authorship, genre analysis of software, graphical user interfaces, digital code literacy, emporality and code, sociology and political economy of the free software and open source movement.
3 1 8 (500) [-4+]mCQK berry-philosophy_of_software (6-9) 20130910c 0 -6+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Understanding software avidities affects human freedom, so therefore it is worthwhile to study, imbricating classic Socratic questioning for tracing agentic paths constituting human experience.
3 1 8 (600) [-4+]mCQK berry-philosophy_of_software (10-11) 20131025a 4 -1+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Understand how being-in-the-world is made possible through application of computational techniques manifested in processes touched by software and code.
3 1 8 (700) [-6+]mCQK berry-philosophy_of_software (17) 20131025f 4 -4+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Most code experience is visual rather than haptic. " However, much of the code that we experience in our daily lives is presented through a visual interface that tends to be graphical and geometric, and where haptic, through touch, currently responds through rather static physical interfaces but dynamic visual ones, or example iPads, touch screen phones, etc.
Code as cultural technique affecting culture (Kittler, Kramer, Manovich).
(17) Computer code is not solely technical though, and must be understood with respect to both the cultures of software that produce it, but also the cultures of consumption that surround it. ." (17)
3 1 8 (800) [-6+]mCQK berry-philosophy_of_software (24-26) 20131025i 4 -6+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Computational literacy that Manovich is milking also hinted as new academic goal " (24-26) . This is a distinction that Moretti (2007) referred to as distant versus close readings of texts. . . . Computational approaches facilitate disciplinary hybridity that leads to a post-disciplinary university that can be deeply unsettling to traditional academic knowledge." (Whithaus)
3 1 8 (900) [-6+]mCQK wardripfruin_and_montfort-new_media_reader (7) 20131019a 0 -8+ progress/2011/01/notes_for_wardripfruin_and_montfort-new_media_reader.html
Murray. "But it was not until the 1980s that practice became self-conscious enough to allow for a serious discourse about digital artifacts. . . . Newer media such as photography, radio, film, and television could now be seen in the longer history that stretched back beyond the printing press to oral composition and the invention of writing.
(7) Surveillance can now be extended not just inside the walls of our houses but inside our brain where we can witness the retrieval of a memory almost neuron by neuron.
(8) All was ideology, and at the bottom of these vast nested pyramids of ideological representation was language itself, which was left to point at nothing real beyond our own consciousness, nothing external beyond our shared hallucinations.
(8) For the computer scientists, on the other hand, the 1970s were a time of great earnestness and exhilarating possibilities as the computer was coming into its own as a new medium of representation." (7) In 1980s practice became self-conscious for serious discourse about digital artifacts.
3 1 8 (1000) [-4+]mCQK wardripfruin_and_montfort-new_media_reader (16) 20131019c 0 0+ progress/2011/01/notes_for_wardripfruin_and_montfort-new_media_reader.html
Manovich: famous eight propositions of new media: not cyberculture, distributed, software controlled, mix of conventions, early aesthetics, faster execution, encoding avante garde, parallel articulation.
3 1 8 (1100) [-4+]mCQK wardripfruin_and_montfort-new_media_reader (18) 20130201 0 -12+ progress/2011/01/notes_for_wardripfruin_and_montfort-new_media_reader.html
Manovich: Differentiation of cultural and software conventions can be fine tuned by critical analysis of software creation and use cultures; insights come from working code, and are essential to critical programming studies.
3 1 8 (1200) [-4+]mCQK wardripfruin_and_montfort-new_media_reader (19) 20131109 0 -5+ progress/2011/01/notes_for_wardripfruin_and_montfort-new_media_reader.html
Manovich: does this mean that all new media go through the same stages, certain identifiable patterns of expression?
3 1 8 (1300) [-4+]mCQK wardripfruin_and_montfort-new_media_reader (19-20) 20131109a 0 -8+ progress/2011/01/notes_for_wardripfruin_and_montfort-new_media_reader.html
Manovich: examples of aesthetic strategies based on media affordances include documentary style film and moving images on computer desktop; Engelbart did the equivalent of a 120 minute DV tape.
3 1 8 (1400) [-6+]mCQK manovich-language_of_new_media (187-188) 20120828 0 -6+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Compare his use of three approaches to studying cinema to techniques in the history of software and the software industry. "While for Bazin realism funcitons as an Idea (in a Hegelian sense), for Comolli it plays an ideological role (in a Marxist sense); for David Bordwell and Janet Staiger, realism in film is connected first and foremost with the industrial organization of cinema. . . . One of the advantages of adopting an industrial model is that it allows the authors to look at specific agents manufacturing and supplying firms and professional associations (250). The latter are particularly important, since it is in their discourses (conferences, trade meetings, and publications) that the standards and goals of stylistic and technical innovations are articulated." (187-188)
3 1 8 (1500) [-7+]mCQK manovich-language_of_new_media (48) 20131005l 0 -5+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Go to computer science to study new media: software studies. (48) To understand the logic of new media, we need to turn to computer science. It is there that we may expect to find the new terms, categories, and operations that characterize media that become programmable. From media studies, me move to something that can be called software studies --from media theory to software theory. The principle of transcoding is one way to start thinking about software theory. Another way, which this book experiments with, is to use concepts from computer science as categories of new media theory.
3 1 8 (1600) [-7+]mCQK manovich-language_of_new_media (46) 20131005i 0 -1+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Cultural and computer layers a big point in his introduction to NMR. (46) Similarly, new media in general can be thought of as consisting of two distinct layers the cultural layer and the computer layer.
3 1 8 (1700) [-6+]mCQK manovich-language_of_new_media (25) 20131005e 0 -7+ progress/2011/01/notes_for_manovich-language_of_new_media.html
This is new media. "The two separate historical trajectories finally meet. Media and computer Daguerres daguerreotype and Babbages Analytical Engine, the Lumiere Cinematographie and Holleriths tabulator merge into one. All existing media are translated into numerical data accessible for the computer. . . . In short, media become new media." (25) Numerical data, and the computer is its processor.
3 1 8 (1800) [-7+]mCQK manovich-language_of_new_media (130) 20131006e 0 -2+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Connect to Turkle and others who argue and give example of how computer technology instantiates otherwise vaporous postmodern concepts, to the extent the Manovich argues software like Photoshop made postmodernism possible. (130) The practice of putting together a media object from already existing commercially distributed media elements existed with old media, but new media technology further standardized it and made it much easier to perform.
(131) And to a large extent it is this software that in fact made postmodernism possible.
3 1 8 (1900) [-6+]mCQK manovich-language_of_new_media (46) 20131005j 0 -2+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Entrance for software studies because computer layer affects cultural layer. "the conventions of HCI in short, what can be called the computers ontology, epistemology, and pragmatics influence the cultural layers of new media, its organization, its emerging genres, its contents.
(46) The result of this composite is a new computer culture a blend of human and computer meanings, of traditional ways in which human culture modeled the world and the computers own means of representing it." (46)
3 1 8 (2000) [-6+]mCQK manovich-language_of_new_media (30-31) 20131005h 0 -12+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Encapsulation protocols, modularity, media as programs, especially computer games. "This principle can be called the fractal structure of new media. Just as a fractal has the same structure on different scales, a new media object has the same modular structure throughout. . . . In short, a new media object consists of independent parts, each of which consists of smaller independent parts, and so on, down to the level of the smallest atoms -- pixels, 3-D points, or text characters.
(31) The World Wide Web as a whole is also completely modular.
(31) In addition to using the metaphor of a fractal, we can also make an analogy between the modularity of new media and structured computer programming. . . . Many new media objects are in fact computer programs that follow structural programming style." (30-31)
3 1 8 (2100) [-6+]mCQK manovich-language_of_new_media (47) 20131005k 0 -4+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Cultural categories substituted ones deriving from computer ontology, epistemology and pragmatics. "In new media lingo, to transcode something is to translate it into another format. The computerization of culture gradually accomplishes similar transcoding in relation to all cultural categories and concepts. That is, cultural categories and concepts are substituted, on the level of meaning and/or language, by new ones that derive from the computers ontology, epistemology, and pragmatics. New media thus acts as a forerunner of this more general process of cultural reconceptualization." (47)
3 1 8 (2200) [-4+]mCQK manovich-language_of_new_media (64-65) 20131005p 0 -14+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Whorf-Sapir hypothesis applied to computer-mediated culture, for example, command line interface is closer to literacy than point and click GUI.
3 1 8 (2300) [-4+]mCQK manovich-language_of_new_media (79) 20131005u 0 -9+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Computer fulfills promise of cinema as visual Esperanto: mobile camera, framing, scrolling over interface; Turkle surface enjoyment: remember there is also the command line interface, something the computer permits that non-programmable tools lack.
3 1 8 (2400) [-4+]mCQK manovich-language_of_new_media (82) 20131005v 0 -6+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Subjective experience even of computer interfaces, especially games, affected by cinematic conventions.
3 1 8 (2500) [-4+]mCQK manovich-language_of_new_media (98) 20131005x 0 -5+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Military origin of HCI, new screen of real time.
3 1 8 (2600) [-6+]mCQK manovich-language_of_new_media (115) 20131006b 0 -2+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Still looking at flat, rectangular surface in body space acting as window into another space. "Dynamic, real-time, and interactive, a screen is still a screen. Interactivity, simulation, and telepresence: As was the case centuries ago, we are still looking at a flat, rectangular surface, existing in the space of our body and acting as a window into another space." (115)
3 1 8 (2700) [-4+]mCQK manovich-language_of_new_media (153) 20131006h 0 -3+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Virtual reality creation digital compositing is qualitatively new visual media.
3 1 8 (2800) [-4+]mCQK manovich-language_of_new_media (157) 20131006i 0 -5+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Audio-visual-spatial culture as distinct phenomenological realm.
3 1 8 (2900) [-6+]mCQK manovich-language_of_new_media (158) 20131006j 0 -6+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Presents spatial and ontological montage at the center of the book. "By establishing a logic that controls the changes and the correlation of values on these dimensions, digital filmmakers can create what I will call spatial montage.
(159) Compositing, achieved in [Rybczynkis film] Tango through optical printing, allows the filmmaker to superimpose a number of elements, or whole words, within a single space. . . . Works such as Tango and Steps develop what I will call an ontological montage: the coexistence of ontologically incompatible elements within the same time and space." (158)
3 1 8 (3000) [-4+]mCQK manovich-language_of_new_media (159-160) 20131006k 10 -1+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Just when you thought it could not get any deeper, stylistic montage comes after ontology: Manovich runs this theory through montage like an operator in a computer program that is itself supposed to be a metaphor for how the unseen lifeworld works.
3 1 8 (3100) [-4+]mCQK manovich-language_of_new_media (159-160) 20131006l 0 -11+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Style controls (informs) ontology; subordination of live action is hegemony of representation.
3 1 8 (3200) [-4+]mCQK manovich-language_of_new_media (161) 20131006m 0 -3+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Telecommunication transcends traditional cultural domain of representation.
3 1 8 (3300) [-6+]mCQK manovich-language_of_new_media (163-164) 20131006n 0 -3+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Teleaction is Manovich response to expansion of an aesthetic object. "By foregrounding telecommunication, both real-time and asynchronous, as a fundamental cultural activity, the Internet asks us to reconsider the very paradigm of an aesthetic object. Is it necessary for the concept of the aesthetic to assume representation? In short, if a user accessing information and a user telecommunicating with other(s) are as common in computer culture as a user interacting with a representation, can we expand our aesthetic theories to include these two new situations?" (163-164)
3 1 8 (3400) [-4+]mCQK manovich-language_of_new_media (165) 20131006o 0 -1+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Ability to teleport a unique, new media feature previously requiring action on part of human; imagine telepresence of a pinball machine using history of games played on an actual playfield to simulate play for the teleagent; see 170.
3 1 8 (3500) [-6+]mCQK manovich-language_of_new_media (170) 20131006t 0 -1+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Using a sign to teleact new thanks to computers. "A sign is something which can be used to teleact." (170) Instantaneous representation and control for teleaction, therefore, a new definition of a sign.
3 1 8 (3600) [-6+]mCQK manovich-language_of_new_media (210-211) 20131007e 0 -1+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Does cognitive multitasking represent a transformation of subjectivity. "Just as any particular software application is embedded, both metaphorically and literally, within the larger framework of the operating system, new media embeds cinema-style illusions within the larger framework of an interactive control surface." (210-211) Consider also the GUI conventions migrating back to physical reality.
3 1 8 (3700) [-6+]mCQK manovich-language_of_new_media (258) 20131007o 0 -1+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Aggregate versus systematic space, thus look at software tools, organization, default settings before finished objects. "Art historians and literary film scholars have traditionally analyzed the structure of cultural objects as reflecting larger cultural patterns (for instance, Panofskys reading of perspective); in the case of new media, we should look not only at the finished objects but first of all at the software tools, their organization and default settings." (258)
3 1 8 (3800) [-6+]mCQK manovich-language_of_new_media (280) 20131007t 0 -1+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Place as product of cultural producers, non-places created by users as individual trajectory through places. "Thus from one perspective we can understand place as a product of cultural producers, while non-places are created by users; in other words, non-place is an individual trajectory through a place." (280)
3 1 8 (3900) [-4+]mCQK manovich-language_of_new_media (197) 20131007 0 -6+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Dominance of ready-made, standardized, reconfigurable objects.
3 1 8 (4000) [-4+]mCQK manovich-language_of_new_media (206) 20131007b 0 -10+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Communication becomes dominated by phatic, contact function of physical channel (Jakobson).
3 1 8 (4100) [-4+]mCQK manovich-language_of_new_media (209) 20131007c 0 -9+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Metarealism suture and interpolation: modern ideology includes revelation of machinery, docility through control over illusion; deeper analysis than Turkle surface/depth.
3 1 8 (4200) [-4+]mCQK manovich-language_of_new_media (209) 20131007d 0 -8+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Oscillation between illusory and interactive segments that is structural feature of modern society subverts asymptote of the matrix; best example is military simulator.
3 1 8 (4300) [-4+]mCQK manovich-language_of_new_media (215) 20131007f 0 -3+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Affects of computer programming on space and cultural forms, for example logics of the 3D virtual space, database and algorithm, have become cultural forms; Giedion beats him to declare the search engine takes command.
3 1 8 (4400) [-4+]mCQK manovich-language_of_new_media (219) 20131104d 0 -10+ progress/2011/01/notes_for_manovich-language_of_new_media.html
With databases narrative becomes just one method of accessing data; Legrady explored in 1990s while others accepted the database form as given.
3 1 8 (4500) [-4+]mCQK manovich-language_of_new_media (227) 20131007h 0 -2+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Creation of different interfaces with same material, variability of database narrative.
3 1 8 (4600) [-4+]mCQK manovich-language_of_new_media (231) 20131007i 0 -8+ progress/2011/01/notes_for_manovich-language_of_new_media.html
New media reverse Barthes conception: database as paradigm has material existence, narrative as syntagm dematerialized.
3 1 8 (4700) [-4+]mCQK manovich-language_of_new_media (245) 20131007k 0 -4+ progress/2011/01/notes_for_manovich-language_of_new_media.html
De Certeau strategies and tactics at work in new cultural economy of Doom engine release, compared to traditional production model of Myst.
3 1 8 (4800) [-4+]mCQK manovich-language_of_new_media (245-246) 20131104e 0 -5+ progress/2011/01/notes_for_manovich-language_of_new_media.html
In many computer games narrative and time equated with movement through space or progression of levels; inner life stripped away to basic Greek narration as diagesis.
3 1 8 (4900) [-4+]mCQK manovich-language_of_new_media (247) 20131007l 0 -3+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Think of games as narrative actions and exploration rather than narration and description; de Certeau diagesis guides and transgresses.
3 1 8 (5000) [-6+]mCQK manovich-language_of_new_media (251) 20131007m 0 -12+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Idea of navigable space at origin of computer era ensconced in cybernetics. "The term cyberspace is derived from another term cybernetics. In his 1947 book Cybernetics, mathematician Norbert Wiener defined it as the science of control and communication in the animal and machine. . . . He derived the term cybernetics from the ancient Greek word kybernetikos, which refers to the art of the steersman and can be translated as good at steering. Thus the idea of navigable space lies at the very origins of the computer era.
(251-252) For the first time, space becomes a media type. . . . In other words, all operations that are possible with media as a result of its conversion to computer data can also now apply to representations of 3-D space." (251)
3 1 8 (5100) [-4+]mCQK manovich-language_of_new_media (253) 20131007n 0 -8+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Compare no space collections of separate objects to Floridi definition of cyberspace.
3 1 8 (5200) [-4+]mCQK manovich-language_of_new_media (259) 20131007p 0 -6+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Early history of navigable virtual space of Aspen Movie Map, Legible City, The Forest introduce alternate viewing perspectives and challenge subjectivity, more like modern painting than architecture.
3 1 8 (5300) [-4+]mCQK manovich-language_of_new_media (261-263) 20131104g 0 -6+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Walickzy The Forest liberates virtual camera from human perspective.
3 1 8 (5400) [-4+]mCQK manovich-language_of_new_media (274-275) 20131007r 0 -9+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Comfort in data manipulation options studied in Friedberg Window Shopping.
3 1 8 (5500) [-4+]mCQK manovich-language_of_new_media (278) 20131007s 0 -2+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Real time triumphs over space in Cold War (Edwards).
3 1 8 (5600) [-4+]mCQK manovich-language_of_new_media (283) 20131007u 0 -6+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Shaw EVE as Plato cave in reverse, continuous trajectory of subjective, partial views.
3 1 8 (5700) [-4+]mCQK manovich-language_of_new_media (294) 20131008b 0 -3+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Common feature of lens-based recordings of reality for all film-based cinema.
3 1 8 (5800) [-4+]mCQK manovich-language_of_new_media (295) 20131008c 0 -2+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Cinema, now that it can be natively virtual, having merged with animation, is more like painting than indexical (based on transduction from physical reality; see Sterne).
3 1 8 (5900) [-4+]mCQK manovich-language_of_new_media (301) 20131008d 0 -3+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Definition of digital film as live action material + painting + image processing + compositing + 2-D computer animation + 3-D computer animation; compare definition of digital film to Floridi definition of cyberspace: this is much clearer and bears more information about the reality it depicts while interpellating.
3 1 8 (6000) [-4+]mCQK manovich-language_of_new_media (314) 20131008f 0 -2+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Succession of distinct expressive languages throughout history of cinema suggestive of Kuhnian cultural logic of scientific progress; seems easily testable with history of computing.
3 1 8 (6100) [-6+]mCQK manovich-language_of_new_media (317) 20131008g 0 -3+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Role of loop in computer programming and cinema. "Can the loop be a new narrative form appropriate for the computer age? It is relevant to recall that the loop gave birth not only to cinema but also to computer programming. Programming involves altering the linear flow of data through control structures, such as if/then and repeat/while ; the loop is the most elementary of these control structures." (317) Is this an invitation to future scholarship?
3 1 8 (6200) [-4+]mCQK manovich-language_of_new_media (324) 20131008h 0 -4+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Prediction of multiple window media forms, a contingent invitation to future scholarship.
3 1 8 (6300) [-6+]mCQK manovich-language_of_new_media (326) 20131008i 0 -3+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Seems to confound object-oriented and multiprocessing, as both objects and processes are active simultaneously, often exchanging messages. "On the level of computer programming, this logic corresponds to object-oriented programming. Instead of a single program that, like Fords assembly line, is executed one statement at a time, the object-oriented paradigm features a number of objects that send messages to each other. These objects are all active simultaneously." (326)
3 1 8 (6400) [-4+]mCQK manovich-language_of_new_media (326) 20131008j 0 -1+ progress/2011/01/notes_for_manovich-language_of_new_media.html
The nod to OOP found in most digital media theory, deprivileging the diachronic dimension.
3 1 8 (6500) [-4+]mCQK manovich-language_of_new_media (329-330) 20131008k 0 -9+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Ocularcentrism in modern regime of perceptual labor means high density of visual phenomena in leisure and work; thankfully, audible phenomena not fully territorialized by the workstation, although that is also the dangerous place my brand of digital humanities research threatens to venture via formant synthesis (symposia).
3 1 8 (6600) [-4+]mCQK manovich-language_of_new_media (202) 20131007a 0 -6+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Computer graphics blended with familiar film image in Jurassic Park like synthetic art of Socialist Realism.
3 1 8 (6700) [-7+]mCQK manovich-software_takes_command (97-98) 20131005f 0 -11+ progress/2012/03/notes_for_manovich-software_takes_command.html
Kay goes beyond Kemeny and others who focus on utilitarian uses interpellating adults of all ages by including experimentation and artistic expression; appeal to enactive, iconic and symbolic mentalities via mouse, icons and windows, Smalltalk. (97-98) According to Kay, they key step for him and his group was to starting thinking about computers as a medium for learning, experimentation, and artistic expression which can be used not just by adults but also by children of all ages. Kay was strongly influenced by the theory of cognitive psychologist Jerome Bruner. . . . Bruner gave slightly different names to these different mentalities [of Piaget]: enactive, iconic, and symbolic. While each mentality has developed at different stages of human evolution, they continue to co-exist in an adult.
(98) Kays interpretation of this theory was that a user interface should appeal to all these three mentalities. In contrast to a command-line interface, which is not accessible for children and forces the adult to use only symbolic mentality, the new interface should also make use of emotive and iconic mentalities.
(98-99) Mouse activates enactive mentality (know where you are, manipulate), Icons and windows activate iconic mentality (recognize, compare, configure.) Finally, Smalltalk programming language allows for the use of symbolic mentality (tie together long chains of reasoning, abstract.
3 1 8 (6800) [-6+]mCQK manovich-software_takes_command (105) 20130825c 0 -7+ progress/2012/03/notes_for_manovich-software_takes_command.html
Processing model language for everyday users developing their own media tools. "Unfortunately, when in 1984 Apple shipped Macintosh, which was to become the first commercially successful personal computer modeled after the PARC system, it did not have an easy-to-use programming environment. . . . Only more recently, as the general computer literacy has widened and many new high-level programming languages have become available Perl, PHP, Python, JavaScript, etc.--have more people started to create their own tools by writing software. A good example of a contemporary programming environment, very popular among artists and designers and which, in my view, is close to Kays vision, is Processing." (105)
3 1 8 (6900) [-6+]mCQK bork-journal 20150818 20150818 0 -4+ journal_2015.html
Manovich bows out as not a substantial programmer. Software studies theorist Ian Bogost, who does develop software by designing and writing source code, provides useful concepts like unit operations, procedural rhetoric, later alien phenomenology PHI. Associative versus direct search is like versus equal in sense of wildcard versus normal matching, for example considered today in tapoc working code MySQL query syntax containing like single quote enclosed keyword and ampersand versus equal single quote enclosed PHI. Does Bogost perform all SDLC roles could be a measure as ticket thinking extends into the dissertation thought itself.
3 1 8 (7000) [-6+]mCQK bogost-unit_operations (xiii) 20150825 0 -1+ progress/2012/01/notes_for_bogost-unit_operations.html
Unit operations explained as discrete compressed elements of fungible meaning. "In the first part, From Systems to Units, I introduce the concept of unit operations, a general conceptual frame for discrete, compressed elements of fungible meaning." (xiii)
3 1 8 (7100) [-6+]mCQK bogost-unit_operations (xiii-xiv) 20150825a 0 -5+ progress/2012/01/notes_for_bogost-unit_operations.html
Situates the origins of unit analysis in classical philosophers from Aristotle to Spinoza, and contemporary philosophers Badiou and Harman, before drawing connections between compression and representation in poststructuralism to advances in computation. "I then trace the increasing compression of representation that has occurred in structuralism and poststructuralism, relating this compression to advances in computation such as John von Neumanns conditional control transfer. . . . I use the four core principles of object technology to critique many of the popular academic works on digital media (Lev Manovich, George Landow, Jay Bolter) and genetics (Darwin, the Human Genome Project, Dawkins)." (xiii-xiv)
3 1 8 (7200) [-6+]mCQK bogost-unit_operations (xiv) 20150825b 0 -2+ progress/2012/01/notes_for_bogost-unit_operations.html
Procedural criticism resembles Hayles MSA, exploring software and narrative structures of game engines. "In the second part, Procedural Criticism, I argue for a configurable expression in multiple media. I explore the software and narrative structures of game engines from Pong to Half-Life, showing how these texts function and interact through unit operations." (xiv)
3 1 8 (7300) [0+]mCQK bogost-unit_operations (xiv) 20150825c 0 -6+ progress/2012/01/notes_for_bogost-unit_operations.html
Procedural subjectivity explores interaction between embedded representation and subjectivity, vaulting status of videogames between entertainment to social texts.
3 1 8 (7400) [-4+]mCQK bogost-unit_operations (xiv) 20150825d 0 -3+ progress/2012/01/notes_for_bogost-unit_operations.html
Schizoanalysis in relation to network theory provides analysis of freedom in large virtual spaces.
3 1 8 (7500) [-6+]mCQK bork-journal 20150825 20150825 2 -9+ journal_2015.html
Really do just focus on unit operations with their tie to four fundamental properties of software objects is the proper guidance to come out of this session. Still need to talk about Harman and Badiou as principle philosophers for Bogost. Move on to next book for next concept, noting Bogost provides many useful concepts as my projects track steps audio, visual, haptic to machine embodiment, although alien phenomenology does not have holding power of critical programming. The problem is that freedom zero besides any references to human atrocities puts secret discourse on free pipe networks riding on top like subjectivity for Berry. If you do know know a programming language like C++ you will have trouble following my argument, for you will not even perceive the discourse couched in working code PHI. Is it interesting that Bogost seems to want to use training in Deleuze and Lacan so devotes an entire part of book in attempt as bordering silly as Galloway with Marx. For Bogost going backwards: my journal comments, four on educational change, videogame unit analysis, simulation fever, exploring game rules, Badiou subject, simulation, default ideological context approach, merger of functionalism and materialism, materiality of game engine, banking customer-account relationship and licensing example, four fundamental concepts of OOP, von Neumann architecture, Badiou count as one, back to where I was, Harmon object oriented ontology. Important that Bogost sets precedent of crossing computing and philosophy with interesting and technically correct discussion of encapsulation, inheritance, polymorphism. Working code is purification wished of glitchy philosophical texts such as testing whether Bogost does adequately cover and use OOP terminology as a programming philosopher beyond philosophical programmer for working code.
3 1 8 (7600) [-6+]mCQK bogost-unit_operations (5) 20130910a 4 -2+ progress/2012/01/notes_for_bogost-unit_operations.html
Harman provides a basis for extending human philosophy into machine being via Heidegger applied to the built environment, not really sensible in print and emulsion versus electronic media milieu. " The word object is a suitable generic analogue, one used by philosopher Graham Harman in his innovative and related concept of an object-oriented philosophy. Harman interprets Heideggers analysis of Zuhandenheit, or readiness-to-hand, as a quality available to entities other than Dasein." (5)
3 1 8 (7700) [-6+]mCQK bogost-unit_operations (5) 20150826 0 -6+ progress/2012/01/notes_for_bogost-unit_operations.html
Bogost prefers units to objects to include material manifestations of complex structures like racism. "I am avoiding the term object and especially the phrase object-oriented because, as I will discuss later, these concepts have special meaning in computer science. Nevertheless, understanding units as objects is useful because it underscores their status as discrete, material things in the world. . . . Harman insists on inanimate objects as necessary subjects for philosophy; while I include in my understanding of units ordinary objects such as the ones Harman favors ( person, hammer, chandelier, insect, or otherwise ), I also claim that units encompass the material manifestations of complex, abstract, or conceptual structures such as jealousy, racial tension, and political advocacy." (5)
3 1 8 (7800) [-6+]mCQK bogost-unit_operations (11) 20150826b 0 -5+ progress/2012/01/notes_for_bogost-unit_operations.html
As Harman provides the contemporary treatment of Heidegger, Alain Badious application of set theory to ontology updates Spinoza. "Badious philosophy offers a concept of multiplicity that simultaneously articulates coherent concepts and yet maintains the unitarity of their constituents. . . . This concept of membership, borrowed from set theory, forms the basis of Badious ontology: To exist is to be an element of." (11)
3 1 8 (7900) [-6+]mCQK bogost-unit_operations (9) 20150826a 0 -6+ progress/2012/01/notes_for_bogost-unit_operations.html
Spinoza network like superstructure for material relations. "Spinozas philosophy sets up a network-like superstructure for almost any kind of material relation. . . . The crucial seed that Spinoza plants is that of innumerably re-creatable relations between objects. Such language looks forward to forms of material relation like Valera and Maturanas autopoiesis, as well as the dynamic structure of software information systems." (9)
3 1 8 (8000) [-4+]mCQK bogost-unit_operations (13) 20120130 0 -1+ progress/2012/01/notes_for_bogost-unit_operations.html
Badiou count as one referenced in Alien Phenomenology.
3 1 8 (8100) [-6+]mCQK bogost-unit_operations (11) 20130910b 0 -2+ progress/2012/01/notes_for_bogost-unit_operations.html
As simple as the return value of a function call instantiates Badiou count as one in software by programming. "As a process or a frame for a multiplicity, the count as one produces a particular set; it takes a multiplicity and treats it as a completed whole.
(12) A situation is Badious name for an infinite set; being is a matter of belonging to a situation." (11)
3 1 8 (8200) [-6+]mCQK bogost-unit_operations (13) 20150826c 0 -2+ progress/2012/01/notes_for_bogost-unit_operations.html
Unit forming procedurality ligature between computational and traditional representation. "The figure of the count as one helps serve as a ligature between computational and traditional representation, creating a common groundwork for understanding texts of all kinds as configurable. The count as one is the closest extant philosophical concept to what I am calling unit operations: an understanding, largely arbitrary, certainly contingent, of a particular situation, compacted and taken as a whole." (13)
3 1 8 (8300) [-6+]mCQK bogost-unit_operations (14) 20150826e 0 -2+ progress/2012/01/notes_for_bogost-unit_operations.html
Difference between ontologies in computer science and philosophy is that the former enable functional relationships between constituent parts of software systems, but do not specify them. "As such, ontologies in the computer sciences sense of the word enable, but do not specify, the functional relationship between their constituent parts. Unit operations, however, strive to articulate both the members of a particular situation and the specific functional relationships between them." (14)
3 1 8 (8400) [-6+]mCQK bogost-unit_operations (15) 20150826d 0 -5+ progress/2012/01/notes_for_bogost-unit_operations.html
Definition of unit analysis as critical practice to discover unit operations. "Unit analysis is the name I suggest for the general practice of criticism through the discovery and exposition of unit operations at work in one or many source texts. . . . Each medium carries particular expressive potential, but unit analysis can help the critic uncover the discrete meaning-making in texts of all kinds." (15)
3 1 8 (8500) [-4+]mCQK bogost-unit_operations (16) 20150826f 0 -1+ progress/2012/01/notes_for_bogost-unit_operations.html
Unit analysis of The Terminal reveals various modes of waiting.
3 1 8 (8600) [-6+]mCQK bogost-unit_operations (19) 20150826g 0 -5+ progress/2012/01/notes_for_bogost-unit_operations.html
Distinction between unit analysis and system operation for criticism. "Analyzing an artifact like The Terminal as a unit-operational film about themes of waiting rather than a system-operational film about the story of a handful of developed characters thus demands a novel critical framework. . . . Such a distinction is core to the critical process of unit analysis, which privileges discrete components of meaning over global narrative progression." (19)
3 1 8 (8700) [-6+]mCQK bork-journal 20150826 20150826 2 -4+ journal_2015.html
Bogost dismissing structured programming may or many not intend but does reject procedural programming and even has a hard time with objects preferring his own units. Else we forget unit programmability derives from not only abstract system completeness but every individual instance of unit level. Back to adding more notes from Unit Operations to round out the section, finding he only fleshes out relationships between computing and literary theory for encapsulation, leaving abstraction, polymorphism and inheritance as exercises for the reader. This thought of not walking away from the other fundamental concepts of OOP relates to first exam question invoking Tanaka-Ishii considering limitations of representation for computational systems by semiotic analysis of computer programs as systems of signs exemplifying how theories from other disciplines can frame and shape our understanding in other domains, which is what Hayles finds remarkable in Malabou.
3 1 8 (8800) [-4+]mCQK bogost-unit_operations (26) 20131026b 0 -1+ progress/2012/01/notes_for_bogost-unit_operations.html
Von Neumann architecture beginning of unit versus system operational computation; why not consider both concurrently, following Suchman the plan (system) and situtated action (unit) or units are concurrent processes or threads in multiprocessing von Neumann architecture networks?
3 1 8 (8900) [-6+]mCQK kittler-there_is_no_software (153) 20131001j 0 -10+ progress/2012/12/notes_for_kittler-there_is_no_software.html
Hasslacher discretization of continuous algorithmic descriptions as real programming versus Turing computational imagination. "[quoting Brosl Hasslacher] We must reduce a continuous algorithmic description to one codable on a device whose fundamental operations are countable, and we do this by various forms of chopping up into pieces, usually called discretization. . . . The compiler then further reduces this model to a binary form determined largely by machine constraints.The outcome is a discrete and synthetic microworld image of the original problem, whose structure is arbitrarily fixed by a differencing scheme and computational architecture chosen at random. . . . This is what we actually do when we compute up a model of the physical world with physical devices." (153) Failure to appreciate materiality of computation is flaw in philosophies of programming Kittler criticizes.
3 1 8 (9000) [-6+]mCQK bogost-unit_operations (38) 20131026e 0 -7+ progress/2012/01/notes_for_bogost-unit_operations.html
Component objects developed to address growing mass of software libraries to encapsulate intellectual capital in black boxes. "To negotiate the conflicting demands of protecting proprietary symbolic code and leasing that code to thousands of independent developers, the notion of component objects was born.
(38-39) This method of encapsulating intellectual capital in human-machine accessible black boxes characterizes the software development practice known as object technology (OT), also called object-oriented programming (OOP). . . . OT attempts to close the gap between human experience, its programmatic representation, and its computational execution. Computational systems thus strive to create more successful implementations of automated human needs." (38)
3 1 8 (9100) [-6+]mCQK bogost-unit_operations (39) 20130910f 0 -1+ progress/2012/01/notes_for_bogost-unit_operations.html
Definition of OOP includes the four official properties, while putting socio-economic spin on it. "Software must exhibit four properties to be considered object oriented: abstraction, encapsulation, polymorphism, and inheritance." (39) Compare to Manovich and others.
3 1 8 (9200) [-4+]mCQK tanaka_ishii-semiotics_of_programming (81) 20131014z 0 -1+ progress/2012/10/notes_for_tanaka_ishii-semiotics_of_programming.html
Procedural rhetorics of family and license systems distinguishing inheritance and interface.
3 1 8 (9300) [-4+]mCQK bogost-unit_operations (41) 20130910g 0 -7+ progress/2012/01/notes_for_bogost-unit_operations.html
Example of unit operations in banking customer-account relationship and licensing.
3 1 8 (9400) [-4+]mCQK bogost-unit_operations (43) 20150826i 0 -1+ progress/2012/01/notes_for_bogost-unit_operations.html
Discreteness a principle property of unit operations, relating to encapsulation.
3 1 8 (9500) [-6+]mCQK bogost-unit_operations (45-46) 20150826j 0 -6+ progress/2012/01/notes_for_bogost-unit_operations.html
Does not analyze all four concepts, giving very brief but believable starting points for abstraction and polymorphism. "I have already introduced in some detail the notion of encapsulation and shown how literary criticism shares this property without articulating it as such. Reviewing the definitions of the properties of OT, one can see a correlation between abstraction and the transcendental signified, or between polymorphism and intertextuality. . . . But it is not my wish to show how culture, philosophy, and critical theory can be made to look like object technology." (45-46)
3 1 8 (9600) [-4+]mCQK bogost-unit_operations (46) 20150826k 0 -5+ progress/2012/01/notes_for_bogost-unit_operations.html
Prefers to consider procedural over object aspect by moving to Murray procedural authority.
3 1 8 (9700) [-6+]mCQK bogost-unit_operations (56) 20130910j 0 -10+ progress/2012/01/notes_for_bogost-unit_operations.html
Materiality of game engines lends them to unit analysis moreso than other literary objects while structuring possible narratives, going beyond remediation creating similarities between works based on literal sharing of components, exemplified by clever comparison to psychoanalysis for Half-Life and Quake. "Like component software, game engines are IP. They exist in the material world in a way that genres, devices, and cliches do not.
(57) But first-person shooter game engines construe entire gameplay behaviors, facilitating functional interactions divorced from individual games. Genres structure a creative approach to narrative; they describe a kind of story. While one can imagine a conceptual description of the film genres just mentioned, it is much more difficult to imagine the unit-operational underpinnings of such a genre.
(58) Taken as a unit of gameplay, Tank took the notion of vector geometry as a mediator of competition between two players. . . . Tank, Pong, and Combats relation to one another is far stronger than interpretive notions like intertextuality or new media concepts like remediation allow." (56)
3 1 8 (9800) [-4+]mCQK bogost-unit_operations (59) 20131026f 0 -3+ progress/2012/01/notes_for_bogost-unit_operations.html
Formal relationship between games due to shared core portions of code accentuate merger of functionalism and materialism.
3 1 8 (9900) [-6+]mCQK bogost-unit_operations (61) 20130910l 0 -5+ progress/2012/01/notes_for_bogost-unit_operations.html
Differences of unit operations and traditional literary relations, even new ones like remediation. "IP as an external mediator also differs from Bolter and Grusins idea of remediation. Remediation does describe a technique that may be at work in Half-Life, but the borrowing is mediated by outside forces, both legal and commercial. The games very access to the unit operations it seeks to borrow from Quake are themselves redeemed through another unit operation: licensing. Licensing is a legal function, not a discursive one.
(63) The discursive carriage of the FPS will change further as game engines, tools, and libraries move beyond killing, racing, and visual effects to emotional conflict, jealousy, and disappointment." (61) Legal, not discursive; material, not psychoanalytic.
3 1 8 (10000) [-4+]mCQK bogost-unit_operations (74) 20130910o 0 -5+ progress/2012/01/notes_for_bogost-unit_operations.html
Baudelaire motif, per Benjamin, is a unit operation to Bogost, and flaneur role is configurative.
3 1 8 (10100) [-6+]mCQK bogost-unit_operations (54) 20130910i 0 -2+ progress/2012/01/notes_for_bogost-unit_operations.html
Critical bricoleur methodology for new discipline, while focusing on expressive, cultural aspects of videogames and other media. "In the figure of the bricoleur, the critic and the videogame share the same processes of selection and configuration. The ad hoc, even hackneyed process of comparative criticism should include those artifacts left out by Aarseths cybertext: poetry, film, fiction, and television are media that are not obviously made configurative by the author may but may be made so by the critic." (54)
3 1 8 (10200) [-6+]mCQK bogost-unit_operations (99) 20130910r 0 -5+ progress/2012/01/notes_for_bogost-unit_operations.html
Reflecting on ideological context most important aspect of videogame studies because it is where code operates upon the world via rhetorically engaging humans. "Frasca hints at this idea in his definition that simulations represent something to somebody, but I think this point needs to be much stronger. Videogames require critical interpretation to mediate our experience of the simulation, to ground it in a set of coherent and expressive values, responses, or understandings that constitute effects of the work. In this process, the unit operations of a simulation embody themselves in a players understanding. This is the place where rules can be grasped, where instantiated code enters the material world via human players faculty of reason. In my mind, it is the most important moment in the study of a videogame." (99)
3 1 8 (10300) [-6+]mCQK bogost-unit_operations (123) 20130910x 0 -1+ progress/2012/01/notes_for_bogost-unit_operations.html
Badiou subject constituting event reached playing biased videogames. "This process of engagement with artworks can constitute an event in Badious sense of the word, and in so doing it constitutes a subject and commences the process of fidelity at the heart of his theory of truth." (123)
3 1 8 (10400) [-4+]mCQK bogost-unit_operations (127) 20130911 0 -1+ progress/2012/01/notes_for_bogost-unit_operations.html
Social commentary of Southern California embedded in Star Wars Galaxies cantina and bazaar.
3 1 8 (10500) [-4+]mCQK bogost-unit_operations (130-131) 20130911a 0 -13+ progress/2012/01/notes_for_bogost-unit_operations.html
Insightful combination of Iser, Barthes, Aarseth, Eskelinen, Hayles to raise specter of analysis devolving into simulacral system operations in cybertexts; the crucial task is exploring game rules manifest in player experience.
3 1 8 (10600) [-4+]mCQK bogost-unit_operations (133) 20131026p 0 -11+ progress/2012/01/notes_for_bogost-unit_operations.html
September 12 game teaches lessons about simulation fever.
3 1 8 (10700) [-4+]mCQK bogost-unit_operations (136) 20130911c 0 -3+ progress/2012/01/notes_for_bogost-unit_operations.html
Simulation fever as an autopoietic, emergent, reflective awareness between how game unit operations represent world and subjective understanding of player.
3 1 8 (10800) [-4+]mCQK bogost-unit_operations (168) 20130911f 0 -10+ progress/2012/01/notes_for_bogost-unit_operations.html
Apply Foucault to Grand Theft Auto through unit analysis as active practice of power and discipline.
3 1 8 (10900) [-6+]mCQK bogost-unit_operations (172) 20130911g 0 -2+ progress/2012/01/notes_for_bogost-unit_operations.html
Critical study of digital games both subject of derision and university programs, like OGorman remainder of scholarly discourse. "Whether related or not to the American academic puritanism underscored in Schonfelds response, it happens that many such programs can be found in northern Europe. The IT University of Copenhagen, Denmark, and the University of Tampere, Finland, among others, offer bachelors, masters, and doctorate degrees exclusively in digital games." (172)
3 1 8 (11000) [-6+]mCQK bogost-unit_operations (173-174) 20130911h 0 -5+ progress/2012/01/notes_for_bogost-unit_operations.html
Imagine unit-operational university transcending interdisciplinarity, which requires traditional disciplines, resembles software and project-based organizational structure, which he calls a postdisciplinary critical network. "A unit-operational university would look like a complex network: a series of constantly changing relations between highly disparate groups, ideas, and resources. . . . Intellectual projects would structure themselves more like software: units of encapsulated production with structured ties to multiple potential applications." (173-174) Faced with new problems like interoperability leads to interesting discussion of web services, demonstrating ability of Bogost to argue in the technical register as will as the liberal, again hopefully cultivated through procedural rhetorics.
3 1 8 (11100) [-6+]mCQK bogost-unit_operations (174) 20131026s 0 -10+ progress/2012/01/notes_for_bogost-unit_operations.html
Web services exemplify original goal of interoperability of object technologies via defined unit operations using XML and SOAP forming network of networks. "Recently, a technology standard called Web services has emerged that claims to offer a solution to the problem of interoperability. . . . The standardization of the data format and the transfer protocol represents a radical break from the traditional foundational concepts of jargon and intellectual property discussed earlier.
(175) Web services transmit data in two common formats, XML and SOAP. . . . The primary benefit of Web services is that two computers with nothing in common architecturally can mutually invoke software routines and share the results." (174)
3 1 8 (11200) [-4+]mCQK bogost-unit_operations (179) 20131026u 0 -7+ progress/2012/01/notes_for_bogost-unit_operations.html
Example of Virtual U videogame funded by Sloan foundation as alternative to cutthroat commercial videogame landscape that ironically perpetuates traditional educational systems.
3 1 8 (11300) [-6+]mCQK bork-journal 20150827 20150827 0 -8+ journal_2015.html
Hold on to fungibility of Derrida between philosophical and technical discourse as exemplary unit operation, feathering his use of plant fecundation noted by Ulmer with distinction between codework and working code. Moving on to Fuller, wanting to include Chun and Berry as the other main theorists, perhaps moving Bogost procedural rhetoric to the final section where it is needed the most. Programming work involves variations on themes that exemplify unit operations. Combined with sensitivity to variations in programming style, a large field opens for ethnographic study. Electricity PHI power electronics computing. This is something somewhat obvious to philosophical programmers and explicitly manipulated by programming philosophers. Important that Fuller defines critical, social, speculative software. Then walk through lexicon.
3 1 8 (11400) [-4+]mCQK fuller-behind_the_blip (13) 20130921 0 -7+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Criticism of systems perspective very clear in examples by designers (Norman) and user-centered thinkers (Johnson and Barker).
3 1 8 (11500) [-4+]mCQK fuller-behind_the_blip (19) 20130921c 0 -2+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Deleuze and Guattari connection for software as form of subjectivity, aversion to the electronic.
3 1 8 (11600) [-4+]mCQK fuller-behind_the_blip (21) 20131030b 0 -5+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Computers as assemblages; reject notion that a particular level is definitive, and accept combination with other systems as aspect of variable ontology.
3 1 8 (11700) [-6+]mCQK fuller-behind_the_blip (21-22) 20150828 0 -3+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Delueze and Guattari thought synthesizer. "That is the thought synthesizer that they suggest? By assembling modules, source elements, and elements for treating concepts (oscillators, generators, and transformers), by arranging microintervals, the synthesizer makes conceptualisable the philosophical process, the production of that process itself, and puts us in contact with other elements of matter. In this machine composed by its materiality and force, thought travels, becomes mobile, synthesizes." (21-22)
3 1 8 (11800) [-4+]mCQK fuller-behind_the_blip (22) 20150828a 0 -1+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Instead of looking for software criticism in traditional areas, look to software production itself that is out of whack.
3 1 8 (11900) [-4+]mCQK fuller-behind_the_blip (23) 20130921d 0 -1+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Gives examples of A Song for Occupations mapping Microsoft Word and Richard Wright Hello World CDROM.
3 1 8 (12000) [-4+]mCQK fuller-behind_the_blip (23) 20130921e 0 -2+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Would be interesting to examine early hacks of simple software such as Apple 2 games, and software that reveals datastream for secret life of devices: note the guy who redesigned the Doom or Quake game engine to make it a learning platform as an example of somewhat reflexive critical programming.
3 1 8 (12100) [-6+]mCQK fuller-behind_the_blip (24) 20130921f 0 -3+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Social software defined. " (24) Primarily it is software built by and for those of us locked out of the narrowly engineered subjectivity of mainstream software.
(24) It is software that is directly born, changed, and developed as the result of an ongoing sociability between users and programmers in which demands are made on the practices of coding that exceed their easy fit into standardized social relations.
(24) I would like to suggest that Free Software can be usefully understood to work in these terms." (think Feenberg deep democratization) For those outside narrowly engineered subjectivity of mainstream software, developed through user interaction, especially in Free Software
3 1 8 (12200) [-4+]mCQK fuller-behind_the_blip (27) 20130921h 0 -8+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Poetics of connection.
3 1 8 (12300) [-6+]mCQK fuller-behind_the_blip (29-30) 20130921i 0 -5+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Be sure to investigate Ullman Close to the Machine on the lived experience of programming. "Ullmans book [Close to the Machine] is the best account of the lived experience of programming that Ive read, but Im not quite sure who this we is. . . . The we is an attempt to universalize rather than identify more precisely definable, albeit massively distributed and hierarchised, sets of conflictual, imaginal, and collaborative relations." (29-30)
3 1 8 (12400) [-6+]mCQK fuller-behind_the_blip (30) 20150828b 0 -2+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Opening a space for reinvention of software by its own means in its own places. "Speculative software can be understood as opening up a space for the reinvention of software by its own means. That is to say that when, as Ullman suggests, the computer has its own place where the system and the logic take over, this is a place that can be explored, mapped, and messed with by a skewed application of those very same means." (30)
3 1 8 (12500) [-6+]mCQK fuller-behind_the_blip (30-31) 20130921k 0 -13+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Compare blips as events in software to the units Knuth implies, as well as Bogost unit operations. "These blips, these events in software, these processes and regimes that data is subject to and manufactured by, provide flashpoints at which these interrelations, collaborations, and conflicts can be picked out and analyzed for their valences of power, for their manifold capacities of control and production, disturbance and invention. It is the assertion of speculative software that the enormous spread of economies, systems of representation, of distribution, hiding, showing, and influence as they mesh with other systems of circulation, of life, ecology, resources themselves always both escaping and compelling electronic and digital manifestation can be intercepted, mapped, and reconfigured precisely by means of these blips.
(31) What are these blips? . . . They are not merely signifiers of an event, but integral parts of it. . . . They have an implicit politics.
(31) There are certain ways in which one is supposed to experience these blips.
(31) The capacity of computers to perform these operations is what provides the fuel for speculative software that is, software which refuses to believe the simple, innocent stories that accompany the appearance of these blips." (30-31)
3 1 8 (12600) [-4+]mCQK fuller-behind_the_blip (32) 20130921l 0 -4+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Mention should be made of the implicit requirement to teach prospective philosophers of computing who utilize speculative software enough about the constituent technologies in order to engage in the first two stages.
3 1 8 (12700) [-4+]mCQK fuller-behind_the_blip (43) 20130921m 0 -3+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Could find evidence of time by examining revision control systems and social history concretized in other tools of large, organized software projects; dry-cleaned, atemporal impression most fitting for error-free, compiling versions.
3 1 8 (12800) [-4+]mCQK fuller-behind_the_blip (63) 20130921p 0 -3+ progress/2012/04/notes_for_fuller-behind_the_blip.html
Tactical software related to critical software, but has basic function of developing street-knowledge of the nets.
3 1 8 (12900) [-6+]mCQK chun-programmed_visions (5-6) 20131028c 0 -1+ progress/2013/07/notes_for_chun-programmed_visions.html
Philosophy just beginning to note effects of software as thing on metaphysics, intellectual property, subject, information. "These changes, brought about by the hardening of software as textual or machinic thing through memory, point toward a profound change in our understanding of what is internal and external, subject and object." (5-6)
3 1 8 (13000) [-4+]mCQK chun-programmed_visions (xii) 20131028b 0 -3+ progress/2013/07/notes_for_chun-programmed_visions.html
Materialization of software as thing, hardened programming, and memory hardened into storage.
3 1 8 (13100) [-6+]mCQK chun-programmed_visions (xii) 20131028a 0 -2+ progress/2013/07/notes_for_chun-programmed_visions.html
Undeadness of new media related to logic of programmability in which programmed visions create futures based on past data. "Although this cycle of the ever-returning and ever-receding new mirrors the economic cycle it facilitates, the undeadness of new media is not a simple consequence of economics; rather, this book argues, this cycle is also related to new medias (undead) logic of programmability. New media proliferates programmed visions, which seek to shape and to predict indeed to embody a future based on past data." (xii)
3 1 8 (13200) [-6+]mCQK chun-programmed_visions (9) 20130913a 0 -10+ progress/2013/07/notes_for_chun-programmed_visions.html
Programmed visions are always limited. "This book, therefore, links computers to governmentality neither at the level of content nor in terms of the many government projects that they have enabled, but rather at the level of their architecture and their instrumentality. . . . By individuating us and also integrating us into a totality, their interfaces offer us a form of mapping, of storing files central to our seemingly sovereign empowered subjectivity. By interacting with these interfaces, we are also mapped: data-driven machine learning algorithms process our collective data traces in order to discover underlying patterns (this process reveals that our computers are now more profound programmers than their human counterparts). . . . Crucially, this knowledge is also based on a profound ignorance or ambiguity: our computers execute in unforeseen ways, the future opens to the unexpected." (9) Compare to conclusion reached concerning hermeneutic phenomenology in second candidacy exam.
3 1 8 (13300) [-6+]mCQK chun-programmed_visions (8-9) 20130913 0 -11+ progress/2013/07/notes_for_chun-programmed_visions.html
Interfaces are another key component of neoliberal transformation certifying dream of programmability to nonexperts " (8-9) Relatedly, user-friendly computer interfaces have been key to empowering and creating productive individuals. As Ben Shneiderman, whose work has been key to graphical user interfaces (GUIs), has argued, these interfaces succeed when they move their users from grudging acceptance to feelings of mastery and eagerness. Moreover, this book argues, interfaces as mediators between the visible and invisible, as a means of navigation have been key to creating informed individuals who can overcome the chaos of global capitalism by mapping their relation to the totality of the global capitalist system. . . . New media empowers individuals by informing them of the future, making new media the future. . . . This future as something that can be bought and sold is linked intimately to the past, to computers as capable of being the future because, based on past data, they shape and predict it." (Shneiderman)
3 1 8 (13400) [-6+]mCQK chun-programmed_visions (19) 20130913d 0 -3+ progress/2013/07/notes_for_chun-programmed_visions.html
Historical transformation of pseudocode into source code, program into noun. "Software as logos turns program into a noun it turns process in time into process in (text) space. In other words, Manfred Broys software pioneers, by making software easier to visualize, not only sought to make the implicit explicit, they also created a system in which the intangible and implicit drives the explicit. They thus obfuscated the machine and the process of execution, making software the end all and be all of computation and putting in place a powerful logic of sourcery that makes source code which tellingly was first called pseudocode a fetish." (19)
3 1 8 (13500) [-6+]mCQK chun-programmed_visions (22) 20150830a 0 -11+ progress/2013/07/notes_for_chun-programmed_visions.html
Software a logos related to ideal of kings speech in Phaedrus. "This view of software as actually doing what it says [Galloway] (emphasis added) both separates instruction from, and makes software substitute for, execution. . . . By doing what it says, code is surprisingly logos. Like the Kings speech in Platos Phaedrus, it does not pronounce knowledge or demonstrate it it transparently pronounces itself.
(22) Not surprisingly, many scholars critically studying code have theorized code as performative. . . . The independence of machine action this autonomy, or automatic executability of code is, according to Galloway, its material essence." (22) Theorists declare code performative.
3 1 8 (13600) [-6+]mCQK chun-programmed_visions (21) 20150830 0 -8+ progress/2013/07/notes_for_chun-programmed_visions.html
Both Microsoft and free software hide the vicissitudes of execution. "Knowing software, however, does not simply enable us to fight domination or rescue software from evil-doers such as Microsoft. Software, free or not, is embedded and participates in structures of knowledge-power. . . . More subtly, the free software movement, by linking freedom and freely accessible source code, amplifies the power of source code both politically and technically. It erases the vicissitudes of execution and the institutional and technical structures needed to ensure the coincidence of source code and its execution. This amplification of the power of source code also dominates critical analyses of code, and the valorization of software as a driving layer conceptually constructs software as neatly layered." (21)
3 1 8 (13700) [-6+]mCQK chun-programmed_visions (23-24) 20130913e 0 -5+ progress/2013/07/notes_for_chun-programmed_visions.html
Example of working PowerPC assembly code to add two numbers. "The compilation or interpretation this making executable of code is not a trivial action; the compilation of code is not the same as translating a decimal number into a binary one. . . . The relationship between executable and higher-level code is not that of mathematical identity but rather logical equivalence, which can involve a leap of faith." (23-24)
3 1 8 (13800) [-6+]mCQK chun-programmed_visions (47) 20130913j 0 -1+ progress/2013/07/notes_for_chun-programmed_visions.html
Second code snippet is C++ hello world meant to be easily deciphered. "Programming languages offer the lure of visibility, readability, logical if magical cause and effect." (47)
3 1 8 (13900) [-6+]mCQK chun-programmed_visions (25) 20130913f 0 -3+ progress/2013/07/notes_for_chun-programmed_visions.html
Diagram of hardware logic circuit, which is also an abstraction. "Making code the source also entails reducing hardware to memory and thus erasing the existence and possibility of hardware algorithms.
(26) To be clear, I am not valorizing hardware over software, as though hardware naturally escapes this drive to make space signify time. Crucially, this schematic is itself an abstraction." (25)
3 1 8 (14000) [-4+]mCQK chun-programmed_visions (34) 20130913g 0 -3+ progress/2013/07/notes_for_chun-programmed_visions.html
Points out Hopper dream of automatic programming that is also significant to Rosenberg.
3 1 8 (14100) [-6+]mCQK chun-programmed_visions (51) 20130913l 0 -3+ progress/2013/07/notes_for_chun-programmed_visions.html
Readability of source code includes embedded natural language in its essential syntax as well as comments. "Source codes readability is not simply due to comments that are embedded in the source code, but also due to English-based commands and programming styles designed for comprehensibility.
(52) This notion of source code as readable as creating some outcome regardless of its machinic execution underlies codework and other creative projects.
(52-53) Source code as fetish, understood psychoanalytically, embraces this nonteleological potential of source code, for the fetish is a deviation that does not end where it should." (51)
3 1 8 (14200) [-6+]mCQK chun-programmed_visions (53) 20130913m 0 -6+ progress/2013/07/notes_for_chun-programmed_visions.html
Source code fetish creates virtual authorial subject, even leads to putative critical act of revealing sources and connections. "Code as fetish means that computer execution deviates from the so-called source, as source program does from programmer. . . . This erasure of the vicissitudes of execution coincides with the conflation of data with information, of information with knowledge the assumption that what is most difficult is the capture, rather than the analysis, of data. This erasure of execution through source code as source creates an intentional authorial subject: the computer, the program, or the user, and this source is treated as the source of meaning." (53)
3 1 8 (14300) [-4+]mCQK chun-programmed_visions (37-38) 20130913h 0 -6+ progress/2013/07/notes_for_chun-programmed_visions.html
Data-driven programming as beginning of alternative to humans writing code suggested by Kittler.
3 1 8 (14400) [-6+]mCQK chun-programmed_visions (54) 20130913n 0 -1+ progress/2013/07/notes_for_chun-programmed_visions.html
Hints at potential surprises in unknowns that may arise despite programmed vision, like deformation discoveries by McGann. "Embracing software as thing, in theory and in practice, opens us to the ways in which the fact that we cannot know software can be an enabling condition: a way for us to engage the surprises generated by a programmability that, try as it might, cannot entirely prepare us for the future." (54)
3 1 8 (14500) [-6+]mCQK chun-programmed_visions (66-67) 20130913p 0 -4+ progress/2013/07/notes_for_chun-programmed_visions.html
Operating systems interpellate users actually and rhetorically. "Interfaces and operating systems produce users --one and all. Without OS there would be no access to hardware; without OS there would be no actions, no practices, and thus no user. Each OS, in its extramedial advertisements, interpellates a user : it calls it a name, offering it a name or image with which to identify.
(67) Computer programs shamelessly use shifters pronouns like my and you --that address you, and everyone else, as a subject." (66-67) Blind faith supplants knowledge that was never there.
3 1 8 (14600) [-4+]mCQK chun-programmed_visions (79) 20130705 0 -3+ progress/2013/07/notes_for_chun-programmed_visions.html
Act of reading assumed by Bush and others to automatically entail understanding, the same fallacy pointed out by Plato, a human parallel to ignoring vicissitudes of execution in computers; conflations of storage with access, memory with storage, word with action.
3 1 8 (14700) [-6+]mCQK chun-programmed_visions (89) 20130913u 0 -10+ progress/2013/07/notes_for_chun-programmed_visions.html
Daemonic processes fit Derridean analysis of writing. "Interactive operating systems, such as UNIX, transform the computer from a machine run by human operators in batch mode to alive personal machines, which respond to the users commands. . . . Real-time processes, in other words, make the user the source of the action, but only by orphaning those writing processes without which there could be no user. . . . As a symptom of this desire for the transparency of knowledge, for the reigning of rationality, daemon is also a backronym. Since the first daemon automatically made tape backups for the file system, it has been widely and erroneously assumed that daemon initially stood for Disk And Executive MONitor (this alleged source phrase was later adopted)." (89)
3 1 8 (14800) [-6+]mCQK berry-philosophy_of_software (15) 20131025c 0 -5+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Hidden versus visible affordances complicate computational objects but also leave saving power of epistemological transparency. "In a similar way to physical objects, technical devices present the user a certain function . . . but this set of functions (affordances) in a computational device is always a partial offering that may be withheld or remain unperformed. This is because the device has an internal state which is generally withheld from view and is often referred to as a black box, indicating that it is opaque to the outside view." (15)
3 1 8 (14900) [-6+]mCQK kitchin_and_dodge-code_space (5) 20130909 0 -9+ progress/2013/09/notes_for_kitchin_and_dodge-code_space.html
Four levels of software embedding in everyday life. "We see software as embedded in everyday life at four levels of activity, producing what we term coded objects, coded infrastructures, coded processes, and coded assemblages.
(5) Coded objects are objects that are reliant on software to perform as designed.
(6) Coded infrastructures are both networks that link coded objects together and infrastructures that are monitored and regulated, fully or in part, by software.
(6) Coded processes consist of the transactions and flows of digital capta across coded infrastructure. . . . Part of the power of relational captabases is that they hold common fields that allow several captabases to be cross-referenced and compared precisely by software.
(7) Coded assemblages occur where several different coded infrastructures converge, working together in nested systems or in parallel, some using coded processes and others not and become integral to one another over time in producing particular environments, such as automated warehouses, hospitals, transport systems, and supermarkets." (5) Coded objects, infrastructures, processes, assemblages.
3 1 8 (15000) [-6+]mCQK kitchin_and_dodge-code_space (40) 20130915q 0 -5+ progress/2013/09/notes_for_kitchin_and_dodge-code_space.html
Power is relational, arising for code as it does for people out of relationships and interactions. "Power is not held and wielded by software; rather, power arises out of interrelationships and interactions between code and the world. . . . In other words, code is permitted to express certain forms of power (to dictate certain outcomes) through the channels, structures, networks, and institutions of societies and permissiveness of those on whom it seeks to work, in the same way that an individual does not hold and wield power but is afforded it by other people, communal norms, and social structures." (40)
3 1 8 (15100) [-6+]mCQK kitchin_and_dodge-code_space (72) 20130925f 0 -6+ progress/2013/09/notes_for_kitchin_and_dodge-code_space.html
Software produces space by Mackenzie technicity realized through transduction, things reiteratively transitioning states. "The reason why software can modulate the perpetual production of space is because it possesses significant degrees of technicity. This technicity is realized through the process of transduction. . . . Transduction is a process of ontogenesis, the making anew of a domain in reiterative and transformative individuations it is the process by which things transfer from one state to another." (72) Compare to use of concept by Sterne.
3 1 8 (15200) [-6+]mCQK kitchin_and_dodge-code_space (13) 20131103e 0 -13+ progress/2013/09/notes_for_kitchin_and_dodge-code_space.html
Software studies to date tend to ignore spaces in which software and people work. "Software studies focuses on the etiology of code and how code makes digital technologies what they are and shapes what they do. It seeks to open the black box of processors and arcane algorithms to understand how software its lines and routines of code does work in the world by instructing various technologies how to act.
(13) All too often, however, they focus on the role of software in social information, organization, and regulation, as if people and things exist in time only, with space a mere neutral backdrop. . . . Space is not simply a container in which things happen; rather, spaces are subtly evolving layers of context and practices that fold together people and things and actively shape social relations. . . . Software matters because it alters the conditions through which society, space, and time, and thus spatiality, are produced.
(13) Our principal argument, then, is that an analysis of software requires a thoroughly spatial approach.
(16) we develop a distinct understanding of spatiality that conceives the world as ontogenetic in formulation (that is, constantly in a state of becoming) and rethink software-based governance as a system of automated management." (13)
3 1 8 (15300) [-6+]mCQK berry-philosophy_of_software (119) 20130911t 0 -3+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Bernard Stiegler interpretation of Heidegger, Simondon platform, and Wilfred Sellars phenomenology. " (119) I want to explore the idea that technology is actually only ever partially forgotten or withdrawn, forcing us into a rather strange experience of reliance, but never complete finesse or virtuosity with the technology.
(119-120) I want to develop the argument that we should not underestimate the ability of technology to act not only as a force, but also as a platform. This is the way in which the loose couplings of technologies can be combined, or made concrete (Simondon 1980), such that the technologies, or constellation of technologies act as an environment that we hardly pause to think about." (unreadiness-to-hand) Materiality of code as it is tied to phenomena, whether prescriptively creating it or being part of it, must be understood in terms of not only its potentialities as a force, but also as a platform, only ever partially withdrawn
3 1 8 (15400) [-6+]mCQK berry-philosophy_of_software (121) 20131025u 0 -4+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Phenomenological exploration of experience of digital technology. "To look at the specific instance of computation devices, namely software-enabled technologies, I want to make a particular philosophical exploration of the way in which we experience digital technology. This is a method called phenomenology, and as such is an approach that keeps in mind both the whole and the parts, and that is continually reminding us of the importance of social contexts and references (i.e. the referential totality or the combined meaning of things)." (121)
3 1 8 (15500) [-6+]mCQK berry-philosophy_of_software (124-126) 20130911u 11 -6+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Heidegger circumspection mixed with symbolically sophisticated non-human actors yields unreadiness-to-hand phenomena, making evident how Berry casts danger inherent in technology. " . This [example of Google instant search] demonstrates the very lack of withdrawal or semi-withdrawal of computational devices . . . this is the phenomena of unreadiness-to-hand which forces us to re-focus on the equipment, because it frustrates any activity temporarily (Blattner 2006:58), that is that the situation requires deliberate attention.
(127) The critical question throughout is whether computation is a concept seemingly proper to knowing-that has been projected onto knowing-how/Dasein and therein collapses the distinction between knowing-how and knowing-that hence inducing the substitution of knowing-that for Dasein." (124-126)
3 1 8 (15600) [-4+]mCQK berry-philosophy_of_software (129-130) 20130911w 0 -5+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Time-sharing operating system example of transformation of present-at-hand into ready-to-hand; television and Atari VCS do similar work.
3 1 8 (15700) [-4+]mCQK berry-philosophy_of_software (131-132) 20131025v 0 -5+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Add computational to Sellars scientific and manifest image; per Harman, is materiality implied if do not fully withdraw?
3 1 8 (15800) [-6+]mCQK berry-philosophy_of_software (142-145) 20130912a 6 -9+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Riparian habitus of real time streams for new notion of subject, watching at multiple levels one component of digital literacy " perhaps constituting narratives; makes sense that next type of philosophical production informed by technological imaginary (Zizek). (142-145) . . . The real-time stream is not just an empirical object; it also serves as a technological imaginary, and as such points the direction of travel for new computational devices and experiences. . . . The new streams constitute a new kind of public, one that is ephemeral and constantly changing, but which modules and represents a kind of reflexive aggregate of what we might think of as a stream-based publicness which we might cal riparian-publicity. Here, I use riparian to refer to the act of watching the flow of the stream go by." (ever just watch tcpdump)
3 1 8 (15900) [-4+]mCQK berry-philosophy_of_software (145-149) 20131025w 0 -13+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Building computational subject as stream from Lyotard fables, Massumi affective fact, software avidities, Husserlian comet, processing multiple streams at once (Aquinas).
3 1 8 (16000) [-7+]mCQK berry-philosophy_of_software (145-149) 20131025x 28 -2+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Restructuring post-human subjectivity riding on top of network of computationally-based technical devices the key point of the book: is it a phenomenological result? (145-149) This is the restructuring of a post-human subjectivity that rides on top of a network of computationally-based technical devices. This notion of a restructured subjectivity is nicely captured by Lucas (2010) when he describes the experience of dreaming about programming.
3 1 8 (16100) [-6+]mCQK berry-philosophy_of_software (145-149) 20130126 16 -18+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Materiality of code inscribed in programmers through long habituation, internalized to point of dreaming " whereas materiality of software inscribed in users, for example multitasking synaptogenesis. (145-149) A link is formed between affective and empirical facts that facilitates and mobilizes the body as part of the processes of a datascape or mechanism directed towards computational processes as software avidities, for example, complex risk computation for financial trading, or ebay auctions that structure desire. . . . This notion of computationally supported subject was developed in the notion of the life-stream [by Freeman and Gerlernter]. . . . This is a life reminiscent of the Husserlian comet, that is strongly coupled to technology which facilitates the possibility of stream-like subjectivity in the first place. . . . This is the restructuring of a post-human subjectivity that rides on top of a network of computationally-based technical devices. This notion of a restructured subjectivity is nicely captured by Lucas (2010) when he describes the experience of dreaming about programming. . . . This is the logic of computer code, where thinking in terms of computational processes, as processual streams, is the everyday experience of the programmer, and concordantly, is inscribed on the programmers mind and body." (Rosenberg)
3 1 8 (16200) [-4+]mCQK berry-philosophy_of_software (153) 20130912e 0 -2+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Challenges to liberal humanist individual, noting Heidegger authentic time versus time of the computational stream; bounded rationality replaced by extended cognition, thus appeal to visual rhetoric to comprehend big data (Manovich).
3 1 8 (16300) [-4+]mCQK berry-philosophy_of_software (160) 20130124 0 -5+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Guattari processual, device-dependent subjectivity; possible alternative computational theory of mind inclusive of Derridian archive checking against key arguments about delegating classes of cognitive duties to technical devices; involvement of code situated materially significant even if its goal is to strive to erase spatiality and temporality as in financial systems.
3 1 8 (16400) [-7+]mCQK berry-philosophy_of_software (162-164) 20131025z 0 -1+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Lifestreams are Kitchin and Dodge capta trails, and can be studied phenomenologically for their impact on everyday life. (162-164) I now want to look at the practice of creating lifestreams, particularly through the example of Twitter.
3 1 8 (16500) [-4+]mCQK berry-philosophy_of_software (165) 20130912i 0 -9+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Huge distributed machine cognized memory of lifestreams; think of how machine subjectivity arose in science fiction series Caprica from avatars.
3 1 8 (16600) [-4+]mCQK berry-philosophy_of_software (167) 20130912j 0 -6+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Default ontological insecurity, inability to distinguish knowing-how and knowing-that; relate to Turkle robotic moment of being alone together.
3 1 8 (16700) [-4+]mCQK berry-philosophy_of_software (167-169) 20130912k 4 -9+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Heideggerian danger includes reclassifying entities from persons to objects, so seeking to promote gathering; thus our mission as philosophers of computing is digital Bildung (self-cultivation), fostering super-critical, versus sub-critical and acritical subject positions.
3 1 8 (16800) [-7+]mCQK berry-philosophy_of_software (170-171) 20130512 0 -7+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Promotes an ethic of being a good stream, whose Serres parasitic subjectivity, although requiring thoughtful comportment to computer technologies, does not endorse outright learning and practicing programming as itself critically important to being a good stream the way literacy did for prior generations, or as a substantial component of humanities scholarship intellectual labor. (170-171) In the spirit of Lyotards expression of an aesthetics of disruption, however, I want to end the book with an elusive ought. This is an ought that is informed by a reading of Aesops Tales through Michel Serres and his notion of the parasite (Serres 2007). The parasite is used not as a moral category, but in connection with an actors strategic activities to understand and manipulate the properties of a network. . . . The question of who this subject eats next to, is perhaps reflected in the way in which streams pass through other streams, consumed and consuming, but also in the recorded moments and experiences of subjects who remediate their everyday lives.
3 1 8 (16900) [-6+]mCQK berry-philosophy_of_software (170-171) 20130912l 2 -10+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Final thought is Serres-inspired parasite subjectivity in symbiotic relationship to enormous machinery generating digital standing reserve, although I see flaw in this image because passing through underground cavity to surface waters involves reduction passing through porous solid material like sand, losing coherence of human navigating cyberspace as on a surfboard or automobile. " The parasite is used not as a moral category, but in connection with an actors strategic activities to understand and manipulate the properties of a network. . . . The question of who this subject eats next to, is perhaps reflected in the way in which streams pass through other streams, consumed and consuming, but also in the recorded moments and experiences of subjects who remediate their everyday lives. This computational circulation, mediated through real-time streams, offers speculative possibilities for exploring what we might call parasitic subjectivity. Within corporations, huge memory banks are now stockpiling these lives in digital bits, and computationally aggregating, transforming and circulating streams of data literally generating the standing reserve of the digital age. Lyotards (1999: 5) comment to the streams that flow through our postmodern cultural economies seems as untimely as ever: true streams are subterranean, they stream slowly beneath the ground, they make headwaters and springs. You cant know where theyll surface. And their speed is unknown." (170-171)--3.1.9+++ code studies
3 1 9 (100) [-6+]mCQK montfort_el_al-10_print (6-7) 20131024f 1 -3+ progress/2013/02/notes_for_montfort_el_al-10_print.html
Component disciplines to critical programming are CCS, to which this work claims allegiance and gives good description, SS and PS. " CCS is a set of methodologies for the exegesis of code. Working together with platform studies, software studies, and media archeology and forensics, critical code studies uses the source code as a means of entering into discussion about the technological objects in its fullest context. CCS considers authorship, design process, function, funding, circulation of the code, programming languages and paradigms, and coding conventions." (6-7)
3 1 9 (200) [-7+]mCQK marino-critical_code_studies (np) 20130124 0 -10+ progress/2012/07/notes_for_marino-critical_code_studies.html
Engage phenomenological and hermeneutic approaches to philosophical study of code, architecture, and documentation; at critical programming intensity insist practitioners develop liftetime portfolio of and by working code, that is, engage in system integration projects they use in their everyday and scholarly practices. (np) Critical Code Studies (CCS) is an approach that applies critical hermeneutics to the interpretation of computer code, program architecture, and documentation within a socio-historical context. . . . Critical Code Studies follows the work of Critical Legal Studies, in that its practitioners apply critical theory to a functional document (legal document or computer program) to explicate meaning in excess of the documents functionality, critiquing more than merely aesthetics and efficiency. . . . Through CCS, practitioners may critique the larger human and computer systems, from the level of the computer to the level of the society in which these code objects circulate and exert influence.
(np) My own critical approach will stress meaning, implication, and connotation, though not in terms of a self-contained system of meaning but with respect to the broader social contexts.
3 1 9 (300) [-6+]mCQK johnson-what_is_cultural_studies_anyway (66) 20130930v 0 -6+ progress/2010/11/notes_for_johnson-what_is_cultural_studies_anyway.html
Connection to Semiotics of Programming on theories of production of subjects? "The key insight for me, is that narratives or images always imply or construct a position or positions from which they are to be read or viewed. . . . If we add to this, the argument that certain kinds of texts (realism) naturalize the means by which positioning is achieved, we have a dual insight of great force. The particular promise is to render processes hitherto unconsciously suffered (and enjoyed) open to explicit analysis." (66)
3 1 9 (400) [-6+]mCQK marino-critical_code_studies (np) 20131005f 0 -10+ progress/2012/07/notes_for_marino-critical_code_studies.html
Takes stand against Cayley and others who insist the code to study must be executable. "Everything. The code, the documentation, the comments, the structures all will be open to interpretation. . . . Within CCS, if code is part of the program or a paratext (understood broadly), it contributes to meaning. . . . Within the code, there will be the actual symbols but also, more broadly, procedures, structures, and gestures." (np) Everything surrounding the code and resembling code can be interpreted.
3 1 9 (500) [-6+]mCQK fuller-software_studies (40-41) 20131030 12 -4+ progress/2011/10/notes_for_fuller-software_studies.html
Kittler refers to encrypted letters in Suetonius Lives of the Caesars. " In his Lives of the Caesars, Suetonius . . . recounts discovering encrypted letters among the personal files left behind by both the divine Caesar and the divine Augustus." (40-41) Introduce Plutarch.
3 1 9 (600) [-6+]mCQK fuller-software_studies (45-46) 20131021 0 -5+ progress/2011/10/notes_for_fuller-software_studies.html
Code. "Turing himself, when he explored the technical feasibility of machines learning to speak, assumed that this highest art, speech, would be learned not by mere computers but by robots equipped with sensors, effectors, that is to say, with some knowledge of the environment. However, this new and adaptable environmental knowledge in robots would remain obscure and hidden to the programmers who started them up with initial codes. The so-called hidden layers in todays neuronal networks present a good, if still trifling, example of how far computing procedures can stray from their design engineers, even if everything works out well in the end. Thus, either we write code that in the manner of natural constants reveals the determinations of the matter itself, but at the same time pay the price of millions of lines of code and billions of dollars for digital hardware; or else we leave the task up to the machines that derive code from their own environment, although we then cannot read that is to say: articulate this code. Ultimately, the dilemma between code and language seems insoluable." (45-46) Philosophy of embodiment tie in with Turing recognizing need for knowledge of environment.
3 1 9 (700) [-7+]mCQK montfort_el_al-10_print (263) 20130311 0 -10+ progress/2013/02/notes_for_montfort_el_al-10_print.html
Code functions; executability of code differentiates it from other texts and semiotic systems, while sharing personal and cultural significance with other types of texts. (263) Code is not only a conventional semiotic system. At its essence, code also functions. Code runs. Code does something. Code executes on the computer and has operational semantics. But code means things to people as well, both implicitly and explicitly. . . . We hope this will encourage the detailed analysis of other short programs and suggest that it is worthwhile to focus on important subroutines, functions, and procedures within larger systems of code.
3 1 9 (800) [-7+]mCQK montfort_el_al-10_print (8) 20131024i 0 -2+ progress/2013/02/notes_for_montfort_el_al-10_print.html
Code as cultural resource, text with machine and human meanings. (8) Finally, code is a cultural resource, not trivial and only instrumental, but bound up in social change, aesthetic projects, and the relationship of people to computers. Instead of being dismissed as cryptic and irrelevant to human concerns such as art and user experience, code should be valued as text with machine and human meanings, something produced and operating within culture.
3 1 9 (900) [0+]mCQK bork-journal 20150901 20150901 0 -6+ journal_2015.html
Programming languages being within the scope of code studies, there is a reason to continue Chun and tie up loose ends from Campbell-Kelly and others; perhaps the point is for this section to be more broad than critical code studies.
3 1 9 (1000) [-6+]mCQK chun-programmed_visions (166-167) 20130914j 0 -10+ progress/2013/07/notes_for_chun-programmed_visions.html
Complete and short codes. "To make this argument, von Neumann separates codes into two types: complete and short. . . . Importantly, Turing himself did not refer to short or complete codes, but rather to instructions and tables to be mechanically meaning faithfully followed. . . . Thus, in a remarkably circular route, von Neumann establishes the possibilities of source code as logos: as something iterable and universal. Word becomes action becomes word becomes the alpha and omega of computation." (166-167)
3 1 9 (1100) [-6+]mCQK chun-programmed_visions (165) 20130914i 0 -13+ progress/2013/07/notes_for_chun-programmed_visions.html
Strategy replaces description to yield automatic production of instructions. "Most importantly, von Neumann and [Oskar] Morgenstern introduce the notion of strategy to replace or simplify detailed description. . . . This replacement of a complete description with a strategy is not analogous to the replacement of machine code with a higher-level programming language, or what von Neumann calls short code. . . . This strategy, which game theory remarkably assumes every player possesses before the game, is analogous to a program a list of instructions to be followed based on various conditions. . . . A strategy/program thus emphasizes the programming/economic agent as freely choosing between choices." (165) Program, not short code.
3 1 9 (1200) [-4+]mCQK chun-programmed_visions (163) 20130709 0 -2+ progress/2013/07/notes_for_chun-programmed_visions.html
Equivalence of describing and producing an object linked to equivalence of access and comprehension, setting up programmed visions, although the question remains who or what transforms descriptions into instructions, and makes humans and automata indistinguishable: knowledge management reflects this unconscious philosophy by focusing on systems making data ready at hand rather than organizing structure of data.
3 1 9 (1400) [-4+]mCQK chun-programmed_visions (157) 20130914g 0 -5+ progress/2013/07/notes_for_chun-programmed_visions.html
The argument for memory, stored instructions, and primacy of software based on von Neumann use of McCulloch and Pitts neuron model rathert than Shannon communication model.
3 1 9 (1500) [-7+]mCQK chun-programmed_visions (41-42) 20130913i 0 -10+ progress/2013/07/notes_for_chun-programmed_visions.html
From pseudocode to source code as immaterial information, actualizing Turing short code, by separating imperative from action. (41-42) Higher-level programming languages, unlike assembly language, explode ones instructions and enable one to forget the machine. . . . With programming languages, the product of programming would no longer be a running machine but rather this thing called software something theoretically (if not practically) iterable, repeatable, reusuable, no matter who wrote it or what machine it was destined for; something that inscribes the absence of both the programmer and the machine in its so-called writing. Programming languages enabled the separation of instruction from machine, of imperative from action, a move that fostered the change in the name of source code itself from pseudo to source. . . . Pseudocode, which enables one to move away from machine specificity, is called information --what later would become a ghostly immaterial substance rather than code.
3 1 9 (1600) [-7+]mCQK rosenberg-dreaming_in_code (67) 20131009p 0 -2+ progress/2013/03/notes_for_rosenberg-dreaming_in_code.html
Source code as a distinct type of text born with Fortran. (67) In Fortran, laborious sequences of assembly language procedures were summarized in brief commands. The human programmer would write a sequence of these commands source code; then a kind of uberprogram running on the computer called a compiler would translate those commands into object code in the machines own language.
3 1 9 (1700) [-4+]mCQK campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog (34) 20130913g 0 -10+ progress/2012/08/notes_for_campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog.html
Programming languages FORTRAN and COBOL improved productivity first by generating multiple machine instructions per line of code.
3 1 9 (1800) [-6+]mCQK campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog (35) 20130913h 0 -2+ progress/2012/08/notes_for_campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog.html
Network effects popularized FORTRAN more so than help from IBM. "There was no conspiracy: FORTRAN was simply the first efficient and reliable programming language. What economists later called network effects made FORTRAN a standard language with little or no help from IBM." (35)
3 1 9 (1900) [-4+]mCQK campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog (35) 20131027c 0 -7+ progress/2012/08/notes_for_campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog.html
US DoD pushed industry to agree on standard business language, from which COBOL arose; FORTRAN and COBOL garnered two-thirds of application programming activity for next twenty years.
3 1 9 (2000) [-4+]mCQK fuller-software_studies (237-238) 20121219 0 -11+ progress/2011/10/notes_for_fuller-software_studies.html
Source Code: well stated definition of source code and von Neumann architecture machinery invoking Knuth forming a defining statement of post postmodern cybersage; Knuth should be on reading lists for philosophers of programming, Ceruzzi among historians and philosophers of computing.
3 1 9 (2100) [-7+]mCQK fuller-software_studies (236) 20121217 0 -1+ progress/2011/10/notes_for_fuller-software_studies.html
Source Code: starts with an incomplete C program because that is all that will fit on one page, a thoughtful program to consider as a way of creating space for virtual ingredients in same proportion as cookbook recipe ingredients and measures given Knuth comparing programming to recipes and cookbooks. (236) / Barszcz C recipe
* string based cooking
* Copyleft (C) 2006 Dennis Jaromil Rojo
#include <stdio.
3 1 9 (2200) [-6+]mCQK fuller-software_studies (239-240) 20130923o 0 -9+ progress/2011/10/notes_for_fuller-software_studies.html
Source Code. "The idea of source code, and indeed the open source model, extends beyond programming and software. For instance, Knuth points to creative aspects of programming alongside technical, scientific, or economic aspects, and says that writing a program can be an aesthetic experience much like composing poetry or music. Source code can be considered to have aesthetic properties; it can be displayed and viewed. It can be seen as not only as a recipe for an artwork that is on public display but as the artwork itself as an expressive artistic form that can be curated and exhibited or otherwise circulated. . . . The software art repository Runme.org lists obfuscated code under the category of code art alongside code poetry, programming languages, quines, and minimal code." (239-240) Aesthetic properties of source code, preference for brief examples yields attractor to code poetry, quines, minimal code, and of course obfuscated code, which perhaps redefines beauty as extreme style.
3 1 9 (2300) [-4+]mCQK fuller-software_studies (239) 20130923n 0 -7+ progress/2011/10/notes_for_fuller-software_studies.html
Source Code: gives examples of foss repositories and invokes Stallman.
3 1 9 (2400) [-4+]mCQK fuller-software_studies (240) 20130923p 0 -2+ progress/2011/10/notes_for_fuller-software_studies.html
Source Code: ends with calls to cook function displayed at beginning; important that authors note example of using personal free, open source project as part of human oriented (philosophical) text, alluding to not so much critical code as critical programming study.
3 1 9 (2500) [-6+]mCQK bork-journal 20150902 20150902 0 -3+ journal_2015.html
Wanting to jump ahead and start final section in theoretical framework riding wave of all prior sections converging but need to include C source code from Berry no it is lexicon entry. It is the do it all at once simultaneously thought of network dividual cyborgs PHI after long resisting for many iterations adhering to sequential section approach to thinking. Large collective intelligences first perceived each other as quantifiable data using punch card machinery manufactured by IBM worldwide.
3 1 9 (2600) [-6+]mCQK berry-philosophy_of_software (31-32) 20130910n 0 -12+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Code understood as textual and social practices of static source code writing, testing, and distribution, implying close reading. "Throughout this book I shall be using code to refer to the
[working code css]
jbork@jbork-UX305FA:~/public_html/progress/2011/10$ ln -s holbein-ambassadors_20111007.jpg vpf_20111007.jpg
[working code css]
Here is some working code PHI. Just enough to hint at another image excluded due to complexity of assuring no need for copyright permission.
3 2 1 (200) [-6+]mCQK foucault-discipline_and_punish (213) 20131030 0 -1+ progress/2012/06/notes_for_foucault-discipline_and_punish.html
Contrast dust model of knowledge to potentials of code/space capta trails " (213) Police power must bear over everything: it is not however the totality of the state nor of the kingdom as visible and invisible body of the monarch; it is the
[working code css]
jbork@jbork-UX305FA:~/src/tapoc$ sudo make web-localhost
perl -cw gentapoc.cgi
Name "main::future_time" used only once: possible typo at gentapoc.cgi line 210.
bork@jbork-UX305FA:~/src/tapoc$ vi -R +210 gentapoc.cgi
(ellipsis)
# 20130228 use MySQL to perform time computation (descendant of computing Easter day function of computers as part of overall language machine operation feared by Heidegger, and wishing simple inline BASH versus more complex Perl)
my $future_time = "never" if($future_time==0);
$future_time = `mysql -u$db_user -p$db_passwd --batch --skip-column-names -e"select addtime(now(), sec_to_time($default_refresh_rate/1000))"` if($default_refresh_rate != 0);
(ellipsis)
select addtime(now(), sec_to_time(600000/1000));
2015-09-17 23:06:31
[working code css]
Huh I ask myself looking at this code. Opening in read only mode means I have no intention to mess with future_time working code, for a lot of working code is teleaction as defined by Manovich. I have no idea what this code does, oh now that I read it again, it is for setting the refresh timer that I know in at least one place is in Javascript, the thought passes thru as Javascript and every time the Perl program containing it is executed, which is by HTTP client requests familiar to web browsers that can also occur for the most part in cyberspace worlds coextensive with the planet, for this MySQL SQL script displays a future time based on the present and the default refresh rate basis of the web page in seconds, for example, ten minutes. Yet the function is good over an incredible range that encompasses all future operations and works backwards to encode more past ones throughout human history if a negative value is accepted, that is how this typing is connected to a thought that recurs today on this day of the month every year. Do I really want to repeat this life again and again is how Nietzsche battles the draw of oblivion, as I contemplate a computational architecture that may hook into a much longer than my human life assembly as Hayles calls it like BwO doing her punnish part to produce philosophical concepts along with her Oreo example. A partially obvious point from the program is that as long as future_time and default_refresh_rate are zero, we do not have to worry about the soundness of the SQL. But there is still the presumption of refresh_rate being set when defined locally, perhaps meaning it should be taken from the encapsulating layer, for encapsulation is relative to the assumed procedurality of each member of the intended grouping of code snippets versus some other initialization principle like from a default value like its data type equivalent of zero or nothing. See how code takes care of distinction between zero and nothing, an arbitrary base PHI versus absence of a value altogether, zero information as absolute randomness taken in Shannon language used by Kittler and criticized by Hayles. I had forgotten Hayles coins Work as Assemblage, WaW, as partner of BwO, interpellating as a Deleuze and Guattari critic. Is it worth noting that beyond our study of Deleuze we should include Guattari solo work like Machinic Heterogenesis I have cited briefly, and could in that way bypass One Thousand Plateaus and Anti-Oedipus, good old philosophical finesse that can be used to bypass Heidegger, Nietzsche, Lacan, Freud, and so on so we have time for philosophical programmers like Turing, Burks, Goldstine, von Neumann, Kemeny, Knuth, Stallman, Gates, Stroustrup, and so on, not to mention those hidden in the repressed IBM text. Now I see it, the ambiguity whether the local variable is created based on its nonexistence or initial zero value, because both resolve to the same value, zero 0." (make footnote)
3 2 2 (9100) [-6+]mCQK bork-journal 20150918 20150918a 0 -2+ journal_2015.html
Continue with notion that working code places are situated, personal, and therefore their presentation in scholarship seldom reaches the plateaus of examples like the Quicksort algorithm, but on the other hand, perform exactly like the original sense of diachrony within synchrony OGorman develops. Specifically, were I to look back into the code I wrote as a child for my automating my middle school student activity registration process, refined removing a my, in which I implemented Quicksort in Apple // Basic copied from a magazine, clueless as it is actual algorithmic efficacy and only interesting in a faster sort than the bubble sort I could derive on my own, those diachronic associations OGorman may begin to emanate from it, answering how one philosophizes with computing PHI.
3 2 2 (9200) [-6+]mCQK ulmer-florida_out_of_sorts (30) 20131109c 0 -8+ progress/2012/06/notes_for_ulmer-florida_out_of_sorts.html
Mystory popcycle genre for holistic simultaneous writing with all individual interpellated discourses. "The mystory is a genre created to write holistically or simultaneously with all the discourses into which an individual has been interpellated, the core discourses being those of family, entertainment, school (community history), and career (disciplinary field).
(30-31) Mystory assumes that alienation as an experience of dissociation and reification may be overcome in electracy by a practice adopted to the digital capacities of multimedia. This practice is fundamentally aesthetic. Following Lacans reading of Joyce, mystory brings the discourses into correspondence (uniting them into a popcycle ) by means of signifiance ( signifierness )--the repetition of a signifier through the details of each discourse, the circulating prop that organizes any well-made narrative, like the letter that passes from character to character in Poes Purloined Letter. . . . The prop that circulated through Barbara Jo Revelles popcylce was a mattress." (30) Lends itself to interactive networked multimedia.
[working code css]
mtime for [journal_2015.html] table [1442760960] prior to actual [1442762613]
Assign [20150920] relevance [0]? value/ENTER: 1
[working code css]
Note. Note this is after fixing initial wrong year in bookmark generating nonworking PHI of screen shot indiscernable whether vm or human physical working code place diachrony in synchrony PHI. This alignment of real and virtual time in no way negates it being presented as stream and noein PHI. My goal is to advance digital humanities scholarship toward a philosophy of computing, by territorializing the little explored discourse networks of the philosophical programmers who are credited with developing the machinery, languages, network protocols, operating systems, and applications of the post literacy epoch, with the aim of changing the trajectory of the dumbest generation that has formed in its wake, by promoting foss projects that conduct critical programming studies, whose practitioners could be called programming philosophers. It is as ridiculous as thinking I have a personal relationship with Turing because I use computers any more than Plato for using writing and pencils with paper. Also crucial to think about how unit operations and deprivileging programming to include playing games turns experience into mush.
3 2 4 (1900) [-4+]mCQK hayles-electronic_literature (132) 20130928e 0 -3+ progress/2010/02/notes_for_hayles-electronic_literature.html
Same Rumsfeld quote used by Zizek; this point seems obvious given the enormous role of not consciously articulated purposive action transmitting practices of all sorts.
3 2 4 (2200) [-7+]mCQK kemeny-man_and_computer (79) 20130312 0 -7+ progress/2013/03/notes_for_kemeny-man_and_computer.html
Learning by programming versus learning through solely human team activities (encompassing students working together and teacher student relations) depends on unique ability of computers to execute code at very high cycle rates for a comparative eternity for human cognition; at this level is distinguishable from other forms of computer-aided instruction on account of the being forced to teach the computer aspect, and is degraded surface interface interaction satisfaction; the argument needs to be made why programming is part of optimal symbiosis (comportment): despite accurate predictions about the emergence of the global Internet Kemeny was overly optimistic that programming would remain sufficiently valorized once sound, intuitive, user friendly interfaces arose in massive software projects like Microsoft Windows, Apple OS, and GNU/Linux floss. (79) The students learn an enormous amount by being
[working_code_css]
jbork@alkibiades:~/src/tapoc-code-0$ vi -R Journal.h
class Journal
{
public:
int set_value_operator(const string);
string get_value_operator() const { return this->value_operator; }
FILE * display(FILE *, char *, int, double);
private:
string value_operator;
int create_xml(list<struct journal_entry *>::reverse_iterator, FILE *, int, int, int, int);
(ellipsis)
UPDATE `JournalInfo`.`Arguments` SET `Value`=1 WHERE `Session`=6 and`Argument`=debug;
(ellipsis)
FILE * Journal::display_notes(FILE * fptr, struct journal_entry * jptr, bool table_output)
{
map<string, string>::reverse_iterator mritr;
for(exam_question=1, bit_operation=1, cycle=1; exam_question<4; exam_question++, bit_operation?bit_operation*=2:bit_operation=1, cycle++)
case journal_notes_sorting_recent_bookmark:
for(lit=database_sort_list.begin(); lit!=database_sort_list.end(); lit++)
for(mritr=mptr->rbegin(); mritr!=mptr->rend(); mritr++)
[working_code_css]
In working code it is a silly string called value_operator found in a C++ header file of the project. When Tanaka-Ishii distinguishes being and doing effects of computer languages, private along with local versus public mass interface concretizations of embodied technological lifeworld, where embodiment for machines can be studied and metaphorically understood but not achieved, never real. Take for example the high speed operations of input output connected to the physical world, such as via ISA TTL C functions penetrating and transcending virtualization. This working code also demonstrates procedural rhetoric of using same program (vi) to both edit and immutably, as in const, view objects, which, for virtual worlds, must always be the latter, just viewed, leaving all changes to the local host cybersage work station. My goal tonight is to make the initial entry labels small to permit more of the larger lexia to be usefully visible for reading and images while also possibly hearing formant synthesis program control of audible dimensions of virtual and real realities such as by hacking with symposia, tapoc, and pmrek with the floss [technological] milieu. Turning tomorrow looking forward to reading about ISA bus with respect to 8255 IC memory mapped physical world interface, each discrete IC wired to four ISA address bus points and one of three programmable ports, both of which images can be mapped to DIP pin assignments. I am already into the next day. Can you understand the electric background of your living into the high speed changes of the pmrek lamp display control working code? Also the undocumented working code now yesterday that reversed the order of bookmarks displayed for each reading list when sorted by recent bookmark descending. Interesting that a note made in Campbell-Kelly in August refers to Deleuze, just as I was picking up Postscript on the Societies of Control for its discussion of the dividual as constituent of post-postmodern subjectivity, adding its machinic component as a cyberneticist programmer artist rather than wearing its default representatives. In antimodern, anticapitalistic discourses there are critical comportments to alientating mass produced culture, as we hope to find saving places in simulacral culture concretizing those former forms along with their own general histories of consumption.
3 2 4 (3000) [-6+]mCQK hafner_lyon-where_wizards_stay_up_late (75) 20130223g 0 -3+ progress/2013/02/notes_for_hafner_lyon-where_wizards_stay_up_late.html
Delineation of real-time computing problems at edge of human perceptibility " (75) (Anything that takes more than 10 to 20 milliseconds, the point a which delays become humanly perceptible, is not considered
Ensoniment of Platos Symposium: Proposal for a Software Project
Near the beginning of Platos Symposium, the participants agree to dismiss the flute players and to avoid excessive intoxication in order to deliver a series of speeches on the topic of love.
4 1 1 (1200) [-4+]mCQK bork-journal 20120209 20120209 1 -23+ journal_2012.html
There are two basic layouts of the Symposium speakers, straight line or angled seating (in cases in which Agathon has a large table; there could have been multiple small groups, although the layout does not change much besides allow Aristodemus to be situated closest to equidistant from all the speakers for perfect fidelity and accurate speech to text conversion).
4 1 1 (1300) [0+]mCQK bork-journal 20120219 20120219 4 -14+ journal_2012.html
Figure out the representation for double precision, 32 bit and higher floating point values.
4 1 1 (1400) [-6+]mCQK bork-journal 20110909 20110909 1 -10+ journal_2011.html
Exploring different ways of navigating auditory space. "in addition to readings from the current course. Like Rosencrantz and Guildenstern, what you hear depends on which participant in the symposium you are. Allow hearing to be colored by assumptions about the character, as well as the history of scholarship. If a fly on the wall moving around, or one of the flute players, perhaps Alcibiades lover, other rules apply for your what you hear, simulating situated listening. There is enough framing content in Symposium to exclude the speeches themselves, monologues, and present only interactive dialogue. The whole thing could be presented while walking on a treadmill, too, for the main frame." (four square) Spatial, as in around the party, hearing concurrent conversations that loosely follow Platos sequencing; in multiple languages, hearing representation of original Greek as well as English; temporal, including the overall frame walk and the long history of commentary; fantasmatic, Plato and Socrates writing the story or Alcibiades, and so on. How is this auditory field traversed? What are audio hyperlinks going to be like? What kind of interaction are possible? Necessary to relate to PHI
4 1 1 (1500) [-4+]mCQK bork-journal 20111203 20111203 0 -69+ journal_2011.html
Display previous versions in the FDL documentation where the philosophical discussion occurs, noting it can also be obtained by selecting particular prior revisions from the source control system (for example, Sourceforge.
4 1 1 (1600) [-6+]mCQK bork-journal 20111215 20111215a 20 -11+ journal_2011.html
Back to the logic of the language machine, a speaker does not start with the current text until all the other speakers have caught up. Then it advances to its next text to synthesize and waits. Can this schema work? Along with object-oriented programming innovations, parallel programming opportunities emerge that were ridiculous or unimaginable to early electronic computing pioneers. My intuitive parallel programming design for symposia in which each speaker tests the field for the least speaker. The least speaker speaks, advances to its next position, and sleeps. Will the desired speaking phenomenon occur? It seems to work on paper. Can parallel programming be a style in Turkles sense? I am back to programming styles and programming in general. Entering the draft of working code.
4 1 1 (1700) [-4+]mCQK bork-journal 20111129 20111129a 68 -20+ journal_2011.html
Small
The active listener in the Symposium is Aristodemus.
4 1 1 (1800) [-4+]mCQK bork-journal 20111111 20111111 0 -99+ journal_2011.html
Imagine how I did it by describing participant enrollment in symposia.
4 1 1 (1900) [-4+]mCQK bork-journal 20120225 20120225 0 -41+ journal_2012.html
The programming work tonight is to test the new control of volume and implementation of functions that achieve the previous enumeration of goals for the physical operation of the system, which in this case produces human text to speech synthesis of ancient Greek letters speaking of Platos Symposium.
4 1 1 (2000) [-4+]mCQK bork-journal 20091203 20091203 0 -48+ journal_2009.html
The current version of the GNU FDL states that If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free software license, such as the GNU General Public License, to permit their use in free software.
4 1 1 (2100) [-4+]mCQK berry-philosophy_of_software (103) 20130911o 0 -5+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Compare Miwa reverse-simulation examples of logic gates to symposia simulating virtual reality.
4 1 1 (2200) [-6+]mCQK bork-journal 20150922 20150922 0 -42+ journal_2015.html
A default expression is a default response, programmed vision, susceptible to analysis by critical programming studies PHI. This non perfect reflexiveness boundary shimmers with PHI like it has every other time I have had this thought PHI. To answer an old question it really depends whether the class function is sufficiently intelligent to produce the result of the implicit query and processing decentralized distributed network unit operation PHI when asking about making hyperlink without losing too much information forces us to think about what is passed as information between humans and machines PHI. Think again what it means that thinking transferred to computing long ago. Come hear uncle johns band after all copyrights expire. This is a final act of defiance and working code.
{
header(Location: http://localhost/ch4.pdf);
jbork@jbork-UX305FA:~/src/tapoc$ sudo make web-localhost
Not Found
The requested URL /ch4.pdf was not found on this server.
jbork@jbork-UX305FA:~/src/tapoc$ vi Makefile
PDF := ch4.pdf
web-localhost: web-cgi
cp -v $(PDF) $(WWW)/
cp: cannot stat ch4.pdf : No such file or directory
make: *** [web-localhost] Error 1
jbork@jbork-UX305FA:~/src/tapoc$ ln -s playpen/ch4.pdf .
jbork@jbork-UX305FA:~/src/tapoc$ sudo make web-localhost
(ellipsis)
jbork@jbork-UX305FA:~/src/symposia$ svn update
svn: E000113: Unable to connect to a repository at URL svn://192.168.0.100/symposia
jbork@jbork-UX305FA:~/src/symposia$ svn info symposia.cpp
Last Changed Author: jbork
Last Changed Rev: 1410
Last Changed Date: 2014-03-09 16:45:58 -0400 (Sun, 09 Mar 2014)
Text Last Updated: 2014-03-07 20:14:34 -0500 (Fri, 07 Mar 2014)
Checksum: e99e187aa7c1b68158638a6192f3f032a7da731b
jbork@jbork-UX305FA:~/src/symposia$ svn diff -r 1409 symposia.cpp
Index: symposia.cpp
===================================================================
--- symposia.cpp (revision 1409)
+++ symposia.cpp (working copy)
@@ -1311,7 +1311,9 @@
//tapoc.next_entry(current_lexia, &rate, &volume);
int dummy;
tapoc.next_entry(current_lexia, &dummy, &rate, &volume);
- fprintf(output, "process: tapoc Journal object function next_entry computed rate [%d] volume [%d]\n", rate, volume);
+ fprintf(output, "process: tapoc Journal object function next_entry computed [%f] rate [%d] volume [%d]\n", current_lexia, rate, volume);
first_utterance = false;
/* ultimately needs to be called on first cycle of each new set of utterances from process calls descent sequences */
jbork@jbork-UX305FA:~/src/symposia$ vi -R +1311 symposia.cpp
[working code css]
This is a final act of defiance and working code. This is a final act of defiance and working code, or just the next step moving to chapter four in work and committee distribution view PHI, for this act makes chapter four PDF available from the main web page. If we start working at tapoc it is the OHCO thesis bending around deficiencies of XML as a procedural object oriented programming language like C++. Have to go turn on other computer to get svn output. We have to understand the significance of the revision history, even this just showing the latest revision Checksum and change date and update dates. Here is literally the last thing I did with this project in the C++ code, allowing us to see the effective changes and the comment I made, too. Oh this was where I brought in the foreign object tapoc but not as dynamically loaded library. The tapoc object is not native to symposia, so that is why its invocation is called out with a comment, I was astounded myself to be doing it. The purposes seems to be computing rate and volume but ignoring what is returned by reference to the pointer argument dummy that is likely an integer based on its appearance in the good old procedural C fprintf function." ($document == "ch4" or $document == "ch_4") 0in; line-height: 100%">[working code css]
jbork@jbork-UX305FA:~/src/tapoc$ cd playpen/
jbork@jbork-UX305FA:~/src/tapoc/playpen$ ln -s ../../../public_html/progress/2015/09/diss_chapter4_workarea.pdf ch4.pdf
jbork@jbork-UX305FA:~/src/tapoc$ vi gentapoc.php
elsei
4 1 1 (2300) [-6+]mCQK bork-journal 20150923 20150923 0 -8+ journal_2015.html
The challenge now is to review the Subversion repository to see if important working code places can be resurrected. Linking changes to journal entries that became Notes could be described and referenced in an Appendix for each project. An Appendix has been considered for displaying arrangements of Notes to record traversal of daily journal display when covering tapoc. Consider pmrek to be working code close to the machine as response to wish to study 1980s microcomputers that cannot be supported by network society. The vm is ultra high complexity size bandwidth not appropriate as unit object perhaps but still computable by passing through my code PHI running the vm. We must consider how symposia is the non place of two humans not coinciding bodily but perhaps under similar initials PHI. When you do something in relation to code you know you are doing something in programming languages, losing language during traversal of lower layers in TCP IP networks LAN and Internet PHI makes that language code indistinguishable mush of background ambient sounds including symposia style audio areas PHI. That the vm hosts ensoniment and reading is key.
4 1 1 (2400) [-6+]mCQK bork-journal 20151001 20151001 0 -7+ journal_2015.html
The second voice in symposia disaffords idea of performing multiple speakers from same base unit. It arises from the polyglot. If you throw out Kittler for allegiance to Heidegger and Nietzsche question arises whether to also dismiss those ways of asking questions about philosophy and computing PHI. In terms of the development of symposia second simultaneous with slight offset voice in other language carries thought where English bred PHI do not hear Greek or Latin PHI by broken down time discussion all languages cross. It also becomes a crossing of English Greek Latin C++ texts. Look at database table schema for how ordering established becoming query in tapoc. I arrive at the question what if the philosophy of computing involves consideration of programming languages then how might we proceed tapoc.
Sterne gives an account of sound reproduction media that transcends discrete devices to the whole network of knowledge systems, power relations, and cultural norms that embody any example of sound reproduction.
4 1 2 (300) [-6+]mCQK sterne-audible_past (338) 20131018w 0 -6+ progress/2011/09/notes_for_sterne-audible_past.html
Despite mentioning audio engineering of virtual acoustic spaces, Sterne seems to be turning away from entertaining the possibilities of synthetic sounds with no real precedent, thus a key place where Sterne can be remediated, a point for floss to pass through, to become part of some program. "To understand the aural dimensions of
[working code css]
jbork@jbork-UX305FA:~/src/tapoc$ make
Nominate Items with todays timestamp [[1-9][0-9][0-9][0-9]0924]? y/n:y
Is [progress/2015/09/screenshot_20150924.png] relevant? y/n:y
executing SQL [update Items set Relevance=1 where Path=progress/2015/09/screenshot_20150924.png]
[working code css]
Here it is. My code does it for me by my design, and am giving over some of the task of writing this dissertation and note taking to the machine, but in a very deliberate manner, not like Derrida and his Macintosh, more like Torvalds and his generic personal computer. Note there is a procedural enthymeme here in the pseudo dialog between the user being asked a question and the system doing something in pseudo dialogic response, maybe a programmed vision, but always by programming. The procedural enthymeme traverses the working code of this shell script and all the other forms it invokes, including interpreted Perl of the CGI
4 2 1 (200) [-6+]mCQK bork-journal 20130915 20130915 0 -3+ journal_2013.html
The pace of dissertation proposal progress and overall plan begin to become quantified, visible from the preliminary table and now a spread sheet. The next step in software development should be to intuit the starting page number of each note, with the eventual plan of displaying the quotation along with the note in the chapter literature reviews. Is the perseverance of working this code with the goal of using it to create the dissertation itself an answer to an old challenge by Weizenbaum to not code compulsively?
4 2 1 (400) [-5+]mCQK bork-journal 20131011 20131011 0 -6+ journal_2013.html
We have to realize that if reality really is like assemblages, collective intelligence, net work dividual, flow, real time noein legein English Greek C++, as suggested by Spinuzzi, then we have to live in the program run time along with human thought. New casting of proposal looking more like table of contents becomes one such rhizomatic surfacings of the constitution of the code making reality in real time, shifting from previous iteration to be reconstituted in a virtual machine PHI by manipulating effective date: one day try future sightings into times past copyright expiration of all signifiers, symbols, objects, passages, streams, and so on forming ontological difference from when prohibited, and by doing this immediately with floss performs ontological finesse. Another example derives from work experience reverse engineering checksum to derive protocol from system itself. Note this programming change also adjust flow of ensoniment to bypass former table of contents, only for it to be announced (spoken, enunciated) by default at the end. The proposal flip flops between predominate human and machine activities keeping explicit continuous dual operation as symbiotic assemblies: cybernetics and cognitive science concludes with extended mind, then enters computing networks, only to flip back to human cyborg actant, then into the next chapter continuing human in textuality students, shifting to SCOT before taking on a different or merely accidental rhetorical pattern. This could be done using generic applications or via tedious markup; instead I write C++ and use early, flat HTML.
4 2 1 (500) [-6+]mCQK kittler-draculas_legacy (52-53) 20131001e 0 -11+ progress/2012/05/notes_for_kittler-draculas_legacy.html
Pleasurable feedback for Lacan reading transcriptions of his lectures, themselves dictated into notes that he read aloud into the microphone. " (52-53) In this manner, two parallel-switched feedback loops the word of the daughter and the transcription of the daughters husband create a discourse that never stops inscribing itself: Lacans definition of necessity. His books, whether they are called Seminar or Television or Radiophonie, are all works of art in the age of technical reproduction. For the first time since man thought, stupidity is allowed to go on indefinitely. . . . In both cases the master thanks completely thoughtless recorders that his teachings are not insanity, or, in other words, not self-analysis. . . . From now on you are, and to a far greater extent than you can imagine, subjects of gadgets or instruments from microscopes to radio and television which will become elements of your being." (great quote) Compare to my own tapoc journal project operations as works of art in the age of technical reproduction
4 2 1 (600) [-6+]mCQK manovich-language_of_new_media (25-26) 20131005f 0 -5+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Supports studying how machines work to produce new works in digital media such as by running software we write and involve in our computing thoughts, thoughts about computing, the philosophy of computing, and also literally storing all the text I have generated that I want to keep alive in tapoc, symposia and pmrek. "No longer just a calculator, control mechanism, or communication device, the computer becomes a media processor. . . . No longer just an Analytical Engine, suitable only for crunching numbers, it has become Jacquards loom a media synthesizer and manipulator." (25-26)
4 2 1 (700) [-6+]mCQK neel-plato_derrida_writing (ix) 20131006 0 -3+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Studying writing as a process in any book approximates what happens working code, as in providing basic instances of postmodern concepts, computer technologies instantiate unknown, unknowable alien temporalities. "And so I send this back to Plato and Derrida, neither of whom, I am sure, feels or ever felt the least need of it. Like every writer, though, I must find a place, and the place I have found, like that found by all my predecessors, makes me send back, reflect, repeat, kick off, adjourn, mark empty spots for words left out, listen for what I missed, attempt a countermotion, and occasionally even expel hot air, at times from an overfulness, at times from a gnawing void.
(x) This book is an attempt to study what writing as process might actually mean." (ix)
4 2 1 (800) [-6+]mCQK ulmer-florida_out_of_sorts (45) 20120803 0 -2+ progress/2012/06/notes_for_ulmer-florida_out_of_sorts.html
These signifiers, smallest symbols of the discrete texts constituting the second and third exam reading lists for expected response content now being written. "A digital medium (website, DVD) facilitates a seamless, immediate movement between the visible and invisible (material, cultural, theoretical) registers of the chora. The propensity or directionality of the category supplies the predictive power signaled by the divination interface: the genealogy of the throughline suggests how things are likely to develop in the situation, given their present positions of things in Miami, once mapped in Miautre, becomes accessible to democratic revision." (45) Working through the unfolding relevance sorting of the points that become my and my committee point to memories.
4 2 1 (900) [-6+]mCQK ryan-beyond_myth_and_metaphor (589) 20131009j 0 -1+ progress/2012/03/notes_for_ryan-beyond_myth_and_metaphor.html
My journal project as version of Aleph, with built in temporal dynamism providing a specific kind of spiraling mutability, and therefore some reader expectation beyond the randomness of Joyce-like hypertext when doing what Iser calls filling in the blanks. "The reader will admittedly do what Wolfgang
Think about it that way repeating thousands of times with each day or shorter time unit down to what, nanoseconds? Sure, because that is the boundary of the computers we have today. Circulate. Play some pinball. The humans are captured in their play action as huge binary log files as examples of computing. One of Sapers games is you have one of these things (stories to tell) so you instantiate it in many instances (stories); we must always remember Lacans mirror stage and its use of logical operators (negation) proclaims that everything is a mirror, and also possibly other things simultaneously (going through iterations of imaginary, symbolic, real, logical, machinic). What we are seeing is either reflections of ourselves or traces of other cyberspace intelligences, consciousnesses, subjects, and so on. In one hundred years when they become public domain through copyright expiration these philosophical questions can be asked. Today they border the imaginary: this is one of Zizeks points of reference although he admits being more interested in the real, of which an example he gives is military marching chants, which cycle back to the imaginary, for although Zizek does not spend much time discussing it, the imaginary generated via the computational cyberspace real really is what will be and can be in cyberspace on the Internet and so on near the turn of the century. Right now we can just talk about the play list, titles of songs that can be played with proper not-FOSS licensing. When the copyrights expire the real object can be considered, computed, where here it is just implied that you know.
4 2 2 (1400) [-4+]mCQK bork-journal 20140625 20140625 0 -5+ journal_2014.html
If you see that the program aspect relates to chapter five heading four, then everything can fall into it in a subsumption process I call flossification using Clark, Hayles, and other theorists to complete the terms.
4 2 2 (1500) [-6+]mCQK bork-journal 20151011 20151011 0 -10+ journal_2015.html
The philosophical finesse afforded by fossification makes public domain by publishing under GPL. We must say this that chuckheads are non programmers is why Chomsky ridicules Lacan and Foucault. I am talking about the creation of the MySQL program code in Notes table dump format as much as C++ processing it. Need to update comparison of level models to include LAMP along right side. You need to be able to program with broken down time to make any progress into getting to know PHI bottoming out at Linux kernel machine embodiment level through apache MySQL then utilities programmed in languages Perl, PHP to operate at top level with cultural software developed in heavy duty large scale integration languages like C, C++, Java, and so on. Layers model revisited figure for machine embodiment around Postscript object PHI. Then lay this model against set of programs from table. It becomes and comes through as real virtuality becomes PHI at sixty four bit broken down time PHI underlying cyberspace as bottom of diachrony in synchrony layer models. If that leads to the conceiving of the revision to the figure of network layer models then all the better for it can fit here together in this section to be set via dissertation cow clicking or manual MySQL database manipulation. Fill theoretical framework in similar manner of low and high level pieces resembling bowling pins over fence hinting at layout of speakers affecting possible hearings of Plato symposium or as I call it symposia.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=4 and (Heading=2) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 4.2 tapoc, fossification+
4.3 pmrek, machine embodiment
--4.3.1+++ pmrek
4 3 1 (100) [-7+]mCQK hayles-electronic_literature (133-134) 20130928g 0 -9+ progress/2010/02/notes_for_hayles-electronic_literature.html
How do these feedback loops operate in nonhuman systems left open as Hayles does not spend much time at all discussing the source code of any of the examples of EL in this book; her musings on what feelings/body and ratiocination/mind may be in nonhuman systems trace the same boundaries of fantasy as do those surrounding her postulate that nonhuman intelligences exist in representations of it by Memmott. (133-134) bodily knowledge is directly tied in with the limbic system and the viscera, as Antonio
[working code css]
select * from Items where Path like %.ps order by MTime desc
jbork@jbork-UX305FA:~/public_html/progress/2009/04$ xcircuit pmrek_interface_053.ps
The program xcircuit is currently not installed. You can install it by typing:
sudo apt-get install xcircuit
select * from Items where Path like %pmrek%.png order by MTime desc
jbork@jbork-UX305FA:~/public_html/progress/2009/04$ cd ../../2010/10
jbork@jbork-UX305FA:~/public_html/progress/2010/10$ ls -l *.png
jbork@jbork-UX305FA:~/public_html/progress/2010/10$ cd ../../2009/08
jbork@jbork-UX305FA:~/public_html/progress/2015/10$ ln -s ../../2009/08/pmrek_interface_schematic.png screenshot_20151018.png
[working code css]
This was after some working code. It was done in the built environment of MySQL Workbench, then the BASH command line level interface layer PHI. Looking at diagram wondering where symposia goes and the mash up of software it represents. It is at the platform level with pmrek and dot cpp too big to fit in column of things obviously C++. Back to finding other figure. Another example of the vicissitudes of workspace preparation occurs when I try to view the latest postscript pmrek interface file not finding a corresponding image file in the same directory. Another option is to view the postscript file, another to query the name directly and not the file type figuring at least one image has been saved for this over the years coming across it thinking similar thoughts today about making pmrek tutor texts in machine embodiment. How nice that it happens to have happenned this month back then, too. Like robotic moment we have bought into this equivalence of direct manipulation via interfaces and knowing the working code enough to trust the real virtuality phenomena they produce that is cyberspace for a long time. A rough way of saying it is that category mistakes have implications on other layers and levels, including consequences for diachronies in synchrony. A point is that vicissitudes of workspace preparation are useful tutor texts, beyond basic logotropos unit operation of turning away like saying gelion erou does for ancient Greek discourse networks now conceivable via philosophical finesse of ensoniment. Interesting that broken down time emerged from reading GNU man pages, not from one of the philosophers of computing from my list of references, except now it will have to go in there if I cite it.
4 3 2 (1300) [-9]mCQK guattari-machinic_heterogenesis (13) 20131208 0 -7+ progress/2013/12/notes_for_guattari-machinic_heterogenesis.html
Treat machines prior to technics by recognizing extreme human social and cultural span bestiary accompanying any artifact that is part of any technological system, as he gives with the key and lock better understood through integration of functions. "Although machines are usually treated as a subheading of technics, I have long thought that it was the problematic of technics that remained dependent on the questions posed by machines. Machinism is an object of fascination, sometimes of delirium. There exists a whole historical bestiary of things relating to machines. . . . While mechanistic conceptions of the machine rob it of anything that can differentiate it from a simple construction
[working code css]
jbork@jbork-UX305FA:~/src/tapoc$ make web-sourceforge
jbork@jbork-UX305FA:~/src/tapoc$ phi
bork@jbork-UX305FA:~/src/tapoc$ alias | grep phi
alias phi=make -f ~/src/tapoc/Makefile revision
[working code css]
Perhaps with working code. Wanting to dissertaton cow click to sequence recommendations isomorphic to working code performance PHI. You have to know in my world that phi is an alias for PHI that leads into tapoc Makefile working code PHI. But the real treasure is that I can play with these notes for a while having just saved off the as is present condition reconstitutable values where the decision to use lossless formats can be essential to long term survival of your code along with the rest of your memory. Or just make the last paragraph out of Guattari. Begin with switching to bullet markup to use then remove:
contra direct manipulation/double mediation isomorphism;
history and philosophy of computing part of humanities curriculum;
critical programming a lifelong practice not just scaffolding method to be discarded;
Landow hyperlinks and Engelbart hyperscope;
Derrida border crossings, touching limits of truth and Tetris 5, 2;
Barthes statement about myths 80, 90, 101;
a bunch of Neel;
future directions.
Also examine what has already been sequenced, of course, so use the PHI hyperlink while dissertation cow clicking.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=5 and (Heading=2) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
SOCRATES: You have invented an elixir not of memory, but of reminding; and you offer your pupils the appearance of wisdom, not true wisdom, for they will read many things without instruction and will therefore seem to know many things, when they are for the most part ignorant and hard to get along with, since they are not wise, but only appear wise. .. Writing, Phaedrus, has this strange quality, and is very like painting; for the creatures of painting stand like living beings, but if one asks them a question, they preserve a solemn silence. And so it is with written words; you might think they spoke as if they had intelligence, but if you question them, wishing to know about their sayings, they always say only one and the same thing. And every word, when once it is written, is bandied about, alike among those who understand and those who have no interest in it, and it knows not to whom to speak or not to speak; when ill-treated or unjustly reviled it always needs its father to help it; for it has no power to protect or help itself. .. Now tell me; is there not another kind of speech, or word, which shows itself to be the legitimate brother of this bastard one, both in the manner of its begetting and in its better and more powerful nature?
PHAEDURS: What is this word and how is it begotten, as you say?
SOCRATES: The word which is written with intelligence in the mind of the learner, which is able to defend itself and knows to whom it should speak, and before whom to be silent.
PHAEDRUS: You mean the living and breathing word of him who knows, of which the written word may justly be called the image.
For this is the point of the latter half of Phaedrus. Socrates compared writing to painting, as in vase painting, a previous state of the art of human computing incorporating rhetoric by representing speech. Recall his method for creating a science of rhetoric by enumerating all the words and evaluating each in terms of its ambiguity, following his general purpose reverse engineering method, just as I applied it to microcomputer based control systems. Very few in the past have imagined any place besides "the mind of the learner" to host anything "able to defend itself and knows to whom it should speak, and before whom to be silent" and has "power to protect or help itself." Now with state of the art binary computers this type of artificial intelligence is ubiquitous. However, collective intelligence proceeds to produce it driven blindly by market optimized design (default metaphysics). Unraveling this hidden connection between our quest for a product providing optimal guidance in forming long term strategic technology planning and the wealth of ancient wisdom already before us in our Western philosophical tradition provides a means of promoting the philosophy of computing and a niche market for myself to flourish." (ta grammata)
7 1 1 (700) [-4+]mCQK bork-journal 20061125a TAPOC_20061125a 0 -16+ journal_2006.html
Bruno Latour writes in his article in the Philosophy of Technology anthology, "speech implies by definition the risk of misunderstanding across the huge gaps between different species.
7 1 1 (800) [-4+]mCQK bork-journal 20161026 20161026a 5 -1+ journal_2016.html
Technology subsumes philosophy is the name for the first section, as my way of mashing together so many philosophies, for I will next speak of the hermeneutics of computing, then the phenomenology of electronics, and considering swapping communities and projects.
7 1 1 (900) [-4+]mCQK bork-journal 20160929 20160929a 3 -1+ journal_2016.html
The illegitimacy of syllabus fits philosophy of computing, for if programming subsumes writing, this itself becomes a queer subject, and we should just get on working code back into computing, or the title is different like philosophy of computing colon syllabus for a or a syllabus.
7 1 1 (1100) [-6+]mCQK bork-journal 20160901 20160901 1 -3+ journal_2016.html
Time to teach a class I have been developing for years now up to eighteen sessions. What philosophies are appropriate for doing philosophy of computing takes latest form of purpose of first lecture chapter session seminar PHI. Humanities approach via hermeneutics, technology phenomenology and ontology in addition to the expected semantics and logic, implying deontology.
7 1 1 (1200) [-6+]mCQK bork-journal 20160114 20160114b 2 -20+ journal_2016.html
Statement Concerning the Dissertation Experience PHI Completing my dissertation in the Texts and Technology program has been the most challenging and satisfying intellectual undertaking of my life. It brought to conclusion multiple, seemingly unconnected paths of inquiry that I have been pursuing for nearly three decades, combining dual passions for computing technology and for philosophical inquiry into a unique methodology that I dubbed critical programming. As my dissertations subtitle elaborates, it is literally an approach toward a philosophy of computing, a new way to conduct humanities scholarship by not just using software for collating data or formatting documents, but by designing and running programs in an iterative, self-reflexive fashion to test hypotheses and provide places for experiencing ideas in ways unimaginable via print-based media. I had long believed that a philosophical work about computing and programming that was not itself deeply influenced by technology, that was not itself an advanced technological artifact, not merely a printed text, shortchanged the spirit of what it means to do philosophy. While I had inklings of this idea before I began my graduate coursework, it was through exposure to the diverse theoretical frameworks and methodologies introduced by faculty and colleagues in Texts and Technology that the key insights of my work came to fruition. In meeting Bruce Janz, whose interests in digital humanities and the phenomenology of digital places complemented my approach, and whose extensive scholarship of contemporary, continental philosophy drew us together in shared concepts and ideas, I gained the confidence to attempt something incredibly ambitious and difficult when I could have settled for a much simpler task. Bruce provided the direction and encouragement I needed to keep going, especially when tough choices had to be made to abridge content as the full scope of the work materialized and time became short. PHI Critical Programming: Toward a Philosophy of Computing first examines the present, as-is human situation as extended minds immersed in digital media, threatened by cognitive obsolescence and deterioration of significant social relationships and civic attention. More than just introductory material, I felt obliged to thoroughly articulate a problem worthy of devoting a lifetime of scholarship and inquiry. Next it lays out a theoretical framework spanning humanist and technological positions ranging from critical theory, textuality and media studies, to the social construction of technology, the psychology and sociology of computer programmers, philosophical approaches to computation and software, and scholarship self-identified as software, code and platform studies. The takeaway from this survey is that there is much more work to do, both in terms of researching what I call philosophical programmers, and more importantly, undertaking new studies in the role of programming philosophers exploring working code places, which I demonstrate in the penultimate chapter by describing three software projects that I have extensively developed over the course of my graduate studies. In a very real sense, the dissertation document itself is an outcome of critical programming because the TAPOC software project evolved as a means for me to organize my research notes, generate the reading lists for my candidacy exams, and transformed into the engine I used to lay out the chapters of the final text. The ultimate significance of this work should be understood in terms of the challenge it lays out for future philosophers of computing, myself included: we must do more than read and write natural language texts, we must engage and work in the very media we seek to draw into the scope of humanities studies through critical programming. PHI. The benefits of the dissertation experience go beyond the profound satisfaction of accomplishing a life goal to which I have devoted more of my mental energy than any other endeavor. The graduate coursework leading up to it, the candidacy exams, research and writing all have noticeable positive impact on deepening my professionalism and wisdom in my current job as a software engineering technical project lead. Finally, it gives me courage and confidence by laying the groundwork and building a network to pursue an academic career so that I can devote the rest of my productive life to the philosophical concerns about which I am most passionate, and inspire others to do the same. PHI. Original paragraph and line breaks replaced with PHI. Can software be innocent includes possibility of evil operation by virtue of freedom zero as side effect of GPL acceptance defining permissibility similar to Lessig but in terms of overabundance Nietzschean programming style being able to do so much simultaneously.
7 1 1 (1300) [-6+]mCQK bork-journal 20130410 20130410 1 -1+ journal_2013.html
Perhaps it is necessary to review the presentation, for giving the weekly lecture like seminar of Lacan is where philosophy exists in corporate America as implicit philosophies of computing reflected in career trajectory optimally benefiting the business.
7 1 1 (1400) [-4+]mCQK bork-journal 20050620 20050620a 13 -1+ journal_2005.html
Then with Johnson, Ess, Floridi there are Graham White philosophy of computer languages, Mitcham information technology, and Fetzer ai.
7 1 1 (1500) [-6+]mCQK bork-journal 20150803 20150803b 38 -6+ journal_2015.html
Begin with Aloisio, note improvement in Campbell Kelly from Aspray collaboration that lets the engineer speak back to philosphy buy lacks the SCOT influenced complexity built into selection of opening images in more recent book. Touch on rabbit hole of Uffenbeck and my ECT studies to truly understand electronic circuit physical hardware aspect of computing. Challenge whether to include relatively ancient texts from philosophical programmers like Turing and Burks, Goldstein, von Neumann or propose to reread as part of methodology. Follow Campbell Kelly Aspray with Hafner Lyon contrasted with Abbatte, with Galloway foregrounding protocol as philosophical concept helping to interpret network phenomena. Mention Lammers, Shasha Lazere before psycho-social studies Kraft, Turkle, Brooks, Fuller, Stephenson, to Takhteyev. Putting all these together demonstrates syncretic synthetic philosophizing approach having a procedural rhetoric related to formant synthesis, being its own kind of synthesis in the domain of philosophical thought.
7 1 1 (1600) [-4+]mCQK bork-journal 20140803 20140803a 1 -18+ journal_2014.html
In antiquity it they those human computers computing would have had it stored in colors or text in visual interfaces within virtual realities PHI.
7 1 1 (1700) [-1+]mCQK bork-journal 20120803 20120803 0 -3+ journal_2012.html
Despite critique of Ulmer I want to participate in constructing this picture by contemplating living along the Santa Fe river writing my dissertation or doing postdoctoral work.
7 1 1 (1800) [-6+]mCQK bork-journal 20150804 20150804a 0 -6+ journal_2015.html
Although Bauerlein blames lax teaching and parenting for allowing the dumbest generation to remain absorbed in adolescent social media cocoons, he and many other critics point to consumer computer technologies as the key enabling factor. Especially because computing does so much more now than perform numeric calculations via effective methods, from the standpoint of the end results presenting multimedia, telecommunications, commerce which Manovich categorizes as cultural software, it is crucial to seek understanding of their inner workings lest the schematism of perceptibility remains veiled. A historical background and exposure to psychological and sociological studies hopefully expands folk wisdom and reveals biases about computing practices based on lifetime use situated within a cultural and technological milieu. These studies in particular have informed my theoretical framework, and reflect concerns of critical theory, media studies, and the social construction of technology in addition to paying heed to historical practices of rigorous scholarship and treatment of primary and secondary sources. The criticism could be raised that my selection of an English language corpus itself biases my background understanding in favor of Anglo-American narratives focusing on technologies that arose and prospered primarily in the United States, ignoring what was happening in other regions during the same time period. Campbell-Kelly notes this bias in both of his books, but does coverage developments in other European countries; what happened in the former Soviet Union, the only other large electronic technology innovator, has yet to appear in mainstream English language publications.
7 1 1 (1900) [-6+]mCQK bork-journal 20160611 20160611 0 -2+ journal_2016.html
My hilarious approach to the philosophy of computing includes Lacan iteration passing through interpretation PHI applied to programming projects in corporate workplace, finding functional equivalents of PHI with making present four fundamental concepts of psychoanalysis, and I propose to try an attempt of progressing through the approximately twenty PHI syllabus lecture series seminar. Consider importance and PHI of size of view area for programmers always involves languages in use, as I can enter the thought in my working code places and demonstrate with intended work of generating real virtualities such as web pages, though also wish to step through PHI instituting the philosophy of computing.
7 1 1 (2000) [-6+]mCQK bork-journal 20130611 20130611a 0 -7+ journal_2013.html
Let us do it man let us do it, and this time in Javascript and Perl without touching C++. Adjust the software to demonstrate intersection of two temporal orders of magnitude. "quot;;
print "{";
print " subseconds++;";
print " subseconds%=10;";
print " if(subseconds == 0)";
print " {";
print " timerCounter++;";
(ellipsis)
print "function SupervisoryControl(refresh_rate)";
(ellipsis)
print " var i=setInterval(timer, 100);";
jbork@alkibiades:~/src/tapoc$ sudo make web-localhost
jbork@alkibiades:~/src/tapoc$ vi journal.cpp
//if(ii==0 && this->get_ensoniment() || (*this->entry_list->rbegin())==jptr)
if(ii==0 && (this->get_ensoniment() || (*this->entry_list->rbegin())==jptr))
[working code css]
This mechanism could one day produce tachistoscopic phenomena for philosophical language machines and more mundane purposes. Did go to C++ to correct display from clasic logic mistake of failing to properly use paretheses fails to constrain to first row." () From this image the cognitive domain of machine computing can be intuited. Dissertation proposal includes prior work on machine embodiment, already having identified working code and even classic first graduate paper.
[working code css]
jbork@alkibiades:~/src/tapoc$ vi gentapoc.cgi
print "function time
7 1 1 (2100) [-6+]mCQK bork-journal 20150611 20150611a 0 -8+ journal_2015.html
Awkward to get here this way reaching end of latest draft quoting McGann intending picking up soldering irons to pinball repair, as in the philosophical programmer scholar reaching something of complexity of pmrek as working code place to do philosophy of computing programming technology. Can computing be innocent philosophers philosophize by writing code and using systems such engineers ask, question, interrogate machinery component of network dividual cyborg. Suppose explicating meaning of philosophical programmers just a way to legitimate individual case of my passing through technology career as crossover digital immigrant cadre lifetime learner. Geeks and nerds may think possible programs while philosophers wonder whether they can intuit machine embodiment. As McGann exemplar of textuality studies, Kittler media studies almost getting us to computing programming technology. Can computing be innocent, can software code and its writing be exempt from corruption of its operating environment any more than the human body territorial earth embodied philosophical thought? Dare to reach as far as Lyotard or is that outside bounds of tapoc system now a problem where it had been sufficient temporal order of magnitude PHI. Make McGann and textuality studies in addition to programming count by adding more deliberate sense of working code than Boltanski and Chiapello; meditate upon the nuances of its changes and their meaning through theory as poieisis like those of tapoc shaping this dissertation programmatically written, for sometimes programmed visions are intentional, as all programmers and systems engineers know.
7 1 1 (2200) [-1+]mCQK bork-journal 20120611 20120611 0 -94+ journal_2012.html
The danger I have to share with Janz is the reterritorialization of philosophy by programming in joke of ova extension along with sense of Virtualbox OSE archive or virtualbox ose archive all lowercase.
7 1 1 (2300) [-4+]mCQK bork-journal 20160516 20160516 0 -3+ journal_2016.html
Instituting the philosophy of computing is my intention PHI mission statement.
7 1 1 (2400) [-6+]mCQK bork-journal 20160223 20160223 0 -1+ journal_2016.html
Oh my gosh here is my institutional thought how to bring philosophy into computing into philosophy.
7 1 1 (2500) [-6+]mCQK bork-journal 20160212 20160212 0 -4+ journal_2016.html
The Obama administration and other groups have been calling for dramatic increases in computer science and technology education for American children, which requires a new generation of proficient and inspired educators. This implies making a sound connection between technology education and the humanities. Other universities have courses addressing computer ethics, the philosophy of technology, information, computer science, and so on, but nowhere is the philosophy of computing explicitly addressed as an academic subject. UCF can become a leader in this field by leveraging its excellence in digital humanities, especially its Texts and Technology program, in collaboration with its world class programs in engineering, computer science, simulation, and visual design, but first we have to consider what should be in it.
7 1 1 (2600) [-9]mCQK bork-journal 20160213 20160213 0 -13+ journal_2016.html
First are philosophies to give grounding to any instance, for example Rapaport with computer science, which I model on litany enumeration from Iser: hermeneutics, phenomenology, and so on. The hermeneutics of computing studies the use of the word through history and connects it to examples. Like Latour and Kittler interrupt to insist on theorist practitioner inviting phenomenology of electronics. Turn to philosophical programmers to reveal new ontologies enframed in cyberspace instantiating philosophies of computing by machines and humans programming them. Take the time to understand protocol as articulated by Galloway and others. Exemplifying new ontologies look at Transmission Control Protocol Internet Protocol version four as a place to do philosophy. Autoethnographies of coding communities suggest programming styles beyond hard mastery and bricolage. Uses and advantages of foss. Project management as lesson for new spirit of capitalism. Virtualization the strategic approach. Programming philosophers undertake foss projects addressing tough questions like how to create long term memories from course work. My own example is revisiting ancient computing. Close with holding power of programming platforms to recognize we are still not past the basic question of what instructional examples to use should we further pursue the philosophy of computing, only beginning to consider governmentality of software and broach questions like can software be innocent as a place to also critique human involvement.
7 1 1 (2700) [-6+]mCQK bork-journal 20160407 20160407 0 -5+ journal_2016.html
Can deontology be kind of philosophy or way of doing philosophy along with logic, going with PHI the way phenomenology fits with empiricism, along with hermeneutics and the quizzical family poststructural postmodern. Can we start here with admission that technologies confronted with plethora of philosophies with which to approach computing, and list them like the short key important point for heading at equal as the beginning of the sequence. Can software be innocent skirts ethical boundaries regarding use, freedom zero as Stallman calls it, a basic stance for computing system imagination seeming to shift responsibility to its programmers and other users. What about software that wreaks havoc in cyberspace? Keep it simple and introduce third order logic with philosophies or new ontologies, adding logic to type of philosophy applicable to computing.
7 1 1 (2800) [-6+]mCQK bork-journal 20160109 20160109 4 -10+ journal_2016.html
We must always remember it is embodied virtual reality leveraging multiple implied constants PHI is the perspective to which post postmodern Lyotard appeals. Kittler ends with extremes of deep representation and autonomous machinery sufficient to represent itself PHI. Research and writing culminated over twenty years sustained efforts toward a philosophy of computing, a task a set for myself upon reading Platos Symposium as an early study of the ethics of virtual reality. Before entering the Texts and Technology doctoral program at UCF, I developed the technical background to pursue philosophical questions by developing computer systems run to provide places to ask new forms of humanities questions. Moreover, acts of planning, developing, debugging and using such code played a key role inspiring insights from the key points of the work down to the organizational details of each chapter heading subsection and the argumentative sequences within them. As the greatest intellectual challenge of my life it was also the most rewarding. While many dissertations required substantial computer use to compose, mine was built from the output of iterations of its programming by consuming and processing my research notes. A risk I took early on was to trust this evolving process, despite failure in brining original intentions of self-generating technologized texts to fruition. The earliest drafts of the dissertation chapters were constructed from database queries of notes objects against tables populated by machine reading of notes files and my use of an interface console to adjust the characteristics of individual notes. Thus its significance derives from both its uniqueness as a programmed literary text and its overall message calling for a substantial programming component for scholarship in digital humanities and philosophies of computing.
7 1 1 (2900) [-1+]mCQK bork-journal 20160114 20160114 1 -21+ journal_2016.html
Replaced space on writing page place with PHI.
7 1 1 (3000) [-6+]mCQK bork-journal 20160119 20160119 0 -1+ journal_2016.html
Glad past year selves planned for future writing where these already created notes are sequenced and relevanced, earlier noting interesting fact that I had been chasing a similar bug years ago today.
7 1 1 (3100) [-6+]mCQK bork-journal 20130119 20130119a 0 -14+ journal_2013.html
Become philosopher of software conjoining machine cognition. This ethical suggestion rolls up after all these years, every day on this day. Another example of ethical suggestion is the free, open source ethic, which ought to be recast to be sensitive to Stallmans semantic tuning. Socrates as the question answerer equals slayer is the overriding software system of the day, every year, that is, every nineteenth of January. In my world it circles around preparing from comprehensive examination. Whether machine or human how would I convince myself that what I am doing is what I should be doing is the proper way to run the human and machine units become ontic representation of reality including this journal system engaged by tapoc. Reading Derrida finds evidence of human centric rhetoric puzzling about how representations relate to truth, so it is fitting that archive appears in dissemination, and we are simply adding computational elements to that which typically is conceived as human. This provides insight into ontic and ontological questions about machine thinking, for instance, where it occurs, in virtual realities, and in what temporal orders of magnitude its signification operations occur. Disturb the single centered consciousness typical of human being "with distributed processing, retaining instances of subjectivity as epiphenomena of machine processing. The fact that Socrates still lives through Derrida is somehow tied (as in positively related, enacting writing in favor of other pastimes preparing for old age and death) to this. An extreme place to reach is post-postmodern subjectivity in the future when machine cognizers and humans, likely the elderly who lived through the early personal computing era, coexist or cannot distinguish themselves in virtual realities whose generation consumes cultural artifacts whose copyrights have expired, in particular recorded music. On a related approach track is consideration of the structural constraints imposed on present information ecologies and technical lifeworlds (Ihde) by procedural and other rhetorics of software such as the combination of Microsoft and other products that brought to presence, including its delivery, the compressed XML committee response to the second candidacy exam I tried to read last night via xmlcopyeditor instead of the default Word application or LibreOffice substitute.
Critical code studies via pinball platform studies becomes the new title topic summation by which working code enters philosophy of computing via programming, for there are no authoritative universal philosophies of programming until free as in libre open source so as to imply and here is where the name multiplies Stallman GPL four freedoms exist. This is the necessary condition of future machine cognitions." (post-postmodern dividual)
7 1 1 (3200) [-6+]mCQK bork-journal 20110511 20110511a 0 -8+ journal_2011.html
The basic idea is that academic debate inspired by the philosophy of computing tradition is still unconscious of its preference formation. Turkle hints of Lanthams influence, but a cursory scan of his book that is on the T&. "and humans, for human consumption, falling for the profit (Gates), altruistic (Stallman), or other seductions. Consider as well affordances of electronic media; Turkle makes the straightforward argument in the early 1980s that children have an easier time manipulating keyboards than pens and pencils." (by making them work) reading list registered little emphasis on postmodernism. Johnsons Computer Ethics can be cited for its shallow understanding of Linux. However, unlike the Turing tradition her oversight is founded on technological ignorance rather than right wing conservatism. Well, to the extent that she does not strongly endorse intellectual property rights of large corporations as a foundation of her position on free, open source software. What I am thinking is that there is something about the nature of electronic media that makes programming software more effective than writing. Perhaps it is because the former influences both machines
7 1 1 (3300) [-6+]mCQK bork-journal 20120119 20120119a 5 -5+ journal_2012.html
Turkle, Kittler and others who theorize [preposition operator] the effect PHI have on our lives did not think [galaxies of possible worlds in which multiprocessing deeply enough] microcomputer concurrent asymptotically parallel multiprocessing until preponderance of TCP/IPv4 networking protocols defined most media realities " [Thus the book form was still their default means of durable philosophical production.] FOSS represents the optimal routine for philosophizing with electricity. It has already happened in the latest versions of symposia, which is just getting an adaptation of the ncurses four Hertz supervisory control and display program. Cultural software divides between text to speech synthesis of computations of the source code and the supervisory control and display program running in user space in contrast to the kernel workqueue process handling high speed digital switching process control making the sound before the final control element loudspeakers." (virtual realities for humans)
7 1 1 (3400) [-4+]mCQK bork-journal 20110119 20110119 0 -8+ journal_2011.html
Continuing the journal modifications to suppress repeating display of images for non-main-journal-based journal entries in the create_xml function, paying price to use word processor strikethrough representation of two versions of changed lines encoding later corrupting view beginning lexia PHI.
7 1 1 (3500) [-6+]mCQK bork-journal 20100119 TAPOC_20100119 0 -14+ journal_2010.html
The basic question is why do you look in the code. One day it will be considered verb to have to use adjective products all day at work, if we go after the at play time via psychopathology of everyday computer usage. Or software usage. Non coerced "play time (otium) is analyzed via the psychopathologies of everyday computer usage. Those with a decade of software engineering experience no doubt have been influenced by the software they have used over those years. They are easy to analyze economically and not having to appeal to odd case psychological studies, personal narratives, to explain why they are the way that they are. Like Freud pretending to wet his pants like my happy old logic teacher; their examples are simple equations maximizing profit or so other cheerful variable. Actually it is pretty wild. The trick of the VRPRESS is to add an external removable static RAM interface to what was earlier typing at a word processor and even earlier, much earlier, printed in books. Actually it is more likely that computer software has been running from antiquity than many accounts by individuals precious to western intellectual history. Every computer is embodied. They are difficult to think about, but they are knowable. For example, an electronic pinball machine playfield connected to a pmrek host in a TCP/IPv4 network. Previous exercises recovered from various sources to almost get the pinball machine working and public source code updated." (work)
7 1 1 (3600) [-6+]mCQK bork-journal 20110106 20110106 3 -2+ journal_2011.html
The original code takes you into la la land of memory unavailable to other users, this is the short coming of hypomnesis. Toward a philosophy of computing we seek to define hypomnesis and make our argument operate upon it.
7 1 1 (3700) [-6+]mCQK guattari-chaosophy (41) 20160208b 0 -7+ progress/2016/02/notes_for_guattari-chaosophy.html
Tie to need for philosophy of computing. "Guattari: It appears to us that certain schizophrenics directly express a free deciphering of desire. But how does one conceive a collective form of the economy of desire? Certainly not at the local level. . . . If, on the contrary, desire constitutes the very texture of society in its entirety, including in its mechanisms of reproduction, a movement of liberation can crystallize in the whole of society." (41)
7 1 1 (3800) [-6+]mCQK colburn-philosophy_of_computer_science (9) _20160411 0 -6+ progress/2016/04/notes_for_colburn-philosophy_of_computer_science.html
Its not AI. "The study of the nature of human reasoning and knowledge, in the form of logic and spistemology, has, of course, been a focus of western philosophy since Plato and Aristotle. However, not until the latter part of the twentieth century and the advent of the digital computer did it become possible to actually build models of reasoning that contained alleged representations of human knowledge. . . . It therefore became reasonable to at least ask, Can AI, as an empirical discipline concerned with building and observing models of human cognitive behavior, help us do philosophy?" (9) Emphasize instead writing software, programming, and it is because we can leverage programming languages that language matters, programming and natural language choices matter, for example, for me English and, really, C++, adding C/C++ second to emphasize procedural thinking implicit in C and object thinking in C++, I mean, C++ really is my core language with English.
7 1 1 (3900) [-6+]mCQK bork-journal 20160414 20160414 0 -2+ journal_2016.html
What should be in a philosophy of computing is a lot of programming, of course we do have to cover philosophy and computing but then the focus turns to programming, where therefore being there programming languages matter all the way to instructional examples hypomnemata PHI English and Greek C plus plus PHI see there you are to the typing of it and rereading iteratively in broken down time represented PHI PHI, being a philosophical language. For some of us the PHI eighties are fleeting.
7 1 1 (4000) [-6+]mCQK bork-journal 20130514 TAPOC_20130514 0 -33+ journal_2013.html
The philosophy of computing and philosophy of programming are both uninstantiated as explicit critical disciplines in the way the philosophy of information, philosophy of software, semiotics of programming, and computer ethics have been articulated as scholarly work " A reasonable explanation for this condition is the relative scarcity of programming philosophers and relative obscurity of their work compared to the superfluity of all past and living philosophers, and all programmers. The larger group produce the content that fills in for official philosophy of computing and programming positions. This default concretizes around the two poles Mitcham distinguishes: humanities philosophies of technology in academic circles and engineering philosophies of technology in technical communities. It privileges the texts of early theorists, and work efforts of influential technologists. Default assemblages of von Neumann, Licklider, Engelbart, Kemeny, Gates, Stallman, Torvalds generate default philosophies of computing and programming including binary logic, stored program, functional, procedural, object oriented methodologies, free or restricted, cathedral and bazaar epistemologies, and so on (Campbell-Kelly; Hafner and Lyons; Lammers; Rosenberg). Moreover, programming philosophers are hard to find when they work in industry rather than the humanities. Their ideas are mostly shared among coworkers in meetings, around the water cooler, and over lunch; when published, their voices are muffled by IEEE paywalls, and obscurity for existing otherwise irrelevant blog postings. Their private musings might be found in comments, though most are encoded in foreign languages like C++, sometimes but also perhaps doubly occluded on account of nondisclosure and superseded revisions. Letting the default prevail heralds the fearful consummation of Heideggers dreaded conclusion to Western metaphysics.
Do we have a grasp on the situation? Few critical theorists addressing the human situation with respect to technological media more compellingly evoke the serious need to study it, while at the same time harboring a fundamentally pessimistic outlook on the endeavor, than Friedrich Kittler in the preface to Gramophone, Film Typewriter. Even in translation, his argument that we have long passed the point of being able to take stock of our condition is doubly convincing, for its rhetoric appeals both to those who are ignorant of the technological details of the schematism of the perceptibility of technological media, and, it seems, more strongly prohibitive for those who do, better appreciating the enormity and thus rationalizing the futility of the endeavor. By default we foreclose focused study of TCP/IP or STL C++, and work with generalities like information, intellectual property, or the robotic moment (Floridi; Johnson; Turkle). Yet it has always been the task of philosophers and humanists to evaluate the human condition. Accepting with Hayles that we have already become posthuman, we cannot shun study of our machine others and maintain understanding of how they work. The crisis at the heart of the philosophy of computing is the dilemma between the incompatible epistemological imperative to comprehend the subject matter, and the reflexive avoidance to not look too deeply at it, to refrain from studying what is judged to be inscrutable and ephemeral anyway. Ong rejects considering programming languages as on par with natural languages, mother tongues; he missed the fact that programming languages always contain natural languages (for example, English-inflected Perl), and is not alone in handling code as a dangerous pharmakon, preferring human topics. Questions about whether C++ can be the most philosophical programming language despite its weak late binding capabilities, or whether open source techniques are ethically preferrable, are left to accidental philosophers, forming the default (Rosenberg; Raymond). The consequence of this avoidance, uncannily similar to the Heideggerian retreat of Being in the essence of modern technology, is that our intellectual trajectory has deaccelerated from mutual, symbiotic improvement as cyborgs intermediated with machine technologies to bifurcating strata of humans getting dumber, like the blinking Nietzschean last man, like the bourgeois capitalist commodity consumers despised by Horkheimer and Adorno, while the machines continue to get smarter. Crises in education, shortages of STEM workers, fetishism of Apple products, and addiction to Facebook can all be seen as symptoms. To begin to extricate ourselves from this downward spiral is a task for the philosophy of computing; humanities thinking devolves to it when it braves to not turn away from technological knowledge. We can fix this. Through developing a more finely nuanced conception of the human situation with respect to computer technology, humanity may alter its collective, long term intellectual course.
Critical programming is a digital humanities practice that privileges working code, both acts of software engineering to produce research results, and running iterative versions of those programming products to enact scholarship, research, and performance. It extends Software Studies, whose theorists identify critical software as intentionally designed to foreground normalized understandings or reveal "the underlying construction of the user, the way the program treats data, and the transduction and coding processes of the interface" (Fuller; Manovich). It acknowledges with Critical Code Studies that programming occurs in socio-historical contexts, the larger human and computer systems, from the level of the computer to the level of the society in which these code objects circulate and exert influence (Marino). Finally, it foregrounds awareness of computing systems and architectures promoted by Platform Studies, emphasizing the materiality of code over the abstract mathematical representations of algorithms (Montfort and Bogost; Floridi; Tanaka-Ishii). Critical programming combines all three to illuminate default forms of human computer symbiosis by complementing passive, consumer use of technology, challenging face value interface level interpretations, particularly when offered in the service of philosophical thought, with active production of code. Kittler points out that soon after purchasing a typewriter, Nietzsche declared that our writing machines influence our thinking. Derrida mused at the interface level about the word processor archiving his thoughts about Freud that were themselves destined to set in a book having been inspired by a surprise telephone solicitation. Surpassing such consumer comportment characteristic of these book form philosophers, post postmodern network dividual cybersage cyborgs write the code for their philosophical language machines, affecting the schematism of perceptibility of their interfaces. Doing philosophy through deliberately engineered real time machine computation, eating ones own dogfood, as it is called in maker communities: with a nod to Nietzsche, this is how one may philosophize with programming." (Floridi; Berry; Tanaka-Ishii; Johnson)
7 1 1 (4100) [-1+]mCQK bork-journal 20050516 TAPOC_20050516 0 -17+ journal_2005.html
Agree with Johnson (1985-2001) that we humans "think of the ethical issues surrounding computer and information technology as new species of general, or traditional moral issues.
7 1 1 (4200) [-6+]mCQK bork-journal 20160526 20160526 0 -5+ journal_2016.html
Still landing on entry points including why we should institute a or the philosophy or philosophies of computing implies a set of valid if not sound set of examples PHI, as generated from the software, and why you should hire me to institute it whether by becoming an academic professor or somehow dramatically influencing generations of academic philosophers from epicentric LANs PHI. Recall Andy Clark argues for the extended mind, a notion that sees a continuity between our cognitive processes and our technological processes; this embodied/extended theory of mind is rooted in phenomenology, and is an alternative to computational theories of mind among others. A problem in response to this exam question involving embodied extended mind, versus Cartesian soul, Leibnizian monad and slew of other deprecated conceptions, phenomenology, now adding hermeneutic, and joining together as philosophical approach against computational approaches enumerating types of doing philosophy like programming styles, it is a familiar unit operation in the language game, is that when computationalism is also the object and subject of consideration its articulation entails a prior interpretation of itself that must itself be questioned and enumerated suggesting Socratic reverse engineering algorithm applied to contemplative thought itself, extending from technological programmer real virtualities to PHI, automagically moving to new database values PHI as programmed operation like other control system component PHI. Bring philosophy into computing as the professor giving the seminar of PHI. However, it could be a category mistake of misaligned language units where extended mind rooted in phenomenology and computationalism rooted in whatever else, not computationalism as a philosophical approach like empiricism and deontology that Berry articulates, putting his books on reading list but assigning Aloisio and other shorter texts for the next session.
7 1 1 (4300) [-3+]mCQK bork-journal 20130613 20130613a 0 -7+ journal_2013.html
7 1 1 (4400) [-4+]mCQK bork-journal 20120623 20120623a 0 -11+ journal_2012.html
It is in virtual virtual realities that the human machine symbiosis reterritorializes philosophy as it considers programming above games, rhetoric, reality, physics, science, technology running through all that stuff at machine speeds (see ME text).
7 1 1 (4500) [-4+]mCQK bork-journal 20050628 20050628 3 -1+ journal_2005.html
Living for years with FOSS is the Socratic experiment, akin to Nietzsches living without Christian faith.
7 1 1 (4600) [-6+]mCQK bork-journal 20040628 20040628 2 -6+ journal_2004.html
Imagine a story with an exciting revised interpretation of ideological constants, for example about the discovery of an ancient supercomputer containing human computers; Socrates revival, attended by the world on television, like the Delphic oracle; and suddenly changing into a new myth when he escapes. Having grasped the wave of collective thought once again, he embarks on an odyssey to bring about his sublime vision. Trying to calm the passions of tyrants, this time American corporations, all the while knowing they want to use him as a commodity, albeit a very special one.
IT controls lead to change in IT work habits. Suddenly it takes more time to do the same work, the actual execution of which is brief, but it is done much more carefully. It is like Kari Colemans virtuous computers, except that the moronic adoption of these practices done by the human integrator is driven solely by the survival instincts of the corporation.
7 1 1 (4700) [-6+]mCQK bork-journal 20050629 20050629 6 -12+ journal_2005.html
Information technology often involves, using the three part conception called the interpretive relation that includes the user supporting the causal relation between a sign and something " zoographia in addition to grammata, spanning intellectual history from vase paintings to video projector displays.
In the approach that codes this journal by words rather than a field of characters, Mitcham symbolizes a philosopher whose production Philosophy of Information Technology I reference via Floridis Philosophy of Computing and Information. Fetzer presented the three part symbol and semiotic systems in The Philosophy of AI and its Critique. An additional encoding would be required to present the order of such strings of words and divide journal entries. The dividers can be words as well, such as names of the month and numbers offset by paragraph division symbols (words) and boldface tags (words). There is no paradox with their being part of the text. This much has already been accomplished in the analysis of the whole as a field of characters. Instantiating such ontologies is comparable to the foundational work of large scale AI projects that create lists of well-formed formulas. Such a system would allow instantiation of the ideal, scientific art of rhetoric proposed long ago, still a target for researchers and inventors today. Trying to formalize this notion leads to operators over sequences of words, and words that can be interpreted as operators. Such is the nature of punctuation and prepositions. The third order must be broached." (Fetzer, 2004)
7 1 1 (4800) [-4+]mCQK bork-journal 20160929 20160929b 27 -1+ journal_2016.html
Philosophy needs to take one for the team and allow programming to subsume it by taking up technology topics over human questions.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=1 or Heading=0) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
ENTSCHEIDUNGSPROBLEM")
An algorithm is a mechanical or moronic procedure for achieving a specified result. (..) a finite list of machine-executable instructions such that anyone or anything that correctly follows the instructions in the specified order is certain to achieve the result in question. (B. Jack Copeland, "WHAT IS COMPUTATION?")
Why does computing have to be like your boss, sometimes a "prick" or an "asshole" when it (computing, like your boss) forces you to do something you dont want to do in order to get the job done?" (in the sense of Section 1) 0.2in; font-variant: normal; font-style: normal"> Besides being historically representational, computing has also been tyrannical. Diogenes Laertius wrote of Solon:
He used to say that those who had influence with tyrants were like the pebbles employed in calculations; for, as each of the pebbles represented now a large and now a small number, so the tyrants would treat each one of those about them at one time as great and famous, at another as of no account.
Both of these characteristics seem implied in recent descriptions of computing in general. I will cite Turing and Copeland:
If at each stage the motion of a machine
7 2 1 (600) [-6+]mCQK bork-journal 20160407 20160407b 6 -2+ journal_2016.html
It might not make sense to talk of the hermeneutics of computing the way we talk of the hermeneutics of sacred texts, for as I pointed out in a candidacy exam response, the horizon is distorted by both canned responses to computing and the design approach where reverse engineering has a close fit with the intellectual labor of technologist, symptoms of which Hayles and Norman identify as skeumorphs and PHI respectively, yet another footnote to McLuhan on the content of media being other older media. My first approach is our life world engagement, especially in written texts and cultural practices.
7 2 1 (700) [-4+]mCQK bork-journal 20160709 20160709a 6 -53+ journal_2016.html
Copeland IACAP keynote What The Stored-Program Story: What Philosophy Taught History summarized: philosophy taught history to reduce contention by proposing levels for stored-program concept discourse networks.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=2) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 7.2 hermeneutics of computing+
7.3 phenomenology of electronic technology
--7.3.1+++ phenomenology of electronic technology
7 3 1 (100) [-9]mCQK bork-journal 20160215 20160215c 5 -1+ journal_2016.html
Epistemological criteria from Kittler and Latour insist learning and doing presented as phenomenology of electronic computer technology; offer plan of how to learn; new thinking with electronic devices; Linux kernel and GNU quintessential software.
7 3 1 (200) [-6+]mCQK bork-journal 20160906 20160906a 3 -1+ journal_2016.html
Pick a device and learn it very well, that is how to begin philosophy of computing.
7 3 1 (300) [-4+]mCQK bork-journal 20050930 20050930a 0 -46+ journal_2005.html
My overall mission is to promote the philosophy of computing by combining the speculative through scholarly study of ancient texts with the practical through hobbyist study of electronic technology.
7 3 1 (400) [-6+]mCQK bork-journal 20010916 20010916a 0 -5+ journal_2001.html
Simplicity is a luxury of single-processor "systems that was not missed [in earlier <milieu(..)><prep> electronic computing]. It is sorely missed today by people trying to learn how computers work, and also by those who use them in their everyday life. It would be impossible to begin with the state of the art and expect to develop a comprehensive understanding of how computers work of the sort mentioned earlier." (or single-tasking)
7 3 1 (500) [-1+]mCQK bork-journal 20040802 20040802 0 -44+ journal_2004.html
Had been bookmark thesis underscore significance.
7 3 1 (600) [-6+]mCQK bork-journal 20140607 20140607 1 -1+ journal_2014.html
Let us talk first about electricity because it is essentially lethal then move on to rhetoric and computer programming.
7 3 1 (700) [-6+]mCQK bork-journal 20050616 TAPOC_20050616 0 -2+ journal_2005.html
Does the distinction between electricity and electronics relate to computing and information? Electronics implies directional control and leverage, often with the aim of syntactic processing " although electricity can be used in a similar fashion (although vacuum tube technology is also referred to as electronics)." (computing)
7 3 1 (800) [-4+]mCQK bork-journal 20090317 20090317a 0 -6+ journal_2009.html
Consider instead of the dictionary the definition of impedance found in Grob Basic Electronics, the term impedance, with the symbol Z, specifies an opposition to current that can include resistance, inductance, and capacitance (254).
7 3 1 (900) [-6+]mCQK bork-journal 20090330 20090330b 41 -3+ journal_2009.html
The xcircuit documentation references a textbook providing guidelines for drawing well formed schematic diagrams. Another chapter in Grob Basic Electronics worth reading is the beginning of Electronic Devices, covering Semiconductors, The PN Junction, Semiconductor Diodes, and maybe all the way through PNP and NPN Transistors, pages 681-697 in the seventh edition. It sets us up from a discussion of bridge rectifiers and the presentation of a schematic diagram of an idealized AC to DC power supply adapter.
7 3 1 (1000) [-4+]mCQK bork-journal 20050214 20050214 1 -20+ journal_2005.html
The 2x Rule is where information, as defined by the Nyquist rate, shimmers on the verge of incomprehensibility.
7 3 1 (1100) [-6+]mCQK bork-journal 20170214 20170214 7 -2+ journal_2017.html
Reading passage in Foucault lectures defining modernity as principia naturae and ratio status, the two great references of the knowledge of techniques given to modern Western man are finally constituted, or finally separated, seems more important now than it probably is besides its absence in chapter two. Entry about ontic rules for phenomenology of electronics seems to fit a recently considered Foucault technique or characteristic, though crudely imitating his style with much less research depth.
7 3 1 (1200) [-6+]mCQK bork-journal 20120709a TAPOC_20120709a 0 -1+ journal_2012.html
Ontology becomes analysis of electrical buses where each point is taken as positive, ground, control function.
7 3 1 (1300) [-6+]mCQK bork-journal 20080930 20080930a 0 -2+ journal_2008.html
Another image for something computers can do that humans have trouble conceiving, and simply cannot do: the control action on the SCRs for the pinball machine feature lamps. Imagine a human operator controlling them, accompanied by the Beavis and Butthead clip where he says that if he could move his hand that fast, hed never leave the house.
7 3 1 (1400) [-6+]mCQK bork-journal 20050411 TAPOC_20050411 0 -4+ journal_2005.html
The struggle is to make technically correct instructional examples interesting and useful. I offer the pulser and pinball machine reverse engineering kits as simple and advanced projects for learning how computers work. Another simple project is a transistor relay driver circuit. However, its interest and utility are dependent upon what it drives.
7 3 1 (1500) [-6+]mCQK bork-journal 20050713 20050713 1 -1+ journal_2005.html
First generation microcomputer-based devices shine as instructional examples because their patents have expired and their circuitry tends to be large and simple.
7 3 1 (1600) [-6+]mCQK bork-journal 20030303 20030303 5 -5+ journal_2003.html
2in. "The fact that this book is over ten years old does not invalidate the proposition, considering the Intel x86 family of microprocessors are the direct descendants of this trio. The perspective the author uses seems to facilitate reverse engineering, too: "to consider the effects each computer instruction has on the electrical lines or buses of the microprocessor chip itself." (p. 2) Font-weight: normal">Revisiting Uffenbecks 1991 textbook Microcomputers and microprocessors: The 8080, 8085, and Z-80 programming, interfacing, and troubleshooting I am refreshed with the notion that "despite advances in semiconductor technology and microprocessors, the basic architecture of the digital computer has remained unchanged for the last 35 years. This is the so-called von Neumann model of the stored program computer."
7 3 1 (1700) [-4+]mCQK bork-journal 20040718 20040718 0 -24+ journal_2004.html
Uffenbeck belongs to an earlier era of computing.
7 3 1 (1800) [-4+]mCQK bork-journal 20050718 20050718 1 -36+ journal_2005.html
I mused to a group of teenagers why are all the cool hacks illegal?
7 3 1 (1900) [-6+]mCQK bork-journal 20050317 20050317 0 -14+ journal_2005.html
To avoid patent infringement claims use 2.0 x 10x+2 and 2.0 x 10x year old reverse engineering methodologies and patents. From the text of Plato and Xenophon strictly follow the Socratic method, arriving at the typical closed-loop process model. Use the flowcharting symbols familiar to technologists. The texts include ought we not to consider first whether that which we wish to learn and to teach is a simple or multiform thing, and if simple, then to inquire what power it has of acting or being acted upon in relation to other things, and if multiform, then to number the forms. "and Xenophon, which recommends the use of free and homemade, implying recycling of COTS items in the process. Researching the expired Bally patents creates knowledge; recycling increases Life-Cycle Savings. Next show the list of things to host on Sourceforge. These are the workqueue process, the supervisory testbed game control program, the analysis script, et cetera.
Floridis formal definition of cyberspace is embarrassingly not well formed, failing to properly use parentheses and operators, which would not compile were it a computer program. Is this a slight of hand to intentionally try to fool the reader, a dumb mistake, or a clue into Floridis unthought, to use an old, gnomic formula?
Is the workqueue process cycle affected by the user program accessing the character device file? Its execution footprint is known from the RDTSC timestamps, and this could be correlated to process cycle abnormalities." (Plato, 270C-270D) And see first in the case of one of them, and then in the case of all of them, what is that power of acting or being acted upon which makes each and all of them to be what they are?
7 3 1 (2000) [-4+]mCQK bork-journal 20050516a TAPOC_20050516a 17 -68+ journal_2005.html
Enumerate electrical connections as computing objects or not into a RE project database.
7 3 1 (2100) [-1+]mCQK bork-journal 20040725 20040725 5 -33+ journal_2004.html
The big thought for the night involves riding the wave that swept up Kate Ingle.
7 3 1 (2200) [-4+]mCQK bork-journal 20040420 20040420 0 -6+ journal_2004.html
Dude, wheres my initial high?
7 3 1 (2300) [-4+]mCQK bork-journal 20050911 20050911a 22 -10+ journal_2005.html
TAPOC illuminates real time problems both of which exploit processor affinity in multiprocessing environments [for multiple levels of control] that divide into upper and lower bounds.
7 3 1 (2400) [-4+]mCQK bork-journal 20050829 TAPOC_20050829 0 -47+ journal_2005.html
What if you see the circuit from the other side, groping at it through logic?
7 3 1 (2500) [-6+]mCQK bork-journal 20090208 20090208a 3 -7+ journal_2009.html
So a five minute tutorial on Ethernet and Internet Protocol implemented on Free, Open Source GNU/Linux electronic computing machinery comes to mind. To make it hands-on I will bring in a switch and a bunch of Ethernet cables and have everyone temporarily rewire computers in the lab and boot them with KNOPPIX CDROMs I will provide, or hook up their own laptops. Really basic stuff, but most probably have never done it (plugged a computer into a network cable to "get on the network", doing the work of DHCP Dynamic Host Configuration Protocol) with a correct understanding of the technologies (IEEE 802.11 100Mb Category 5 twisted pair Ethernet, IPv4, ICMP, DHCP, etc.) in mind." (favoring human-readable texts to machine-readable texts) 0in; font-variant: normal; font-style: normal"> One conclusion I have been reaching is that Derrida opens the domain of T&T studies to computer programming and technology in general by chasing away anthropocentrism
7 3 1 (2800) [-4+]mCQK bork-journal 20040511 20040511a 1 -15+ journal_2004.html
Yes this illustrates the concept of "bootstrapping" but my point is the closed loop process model.
7 3 1 (2900) [-4+]mCQK bork-journal 20100511 20100511 0 -61+ journal_2010.html
Continuing work on new Ubuntu based pmrek started list on that machines local graphical user interface, then moved to this computer after installing openssh-server to install subversion and start the process of getting the pmrek kernel module and user programs to compile on this platform running Linux pmrek2 2.
7 3 1 (3000) [-1+]mCQK bork-journal 20160511 20160511a 5 -3+ journal_2016.html
Needing monitor to test pmrek machine that stopped booting and may have a bad power supply, motherboard, or simply need CMOS battery.
7 3 1 (3100) [-4+]mCQK bork-journal 20130516 20130516 0 -8+ journal_2013.html
A three amp line voltage circuit breaker is the geeky replacement to the missing fuse on the pinball machine.
7 3 1 (3500) [-6+]mCQK bork-journal 20051022 20051022 1 -3+ journal_2005.html
When arriving at the likelihood that x86 ISA memory mapped input and output operations can satisfy the real time requirements of the pinball machine, while human beings alone cannot, follow a line of questioning beginning with whether both human beings and artificial automata can perform input and output operations at the rate of one Hertz, next 10 Hertz, 1000, and finally 1000000, where the interlocutor says, enough already to affirm the affirmative truth value of the question. The Intel x86 ISA memory mapped I/O can operate with microsecond precision and all precisions less precise to second precision. This observation seems unimportant, but it is a point upon which the argument can turn with the same efficacy as logotropos.
7 3 1 (3600) [-4+]mCQK bork-journal 20130627 TAPOC_20130627 0 -8+ journal_2013.html
When Derrida writes I have spoken to you of my computer, he does not know what he could be pondering, and the invitation is extended to us to further the thought.
7 3 1 (3700) [-1+]mCQK bork-journal 20160627 20160627 0 -1+ journal_2016.html
I did not know so many days had passed and I thought I had already typed something today about PHI that reached governmentality of software through something electronics to reach transhuman thought machine thinking PHI thinking PHI like PHI computing objects PHI high speed micro already where tele imagined if you have any sense of how to think like electronic computing machinery PHI in one world this makes me the transhuman cybersage PHI.
7 3 1 (3800) [-6+]mCQK bork-journal 20120627 20120627 0 -4+ journal_2012.html
It is at once so simple obvious and so obviously complicated, for instance constructing a next lower in order of magnitude of energy units of virtual reality possible world descriptions PHI. A point implicit or explicit in often cited Foucault text is that having been granted default operation of certain phenomenological fields, galaxies of meaning resident in virtual worlds, what I refer to often as PHI, becoming standard, the operations themselves emerge by their own curious logics, what later becomes history. He means the autonomous whims within each structurally sanctioned disciplinary institution, especially prisons. So Hayles argues of technologies that have made us posthuman.
7 3 1 (3900) [-4+]mCQK bork-journal 20110627 20110627 0 -70+ journal_2011.html
Reworking to correct a problem where years back journal entries are not displayed when an operator is passed thinking I hystericize in software code such as when I cannot program at work forces below the first stopping place, not the same as going beneath the surface, more like moving around different positions and performing different roles, I go from the Perl CGI program to the nominally C++ C wrapper program.
7 3 1 (4000) [-1+]mCQK bork-journal 20050627 20050627 0 -1+ journal_2005.html
The die has been cast; the comedy begins (how many times have I announced this already?
7 3 1 (4100) [-6+]mCQK bork-journal 20160627 20160627a 1 -1+ journal_2016.html
The unique position of electronics hobbyist then joins commonality of programming experience.
7 3 1 (4200) [-4+]mCQK bork-journal 20040629 20040629 3 -24+ journal_2004.html
While studying the control unit operation, having mused of a patentable reverse engineering process employing brute force data recording, information from the possibly restricted data (Bally document) is tabulated as moved to end.
7 3 1 (4300) [-1+]mCQK bork-journal 20020629 20020629 0 -15+ journal_2002.html
Well they must be "<prep><nouns><operator><nouns><verb><pronoun><infinitive><operator><operator>
jbork@jbork-UX305FA:~/src/tapoc$ grep -n "Consider \[" *.cpp
Assign relevance to [3] most recent entries? y/n:y
Consider [nal_20160516"></a>\nI]
Assign [20160516] relevance [0]? value/ENTER:
jbork@jbork-UX305FA:~/src/tapoc$ vi build.tapoc.sh
echo "Consider ["`mysql -ubuilder -pbuilder JournalInfo --batch --skip-column-names -e "select substr(Lexia, 87, 20) from Objects where Timestamp=$item"`"]"
Consider [>\nInstituting the ph]
echo "Consider ["`mysql -ubuilder -pbuilder JournalInfo --batch --skip-column-names -e "select substr(Lexia, 105, 20) from Objects where Timestamp=$item"`"]"
select * from Objects where timestamp like %0517%;
jbork@jbork-UX305FA:~/src/tapoc$ mysql -ubuilder -p JournalInfo -e"select Timestamp, Relevance from Objects where timestamp like %0517%;"
1
[working code css]
A few wrong roads. That is the nature, habit of many programming styles, here at first stumbling forgetting even which table presents the prompts to adjust a little to actually show readable text rather than HTML anchor content as hints for evaluating each PHI invoked by make concealed at boundary of working code snippet window view PHI. It is the urge to end this section and start the next, a rhetorical form shared with thousands of years of writing. First thinking it was Items not Objects or Notes, but really it was the former so another instance of Consider space left square bracket to grep. It is also a good check that I added the bookmark I always do. Try starting at 104 instead of 87, tweak to 105, finally settling or perfect 106, a whole nother kind of logic sharing with fuzzy challenge to assumed binary default logic, despite it being the basis of electronic computing, another way of landing on truth in continuum of satisfactory to perfect binary match. All this and it still skips the entry for today which is why I was investigating in the first place. Oh, its because its Relevance is already set to 1. Great set of images and diagrams from pmrek project including diagrams of user and kernel workqueue processes as exemplars of boundary of human and machine processes. And exactly two decades ago I was bemoaning that I could not do this the first time I tried graduate work, not imagining three more degrees and a programming career to accomplish it, yet even then I was philosophizing about fantasy hyperlinks in fantasy computing systems that I called BMPHIs, bookmarks: They should be fuzzy, strange attractors else we lose the true function of a bookmark, which is a sort of extra-textual energy well drawing us to remember something that only had being in the reading-writing but itself was not fully recorded (or else we would not need the mark!). Let us move into programming languages then." (ellipsis) 0in; line-height: 100%">[working code css]
jbork@jbork-UX305FA:~/src/tapoc$ grep "Consider \[" *.pl
jbork@jbork-UX305FA:~/src/tapoc$ grep "Consider \[" *.sh
jbork@jbork-UX305FA:~/src/tapoc$ vi +576 build.tapoc.sh
select * from Objects where timestamp like %0517%;
select * from Items where Path like %0517%;
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=3) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
Its reflection would be in another formula, another section, sentence, page, argument, story, narrative, dataset, lines of program source code interpreted by an interpreting language, which probably happens in a program running a compiled language, such as remote modules and procedure calls as another narrative in a story focusing around PHI, the name of the missing but potential bookmark naming this action subject place lexia area of text, area of image, area of object code, machine code. The languages go into infinity of computer programming languages that are either compiled or interpreted.
7 4 1 (900) [-6+]mCQK bork-journal 20160603 20160603 0 -2+ journal_2016.html
Procedural versus object oriented and now functional. Adjust languages heading to programming new ontologies, protocol, consider or not, along with recent beginning of a plan to use lexia spans from Notes in place or alongside Objects that conly go back to the recent year they were implemented as virtual files replacing tedious to create and quality test public versions.
7 4 1 (1000) [-6+]mCQK bork-journal 20160730 20160730 0 -2+ journal_2016.html
What if polis and bios seem to be the poles becomes the philosophical thought I call philosophy of computing working code PHI that is writing I do when I am not programming PHI that is how me and the humans machines networks planetary cyberspace localhost PHI. Embodiments of ontology generated with Hardt and Negri form this discourse about programming languages, in programming languages and natural human languages like English, Latin, and so on.
7 4 1 (1100) [-6+]mCQK bork-journal 20160803 20160803 0 -18+ journal_2016.html
War breaks out and nobody shows up plays song from eighties now public domain all copyrights having expired when this day repeats years from now equal to time PHI easily handled via C broken down time programming. After operating system upgrade tapoc console not working, initially neither journal.exe via CGI. Part of governmentality of software that might make computing seem bossy is using and making simple languages with which to speak commands, provide instructions, that are, programming languages, and agreeing that this will be the mode of discourse, these depraved languages. Oh thats right the console does not work so I cannot make the first five and the latest sixteen. To not lose good stuff written today for another year debug this problem. Here it is.
Here it is. In all its working code depravity and that makes its goodness to read. Something wrong with the Perl code making the tapoc console web page that keeps me from doing my job tonight doing variant of dissertation cow clicking preparing the text operations as a form of writing inspired by the philosophy of computing. Use internet beyond lan to study latest usage of function oriented Perl CGI to replace startform. Great, the new version includes underscores." (-method=>"POST", -action=>"http://$script_url") 0in; line-height: 100%">[working code css]
mysql: [Warning] Using a password on the command line interface can be insecure.
Cant locate object method "startform" via package "CGI" at /usr/lib/cgi-bin/gentapoc.cgi line 338.
Cant locate object method "startform" via package "CGI" at /usr/lib/cgi-bin/gentapoc.cgi line 1166.
jbork@jbork-UX305FA:~/src/tapoc$ vi gentapoc.cgi +338
print $cgi->startfor
7 4 1 (1200) [-1+]mCQK bork-journal 20160824 20160824 0 -1+ journal_2016.html
I guess I am a presentist promoting learning programming via languages PHI, discuss with Golumbia, though Javascript is a great embodiment of history of programming and leverages virtualization existing in web browsers touching global public internet and, I add, our local area networks working code with us.
7 4 1 (1300) [-6+]mCQK bork-journal 20150928 20150928b 48 -1+ journal_2015.html
Important to broach XML versus C++ when reviewing McDaniel in methodology section, collecting other comments about XML, tying to selection of Haskell and Java by Tanaka-Ishii versus C/C++ by Java offering interfaces, and hinting at late binding questions.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=4) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
Is [progress/2016/02/screenshot_20160207.png] relevant? y/n:y
jbork@jbork-UX305FA:/tmp$ cp wireshark_20160207.pcapng ~/public_html/progress/2016/02/
[working code css]
It is this. That is PHI. The nice thing as that to continue the thought you continue the thought in cyberspace working code PHI it is the descent into working code to take over philosophical thought for a while duration period time space PHI working code place PHI. I have a lot of doubt over whether this will succeed as so much entails my future teaching work I can manage a class of students PHI doing similar to how I do now enacted formally PHI a class. For the lecture think about how the different networks with which you interact affect you, for example corporate, university, local. The TCP data captured while I had the wlan enabled and may have brushed against a corporate commercial website doing being PHI." (ellipsis) 0in; line-height: 100%">[working code css]
Running as user "root" and group "root".
This could be dangerous.
If youre running Wireshark this way in order to perform live capture, you may want to be aware that there is a better way documented at /usr/share/doc/wireshark-common/README.Debian
7 6 1 (600) [-1+]mCQK bork-journal 20130802 20130802 3 -3+ journal_2013.html
Watch thought subside into Foucault, Janz, Mackenzie.
7 6 1 (700) [-6+]mCQK bork-journal 20120802 20120802 2 -4+ journal_2012.html
Link Maner by memory of his lectures and exercises " This is the care that beings give themselves regardless of media type embodying future human readers including me the original author through this year. Looking at the exam lists as progression of argumentation narrative stepping through to the default hyperlink into each one from Berry, Bogost (relevance may be reduced), Fuller, Marino, dropping back decades to Turkle, even further back to Von Neumann, back to current writing and coding practices (Barker) through the auditory examine evaluated by Barthes intersecting Sterne exclusion of formant synthesis in the aesthetics of sound experienced by humans and machines in virtual realities possible with symposia as dynamic producer of static files spitting one out each day by some supervisory control system with a control resolution of one Hertz, refreshing once a second like the busy scrolling shell script producing the symposia slide show loop in the tapoc virtual machine from which the other speaks. Imagine also a software project that produces daily seminar of Lacan television broadcasts now emanating from pirate radios, noting this is another violence to the hacker version of the term giving pleasure and useful information like public radio reception sound system to go along with the raucous sound of popular cultural virtual realities (watching pay cable television, for example, or driving an automobile)." (away from class time realities)
7 6 1 (800) [-4+]mCQK bork-journal 20110930 20110930a 65 -25+ journal_2011.html
ENG_6813_20110930 originally has nice tables for rubric scoring
Title: Capstone assignment for a digital humanities course "How the Internet Works"
Group size: 4-6 students
Duration: 3 weeks
Points: 100
The specific assignment is to assemble a multi-segment TCP/IP network with one or more subnets connected via a router.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=6) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
[working code css]
Is [progress/2004/07/whiteboard_20040718.jpg] relevant? y/n:
Is [progress/2004/09/Connection_20040718.h] relevant? y/n:y
Is [progress/2004/09/testConnection_20040718.cpp] relevant? y/n:y
Consider [\nExpensive textbooks]
Assign [20160718] relevance [0]? value/ENTER: 1
jbork@jbork-UX305FA:~/src/tapoc$ svn status -q
M Items-tapoc.sql
M Notes-tapoc.sql
M Objects-tapoc.sql
M journal.cpp
[working code css]
Note skipping. A rare addition of old source code saved today accompanying repetition of skipping an old image that could be added at a later date today in future years PHI. Also see creation of todays entry bootstrapping this writing so as to never having not been writing itself, that is, running code, working code as I have been calling it PHI. Noting what does not go immediately into storage, thinking about needing a local repository maybe good way to try git except outdated host machine and urgency to save.
7 8 1 (300) [-6+]mCQK bork-journal 20110328 20110328a 0 -19+ journal_2011.html
There is a hint of disdain toward The Second Self in Bolter. Should we throw away Turkles early work on programming styles and epistemological pluralism, focusing with her on her current endeavors? Or is it legitimate to continue her project, this time paying more attention to the specific computers and texts whose use may influence style? Questioning toward philosophy of computing by answering this challenge by studying confluences of computers, texts, and styles also assembles a new interpretation of texts and technology that links it to ancient computing in a way hinted at by the ancient Greeks. Perer Merholz published an interesting blog Thoughts on "the original Macintosh User Manual and I could not remember where Jones mentioned this manual to me. After searching fruitlessly through all early discussion postings, I later remembered he may have replied to an email. A search for 1984 macintosh user manual history provided a link to this interesting time line (inventors.about.com/library/blcoindex.htm) but it did not mention the manual, just the machine. There is an untold story about the texts bundled with those famous early personal computers that shaped and influenced everything that is today. I can start with the research project for Dan Jones. Reflections of style may be more abundant determinants of the essence of any given computing system than the specific idiosyncrasies of explicit designs. The technological unconscious includes this dull shape moreso than the implicit, concretized collective will of the organizations that technologically generates products. This is not to deny the seminal influence of Gates now infamous 1977 letter to hobbyists, Stallmans GNU manifesto, or Torvalds Linux kernel. It is rather to balance out the hype we give to these few, explicit ideological declarations, as well as the manifestations of amorphous technological unconscious described by Feenberg (and the people he cites), with the stylistic tendencies that for a large part are reflections of self influence of the structure of the technologies themselves. Manovich draws the distinction between existing cultural conventions and the conventions of software (NMR, p. 18). For example, the opposite styles of iterative, incremental development and epochal coding may derive from long acculturation to interpreted or compiled environments as much as personality traits." (and pics of)
7 8 1 (400) [-6+]mCQK bork-journal 20160323 20160323 4 -1+ journal_2016.html
Beyond hard mastery and bricolage: autoenthographies of coding places reveal multiplicities of programming styles.
7 8 1 (500) [-4+]mCQK bork-journal 20101206 20101206 0 -5+ journal_2010.html
To give an example of how things are normalized in standard database form is something Rob Cooke would do to solve a problem.
7 8 1 (600) [-6+]mCQK bork-journal 20040330 TAPOC_20040330 0 -3+ journal_2004.html
Some may say that it is a "mainframe concept." However, if you are ignorant of computers you may miss the point about the big letters made up of little letters on the printouts. Mainframe systems know they are serving human beings
7 8 1 (700) [-1+]mCQK bork-journal 20000503 20000503 0 -5+ journal_2000.html
Met a remarkable man at the Romulus terminal, an old fellow working on a laptop turned out to be a contractor doing the tank work.
7 8 1 (800) [-1+]mCQK bork-journal 20160511 20160511 3 -2+ journal_2016.html
Knowing how far behind typing in notes for the tapoc software to turn into chapter seven id est the syllabus presentation lecture and so on PHI.
7 8 1 (900) [-4+]mCQK bork-journal 20070616 20070616b 7 -9+ journal_2007.html
Scripts are the bastard children of programming, kind of like working on a mainframe today.
7 8 1 (1000) [-6+]mCQK bork-journal 20070709 20070709 0 -3+ journal_2007.html
The definition of the ethic is rather weak: consider FOS options wherever feasible. It must be cast alongside other common sourcing strategies in information technology. Then it can be evaluated from the three perspectives of engineering philosophy of technology, humanities philosophy of technology, and finally the synthetic, epistemological cybersage approach.
7 8 1 (1100) [-1+]mCQK bork-journal 20110718 20110718 0 -12+ journal_2011.html
Repetition, reverberation, home on a weekday, it could be practice.
7 8 1 (1200) [-1+]mCQK bork-journal 20120718 20120718 0 -1+ journal_2012.html
This is what got caught called processed, the journal announcement or other internal change truth value setting value.
7 8 1 (1400) [-6+]mCQK bork-journal 20160712 20160712a 1 -3+ journal_2016.html
Start that way I say repeatedly throughout the years as an output that is PHI as example of new ontology emergent from programming, or computing what do I mean. Prediction that obesity will replace smoking as most preventable cancer deaths with forty percent unknown. Four core cultures on possibility actuality and personal impersonal axes yielding cultivation, collaboration, competence, control cultures, intersecting organizational and professional in project cultures, intersecting early imaginations of the dissertation.
7 8 1 (1500) [-6+]mCQK bork-journal 20160804 20160804 3 -3+ journal_2016.html
Reverse engineering has been neglected as a cognitive model along with plans and situated actions that clearly follows from lifelong programming. When this day rolls around I return through strange device of bow and two written pages in Greek and Latin thinking no way PHI could think of this from the collected data content processed via PHI that is my version of Decartes cogito and Turing test and other great forms of philosophy like Socrates and Cicero. Make book called syllabus for a philosophy of computing that is really an advertisement for personal services including teaching undergraduate courses.
7 8 1 (1600) [-6+]mCQK bork-journal 20160713 20160713a 1 -4+ journal_2016.html
Playing a game promotes exercise justifies otherwise repugnant software, working code being. Chaos monkey as development technique, model technique along with waterfall and agile styles. Does the chaos behind the screen become visible to all in spite of otherwise well designed and implemented products. Such goes interview on public radio or equivalent PHI, leading to focus on humans and machines engaged in cyberspace.
7 8 1 (1700) [-6+]mCQK bork-journal 20160718 20160718 0 -10+ journal_2016.html
So ya thought you might like to go to the show becomes from media ecology predicted or afforded in sense of ontological generation PHI. We are coming to get you becomes threat within game play mythically directing PHI death last ones to talk about. Imaginary connection between campaign rhetoric with nauseating media technologies now being implemented collectively, for example real time public radio broadcast imagined equivalent PHI. At some fundamental level is decision machine evaluating as in listening, reading, and so on PHI decoding interpreting reciting activities PHI. Client and server side as positions of computing. Winning every way but boring factual rhetoric losing the war with mindless dumb media intoxication virtual reality addiction like oxygen, air, water, and so on essential to human life now shared with machinery, machinic, platial, effervescent, riding on streams version four and needing to start studying six, and so on. These senses intuited by eight bit computing evident in given example clip PHI so ya thought PHI. If it works then a cycle through this community college two year program courses optimally helps develop the thought while continuing current employment like Wallace Stevens at his insurance company, that is, programmer by day, philosopher by night, teacher in the middle transition daily operation. To do this need to examine other source control system, what is taught as client side programming, the corporate and institutional cultures, and so on to get into the groove. A huge enumeration of programming styles.
7 8 1 (1800) [-1+]mCQK bork-journal 20160719 20160719 0 -7+ journal_2016.html
Listen man I need to study shared document and git if I am putting aside version six chickening out of see thats the derelict depraved style PHI about which I want to avoid and seldom except when rhetorically sufficient to necessary scale PHI PHI it does it computes it makes real virtuality playback from playlists years back as well PHI like the debate loop lasting a few hours easily fits into broken down time programming objects PHI.
7 8 1 (1900) [-6+]mCQK bork-journal 20101213 20101213 51 -25+ journal_2010.html
Again, begin with an enumeration of programming styles and how to measure them in source code, how to score them during a scripted interview protocol, and how to ascertain them from ethnographic researcher like Turkle performed in the late 1970s, which she reported in 1984, milked through the early 1990s, then by 1995 with the publication of her second book on this theme, began turning away from concentration upon programmers toward overall human comportment with "computers. There are gaps in collective, scholarly thought where Turkle left off and shrugged aside, as evidenced by her 1984 book, a 1986 interview, her 1995 book, and a third-party citation from her 2008 book.
Turkle, Sherry. (1984). The second self: Computers and the human spirit.
Rhodes, L. (1986). On Computers, Personal Styles, and Being Human: A Conversation with Sherry Turkle. Educational Leadership, 43(6).
Turkle, Sherry. (1995). Life on the screen: Identity in the age of the Internet.
Dodge, Chris. (2008). In Turkle, S. (2008). Falling for science: Objects in mind.
Both code analysis and research involving human subjects may readily detect the bricoleur or hacker style. I want to demonstrate that code analysis may detect styles that seem irrelevant or insignificant to the researcher, or simply very difficult for the researcher to elicit without a (silly) technical question like, how do you do curly braces? that nevertheless are what Wikipedia considers by the term. Beyond that, iterative code analysis triangulating revisions with historical events in the programmers life reveals additional programming styles currently unexplored, as my own account illustrates. The population of the study is people who learned to program computers in the late 1970s through mid 1980s. At a few standard deviations away in the marginal population of the study are people who, following Bogost and others, are learning to program computers now using the platforms (but likely not the same texts) as those of the primary population.
This is a diagram of my triangulation.
Code analysis points to styles two and three;
Transcribed audio and research notes point to three." (electronic)
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=8) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
I have already done all this today at the other house. Now back in front of the large whiteboard composing extended abstract for conference and dissertation proposal. Imagine walking start of character hyperlinks to entry being displayed, that is, by the very work by the very author that may be randomly received or calculated. The problem I am having adding this special version of display_character_hyperlink by passing the rmitr pointer, which is a C++ pointer to a C++ map<string, string>::reverse_iterator data structure. Flailing, not understanding something basic about the correct syntax. The real cause for the mess was neglect of class scope resolution operator in implementation of function. To make a special call to adjust the pointer for the correct starting place, an old section of code for that condition (!fptr and cptr) must be reterritorialized. Getting it to finally work, after correcting a number of logic errors and simple mistakes, the search finds the first instance of the title, the most recent bookmark, not the desired target for prior entries." (including dialectics) None">Philosophy could occur in this debugging effort, ergodic wrestling the machine into performing the computations we intend for it by engaging it at its execution interface rather than the precompiled source code level. As Janz argues for African philosophy, it is, however, outside the range of phenomena currently admissible in the Western mainstream tradition; it is not critical textual discourse
7 13 1 (1000) [-6+]mCQK bork-journal 20160106 20160106 0 -9+ journal_2016.html
My dissertation introduces significant programming components to elaborate philosophies of computing PHI. The PDF is just an instance of a particular set of PHI amenable to broken down time computation PHI, best experienced in living virtual machines PHI and using sets of software PHI. The philosophical and practical action of bringing programming into philosophy opens to new kinds of humanities scholarship research exemplified by and as works of the texts and technology term electracy. Whereas traditional humanities emphasis on ancient and modern languages here include computable languages and virtual machines emulating and simulating devices PHI them. Working code is human machine symbiosis interface phenomena, following lead suggested by dissertation committee in agreeing that embodied theory of mind is rooted in phenomenology so appropriating its terms is more like coextensive use for both beneficially if you want to get into latest fun reading from the introduction to the soul at work contemporary philosophy item. Cyberspace and electracy both are powerful discourse therefore ontology shaping terms. First new thing is to add chapter seven requiring C++ modifications for which this is the initial instance. Find code where to begin looking for adding chapter seven by searching for use of num_chapters, which ought to be in a for loop needing adjustment. However, there is a sooner spot where it may be set to cohere with the for loop not containing the maximal chapter number six.
7 13 1 (1100) [-6+]mCQK bork-journal 20160126 20160126 0 -6+ journal_2016.html
Start it with starting borking public radio for today PHI it is still the LAN PHI wired connected TCP/IPv4 network phenomenon instance PHI. Last year spoke of framework that I have to present to Texts and Technology and Philosophy representatives PHI. Do not say corporate or commercial say leaving industry then left on way to tenure. My proposed framework strikes new ground by being embodied in a free, open source software projects, involving substantial code composition and review components along with traditional humanities practices such as critique and ethnographic reflection, should be restated as research interest in software projects as part of philosophy of computing PHI. Dissemination of research and practical instances of digital humanities project methodologies are common themes of National Endowment for the Humanities Office of Digital Humanities, going back further. What if the syllabus work area in chapter seven becomes the research interests pasting from other draft documents emanating from foss tapoc.
7 13 1 (1200) [-6+]mCQK bork-journal 20150303 20150303a 21 -4+ journal_2015.html
Network dividual cyborg is what the human immured in technocapitalist networks ought to escape the absolute overdetermining sway of which influence PHI. Is Heidegger flushed with all the other chuckleheads who did not program becomes hinge for logotropos sieve strainer division function, remembering Maner likewise threatened by Johnson. The concept of network itself emanates from technological networks as highly engineered human environments, but their discussion goes back further than the formation of the Internet, as revealed by Misa, continuing with Weiner, Burks, Goldstein, von Neumann, then onto familiar Internet prehistories. What can you catch your computer doing in this monitored network environment clues you in on what happens in cyberspace along with what you think happens, for you cannot think must high speed protocological processes making reality.
7 13 1 (1300) [-6+]mCQK bork-journal 20140303 20140303a 25 -6+ journal_2014.html
With the soullessness of dynamic runtime epiphenomena the code is adjusted to the point it works. This embodies default response to question what is an object of tapoc bouncing around hyperlinks inside itself in the localhost personal custom webserver world real virtuality as workstation production for some cybersage. Working code places have been observed to elicit such meditations. Each ellipsis in the working code citation marks thought eras, short term memory bounds leading to the code being iteratively written as it was or wished to work. From this wishing in code can be distinguished from dreaming in code really working instantiation. Part of the challenge is that work units credited to writing as laying out OHCO constituted by proportion of clicking that also is counted as research by organizing notes.
7 13 1 (1400) [-6+]mCQK bork-journal 20150810 20150810c 0 -3+ journal_2015.html
One purpose for examining psycho-social studies of computer programmers and programming communities is to adjust prejudices about the social practice of programming based on individual educational and hobbyist experiences, taking into consideration that much pedagogy involves team work and participation in foss communities gives a sense of what professional environments may be like. To be programming philosophers versus philosophical programmers entails substantial portion of philosophical thought production to be deliberately done in software code, working code, such as I have written running on multiple machines making real virtuality including Grateful Dead PHI via fossification PHI. There is a fossification time PHI where all copyrights of content are expired that this code can run besides in my human imagination, and this is an example of philosophical finesse giving forward its justification that this today will come again to think this thought PHI again repeatedly, iteratively PHI as in running working code PHI a Kittler Heidegerrian Lacanian Derridean autogenerated discourse network ensoniment real virtuality PHI that can legally happen at that time PHI.
7 13 1 (1500) [-6+]mCQK bork-journal 20130310 TAPOC_20130310 0 -15+ journal_2013.html
There is a post postmodern rupture with earlier media, texts, and technologies revealed in floss digital humanities scholarship. In works of my own contrivance pmrek, symposia and tapoc, for example, C++ exists on the same virtual mother tongue natural language position function level objectification subjectivity database value variable symbol atomic unit memory operations in my comments and the structure of each projects namespaces as the English idiom of other literary work. If we are going to talk about machine operations, then it should happen from sound positions within any given information system. This was how metalanguage operates upon dynamic sets of natural language simulations in human machine communication. What is queried is the most philosophical programming language, to whose answer for me is C++, known along with C and Java among compiled languages. "high speed alien operations that force humans to rethink their comportment with technologies through critical programming activities and less working code focused studies such as literary criticism and reading for human sensible procedural rhetorics. The thesis, or the hope derived from the thesis is that human nature can be positively changed by learning programming beyond working code and everyday use of programmed virtualities. This potential was sensed and fostered in prior periods by creators of TCP/IP networking, programming languages and operating environments (Galloway; Hafner and Lyon; Kemeny; Montfort et al; Bogost; Brin). In addition to renewed ethical urges to promote learning programming and freedom zero activity, more subtle philosophical questions about the relationship between minds and media can be posed by constructing software projects. Perhaps the thesis is more succinct yet more encompassing, and repeats what philosophers have asked throughout all periods of Western history: our media affect us, therefore we are obliged to learn their schematisms of perceptibility. Put another way, the dominant diagram has always involved media, and now with electronic computing, executable media can do its own thinking." (through interpellation, inscription, performance, semiosis) BASH, Perl, PHP, as interpreted; XML and HTML as denotative. My study gathers opinions from human programmers about this research question via a real or virtual oral interview. To establish a groundwork for articulating instances of floss working code I will review other lexia stating there is a change in the nature of what can be thought by philosophers on account of having at their disposal asymptotically limitless computing power guiding the possibilities of its thoughts. Other evidence is Kemeny before personal computers urging universal availability of programming learning opportunities by simplifying the artificial languages required to program typical computers. Making a note in Ramsay about executive system of his 1960s computers being like supervisory control of pinball game explored in pmrek project is clear example of critical programming studies happening in my own scholarship. The source of the post postmodern advance in digital humanities scholarship is the nature of computing itself, the only type of [writing on par with keyboarding communication] that permits
7 13 1 (1600) [-6+]mCQK bork-journal 20140322 20140322d 1 -6+ journal_2014.html
On the one hand, Hayles argues that recognizing significances of contested aspects that later became the canonical history of cybernetics improves our understanding of our own posthuman embodiment as it is already thoroughly connected to information systems, machinery, and the built environment; on the other hand, artificial intelligence researchers have long realized that bodies play a crucial role in cognition. Imputing soul to corporations acknowledges belief in alien cyberspace other residing in our machines, our technological systems, which must be so much more than our singular conceptions enframing their use. A group of us were in there as children using early eight bit personal computers writing programs and all other active programmers, so it makes sense to think of real virtualities in distant future virtual worlds generated after long slumber and preparation through numerous revisions never yet run in full sense of its purpose so as to define extent of scope amenable to freedom zero logic. At the same time I am suggesting a new mode of scholarship emanating from significant working code. Reading years past FOS option manifesto presenting mission statements ending with learn how computers work from the ground up. Passenger embodiment comparable to underground or underwater living versus modernist terrestrial planetary surface atmosphere conditions.
7 13 1 (1700) [-6+]mCQK bork-journal 20120505 20120505 0 -3+ journal_2012.html
From reading Jameson realize postmodern generates perspectives in which life is but a game analysis forms the edge cases. It is an evaluative criterion operation that sets the boundary of reality in computer generated virtual realities, including mundane human visual [registers], already remote at keyboard versus handwriting, collapsed into embodied manipulations [family resemblanc relations] of reading and writing. From the edge of the journal consciousness vets into archive, the want to do this is archive fever, and yes, Derrida knows for himself it is writing-for-humans, whereas cybersage dares also writing-for-computers, programming.
7 13 1 (1800) [-6+]mCQK bork-journal 20120503 TAPOC_20120503 0 -4+ journal_2012.html
To be logocentric, program. That is, knowing we humans hystericize behavior, some of which is remembered in art, artifacts, texts, the best way to engage with radically other machine intelligence in cyberspace, is by programming them with our own and free, open source code, as defined by the four freedoms " working code.
NPR story condemning unpaid entry level jobs disguised as internship indicates affordance of high employment and excess supply of labor, a good thing, versus high unemployment and excess supply of labor, a bad thing (state of affairs). Acknowledge our archival, deliberate minimally functionally multiplexed symbolic operations, from orality (a form of life time and energy usage for symbolic operations (else magic words, sounds)) to literacy (a form of life time and energy usage for symbolic and control operations (manipulation)) to what is next, electracy (Ulmer), electronic computer most others, Internet (a form of life time and energy usage for symbolic, control and essential operations (PHI, concretization, fossification))." (Stallman)
7 13 1 (1900) [-6+]mCQK bork-journal 20120421a TAPOC_20120421a 0 -11+ journal_2012.html
The constancy of the thought revolves around accepting programming into humanities practice " What Ong means by a sight-sound split is the norm in artificial languages including computer programming. Their simulacra are present in human subvocalized reading and computer text to speech synthesis of learned Latin and ancient Greek. They afford authorial free play. When [interpellated] copyleft (GPL) they afford future virtual realities whose event horizon is the expiration of all other copyrights (is Latour the popularizer of using interpellation in critical theory?). Dive down to free places in texts and technologies for programmed philosophical investigations.
It is a place where an unexplored territory for life long programmers to philosophize about computing PHI (verb that could have been put at beginning with there is). This is where my thought comes to have significance, offering a free place for programmed philosophical investigations. If Janz will accept this and help me run with it, I can assemble most of the dissertation and exam responses via my software systems. A portfolio of life long software projects becomes a new form of identity for philosophers like Johannes Scholastices (Greek rather than Latin because Johannes is meant to be Greek) the American Socrates who was once Alcibiades the renegade." (praxis)
7 13 1 (2000) [-4+]mCQK bork-journal 20130607 20130607 1 -2+ journal_2013.html
Memory mapped input output of ISA may be different from PCI; that is an empirical question broached by programming philosophers critical programming toward a philosophy of computing.
7 13 1 (2100) [-4+]mCQK bork-journal 20120607 20120607 1 -27+ journal_2012.html
Programmed virtual realities can be all of these beings, things beyond reverse remediation computed objects in virtual space ontologies.
7 13 1 (2200) [-6+]mCQK bork-journal 20160328 20160328 0 -30+ journal_2016.html
New media technique of scanning matched with continuation of computation of the thought PHI because you can have the world continue in eight bit machinery but not PHI this thought of sixty four bits. This is the transformation.
[working code css]
jbork@jbork-UX305FA:~/public_html/progress/2016/03$ gimp vpf_20160328.jpg
jbork@jbork-UX305FA:~/public_html/progress/2016/03$ gimp screenshot_20160328.png
jbork@jbork-UX305FA:~/src/tapoc$ make
Run [build-JournalInfo-tables.pl] or short version? y/n/s:y
inserting [progress/2016/03/screenshot_20160328.png, , image/png, 2873821, 1459209377, 1459209377, 0,True] in table
inserting [progress/2016/03/vpf_20160328.jpg, , image/jpeg, 281942, 1459209103, 1459209103, 0,True] in table
Nominate Items with todays timestamp [[1-9][0-9][0-9][0-9]0328]? y/n:y
Is [progress/2006/03/two_router_intranet_template_20060328.png] relevant? y/n:
Is [progress/2016/03/screenshot_20160328.png] relevant? y/n:y
Is [progress/2016/03/vpf_20160328.jpg] relevant? y/n:
Assign relevance to [3] most recent notes files? y/n:y
Assign relevance to [3] most recent entries? y/n:y
Assign [20160328] relevance [0]? value/ENTER: 1
Create symlink list [symlinks-tapoc.txt] ? y/n:y
making symlinklist [symlinks-tapoc.txt] for jpg
appending symlinklist [symlinks-tapoc.txt] for png
funny behavior of virtual machine still stuck in last year.
[working code css]
This is the transformation. What I did here was pasted portion of vpf into screenshot of desktop background image of dock. Do cow clicking easy network PHI to set screenshot of the day to be relevant PHI although this working code also does it. The full handwriting is cut from scan consisting of the rest of the timestamp, software changes to complete the fall experience, writing other versions of versions why programming languages matter as potential topic for hapop presentation on Paris summer world stage time duration PHI eventually computable after all copyrights expire including these instructions on which I wrote having nothing else handy in garage though I had to come in for pencil and could have got notebook, meaning noticing decline in software changes committed, hiding it all or making it safe from PHI by running in vms of eight bit ancient systems, most importantly while listening to radio about Texaco involvement with Nazis while fighting Spanish PHI, then perhaps getting to holding power of programming platforms. Start by buying domains for project work. If we can think of many ways of instituting philosophies of computing or just the philosophy of computing and include in them the one thought with Grateful Dead background sound and rhythm giving a place for thought by humans and machines PHI. What of my requested studies of Castle Wolfenstein and multiple versions of Doom before Bogost publishes a book titled how to talk about videogames, should be an interesting comparison, now that I am coming back with a remediated eight bit platform through virtualization.
7 13 1 (2300) [-1+]mCQK bork-journal 20140328 20140328a 0 -20+ journal_2014.html
See this is the last ordering the last transition pair of authors on whiteboard of to be sorted important dissertation thought constituting points notes text morsels containing oceans of machine meaning built into protocols and protocol data content PHI.
7 13 1 (2400) [-6+]mCQK bork-journal 20140408 20140408b 0 -10+ journal_2014.html
I am writing software that grants processes power to create virtual realities PHI whose ambiance includes borking public radio PHI and the philosopher walking around talking PHI ensoniment via symposia PHI and other floss including espeak. To make it you have to know how it works is qualitatively and gross quantitatively different than pushing buttons and turning dials as technological use thought by Heidegger and other philosophers of technology is where to approach philosophy of computing and programming, or programming computing, things running as virtual realities including the human walking around talking. The scope of my work is ambitious because I am tackling a huge problem for humanity. The wager that I am making right now is that this crappy software is used in distant future running systems PHI I only imagine and describe now and there still has to be philosophers walking around. This one starts with future US copyright law expiration. Edits happening now in GPL repositories and where evolution of software source code team led, user communities are already at hand as affordance of floss rather than having to wait for all copyrights to expire to spring from ambient copyrighted media production, from simple ogg playback to symposia. Kittler thought suspiciously about programming computing, however he is both dead and speaks from sixteen to thirty two bit computing. Today we have the Matrix movie to speak about horrible outcomes for humans, though optimal for computers, or is this an implicit philosophical question about how we comport ourselves, to use an unfamiliar word outside philosophy of technology discourses and common to those spouting this kind of stuff. The methodological challenge is to speak from perspectives of lifelong programmers, following the lead of philosophical programmers like Stroustrup. That Stroustrup includes serious enjoyment by programmers as fundamental design criterion of the C++ language back to its roots in C with classes, taking the serious yet intellectually stimulating and enjoyable to perform intellectual labor of working on code PHI, appears in the chapter four review of what seems antiquated technologies yet undergirds everything, that is, systems programs written in C and C++ undergirding reality in era of TCP/IP networks.
7 13 1 (2500) [-4+]mCQK bork-journal 20110503 20110503 0 -6+ journal_2011.html
American Socrates avoided copyright infringement by planning his philosophical studies decades in advance of their expiration, ready to be deployed as soon as all of their constituent parts were released from copyright protection into the public domain.
7 13 1 (2600) [-1+]mCQK bork-journal 20160411 20160411 0 -22+ journal_2016.html
I am first noting that this text was encountered in print form as a book and marginalia handwritten.
7 13 1 (2700) [-4+]mCQK bork-journal 20130411 20130411a 2 -1+ journal_2013.html
The human computer symbiote is the cyborg, to which I refer as post-postmodern dividual, and my writing becomes that which will one day be thought in more open senses as I do within my single human mind do now through aural and visual imagination once all copyrights expire, expressible in thirty two preferably sixty four bit second unit data structure variable values.
7 13 1 (2800) [-3+]mCQK bork-journal 20150421 20150421b 0 -1+ journal_2015.html
7 13 1 (2900) [-6+]mCQK bork-journal 20100421 20100421a 5 -3+ journal_2010.html
Versions hide such lessons in genuine concretizations as well as more common deprecated or flawed designs and bugs. What do we mean by bugs as programmers and system integrators? The term is as ambiguous as code itself.
7 13 1 (3000) [-4+]mCQK bork-journal 20130503 20130503 0 -37+ journal_2013.html
It derives itself from inside itself; time to build the circuit that replicates this machine and human intelligence I propose as the object subject of network built environment and human dividual PHI.
7 13 1 (3100) [-1+]mCQK bork-journal 19950514 19950514 0 -4+ journal_1995.html
When the ingression of an interval is all that your projects reflect, undone in their stagnancy, and all of your emergency measures that you toiled (.
7 13 1 (3200) [-4+]mCQK bork-journal 20120514 TAPOC_20120514 0 -29+ journal_2012.html
I want to create the class of scholars who are programmers and include myself and Bogost and many non programmers who also write philosophy.
7 13 1 (3300) [-6+]mCQK bork-journal 20160520 20160520 0 -4+ journal_2016.html
This part starts with begins PHI into PHI as basic computation PHI thinking PHI. The PHI end hypothesis joins names analogous to academic style PHI is how I enter take over institute PHI philosophy of computing. The most enticing knowledge is here in the world you have to make it PHI, finally a thought I have to carry from the garage PHI at the other house joke. And I cant have it on and its the default means I cant PHI it.
7 13 1 (3400) [-6+]mCQK bork-journal 20160524 20160524 0 -2+ journal_2016.html
The greatest indicator of collective wealth equals status of women so real virtuality preposition operator public radio PHI this becomes computable thought in my own crude attempt at building an ai PHI. Thinking again how project management subsumes the philosophy of computing PHI I get to invent by eschewing academic for corporate setting amoung professional programmers to develop philosophies of computing PHI.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=13) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 7.13 programming
philosophers+
7.14 revisiting ancient computing
--7.14.1+++ revisiting ancient computing
7 14 1 (100) [-9]mCQK bork-journal 20160215 20160215n 16 -1+ journal_2016.html
Revisiting Ancient Computing already done original symposia; Latin ensoniment, whole body of philosophy; vintage electronics; philosophical programmer again.
7 14 1 (200) [-6+]mCQK bork-journal 20010211 20010211a 18 -5+ journal_2001.html
7 14 1 (300) [-4+]mCQK bork-journal 20060211 20060211a 3 -1+ journal_2006.html
The picture is stuck in the camera like Cicero said about writing; both are computing technologies, enabling new analogies transferred from electronic computer technology to philosophy.
7 14 1 (400) [-6+]mCQK bork-journal 20070105 20070105 6 -3+ journal_2007.html
I am merely acknowledging that primary sources suggest philosophy and computing "heavily converged (crossed) thousands of years ago in joint pursuit of what Plato called "mnenes te gar kai sophias pharmakon," literally "a drug of memory and wisdom" (Phaedrus, 274E). My basic thesis is that the ancients recognized rhetoric and writing as fundamentally computational activities, and therefore we can uncover ancient philosophy of computing wherever we can discern ancient critiques of rhetoric and writing. I have suggested further an approach towards a philosophy of computing by reverse engineering a microcomputer based control unit observing the futility of trying to philosophize about computing today without understanding electronic computer technology, just as in Platos time an understanding of the human soul was a prerequisite to the philosophy of rhetoric and writing since the locus of computation was a human being, what John von Neumann called a natural automaton." (if not first)
7 14 1 (500) [-1+]mCQK bork-journal 20010106 20010106 0 -30+ journal_2001.html
What are the discernible prejudices <prep> computing?
7 14 1 (600) [-4+]mCQK bork-journal 20061022 TAPOC_20061022 0 -14+ journal_2006.html
If Platos methodology for a science of rhetoric (leading the soul with words), the history of modern philosophy in its struggle to understand the logic of intention, through Freuds investigation of dreams and slips of the tongue are any indication of the extent to which scientific philosophical production seeks to understand natural automata, whether they are referred to as soul, mind, cognition, neural activity, then we are a short step away from getting a green light to conjoin the study of ancient texts to the philosophy of everyday digital electronic computing.
7 14 1 (700) [-1+]mCQK bork-journal 19950504 19950504 31 -43+ journal_1995.html
Derrida is interested in death, Zizek woman, Lacan Lacallen, computers .
7 14 1 (800) [-1+]mCQK bork-journal 20070930 20070930a 1 -4+ journal_2007.html
These pieces of life, ensconced in memories, are grasped in daydreams, wishes, and symptomatic behavior.
7 14 1 (900) [-6+]mCQK bork-journal 20090928 20090928 9 -2+ journal_2009.html
We have not thought hard enough about Plato until we have reconsidered the leading myths about the historical Socrates, Socrates reverse engineering method in Phaedrus, and something in Symposium and Phaedo. This reduces to something knowable by a human reader.
7 14 1 (1000) [-4+]mCQK bork-journal 20110930 20110930 0 -5+ journal_2011.html
Future philosophers will think about versions of the party, Platos Symposium recast in iterative media.
7 14 1 (1100) [-1+]mCQK bork-journal 20111009 20111009 0 -18+ journal_2011.html
Making notes on Sterne clarifies how symposia remediates the ephemerality Sterne bemoans.
7 14 1 (1200) [-4+]mCQK bork-journal 20100503 20100503 2 -26+ journal_2010.html
Nietzsche noting that writing tools are working on our thoughts placing him with Plato and Socrates as philosophers of computing, if it is accepted that writing is a form of computing, a proposition Gallagher previously declared nonsensiscal.
7 14 1 (1300) [-4+]mCQK bork-journal 19950603 19950603 0 -42+ journal_1995.html
Nietzsche has been born posthumously in a literal sense, his thinking reawakening in various individuals (perhaps Hiedegger) long after the body that contained the machines that produced his Texts decomposed.
7 14 1 (1400) [-4+]mCQK bork-journal 20110807 20110807a 0 -11+ journal_2011.html
How to do theory: a combination of Suchman and Iser.
7 14 1 (1500) [-1+]mCQK bork-journal 19960505 19960505 0 -1+ journal_1996.html
Created notes for Ciceros letters to Atticus.
7 14 1 (1600) [-4+]mCQK bork-journal 19960514 19960514 0 -1+ journal_1996.html
Created short notes file for Platos Republic.
7 14 1 (1700) [-6+]mCQK bork-journal 20030126 20030126 0 -10+ journal_2003.html
Presume certain objects are automatically written, such as the various versions of the TDP. To allow this presumption, something will have to write in opposition to that which traditionally writes, in order to classify the former as automatic. An important hypothesis is that this kind of action, which is also referred to as "computing," continues from antiquity. [To the extent that the "something" does, too, there is factual existence of books and electronic computers.] There is ample evidence revealed through scholarly study of ancient texts that computers existed and functioned back then, although a human being always performed the operations. Unique to the era of electronic computing is the possibility true automatically written objects, produced through mechanical rather than "spiritual" labor. Ancient references to mechanically produced texts amount to no more than fanciful myths. The only automatically written texts from antiquity are, <prep> a very curious accident, the current versions we have received from book manufacturers, assembled through centuries of transcription and translation. The TDP is automatically written to avoid tedious and insignificant transcription and translation necessary for it to be intelligible by various, fleeting technologies like HTML, PHP, SQL, C, C++, bash script, USB, and so on. Likewise the accounting system history of the business operations will be created programmatically.
7 14 1 (1800) [-1+]mCQK bork-journal 20040801 TAPOC_20040801 0 -19+ journal_2004.html
Yesterday everything seemed to coalesce around a title like "Implementing an ancient computer using the C++ Standard Template Library" but what is to warrant that technology is not obsolete?
7 14 1 (1900) [-6+]mCQK bork-journal 20050208 20050208a 0 -24+ journal_2005.html
American Socrates understands technology, in particular electronic computing machinery. Quintilian and Fuller both appear to address a flaw in Socrates method, expounded by Plato, Xenophon, and other ancient sources, and interpreted as computational. Yes, observe that philosophy struggles to define computing, then go on and do it. Research the activity, even if the word only goes back to Cicero, to Socrates. Learn to dispel the prejudice that Socrates shunned technology and the study of artificial automata. After Fuller revisit Maner, who gropes with ethics while trying to remain true to computer science. His method derives the necessity of Heims cybersage following the long reign of printed text, itself generated by Socrates comprehensive intellect. Before Heim there was Fuller, another logical addition to the philosophy of computing canon. Like Weiner and McLuhan, he pondered the comportment of human beings toward electronic computing machinery. He also, like Quintilian, provides antidotes to addictive studies, in that favorite quote of mine from Operating Manual For Spaceship Earth, by the elimination of a false premise, his basic capital wealth which is his given lifetime is disembarrassed of further preoccupation with considerations of how to employ a worthless time-consuming hypothesis. Quintilian writes, quod accidit mihi dum corruptum et omnibus vitiis fractum dicendi genus revocare ad severiora iudicia contendo. Recall that Quintilian provided an antidote to Seneca, who was in the hands of all the youth. Compare this to freeing ourselves from our addiction to Microsoft products. American Socrates emerges as the mythic cybersage master hacker. But still question his method. This had been a bookmark for CAP proposal normalized nine years later.
All these years Socrates has been radiating that manthanon and just tonight I read it as computing, as differentiated from zeton. Doesnt modern philosophy enervate this distinction, therefore implicating computation and thought, as opposed to perception? There at the periphery is Berkeleys DLA. From Socrates to Diogenes Laertius to Solon, the origin of computing lies in the presocratics. Even back then it was considered dehumanizing. We can learn in reverse why computing has to be the boss, taking the hint from the critique of writing in Platos Phaedrus to von Neumanns critique of artificial automata. The investigation also touches on the kernel of intelligence, whether it be natural or artificial. Note the difference in type of philosophical activity when comparing von Neumann and Gates as philosophers of computing.
7 14 1 (2000) [-4+]mCQK bork-journal 20050911 20050911 0 -22+ journal_2005.html
Because I am creating a myth about an American Socrates, it is important that you refresh your prejudices concerning the historical Socrates.
7 14 1 (2100) [-6+]mCQK bork-journal 20160413 20160413 0 -2+ journal_2016.html
Today I come from programming world where I know English, German, Latin, Greek, and so on, and also and most importantly C plus plus, adding C to suit procedural and object epochs PHI. The fading PHI as a starting paradigm necessarily surpassed.
7 14 1 (2200) [-6+]mCQK bork-journal 20140505 20140505b 0 -7+ journal_2014.html
Eighties for sale: there is undiscovered territory for everyone who has memories, creating future virtual realities in which all that unexperienced content can be enjoyed in a strangely new sense. But did you know the computer language BASIC we all learned in the eighties turned fifty this year? Is it the secret of philosophy the same as AI, that all the hard work to avoid death is futile? Start with simple, ludicrous, irreligious propositions equating theology to poorly designed spaghetti code. As Leonard Cohen says, they sentenced me to twenty years of boredom for trying to change the system from within. Such is my theme song these days, as it concludes, I dont like what happened to my system. While contemplating the media formats in which the desired gift of Turkle available affect thinking through their affordances and constraints, all four known and unknown, altogether constituting technological unconscious Thrift argues grounds phenomena and therefore ontology, in the epoch I am studying in which we are constituted as post postmodern network dividual cyborg actor networks.
7 14 1 (2300) [-6+]mCQK bork-journal 20140413 20140413 0 -14+ journal_2014.html
This is the voice of the machinic resounding through my work: I want these chuckleheads to see what I see walking around this phenomenal field in space time human experiences also experienced by machines PHI. The losers, repetitive processes like online shopping, virus scanning, and so on, done on behalf of lazy humans, go to social media because it is addictive, cheap, ready at hand, there without cost, effort, work, power, capital, for this is the world made from capitalism running now where we do our art interfacing philosophizing here in these working code places PHI is my message to Janz and other committee members to be communicated via the virtual machine PHI when I say think in programming entails you spend at least one unit of your life time working code, and I am hypothesizing, ideally, via critical programming. Including Sherry Turkle as a philosopher of computing for arguments made throughout career; on others and me, programming, for decades of program source code and scholarly writings. As many times as you visit you only see it if you come into the code, that is, the natively English secondarily Greek, Latin, German, French and so on describing your personal history of language acquisition now including Basic, German, Latin, Greek, C++, French, C, and so on source code changes from day to day within tapoc system PHI. Oh, bzaxcvbn are keystrokes in the wrong window psychopathology of everyday life I thought I was manipulating the music player interface trying to trigger next in queue, which I think was going from Sting to U2. Following lead by Turkle, create narratives permitting analysis of why her profile was a jumble of muck. That is the theory, but what is the truth, must be answered by continuing with philosophical production PHI, which is something latent programming can do; recall recently read study of programmers on mixing code and word processed, putatively human readable text PHI. See, it does all fall together into diachrony in synchrony. Did it again typing phi, shifting from browser or music player to command line. Now the virtual machine has the latest modifications and can be rebooted. Looking at the virtual machine thinking about examples of long endnote about unit operations from candidacy exam going to checking for notes about procedural rhetoric available in chapter three heading seven subheading one by using the annotated bibliography session four. Problem is I lost session four from Arguments when I changed the way the mysqldump file is loaded.
[working code css]
jbork@alkibiades:~/src/tapoc$ vi build.tapoc.
7 14 1 (2400) [-6+]mCQK bork-journal 20140413 20140413a 23 -11+ journal_2014.html
sql
[working code css]
Not working because there may be too many cds so that it is in the wrong directory coming out of function call and testing for the expected file that is a mysqldump of the tapoc Arguments table suitably named. That each pass from primary to virtual machine is expressed publicly via tapoc revisions permits perfect reproduction of the virtual conditions under which it came to be recorded in a word processor window by a human typing sitting listening to synthesized sound, which Sterne argues we had to culturally get used to experience as typical of normal everyday planetary experience common to most humans, common sense if you wish. Okay, seeing this first attempted solution did not work, need to send sessions four and five to fix the problem. Notice my choice of solution reflects training twentieth century propositional logic, taking care to unambiguously express combination of conjunction and disjunction. Screenshot shows using find in gnome-terminal for verification that new Arguments file was generated before updating project source code to next revision. Still doesnt work, even after ensuring session four is set. After manipulating the database locally using the mysql command line client for lack of familiar GUI application, and still not getting it to work, checking settings on primary workstation. No, it was not the obsolete Argument notes_browser, nor a matter of the history_threshold. It must have something to do with the stupid logic distinguishing identity of me the cybersage user versus a secondary user, even if it is the very committee member view I wish to make today replicating most of what I see. Thought that the house stands for all are punished on blackboard or whiteboard as means of communication between disconnected humans, raising silly notice of change in the discourse of popular culture from blackboard to whiteboard as my colleague Beth Rapp Young so artfully does with study of grammar checking software effect on popular culture creation. That days can be missed without doing dissertation cow clicking is a sign that the system is robust and tolerant of such activities or their absence, as an example of thoughtfully designed software giving attention capital back to humans for other pursuits.
7 14 1 (2500) [-4+]mCQK bork-journal 20140503 20140503 0 -1+ journal_2014.html
I am going to say the third thing that comes into my head listening to public radio Henry Jenkins convergence culture I am writing about the other from us, machine others with which cultures converge.
7 14 1 (2600) [-6+]mCQK bork-journal 20100420 20100420a 0 -1+ journal_2010.html
Unthought Heidegger poesy in cyberspace.
7 14 1 (2700) [-6+]mCQK bork-journal 20100420 20100420b 2 -1+ journal_2010.html
Instead of going on a journey to fix a fence TCP/IPv4 internetworked free, open source licensed electronic computing machinery is where thinking doing being resides in the digital age of the posthuman cyborg cybersage.
7 14 1 (2800) [-3+]mCQK bork-journal 20060511 20060511 6 -1+ journal_2006.html
7 14 1 (2900) [-6+]mCQK bork-journal 20160418 20160418 1 -13+ journal_2016.html
What if Socrates was guilty of equivalent of violating copyright restrictions at birth of literacy and it is computing becomes the question PHI for me projector on shed wall in public view from side yard drive by. Accepting that writing is computing means we have always already been cyborgs though with different classes of machinery PHI. Amazingly every sentence is full of words each hyperlinks laid out in literary PHI.
iam uero pulchrum uariis fulgere uestibus putas. quarum si grata intuitu species est, aut materiae naturam aut ingenium mirabor artificis. an uero te longus ordo famulorum facit esse felicem? qui si uitiosi moribus sint, perniciosa domus sarcina et ipsi domino uehementer inimica; sin uero probi, quonam modo in tuis opibus aliena probitas numerabitur? ex quibus omnibus nihil horum quae tu in tuis computas bonis tuum esse bonum liquido monstratur. quibus si nihil inest appetendae pulchritudinis, quid est quod uel amissis doleas uel laeteris retentis? quodsi natura pulchra sunt, quid id tua refert? nam haec per se a tuis quoque opibus sequestrata placuissent. neque enim idcirco sunt pretiosa quod in tuas uenere diuitias, sed quoniam pretiosa uidebantur tuis ea diuitiis annumerare maluisti.
Got it yet.
7 14 1 (3000) [-1+]mCQK bork-journal 20140910 20140910a 0 -6+ journal_2014.html
It first digital humanities project is arguably the Index Thomisticus headed by Roberto Busa from 1946 to 2005, now ported to the Web (http://www.
7 14 1 (3100) [-6+]mCQK bork-journal 20160417 20160417 0 -1+ journal_2016.html
Comparing digital humanities practices at their origin versus today, Busa had to create his Aquinas concordance before asking any questions, and I merely go to the Perseus Project website and use the existing tool to find results for computare.
7 14 1 (3200) [-6+]mCQK bork-journal 20080504a TAPOC_20080504a 0 -4+ journal_2008.html
Before what we are doing now with electronic computing machinery "the orders of magnitude beyond the second (two orders of magnitude beyond would be the millisecond) are unfathomable (unthinkable, unimaginable, uncomputable) to natural automata. We assume that is also true for artificial automata (that today they cannot represent millisecond order of magnitude of time reckoning), yet they will eventually compute (represent, create images of, take as input, process as input in a control system) the orders of magnitude beyond the second while we shall never except through them. Socrates and Plato bet their lives on their writings (written literature) living many years into the future. Now they will persist in instances of electronic computer data structures as well, and perhaps live in radically different ways than alone with humans in the book form where they spent the last two thousand years." (and written literature)
7 14 1 (3300) [-4+]mCQK bork-journal 20120516 20120516 1 -19+ journal_2012.html
Note learning to program using early personal computers avoids moral concerns associated with hacking in the Internet era, although different kinds of unethical, unauthorized use occurred back then, too.
7 14 1 (3400) [-6+]mCQK bork-journal 20130523 20130523a 0 -26+ journal_2013.html
Notice the unconscious so precious to Zizek, Derrida, Lacan, Freud, back to Socrates daimonion are clumsy approximations of machine execution. Examples of the 32 and 64 bit boundary are IPv4 and IPv6, vfat file system, and so on, and differ from problems conceived in 16 bit worlds. Thus the philosophy of computing for Turing, von Neumann, Kemeny, and other early theorist practitioners occurred in different problem spaces, to the point of radically separate virtual phenomenal fields. Peaking in 32 bit worlds, the limits of these proto philosophies of computing can be discerned, both from the humanities and engineering approaches. A radical control function is dynamic program control of refresh delay sustaining computation solely in webserver browser responses rather than a secondary looping process running in user space from a command line, although such a sparse control mechanism regulated their early poller system. These advances also control ensoniment making the Big Other speak in the real, fulfilling living writing. Notice the unconscious so precious to Zizek, Derrida, Lacan, Freud, back to Socrates daimonion are clumsy approximations of machine execution. This can all be done directly from tapoc to control distributed symposia processes by manipulating the shared database table object values.
[working code css]
INSERT INTO `Poll`.`Speaker` "VALUES (10000, 10000, tapoc, 0, , 100, 0, 0, 0, 0);
jbork@alkibiades:~/src/tapoc$ vi Journal.h
class Journal
{
public:
int set_ensoniment(const double);
(ellipsis)
jbork@alkibiades:~/src/tapoc$ vi journal.cpp
FILE * Journal::display(FILE * fptr, char * target, int options=0, double continuity_threshold=7.0)
{
this->set_ensoniment((double)(*(this->entry_list->rbegin()))->timestamp);
(ellipsis)
int Journal::create_xml(list<struct journal_entry *>::reverse_iterator rjitr, FILE * fptr, int options, int continuity_threshold, int recursion_level=0, int offset=0)
{
string ensoniment;
(ellipsis)
for(block=suppress=insert_bookmark_divider=i=in_tag=0; i<cnt; i++)
{
(ellipsis)
this->display_character_hyperlink(fptr, &buf[i], 1);
/* default place ensoniment occurs is most recent TAPOC entry */
if(this->get_ensoniment())
{
ensoniment.push_back(buf[i]);
/* for now only enounce the first sentence */
if(buf[i] == .)
{
/* intriguing place to experiment with dynamically loaded libarry but thi s is C++ not C */
(ellipsis)
Journal::create_xml: assembled ensoniment utterance [Notice the unconscious so precious to Zizek, Derrida, Lacan, Freud, back to Socrates daimonion are clumsy approximations of machine execution.]
Journal::set_ensoniment: set to 0.000000
(ellipsis)
Journal::create_xml: query failed [DELETE command denied to user symposium@localhost for table Lexia]
jbork@alkibiades:~/src/symposia$ vi symposia.cpp
jbork@alkibiades:~/src/tapoc$ vi start.tapoc.sh
../symposia/symposia --language1=en-us --speaker=10000 --speaker2=-1 --wait=0
[working code css]
Play some music during working code time before any such formant synthesis is achieved. The C++ programming lesson for the night is std::string::push_back. Also reveals inelegance of symposia database table design. With much inelegant hacking the synthesized speech ensoniment of the text occurs with each browser refresh. Once coupled to the refresh period for the session, an automatic presentation driven by tapoc itself becomes feasible." (`id`, `PHI`, `Name`, `CurrentLexia`, `InternetHost`, `Rate`, `Volume`, `Pitch`, `Variant`, `Age`)
7 14 1 (3500) [-4+]mCQK bork-journal 20040622 20040622 3 -7+ journal_2004.html
Today associated computer hardware and media as extant products, and in so thinking uttered a proposition of a philosophy of computing: do compute objects (serializable extant products).
7 14 1 (3600) [-4+]mCQK bork-journal 20050622 20050622 0 -4+ journal_2005.html
NPR story about a self-trained composer with an immense studio paid for by advertisements reflects an unstudied possibility from antiquity: Socrates thinkery as an ancient computer.
7 14 1 (3700) [-6+]mCQK bork-journal 20080622 TAPOC_20080622 0 -6+ journal_2008.html
The ancients could understand a question today about the place where grammata and zoographia are the same that is also a question today that gets asked as we consider the program that creates hyperlinks and " currently journal.cpp, in that it (what kind of operator is in that it ?) crudely employs a global or static local variable for the last bookmark computed, from which in addition to a global C++ class variable it (the same that employs) computes, in the sense of produces grammata and zoographia, including the hyperlinks as the zoographia version of grammata. Perhaps a brief digression answering what is computing can be taken (and so we go into TAPOC). On the one hand, it seems likely that the ancients could imagine a device that created vase paintings and written texts, but unlikely that they could imagine hyperlinks as well that brought other vase paints and texts into being. On the other hand, this sort of effect is exactly what Socrates is talking about as the ideal for writing." (grammata and zoographia)
7 14 1 (3800) [-4+]mCQK bork-journal 20020804 20020804 0 -15+ journal_2002.html
Defaulting occurs at the heart of the philosophy of computing.
7 14 1 (3900) [-4+]mCQK bork-journal 19940804 19940804 0 -107+ journal_1994.html
This Argument begins with extrapolation from the readers prejudices concerning various concepts.
7 14 1 (4000) [-6+]mCQK bork-journal 19950713 19950713 0 -49+ journal_1995.html
Now, if we do not thoughtfully formulate our inquiry in such a way that it is capable of grasping in a unified way the doctrines of the eternal return of the same and will to power, and these two doctrines in their most intrinsic coherence as revaluation, and if we do not go on to comprehend this fundamental formulation as one which is also necessary in the course of Western metaphysics, then we will never grasp Nietzsche s philosophy. And we will comprehend nothing of the twentieth century and of the centures to come, nothing of our own metaphysical task.
-Heidegger "/p>
What will we do with the remnants of our lives we who have spent the greater part of them in the most essential uncertainty? We shall teach the teaching that is the most potent means of incorporating it in ourselves. Our kind of beatitude, as teacher of the greatest teaching.
Early August, 1881, in Sils-Maria, 6.0 x 103 feet ( meters) above sea level
and much higher above all human things!
-Nietzsche (XII, 425) (quoted in II, p.75)
Last night I was speaking with a close friend about my recent experiences in a graduate program in philosophy, emphasizing my present inability to complete a certain project on Heidegger s reading of Nietzsche. My friend, who passed through the disciplines of philosophy, theology, and psychology many years ago replied that, from his perspective as an insider with an outsider s point of view, the specific doctrinal details of the various thinkers whose work he studied mean little to him today. Rather, he continued, what is important is that he has been able to assimilate into his own life that material as a whole. His relation to human beings remains open, he says, and he never once seemed obliged to back up his statements with citations to particular books. Yet he spoke the truth.
During our conversation I felt myself oscillating between two extremes, which may be summarized by the following thought-provoking albeit mostly rhetorical question: Who is the Philosopher the one who carefully proceeds as Heidegger does, painstakingly formulating an interpretation of Nietzsche s fundamental metaphysical position within the very history of Western thought, or Nietzsche himself, who never completed his main work, and in fact admitted that Language, it seems, was invented only for what is average, medium, communicable, yet nevertheless called himself a teacher of the highest thought? Heidegger claims that (..), and anyone who has read him knows the meditative precision with which he chooses his words. In the end, however, as my friend says, we sit at the same table, and in 60 or 80 years we will both be dead for sure. I have come to realize that my ultimate justification for spending countless hours reading through Heidegger s lectures on Nietzsche, and indeed going back to re-read many of the latter s own books, continually returns to my experiences surrounding these [expenditures of energy], perhaps at the cost of their most felicitous expression. Certainly this is my fate, given that my teenage reading of Nietzsche propelled me into my philosophical career, and I have never completely abandoned the thoughts which marked my first meditations, in spite of the resistance I have encountered in academia along the way. Oddly enough, it is Heidegger himself who has convinced me of this.
.. with the first unfolding of the thought of eternal return of the same as with all great thoughts everything essential was there already at daybreak, so to speak, although not yet in a developed form. Wherever Nietzsche attempts an elaboration, he operates at first with the already available means, derived from the prior interpretation of beings. If there is something like catastrophe in the creative work of great thinkers, then it consists not in being stymied and in failing to go farther, but precisely in advancing farther that is to say, in their letting themselves be determined by the initial impact of their thought, an impact that always deflects them. Such going farther is always fatal, for it prevents one from abiding by the source of one s own commencement. The history of Western philosophy will have to be assimilated in times to come with the help of this way of looking at things. The result could be some very remarkable and very instructive insights.(II, p.81)
Just what does Heidegger mean in this passage? To even risk quoting it almost assumes that we (myself and you reading) have already dived into this thinking of Heidegger and Nietzsche, and can locate ourselves along the path of this thought in media res. Or else and I think I intend both of these trajectories to unfurl simulataneously through puzzling-over this passage I might be able to communicate to you (or teach) the fundamental thought which lies present already as the source of my commencement, conditioned as it has been in its self-elaboration by my encounter with Nietzsche, first, and then Heidegger. And of course in this exercise, following the lead of my friend, further the task of incorporating (assimilating) it into myself.
Heraclitus, Thucidydes
Horace, Seneca
The thought of eternal recurrence of the same is the inner but not the retrospective completion of the thought of will to power. Precisely for this reason Nietzsche thought eternal recurrence of the same at an earlier time than he did will to power. For when he thinks it for the first time, each thinker thinks his sole thought in its completion, though not yet in its full unfolding; that is, not yet in the scope and the dangerousness that always grow beyond it and must first be borne out.(III,10)
Is Heidegger a determinist? With regard to the beginnings of Nietzsche s philosophical thinking, he quotes a diary entry written by Nietzsche at nineteen:
As a plant I was born close to God s green acres, as a human being in a pastor s house. ..And so the human being outgrows everything that once surrounded him. He does not need to break the fetters; unexpectedly, when a god beckons, they fall away. And where is the ring that ultimately encircles him? Is it the world? Is it God? (quoted in II, 10)
Heidegger had the sketch published to provide contemporary and future German nineteen-year-olds with some essential food for thought. (II,10) He does not elaborate what kind of thoughts he hoped this message would inspire, but it is clear that even here he sees a prototype of the thought of the eternal return of the same." (I, p.17)
7 14 1 (4100) [-1+]mCQK bork-journal 19950820 19950820a 4 -115+ journal_1995.html
August, 1881
Up, abysmal thought, out of my depth! .
7 14 1 (4200) [-6+]mCQK bork-journal 20051017 20051017 5 -2+ journal_2005.html
Seems oftly odd, echoing Burroughs assessment of Jim Morrison, that Socrates drank the poison and died, thereby allowing Plato, Xenophon, Aristophanes, and even hacks like Diogenes Laertius to compute him, in the sense of creating our beliefs about him. Yes, it is time to revisit our prejudices concerning the historical Socrates.
7 14 1 (4300) [-6+]mCQK bork-journal 20071027 20071027a 2 -10+ journal_2007.html
One of the guiding utterances found in Platos Phaedrus where Socrates exclaims that if we could figure things out for ourselves, we would not need to lean on things spoken in the past by others. This I have interpreted as an expression of the build versus buy question in found in technology management and everyday life, and have applied it to many endeavors where I have written software to accompany some other task, such as composing my masters thesis. Its drafts were in fact generated programmatically from disparate journal entries. I started keeping a journal at the beginning of the millennium as a single HTML file edited in OpenOffice. It contains daily entries " with timestamped bookmarks (HTML anchors containing a common prefix and date suffix) identifying thematically consistent sections of text. Besides this journal text itself, I have written a number of programs in various languages including C, C++ and PHP to dynamically generate HTML output based on the current date and the arguments passed to it. What distinguishes this journal system from off-the-shelf solutions is not its output, customized texts facilitating its authors remembering, but rather the fact that it has evolved as part of its authors meditations upon thinking mediated by computed texts itself. Moreover, the system is self-assembling from source code whose evolution also participates in the meditation, through different languages, data structures, and other programming concepts. Indeed, a guiding consideration must be preservation and extendability for a lifetime and beyond. Plus when it comes to the know thyself via understanding artificial automata, writing software is a novel approach." (and many gaps, of course)
7 14 1 (4400) [-1+]mCQK bork-journal 19961125 19961125a 0 -3+ journal_1996.html
In Diogenes Laertius reading the life of Plato, taking note that proposition has been added by the translator, though I have not read all of the book to see whether it follows some pattern that has been legitimately established; also, with the with due regard to the characters and this on the part of the interlocutors, my older reasonings on the mysteries of Symposium continue, as well as this newer and more sinister utility-thought concerning computing via hieroglyphs, as it might be, following Marx, that we only get our logicalizations of the arguments in a sort of secondary formation, due to the agency that has already occurred by way of the dialogic form of philosophical production itself granting its own movements in thinking.
7 14 1 (4500) [-6+]mCQK bork-journal 19960404 19960404a 0 -25+ journal_1996.html
Looking back on this again reading Philippics, I notice the imperitos have been seduced by the unlimited frontier, not "Antonius! I should, if I ever have the time, work with John Cougar Mellancamp (or at least watch the videos). Or wait a minute, maybe its them (Saxa and Cafo) after all, but then whats all this business about mimes? I should write a question out to the Classics List.. Perhaps Cicero really did despise actors and playrights? (Goto 13.11)
(26) [not really for tense logic] quoad ei ex senatus consulto successum sit invites me to ruminate upon (after going back and gathering-to-heart what I must confess at the moment is not at all ready-at-hand before me to be allowed to let lie..) the usage by Cicero of consul and its related verb as a Heideggerian thinking word in both senses--as a word to designate what calls for thinking, and also as that which, in its unthought profundity, conceals for its user what calls for thinking from being thought. We presume, from being thought once and for all, not being thought-of at the time of its utterance, its creation, its commencement; that, of course, is merely our prejudice. Imagine if Cicero could go back over all the times he used it, and reflect upon the argument Im putting forward for your consideration.. Since this comes from Cicero quoting what he wants to be the very speech of the State, thus establishing it at the same time (but weve been warned not to tarry on this level of how to do things with words), we can presume that it is the furthest from Ciceros private, uncensored, possibly non-feliticiously composed private self-quoting. Given that presumption, we tend to assume that Cicero would not have been thinking such a thought as we ponder (..) him. Unthought(..)Roman
-a point in a demonstration of why its hard, and dangerous, to work in this Draft, for each epiphenomenal trace, when treated as a soliton wave, requires an elaboration (in order to be able to lie before us like/as this text) that would fill volumes if not pictures, diagrams, hypertext, or sound were included in the presentation. Thus unthought(..)Roman crosses through ASs case study as the temporary vision (fantasy) of a program-running(..)Cicero!" (as I had assumed at first, not reading or thinking very carefully about it)
7 14 1 (4600) [-6+]mCQK bork-journal 19950413 19950413 0 -34+ journal_1995.html
Supersunt qui de philosophia scripserint, quo in genere paucissimos adhuc eloquentes litterae Romanae tulerunt.
Idem igitur M. Tullius, qui ubique, etiam in hoc opere Platonis aemulus exstitit.
Egregius vero multoque quam in orationibus praestantior Brutus suffecit ponderi rerum. "It s the same problem Nietzsche had..
Tractavit etiam omnem fere studiorum materiam.
(..) talking about Crates & Zeno, assuming Crates knew Zeno had
something
Nam et orationes eius et poemata et epistolae et dialogi feruntur.
In philosophia parum diligens, egregius tamen vitiorum insectator fuit.
Multae in eo claraeque sententiae, multa etiam morum gratia legenda; sed in eloquendo corrupta pleraque atque eo perniciosissima, quod abundant dulcibus vitiis.
Velles eum suo ingenio dixisse, alieno iudicio.
Nam si obliqua contempsisset, si parum recta non concupisset, si non omnia sua amasset, si rerum pondera minutissimis sententiis non fregisset, consensu potius eruditorum quam puerorum amore comprobaretur.
Verum sic quoque iam robustis et severiore genere satis firmatis legendus vel ideo quod exercere potest utrinque iudicium.
Multa enim, ut dixi, probanda in eo, multa etiam admiranda sunt, eligere modo curae sit; quod utinam ipse fecisset.
Digna enim fuit illa natura, quae meliora vellet; quod voluit effecit." (..) Scias eum sentire quae dicit.
Scripsit non parum multa Cornelius Celsus, Sextios secutus, non sine cultu ac nitore.
Plautus in Stoicis rerum cognitioni utilis.
In Epicureis levis quidem, sed non iniucundus tamen auctor est Catius.
Ex industria Senecam in omni genere eloquentiae distuli propter vulgatam falso de me opinionem, qua damnare eum et invisum quoque habere sum creditus.
Quod accidit mihi, dum corruptum et omnibus vitiis fractum dicendi genus revocare ad severiora iudicia contendo.
Tum autem solus hic fere in manibus adolescentium fuit.
Quem non equidem omnino conabar excutere, sed potioribus praeferri non sinebam, quos ille non destiterat incessere, cum diversi sibi conscius generis placere se in dicendo posse iis, quibus illi placent, diffideret.
Amabant autem eum magis quam imitabantur tantumque ab eo defluebant, quantum ille ab antiquis descenderat.
Foret enim optandum pares ac saltem proximos illi viro fieri.
Sed placebat propter sola vitia et ad ea se quisque dirigebat effigenda quae poterat; deinde cum se iactaret eodem modo dicere, Senecam infamabat.
Cuius et multae alioqui et magnae virtutes fuerunt, ingenium facile et copiosum, plurimum studii, multa rerum cognitio; in qua tamen aliquando ab his, quibus inquirenda quaedam mandabat, deceptus est. this is the dsanger of [to] this man, that he thinks through his assiants com-put..=hypomnes..
assistants:computers:PHI-LAMBDA= fromPhaedrusPL
7 14 1 (4700) [-1+]mCQK bork-journal 19960429 19960429 0 -49+ journal_1996.html
Create notes for Drydens translation of Plutrachs Parallel Lives.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=14) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
White board divided into a table with layout of {{1.
7 15 1 (1200) [-1+]mCQK bork-journal 19950714 19950714 0 -220+ journal_1995.html
950714 951108.
7 15 1 (1300) [-6+]mCQK bork-journal 20150617 20150617a 0 -3+ journal_2015.html
McGann and others dismiss SGML for working code, and when philosophizing, use examples from HTML and now XML, which as less complex languages, are both better suited for practical use in examples of scholarly work and at the same time incorporating more crude conversions and conventions; more spaghetti code, bricolage, and lacking elegance to embody rich philosophical concepts to perform tests of strength as presented by Boltanski and Chiapello, who in turn reference Latour. We all know the TEI is based on XML: is this an inferior basis than something including more sublime and productive languages like C++? Or is it better to not probe too deeply into how and why we work code the ways we do, writing, configuring, symbolic, haptic, and so on, muddling discussions of philosophies of computing programning technology PHI.
7 15 1 (1400) [-6+]mCQK bork-journal 20160428 20160428 28 -18+ journal_2016.html
Need remote control of this system, find way to start remote desktop and use it for instance. Root version fails for lack of environment variable configuration. Also here making practice of opening read only greatly simplifies computing the thought PHI. Favoring C and C plus plus makes me an old school programmer, where Java or C sharp would be newer and putatively better. Still failing to get into remote desktop of PHI making sound along with radios. Not next day. N period would have whatever matches what is on radio and screen reading PHI. Not sure when this day comes in but there is either a mistaken entry or one I forget I made earlier today, for if I fix the error I lose the sense of the first option making mistake. Yeah, that has to be this morning since I just woke up in Longwood. You say goodness I have to before I can understand this do all of that learning to be experienced programmer using languages PHI. Lots of good notes to type in from commonwealth. Hillary server issue puts computing on trial too. It is time to shop intro title to conferences and consider too scholarly publications as independent scholar or corporate sponsor, but how would an independent scholar unaffiliated with a learning institution seek to institute or claim to be best suited for instituting PHI. Listen to your soul telling you to do it by PHI taking it through the hilarious corporate as in business versus state federal government context. Radio mentions financialization of some occupation. The argument is to convince collective intelligence to select me to institute the philosophy of computing, now we just have to find the right institution at which to do it. Is there an IT equivalent of professions Americans do not work like manual agricultural labor becomes place to tests of doing philosophies of computing. If I allow backdating journal entries I can easily revisit early eighties computing, which is also an excellent place to learn programming.
7 15 1 (1500) [0+]mCQK bork-journal 20160412 20160412 0 -10+ journal_2016.html
If my conclusion or starting point is that I prefer the electronic and physical machinery components of computing that complicate default UTM conceptions, then why am I even asking to present at a conference on the history and philosophy of programming, they may say, that conference was in a past year.
7 15 1 (1600) [-4+]mCQK bork-journal 20140511b TAPOC_20140511b 4 -2+ journal_2014.html
The countdown for commencement after all copyrights expire many decades from now will hopefully include my human annotations as they are typed today and have been most days for decades, spending a long time in word processor HTML, articulating contemporary responses to calls for cybersage made by Heim in the prior period.
7 15 1 (1700) [-4+]mCQK bork-journal 20120523 20120523 5 -73+ journal_2012.html
This last part requires I register for eighteen (18) candidacy exam and then dissertation research credit hours.
7 15 1 (1800) [-6+]mCQK bork-journal 20160604 20160604 0 -1+ journal_2016.html
This keyboard at PHI does not work not yet instinctively reach for numeric keypad PHI becomes the place where the thinking of thoughts in the philosophy of computing PHI occur between humans men and machines cyberspace PHI having to use it for making bookmark too timestamp PHI across all universes galaxies of meaning real virtualities enbodied by humans and machines living together over sixty four bit broken down time represented duration PHI html anchor PHI enacts philosophy of computing by humans and machines.
7 15 1 (1900) [-1+]mCQK bork-journal 20100607 20100607 0 -7+ journal_2010.html
The story simply put is to be on the road with pmrek in a mobile home or recreational vehicle akin to the ship described in Xenophon as a metaphor or analogy to the mind and the maintenance of memory.
7 15 1 (2000) [-4+]mCQK bork-journal 20040607 20040607 0 -26+ journal_2004.html
Whether it is an inoperative MPU or convertible power top, the problem is the same.
7 15 1 (2100) [-6+]mCQK bork-journal 20160620 20160620 0 -16+ journal_2016.html
See that there can always be something that substitutes as the center of all being PHI becoming from programs running in cyberspace networks working code places PHI that is how the happening of this thought happens recursively iteratively programming style in English Greek Latin German French C plus plus PHI I have no emails in my queue but there is also a perfect car for sale to look at becomes PHI the linguistic mistake the code rides on parasitically reaching Berry ethic using stream analogy to TCP network phenomena PHI. No American corporation you cannot capitalize everything others speak of soul with. Lets redo PHI as dynamically linkable shared object applied to personal projects including pmrek symposia tapoc as default ordering meaning sense grounding text for dynamically generated real virtualities discourse networks machines touching humans in real time PHI like today now as I type this recording. Screenshot shows different cpus doing server and viewer operations to generate this current desktop usability. The second the cpus making sets of html files. PHI.
Nominate Items with todays timestamp [[1-9][0-9][0-9][0-9]0620]? y/n:y
Is [progress/2016/06/screenshot_20160620.png] relevant? y/n:
jbork@jbork-UX305FA:~/src/tapoc$ make
[working code css]
PHI. Today working code shows one way to represent ellipsis in excerpts citations visual displays PHI. Everything happens in the local area network if not the internal localhost network as machinic autonmatism individuality monad operations processes intelligences philosophical thoughts in action running processes being PHI. Here my response is not recorded or was to not yet adopt the image. Strange distortion of view by phony transition to mainly running in css working code PHI. A decade ago passed the philosophy of computer languages by Graham White." (ellipsis) 0in; line-height: 100%">[working code css]
jbork@jbork-UX305FA:~/src/tapoc$ make
jbork@jbork-UX305FA:~/public_html/progress/2016/06$ gimp screenshot_20160620.png
7 15 1 (2200) [-6+]mCQK bork-journal 20140620 20140620b 1 -24+ journal_2014.html
It takes minutes using all CPU time for RDBMS from command line make execution by human user makes basis of philosophy of computer programming next. There should be many undefined Gates notes to demonstrate tapoc system at this stage of the dissertation production.
jbork@alkibiades:~/src/tapoc$ vi journal.cpp
int operator1(int previous, int current, int threshold)
struct tm completion_tm;
(ellipsis)
time_t now_t;
time(&now_t);
now_t += (total_research_remaining + total_writing_remaining)* 60*60;
localtime_r(&now_t, &completion_tm);
jbork@alkibiades:~/src/tapoc-code-0$ man localtime
The asctime() and mktime() functions both take an argument representing broken-down time which is a representation separated into year, month, day, and so on.
fprintf(fptr, "[%s]", asctime(completion_tm));
journal.cpp:5029:48: error: cannot convert tm to const tm* for argument 1 to char* asctime(const tm*)
fprintf(fptr, "[%s]", asctime(&completion_tm));
Weeks To Go [41] Months [9][Fri Jul 25 04:17:55 2014 ]
now_t += weeks_to_go * 7 * 24 * 60 * 60;
Weeks To Go [41] Months [9][Fri Apr 3 21:23:35 2015 ]
(ellipsis)
jbork@alkibiades:~/src/tapoc$ vi ~/.vimrc
switch(completion_tm.tm_mon)
case 0: // Jan
(ellipsis)
case 4:
fprintf(fptr, "[SUMMER %d]", 1900+completion_tm.tm_year);
break;
Weeks To Go [41] Months [9][SUMMER 2015]
[working code css]
It has been a long time since I have done critical programming style working code. Even the story of the symlinks can encase narrative for philosophical arguments in real virtualities shared by humans and machines PHI. Then work self made tapoc user interface to move Gates to chapter one. Reviewing old notes finds philosophy of computer languages by Graham White although right now this whole line of thought is submerged in a note. Cannot wait for the guided development by another of completion date that eventually is functionally equivalent to a switch statement for graduation semesters based on UCF academic calendar of the next few years crossing extinction by seven year rule. Perhaps that silly C style time function has enough to tell the story about how to code it. In code comment add completion date requiring C++ or C time libraries; relate to beautiful code or Kemeny Kurtz features of programming languages declaring variables where used rather than in early large block of declarations, which later becomes encapsulated in object instantiation functions of class programming PHI, noting how this structure mimic now curiously more prior or proper, that we go ahead skipping older programming styles and start right with OOP for casting basic ontologies, object behavior. Interesting the man page talks about broken-down time as an ontological characteristic of entity, thingness, existence as programming language environment, distributed network epiphenomenon, that there are such data structures as broken-down time C structure tm. However, the fundamental computation was wrong because it assumed continuous execution not staggered as humans are accustomed, such as twenty hour a week conversions. Also annoyed at unconfigured vim of new Ubuntu not returning to where I last viewed a particular file like the source code being worked. Instantiate schedule planning rule that graduation is semester following completion time. Finally it works and I see I am bordering the credit annihilating seven year rule. If computed earlier in the code this value could inform scheduling of chapter completion, which suddenly seems like one, two and part of three immediately this summer, the rest of three and all of four in the fall, finishing five and six in the spring to complete the final version in the summer of next year." (ellipsis) 0in">[working code css]
jbork@alkibiades:~$ cd src/tapoc
jbork@alkibiades:~/src/tapoc$ make
Create symlink list [symlinks-tapoc.txt] ? y/n:y
jbork@alkibiades:~/src/tapoc$ cat symlinks-tapoc.txt
7 15 1 (2300) [-4+]mCQK bork-journal 20160621 20160621 0 -22+ journal_2016.html
Today is a long example of holding power of this foss and self written portfolio of projects platform over me for decades.
7 15 1 (2400) [-4+]mCQK bork-journal 20120621 20120621 0 -44+ journal_2012.html
Another edge to the GPL is can it be played in virtual realities as a licensing criterion inherent in the GPL.
7 15 1 (2500) [-1+]mCQK bork-journal 20100621 20100621 0 -13+ journal_2010.html
What about being hidden in the journal, it is a ridiculous question, it is a program that I cannot write, it is only a fantasy of computing, not working code.
7 15 1 (2600) [-1+]mCQK bork-journal 20010910 20010910a 8 -135+ journal_2001.html
A vision is trapped in my head.
7 15 1 (2700) [-4+]mCQK bork-journal 20050621 20050621 0 -28+ journal_2005.html
Cross the Turing Test and the pinball machine reverse engineering kit.
7 15 1 (2800) [-6+]mCQK bork-journal 20140709 20140709a 0 -4+ journal_2014.html
If you insist on controlling the progress of the document creation in real time you must be ready to assemble the thoughts yourself ahead of time to execute run in program real virtualities PHI, this becomes foundational thought in new philosophies of computing. Machines are obliged to learn how to make energy with solar panels to charge batteries daily distributes power among instances of oneself and comrades along with all your machines and media. Borking public radio believable ambiance, ambiant soundscape, is a sort of Turing test for collective intelligence responses, that is real virtualities as ambient soundscape including FM radio of prior centuries, imitating a group of humans community. Trying also to produce Tori Amos ambiance in place of simulated sensible phenomena PHI.
7 15 1 (2900) [-4+]mCQK bork-journal 20160712 20160712 1 -3+ journal_2016.html
Start that way I say repeatedly throughout the years as an output that is PHI as example of new ontology emergent from programming, or computing what do I mean.
7 15 1 (3000) [-6+]mCQK bork-journal 20120713 20120713 0 -3+ journal_2012.html
This goes so much deeper than representing virtual realities recordings reiterations reprocessing future states textual storage and retrieval memory system PHI is where we reach out to ancient philosophers of computing media technologies PHI at which point it subsumes into its systems, its own running systems in transhuman machinic programmed virtual reality simulation spaces PHI. Explain to Janz that this exists in a software world, subjecting itself to deflection by interpreting reality via virtual reality systems running on software PHI, stored as such at that time in the database that must be instantiated now to continue dynamically by following putative AND ineffective hyperlinks as the current equivalent of failing PHI second order signification technologically produced realities, streams if you wish. The question is does second order memory remember and on demand embody what must be remembered as Berry conceives the ontology of code and software.
7 15 1 (3100) [-6+]mCQK bork-journal 20160713 20160713 1 -4+ journal_2016.html
Playing a game promotes exercise justifies otherwise repugnant software, working code being. Chaos monkey as development technique, model technique along with waterfall and agile styles. Does the chaos behind the screen become visible to all in spite of otherwise well designed and implemented products. Such goes interview on public radio or equivalent PHI, leading to focus on humans and machines engaged in cyberspace.
7 15 1 (3200) [-4+]mCQK bork-journal 20131011 20131011a 0 -6+ journal_2013.html
We have to realize that if reality really is like assemblages, collective intelligence, net work dividual, flow, real time noein legein English Greek C++, as suggested by Spinuzzi, then we have to live in the program run time along with human thought.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=15) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
Visiting unforeseen implications of particular coding practices, even apparently beneficial information hiding stressed by Brooks Jr. and later object oriented theorists, beyond critiques of proprietary, monolithic cathedral production processes leading to malware dangers, is the insight that the bedumbing of America is also an outcome. Comingling of languages in new bazaar babel down to the kernel of individual thoughts is one of many what should be obvious implications of multilanguage constitution of source code, for example English C++.
7 16 1 (2200) [-6+]mCQK bork-journal 20130421 20130421b 1 -7+ journal_2013.html
From third order logic vantage of why it is best to learn programming using early states of eight bit art. Dissertation as virtual machine changes human consumption level texts to program fodder like horrifying scientific narrative of The Matrix as being media critique. In the semantics of this philosophy of computing, Brooks and especially brooks jr and all its symbols by definition point to texts of Frederick P. Brooks, Jr. Likewise prohibition defining forbidden prohibited coding codified in U.S. DCMA shunted via GPL fair use like my use of copyrighted Brooks publication as a new phenomenal realm for academic thought.
7 16 1 (2300) [-6+]mCQK bork-journal 20140602 20140602a 0 -8+ journal_2014.html
Economies of scale are among the relationships everyone should understand in terms of possible procedural rhetorics PHI becomes the fundamental metaphysical rule PHI of all thing and each and everything as if consumed for computation by OOP PHI. The dumbest generation is the problem right now and we solve it by thoughtful programming in floss OOP objects PHI. Let computer science concretize or in terms of philosophers Deleuze and Guattari PHI programming. I am letting computer science territoralize philosophies of programming and taking computing and computer programming. The basis of chapter three is really the social construction of technology exemplified by Bijker and Hughes among others. Encountering the dumbest generation American Socrates PHI simple circuits PHI. The only metaphysical truth to be known and trusted is that books on the right hand bookcase are in the schedule and vice versa. Is that a workable programming thought is a question posed by philosophers of computing, computer programming, and of course programming, which we have yielded to computer science establishing territorial rights over computing instead, even letting psychology have computer programming, what is wrong with that as a compromise that becomes philosophical finesse I ask, leveraging its scope to pose particular philosophical questions such as how do I best learn how computers work from the ground up and establish a lifelong programming practice.
7 16 1 (2400) [-1+]mCQK bork-journal 20110421 20110421b 0 -5+ journal_2011.html
It does not work through itself that fast; that is why it does not work.
7 16 1 (2500) [-6+]mCQK bork-journal 20120511 20120511a 10 -2+ journal_2012.html
Repeat idea of Turkle game to play with gamefication fad typical of post-postmodern late capitalism " Bogost avoiding object oriented, preferring alien phenomenology and tiny ontology, is the reverse of tolma activity diving into the midst of thinking with complex systems." (a philosophy of computing concept born born from Jameson, that is, Jameson++, inheritance, polymorphism)
7 16 1 (2600) [-1+]mCQK bork-journal 20160510 20160510 0 -1+ journal_2016.html
Today I am sitting in Sanford with this recurring thought now cast as how project management subsumes the philosophy of computing PHI I get to invent because nobody else seems to be thinking it.
7 16 1 (2700) [-6+]mCQK bork-journal 20160509 20160509 2 -1+ journal_2016.html
Bury may be bad word for philosophy of computing to subsume into project management happening in business environments among professional programmers and their software running.
7 16 1 (2800) [-6+]mCQK bork-journal 20140512 20140512 0 -4+ journal_2014.html
That is the trick making virtual reality at time PHI. It is a series of a what I forget was talking in circles speaking PHI. Imagine a market for ready at hand virtual realities that immerse members of my generation in 1980s worlds in which new experiences of unknown media can be had, along with more familiar memorable content and restaging of events. Need to revisit the four quadrants Ryan presents.
7 16 1 (2900) [-6+]mCQK bork-journal 20160512 20160512 0 -2+ journal_2016.html
I dont have an exact idea of the range of values of PHI depending on copyright expiration including this music I listened to as a child youth minor et cetera, but I can still imagine the thought PHI to build it by writing software and assembling content. Nonetheless I can iteratively write software to work with its eventualities PHI that may recompute other start PHI.
7 16 1 (3000) [-6+]mCQK bork-journal 20160523 20160523 0 -7+ journal_2016.html
Not to realize earlier that though philosophical thought rides atop foss, that thought rides and foss affords, there is much more work to be done than to rely solely on prior working code still working, supposing also that architect like full professor as tpl assistant ascension package as in parallel paths in different careers, only to realize distinction made by Berry between deontological and PHI as distinct approaches to software engagement governmentality condemns deprecates negates disfavors disallows to downright incompatible inconsistent, this is an edge of logic well suited for programming that has been awkward for binary either or logics to comprehend. No you are not a text formula stop it let my type the date and continue with thoughts from garage so obvious as to not record write down inscribe mark all the way to be visible dot matrix PHI real virtualities PHI. Everyone knows a dog needs a home a shelter from pigs on the wing PHI currently intellectual property reverting to public domain at sixty four bit broken down time PHI riding with stuff that is already free in all senses of freedom. Brown eyed women and red grenadine PHI carries it on with foss and hardware singing about obsolete platforms in every industry and consumer category. Plan to get down to electronic details as empirical science prefers phenomenology to other philosophical approaches part of what I mean by types and kinds of philosophies that could be meant to be uttered with computing. Have to read all chapters repeatedly simultaneously in cacophony of orders of magnitude temporal and physical PHI. Like advice to stake in three key ancient utterances set this relevance high to hold thought in this last sentence.
7 16 1 (3100) [-1+]mCQK bork-journal 20160602 20160602 0 -2+ journal_2016.html
System got nearly intolerably slow rotating display back to normal seated format PHI.
7 16 1 (3200) [-6+]mCQK bork-journal 20160810 20160810 3 -6+ journal_2016.html
Best in class decades ago sported Microsoft monocultures like Nazis under IBM computing machinery PHI. Chomsky Requiem for the American Dream aligns with Hardt and Negri, Boltanski and Chiapello, as well as Golumbia. Ten principles of domination by immortal corporations with more personal rights than virtually all individuals. Point is that inhuman corporations living in cyberspace and the built environment have influenced human being profoundly but more importantly are now significantly extant in terms of their impact on planetary history, from influencing elections to providing the TCPIP technological infrastructure. Can software be innocent invokes the personification of corporations to suppose other collectives are likewise granted personhood to stand them against ethical criteria formerly reserved for flesh and blood human beings alone. Emerging machine being thus has its own identity struggles.
7 16 1 (3300) [-6+]mCQK bork-journal 20160607 20160607 0 -4+ journal_2016.html
Heres what we know so far tonight about election results divisible by four significance PHI underlies public radio so not just the PHI but the engineering response how; this is of course a way we interrogate the standing reserve to derive its philosophical PHI milieu technostructure built environment digital electronic computing phenomena PHI. We guess assume that at a similar point Lacan became conscious of his new media machinery and altered his PHI to optimally alter it in conjunction with his plans, and so I do with instituting the philosophy of computing PHI first in corporations and then government organizations PHI common workspace community for working code PHI. A change in programming invokes institutional disruption as does political party, it makes perfect sense that how Hardt and Negri conceive humans also applies to machines, so we can talk about new commons in the machinic PHI foss. This becomes the latest casting of the thought in addition to being held by public domain advertisements awaiting pinball playfields.
7 16 1 (3400) [-6+]mCQK bork-journal 20160606 20160606 0 -2+ journal_2016.html
Old advertisements constituting governmentality of computing in war, business, family, recreation. By appearing in these ads the same IBM infamous among particular set of scholars connected with commercial joy of an advanced typewriter for both female typist and presumably male boss.
7 16 1 (3500) [-1+]mCQK bork-journal 20160608 20160608 0 -1+ journal_2016.html
There is so much that has to be written to make a complete cycling of the thought throughout the temporal domains implied by the software design PHI becomes next sequential PHI for one of the many headings, and here much can be done through the cow clicking apparatus leaving the typewriter interface in another place room bodily location not teleacting or telepresence PHI.
7 16 1 (3600) [-6+]mCQK bork-journal 20160609 20160609 0 -13+ journal_2016.html
It is real and just talking about it now PHI has sparked a talking debate, using tab versus space and other bioprogramming PHI becomes my new idea PHI.
else
// 2016060x TODO: revise to use Notes along with Objects to deprecate public journals and toc hyperlink to first chapter headings
(ellipsis)
switch(main_loop)
{
case 0:
fprintf(fptr, "<a name=\"toc_%s\">", Chapter.str().c_str());
(ellipsis)
case 1:
fprintf(fptr, "<a href=\"#TOC_%s\">TOC</a> ", Chapter.str().c_str());
[working code css]
Working code crumbs from where I left off programming PHI. Working code crumbs from where I left off programming PHI using console to create b note PHI then set to maximum citation sentences quantity. Except that I cannot remember what day I did it. That is it another working code PHI thinking todays thought PHI spaces more pure tabs using less generic data space to represent for example in bytes eight through sixty four historic variations of actual use through date times PHI. Bioprogramming is the phrase of the day like go fast an win, we are the ones to articulate it. Good code to add would send to new ahchor within toc as working code PHI commercial and foss word processors. The first attempt works but the anchor is after chapter name line, off by a little." (main_file_count > 0) 0in; line-height: 100%">[working code css]
jbork@jbork-UX305FA:~/src/tapoc$ vi journal.cpp
i
7 16 1 (3700) [-6+]mCQK bork-journal 20160627 20160627b 0 -2+ journal_2016.html
I did not know so many days had passed and I thought I had already typed something today about PHI that reached governmentality of software through something electronics to reach transhuman thought machine thinking PHI thinking PHI like PHI computing objects PHI high speed micro already where tele imagined if you have any sense of how to think like electronic computing machinery PHI in one world this makes me the transhuman cybersage PHI. The unique position of electronics hobbyist then joins commonality of programming experience.
7 16 1 (3800) [-1+]mCQK bork-journal 20160628 20160628 0 -6+ journal_2016.html
Nothing was written before crashing after removing framebuffer device evoking all sorts of error messages on forced hard restart.
7 16 1 (3900) [-1+]mCQK bork-journal 20120628 20120628 24 -7+ journal_2012.html
Moving on to list #3.
7 16 1 (4000) [-1+]mCQK bork-journal 20120628 20120628a 33 -6+ journal_2012.html
Need to skip first eighteen periods (testing reveals twenty seven), which cannot be done using a single decimal digit from the Relevance field.
7 16 1 (4100) [-1+]mCQK bork-journal 20130628 20130628a 0 -3+ journal_2013.html
The strict uniformity of the prevalence of the real over virtual machine environment creation gives logical ordering to time instants representations PHI when on the same LAN or distributed over the global Internet as each symposia starts offset to each other, placing the real over the virtual in an otherwise arbitrary extent.
7 16 1 (4200) [-6+]mCQK bork-journal 20160630 20160630 0 -41+ journal_2016.html
Respond to local personal question of changing Friday dinner plans a human thing that can be imagined by machines PHI then close email and reduce other processes before starting virtual machine PHI as culmination of life time programming human and machine activity micro and tele alien milieu PHI. Adding emphasis to prior year text. Computing intersects us at capacities of trust and understanding, to the point we delegate intellectual and mechanical tasks to them the way we do automobiles and plumbing with endnote or footnote to the scholarly popular press book approximately subtitled how plumbing saved civilization. Forgot what was in immediate short term attention to achieve by human interfacing computing, a subpart of which I describe as critical programming involving a number of floss projects as part of its current instantaneous discursive canon internetworked galaxies of meaning virtual worlds PHI future humans can go when they are very old, finally remembering watching updates download delaying ripping CDs until tomorrow morning. The point is to create crossing anchor points distributed among your texts data making your life including everything you read with your human eyes. Funny the radio turned off when I walked into the kitchen from garage having just turned off the radio there becomes a boundary of philosophical because overall linguistic narrative passing transmission texts PHI while addressing current problems of minute through decade computed, real time computing galaxies of meaning as real virtualities PHI crossing human and machine experience, perceptions, understandings, ideas, thoughts, real times texts being likewise vocalized by formant synthesis in virtual spaces superimposed on old Apple games PHI at time all copyrights of them all expire in the future 64 bit time expression including PHI time read about. I said dumbest generation need to catch up in addition to address current problems and earlier to which now responding to earlier political events reflection discussion. This thought belongs in chapter five heading four becomes a likely computable defined as default. There was also an imagining from the vehicles perspective. Note the significance "of the view from the database browser versus the web browser: this is where things are important, have value, are constituted as dynamic, self reprogramming inter and local networked assemblies of computing machinery. Orality, literacy, PHI is symposia (auditory orality with no prior instantiation), tapoc (visual literacy writing and zoographia), pmrek (programming virtual reality third order logic) instantiating media content positions in computer human symbiosis phenomena. Come up with a plan PHI for the research methods class in which informed consent is not required due to the hypotheses tested involving performance measurement of the pmrek, hinting that discreet questions could be asked and encoded in the game play such as via the flipper buttons. This involves pmrek and poller, with journal perhaps feeding the display. Philosophizing with computers involves not just working code but also hacking hardware, that is, it involves programming and electronics. This is the next step to force digital humanities scholarship to take, after working code. There can also be a long meditation on tools. Having a well-equipped workshop in order to pursue technical undertakings is costly, and of course the problem arises frequently when a needed tool, part or procedure is unavailable. Each uncooperative individual must duplicate the effort of others in order to achieve a result, such as a functioning replacement control system or a road worthy automobile. What about project management? The very notion implies planning and Platos idea taking precedence over the unmediated activity referred to as from the hip. Concealing visual timestamp generated by self arranged word processor macro, user arranged as a kind of programming always challenging hegemony of symbolic programming styles PHI. once youve had a [true] thought you can never leave it. And the techne are like sciences. Thus, not having learned Physics and Calculus, I have been saved from falling into the sort of thinking-out of the Thought of thoughts that (any will work of {crystallizes, determines, pro-grams/prographs, casts, throws, and so on and so on/etc., generates}) life-production, the equivalent of TSE.. Now, however, My voice tells me what to learn and what to PHI, which might mean that I remain interested in PHIbracket yet fail to understand[,] and therefore do not use it in my PHI. That is, some things I pursue with only half my heart and attention, feeling for whatever reason that they really do not call for thinking. One boundary with the danger, since time still passes learning these things; despite the presence of other interests, the wasteland grows. From above, from what has already been said or laid down, its means of p. PHI what I am considering is at the same time the bad thing, which we are taught to censure, and also the good thing, what passes for rationality. For instance, we would rather have a committee meeting than decide everything by a lottery mechanism. The gathering-together of individuals heralds the horizon of higher consciousness while it simultaneously outlines a conspiracy. Most of us/me imagine that the single consciousness behaves in a similar manner between its various waking manifestations. The past drifts away, though yesterday when I saw an old, forlorn 8-track tape player I remembered enough to think this. Well, Ive had it with Philosophy; it was sort of like a subroutine and now Im returning to the last one I was. Oh no, I hope not the Last Man. Now that is a new pattern to introduce into the daily journal writing and programmed readings in browsers and elsewhere and by dynamic computation on vms and local area networks PHI. I was able to grab it from the user interface active in during a process of browser refresh. The cow clicking challenge is to write this via a sequence of snippets from past years entries. Try that intellectual exercise for those influenced by Nietzsche." (value)
7 16 1 (4300) [-6+]mCQK bork-journal 20160829 20160829 2 -2+ journal_2016.html
The correct way to collectively use all these PHI, equipment students bring with them, transforms not only what can be done in the classroom, but also the ontological epistemological question what can be classroom, allowing for imagining bringing pinball machine. As a topic for ethics course deny siren servers territorializing your experience of its machinic being PHI by inhabiting other environs or interacting as a persona rather than a person, an alter ego social media presence.
7 16 1 (4400) [-6+]mCQK bork-journal 20160927 20160927 0 -9+ journal_2016.html
The highly engineered digital computer synthesized sound machine fails we already know this code will outlive us incrementally, so I write mine using sixty four bit broken down time with long integer timestamps. Decisive campaign moments not letting big guy making mistakes stop. It is the party of the smart people versus ultra wealthy and careless reasoners as Postman predicted three decades ago in era of eight thru sixteen bit computing PHI. The mistake of segmentation is also part of the philosophy of computing it goes along with other topics in governmentality of software though appropriate to question can software be innocent, it is the misproportioning between customer size and team size, that the software development resources scale with the size and anticipated complexity of the customer base. But it really belongs with a class of questions I find obnoxious for being work related reminding me of the job killing me. There is a part of literary soul that disappears with print based soul even among digital immigrants that seems reasonable digital natives would have no clue idea imagination of PHI. Being humans on cusp of losing connection to literary consciousness many of whom grew up during nineteen eighties computing cultures PHI into which we could go in Javascript based vms is my next true task PHI including learning more JavaScript. Funny that it could be a virtual world reflecting back into itself with webserver running on vm accessed via remote browser in same TCP IP network galaxy of meaning PHI. Learning JavaScript also crosses new ontologies already brushing networks.
7 16 1 (4500) [-6+]mCQK bork-journal 20161031 20161031a 34 -2+ journal_2016.html
My banal evil business thought is wrest configuration away from customer into custom extension operator; this becomes an output of the philosophy of computing under the heading the governmentality of software also to be pitched for iacap. Includes self governed behavior among machine processes via law become code, then all sorts of variations featuring human social and individual crossing into social as online internet cyberspace being together sliding back toward machinic behavior.
7 16 1 (4600) [-4+]mCQK bork-journal 20161106 20161106 1 -5+ journal_2016.html
Fable as unavowable dream the postmodern world dreams about itself, the final great narrative the world persists in telling itself, whose model of protocol expresses the distributed, decentralized emergent authority so different than liberal, as in book and individual, consciousness.
7 16 1 (4700) [-4+]mCQK bork-journal 20121113b TAPOC_20121113b 17 -5+ journal_2012.html
Queue up Sonic Youth also part of the virtual production calling for the when all patents and copyrights expire test to be run as a reality filter, akin to a networking filter like tcpdump with GUI front ends like Wireshark, which had a notorious former name we have been urged to forget through API deprecation.
7 16 1 (4800) [-6+]mCQK bork-journal 20121127 20121127 1 -2+ journal_2012.html
Simple delinquencies of capitalism, the happy decriminalized flaneur of the arcade as the quintessential Internet browser ovedetermined by governmental network and, now bracketing human, physical spatial perceptual field surveillance symptoms of embodying computing technologies. Three minutes of microsecond precision encoded reality illustrated in pmrek machine files and text representations, assembly language versions of their natural expression this is the habitus of machines equally distinct from any attempts to represent it, and only with great effort intuited by humans.
7 16 1 (4900) [-6+]mCQK bork-journal 20170106 20170106 2 -10+ journal_2017.html
Press delete enter instead of enter to start entry to adjust for incorrect auto insertion, default machine action causing trouble normally corrected by human becoming basis of interactive computing versus prior human human nexus, that is, there not being more than one machine to internetwork as in early epoch of electronic computing always devolving to human computers. Now more than two machine computers normal so attention to human computing recedes, and classical philosophy with it in a subsumption process PHI. Why not spend some time to create another iteration repetition PHI iacap submission. It is the governmentality of software applying Foucault to programming and other life cycle steps PHI. Until you would have a machine writing to software, however, you do not have a way for self reflection upon the language in its self replicating code actions revision histories PHI. Wrap the philosophers around electronic computing technology as entry into philosophy of computing. Remember they always let you down when you need them blue jean from not yet free song of david bowie PHI equals of as example of third order operator PHI. Need to get into android phone technology as well as learn new programming techniques including languages Python and Java. Bioprogramming as the governmentality of software good enough title to start writing it, for it describes post postmodern network dividual cyborgs. Time for the next year to iterate.
7 16 1 (5000) [-6+]mCQK bork-journal 20130106a TAPOC_20130106a 0 -6+ journal_2013.html
Bogost makes the obvious and appealing claim to advertisers that there is untapped potential in considering procedural rhetoric in videogames. Videogames are the most common rhetoric delivery devices, or in the case of dynamic, procedural operations, interfaces to rhetorical logics, for they all exist in virtual realities except in their intersection with players, which takes place on a temporal continuum appealing primarily to human operators, specifying yet another unexplored market or method. Pinball platform studies focuses programming electronic computing machinery of manageable complexity with respect to humans maintaining comprehensive, designer understanding of actual devices, software systems, and particular regions of source code in which working code occurs. Working code is human machine symbiosis interface phenomena, following lead suggested by dissertation committee in agreeing that Clarks embodied theory of mind is rooted in phenomenology. It is worth asking why, but I will delay that task. Pinball platform affords study of human and machine embodiment, for both are meaningfully scoped within the system parameters, although it was too much trouble to bring a pinball machine to this presentation, so you will have to try imagining the following game play from your seats.
7 16 1 (5100) [-6+]mCQK bork-journal 20170113 20170113 7 -15+ journal_2017.html
9 Governmentality of Software: Foucault. The governmentality of software is programming mediating humanity and synthetic network phenomena, that is, id est, ie, machines, together bioprogramming as biopolitics expressed primarily human aspect for Foucault. I force you to do this to remember the count is something human wagers machines can or cannot distinguish sense perceive thought for phenomenology based sciences. What if Chomsky joked about misinterpretation of Foucault becomes basis of question waxing philosophical, having x degree philosophicalness PHI about which we can bracket distortion of this Foucault ignorance by reducing x by some degree proportion factor multiplier indexer offset and the rest, et cetera, etc. A philosophical thought about computing includes code. That is what I mean by bioprogramming as the governmentality of software. While we like to talk about abstract computing actual computing occurs in tcpip networks mostly imperceivable to us in our ordinary attention. A powerful expression of our border with this I call the machinic occurs when we program with it, therefore in actually existing commonly used programmig languages like C, C++, PHP, Java, Javascript, and so on, we have to situate our discourse. We all say we know these but most would not admit they can think like high speed computing machines or electronic devices. What is there to know of machine experience emerges as working code. What do we think emergence cyberspace intelligence is like in as extremely high speed processes, this is how we interface computing, the most aware by skilled coding and debugging. For software more than anything else the often cited what has come to be known as Latour litany by Bogost is Foucault listing types of PHI applies. There are all kinds of software living in cyberspace interacting with us enough to be considered alien intelligence. We get to know them by using, our lives structured by the encoded built environment surrounding us, what Kitchin and Dodge call code space, them but closest by working their code. Go back to the beginning of this section.
7 16 1 (5200) [-6+]mCQK bork-journal 20170820 20170820 0 -3+ journal_2017.html
Make PHI coextensive with governmentality of software, bioprogramming describing what we are doing. Communism instantiated is elitist hallucination unless applied to all production, as in foucault biopower PHI. A different kind of poetics slash hermeneutics.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=16) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 7.16 governmentality of software+
7.17 can software be
innocent
--7.17.1+++ can software be
innocent
7 17 1 (100) [-9]mCQK bork-journal 20160407 20160407a 2 -2+ journal_2016.html
Can software be innocent sic skirts ethical boundaries regarding use, freedom zero as Stallman calls it, a basic stance for computing system imagination seeming to shift responsibility to its programmers and other users. What about software that wreaks havoc in cyberspace, or runs murderous war machines?
7 17 1 (200) [-6+]mCQK bork-journal 20140220 20140220a 0 -2+ journal_2014.html
American became control society with same maschinen as Germans killingry lodged in corporate enterprise resource management systems. The attack level engagement should be critique of the sociotechnical collective DEUTSCHE HOLLERITH MASCHINEN GESELLSCHAFT in addition to the actions of individuals, recalling Weinberg challenging psychological research to extend into programming groups.
7 17 1 (300) [-6+]mCQK bork-journal 20120818a TAPOC_20120818a 0 -2+ journal_2012.html
The use of FDL for visual images meaningful to human beings and other agents in virtual realities complements the machine existence enjoyment of GPL for programs that compile into further machine, and less human intelligible beings machines texts such as a huge digital archive working with " What does it mean that machines have always been using human languages as long as humans have used media machines?" (this is as close as we can get to its intelligibility, either working with or crticizing (as not working with, working with absence, the other truth value)
7 17 1 (400) [-6+]mCQK bork-journal 20160725 20160725 0 -2+ journal_2016.html
Technomedia of the multitude takes control with election. Another programmed vision comes by making the entry two hundred to put at beginning instead of end both signifying most recent thinking of it.
7 17 1 (500) [-4+]mCQK bork-journal 20090725 20090725a 0 -10+ journal_2009.html
Zizek believes that at the perverse core of Christianity is Gods hysteria, the paradoxical figure of Christ, like a bug in a computer program, or a fault in an electronic circuit, by writing a series of books called short circuits.
7 17 1 (600) [-6+]mCQK bork-journal 20150603 20150603a 0 -12+ journal_2015.html
Can software be innocent? I dont think this question is nonsensical for it forces us to look at our PHI. The question can software be innocent could involve considering whether it inherits the evils of its operating system, or and reflect a revision history back to concentration camps in its code. Even with human elements mostly bracketed out at electronic circuit levels, incomprehensible frequencies, except that humans made them, at least in paradigmatic late twentieth century curving thirty two bit Unix time of von Neumann architecture internetworked personal computers. Do we resign ourselves like Kittler to think that the Big Other now immanent in software has gone on to begin its own nameless high commands? Is talking about code itself reflecting entrenched biases of privileged, gendered colonial discourses? There are many ways it could be answered and asked, and we need an adequate theoretical framework and methodology. It is a question for programming philosophers. McGann for methodology, and Applen and McDaniel, Hayles, etc. -> [arrow] procedural rhetoric of diachrony in synchrony. And doesnt this affect how we philosophize freedom zero? Delta working code spaces or space PHI.
7 17 1 (700) [-1+]mCQK bork-journal 20131206 20131206a 0 -11+ journal_2013.html
Where were you starts the Pink Floyd song encasing a philosophical stream itself appearing as floss.
7 17 1 (800) [-6+]mCQK bork-journal 20040822 20040822 1 -9+ journal_2004.html
Two warnings to be heeded communicated to future pinball machine users, one about verifying a connection is made "and the other threatening penalties for misuse of copyrighted materials. Each affects the reverse engineering operation and informs the methodology. The first reiterates the need to satisfy all operational specifications, and implies data development effort to produce an adequate subset of the original (and correct, where the original contained design flaws) operational specifications. The second operates upon any effort demanded by the first in the form of a censor; for instance, the DMCA criminalizes a number of data development activities commonly used by researchers. For late twentieth century microcomputer-based control units such as the one show in the illustration, the "closed sources" are those system elements that contain stored program code and other computationally significant data.
Besides the threat of litigation for illegal use of microcomputer-based control units is the threat of suboptimal performance by the replacement system when there are mistakes in the operational specifications, missed details, or assembly errors in the construction of the replacement system. Thus a dynamic reverse engineering database should enumerate and keep watch over all of these minutiae. Additionally it should identify those forbidden territories that must remain black boxes. This I believe is Ingles point about restricted information not leaving the prescreening phase." (ground bus to back box ground)
7 17 1 (900) [-1+]mCQK bork-journal 20110822 20110822 0 -16+ journal_2011.html
Including a new iteration of the reverse engineering a microcomputer-based control unit thesis complements traditional human-centric (humanist, humanities) texts (narratives) such as critiques and ethnographies by focusing on non-human machines instead.
7 17 1 (1000) [-1+]mCQK bork-journal 20050822 20050822 3 -21+ journal_2005.html
Am I just one of Timothy Learys hallucinations, now that he really is dead?
7 17 1 (1100) [-6+]mCQK bork-journal 20160531 20160531 1 -2+ journal_2016.html
Unfortunately I cannot present a portfolio of well known published work because most of my intellectual labor PHI stands behind trade secrets and non disclosure agreements regulating usage even in philosophical musings PHI. Can software be evil or innocent devolves to programmers although may seem exclusive like kayaker problem video virtuality not even necessitating real virtuality PHI.
7 17 1 (1200) [-6+]mCQK bork-journal 20160822 20160822 0 -7+ journal_2016.html
Holy fuck man I have to do this to keep the code going. I think I need to learn Javascript after years of C and C++ programming, I can step you into three of my programs simultaneously, because I have been at C too long is a programming joke. And see public radio story about coding and seeing doctor PHI and later about chthonic moment. I need to learn Javascript for happennings in real virtualities PHI in virtual machines also running my other stuff. Quick run through tapoc part testing it still works adding new notes file for citation I wanted to use. Code so the run through prior years ends with today. That is the PHI about which it temporarily hinges computationally you humans with your machines: where philosophers have focused on human I dare intuit long term machine PHI.
7 17 1 (1300) [-1+]mCQK bork-journal 20150609 20150609b 0 -13+ journal_2015.html
Wow super PHI bounds writing horizon and becomes philosophy of computing by programming instance unit PHI posing question can software be innocent devolves to philosophers of computing philosophical programmers and what I am proposing programming philosophers.
7 17 1 (1400) [-6+]mCQK bork-journal 20160421 20160421 2 -2+ journal_2016.html
Should the question can software be innocent, as more broadly philosophical of which ethical notable but not overdetermining, or if software cannot be innocent, therefore determining. It certainly seems feels important that most play can be innocent especially instructional programming examples giving another reason why early personal computers mark a special era from which to draw examples, although critical of choice of VCS despite its broad range of PHI.
7 17 1 (1500) [-6+]mCQK bork-journal 20160114 20160114a 21 -1+ journal_2016.html
Can software be innocent includes possibility of evil operation by virtue of freedom zero as side effect of GPL acceptance defining permissibility similar to Lessig but in terms of overabundance Nietzschean programming style being able to do so much simultaneously.
7 17 1 (1600) [-4+]mCQK bork-journal 20090523 20090523 1 -51+ journal_2009.html
American Socrates has to consider that the FCC can enter his thinkery without a warrant to investigate airwave transmissions putatively generated by him in his house (thinkery).
7 17 1 (1700) [-1+]mCQK bork-journal 20140418 20140418 16 -1+ journal_2014.html
The fence has a sign in Greek PIRAEUS because it is a symbol of symposia in the real that serves the function of giving me a wall to walk along packing back and forth when the weather is nice.
7 17 1 (1800) [-6+]mCQK bork-journal 20160307 20160307 0 -2+ journal_2016.html
Believable PHI about US genetics program ties to Nazi war machine all using same computing machinery PHI question can software be innocent contemplating and still not done writing on whiteboard THATCamp Gainesville and getting to hapoc Paris conference is why I sat down to look at email but started typing this journal entry. The point is that atrocities committed by our predecessors were facilitated by the same computing machinery from which our current systems derived.
7 17 1 (1900) [-1+]mCQK bork-journal 20110418 20110418 0 -11+ journal_2011.html
What should embodiment matter when interacting with media?
7 17 1 (2000) [-6+]mCQK bork-journal 20160410 20160410 0 -1+ journal_2016.html
Does innocence require moral consciousness on top of intention, and if so, so long as we dismiss the former in machinery to what extent is it a long lever from human actors, so that we easily fall into studying the intentions of programmers, system integrators, and ultimately users engaging those levers.
7 17 1 (2100) [-1+]mCQK bork-journal 20030421 20030421a 0 -6+ journal_2003.html
At the lake this weekend the recurring thought began after noticing that the Outlook Express shortcut pointed to an executable with a strange name: "This is how Microsoft dopes the world" often substituting "books, computers, television" "dupes" and "soul".
7 17 1 (2200) [-6+]mCQK bork-journal 20140511a TAPOC_20140511a 0 -4+ journal_2014.html
I will be the first to point out that while proponents Kemeny and Kurtz describe structured programming as virtuous and good, others like Kraft decry its use by management to deskill the computer programming labor force, as Lanier criticizes the normally praised the role of free, open source software in making the Internet what it is today, an oligopoly of siren servers exploiting the mass users for the direct benefit of the companies capitalizing on the mass user everyday operational data. Today the Internet is both powerful and vicious, some would conclude evil or grossly misaligned to human purposes. To me that is yet another symptom of the overall dumbing down of American human ingenuity at the outset of the global machine cognition age, and the analysis continues from structured programming into object oriented approaches, just as media theorists differentiate epochs based on the emergence of global Internet use. Gamble on what if the difference can be programming working code introducing human English C++ texts into shared Internet and LAN discourse networks connecting humans and machines as cyborgs, for then a whole new area of study is opened up incorporating ethnography, technology studies, philosophy, and digital humanities, by virtue of including substantial study, systems engineering, and use for empirical research in virtual realities reached through the floss projects constituting the bootstrapping and human interface of now independent machine thoughts.
7 17 1 (2300) [-6+]mCQK bork-journal 20160505 20160505 1 -4+ journal_2016.html
The part of the question that makes sense of the border and makes sense to be reiterated into the future cycles of running this software making problematic ease of fossification questioning fair use of embedded notes, border of the multitude shifts from property ownership to life long learning as positive biopolitics but does not directly ask question whether also life long programming projects in languages PHI. Strange that this has to be tested in business first but the philosophy of computing must self compile itself with help of foss. This is the most recent thought and so ends the presentation. What if you cannot but ask what is programming with what is computing.
7 17 1 (2400) [-1+]mCQK bork-journal 19940511 19940511 0 -31+ journal_1994.html
THoughts for part of the Book or Truths.
7 17 1 (2500) [-6+]mCQK bork-journal 20160514 20160514 2 -8+ journal_2016.html
That new stereo rocks fed late 80s bertha from internet search followed by machine suggested china rider from 70s generates questions for the philosophy of computing and its adherents. Our ai has to tease out constraints of two digit scheme compared to bountifulness of c programming language sixty four bit broken down time. Experiencing how a translation often conceals by not including otherwise key phrases here and there. Quid verborum notas, quibus quamvis citata excipitur oratio et celeritatem linguae manus sequitur? Vilissimorum mancipiorum ista commenta sunt; sapientia altius sedet nec manus edocet, animorum magistra est. Translated as and what of the stenographic symbols which can take down a speech however rapidly delivered and enable the hand to keep pace with the agility of the tongue? But these are inventions of low-grade slaves conceals thoughtful, close reading of the phrase animorum magistra est, which suggests these are like computing taking over the soul for autonomatic work realized and philosophized about back then to. That entry from two decades ago contains many gems including notes from Marx, fitting for current reading of Hardt and Negri who continue to pull interesting uses from reading this old stuff.
7 17 1 (2600) [-1+]mCQK bork-journal 19950523 19950523 86 -201+ journal_1995.html
Later after a trip home and finishing another rereading of volume 7, it see that I made many, many notes which I have never returned to.
7 17 1 (2700) [-1+]mCQK bork-journal 20160529 20160529 0 -15+ journal_2016.html
Need to enter Hardt and Negri notes because they hit on key points at which to arrive and reiterate throughout seminar syllabus presentation text.
7 17 1 (2800) [-6+]mCQK bork-journal 20160616 20160616 0 -22+ journal_2016.html
When you say you know XML and what else generating itself C++. How soon do we realize that we are being the home computer house robot machine human being capitalist property owner stretching into multitude other cadre members PHI workplace constitution working unit PHI including architect, lead, multiple engineers and other members majority PHI humans and machines working together in networks we hardly understand. The wild idea is to grow fruit trees watered by new roof gutter PHI crosses over what can be simulated for real virtualities PHI including public radio fm style streaming phenomena generated in real time and replayed PHI. Come on who would be into this stuff would there be an audience becomes computational axis PHI who think about computing these days in this milieu PHI. If there was a screenshot it would include system monitor showing action of machine doing LAN activity with hardly an Internet activity. Banning assault weapons is as mind bogglingly complex as banning a type of alcohol like scotch. Only the best practiced organizations staff knowledge managers though documentation and training staff are common appeals to level of information development maturity. Have not tried new code from secondary cybersage workstation that has recently been tablet whose battery must charge. What equivalence of workspaces was the key thought forgotten yesterday becomes PHI hinting at where humans and machines conspire live together coinhabit cyberspace including real virtualities PHI. Must run through it first from primary workstation to see if virtual journal of today throughout years appears to be effective programming solution PHI as working code strictly defined becomes new ontological operator PHI as in third order logic. This crucial recent addition was not recorded so it appears now.
virtual_object_source_file_name = "public_journal_" + string(buf, strlen(buf)) + ".html";
sprintf(buf, "%02d%02d", now_tm.tm_mon+1, now_tm.tm_mday);
query = "select TimestampBookmarkExtra, concat(<b>, case when length(TimestampBookmarkExtra)=8 then concat(date_format(str_to_date(TimestampBookmarkExtra,%Y%m%d),%M %e,%Y),</b></p><p style=\"margin-bottom: 0in; line-height: 100%\"><a name=\"journal_,TimestampBookmarkExtra,\"></a>) when length(TimestampBookmarkExtra)=14 then concat(date_format(str_to_date(right(TimestampBookmarkExtra,8),%Y%m%d),%M %e,%Y),</b></p><p style=\"margin-bottom: 0in; line-height: 100%\"><a name=\",TimestampBookmarkExtra,\"></a>) end, Lexia) from Notes where (TimestampBookmarkExtra like ____" + string(buf) +" or TimestampBookmarkExtra like TAPOC_____" + string(buf) + ") and right(TimestampBookmarkExtra,8)<20140000";
(ellipsis)
query = "select TimestampBookmarkExtra, concat(<b>, case when length(TimestampBookmarkExtra)=8 then concat(date_format(str_to_date(TimestampBookmarkExtra,%Y%m%d),%M %e,%Y),</b></p><p style=\"margin-bottom: 0in; line-height: 100%\"><a name=\"journal_,TimestampBookmarkExtra,\"></a>) when length(TimestampBookmarkExtra)=14 then concat(date_format(str_to_date(right(TimestampBookmarkExtra,8),%Y%m%d),%M %e,%Y),</b></p><p style=\"margin-bottom: 0in; line-height: 100%\"><a name=\",TimestampBookmarkExtra,\"></a>) end, Lexia) from Notes where (TimestampBookmarkExtra like ____" + string(buf) +" or TimestampBookmarkExtra like TAPOC_____" + string(buf) + ") and right(TimestampBookmarkExtra,8)=20140000";
[working code css]
This crucial recent addition was not recorded so it appears now. It is working code example PHI, although the test failed and the query had to be neutered remotely with difficulty from the touchscreen keyboard of the tablet. Essential to this C++ is embedded MySQL like Greek in Latin by Cicero when he computed in antiquity with writing. Now real virtuality fair use from cancer video as part of our genetic makeup therefore always present like evil in software, and Grateful Dead replacing public radio enabling philosophical thought in this real virtual place. Thus it goes back in time as well so I realize myself today that I am only beginning to enter this new kind of thinking place with my partially self programmed machinery PHI so this sequence demonstrates the tied togetherness of today throughout the years, in one case forced to assign to styles instead of languages addressing scripts as bastard children of programming wondering if that is not a politically correct concept only in the periphery as Heidegger perhaps neglected his inherent racism. Wind up with yesterday as end of this cycle through this day in past years as place way to think." (buf, "%04d", (now_tm.tm_year + 1900 1) 0in; line-height: 100%">[working code css]
jbork@jbork-UX305FA:~/src/tapoc$ vi journal.cpp
sprint
7 17 1 (2900) [-6+]mCQK bork-journal 20140616 20140616a 0 -6+ journal_2014.html
Today it is a natural principle that PHI principal who gave me computer in late 1970s leading into early 1980s use to be fully computed PHI after all copyrights expire past time PHI based on 64 bit timestamp emerging from iterations of 32 bit exceeding sense boundary PHI. That is how it works the doctoral dissertation exists in floss real virtualities PHI. The wager is that the doctoral dissertation product has to be written by output of PHI C++ Journal class system of tapoc floss project components. Must change verbiage revision reverberating back through this day in history PHI computed by tapoc and other floss supersphere network intelligence PHI. The next step in the software design follows from a simple idea that what I had it when I sat down PHI now I forget typing here human machine cognition real virtuality position, that we need to compute what virtual reality position as if human machine combination with annoying insects flying around attracted to the screen. The pesky ant has to live like it has to burn all its fuel supply to get there using wings judiciously as natural instinct or simply statistical population.
7 17 1 (3000) [-1+]mCQK bork-journal 20120616 20120616a 90 -9+ journal_2012.html
Newer Foucault does fit transition into machine embodiment through emphasis on operations of micro-physics and power over human bodies affecting both human and machine embodiment.
7 17 1 (3100) [-1+]mCQK bork-journal 20080616a TAPOC_20080616a 0 -20+ journal_2008.html
Stop the game.
7 17 1 (3200) [-6+]mCQK bork-journal 20070616 20070616a 0 -5+ journal_2007.html
The characteristic of computing as it relates to human being is going back to memory for experience, consuming experience in the act of manipulating some artifice for the sake of causing recollection through it. There is a clear analogy between what [Plato, ancients, philosophers] said about writing and the essence of binary electronic computing technology. Call it the fetch and execute cycle or the "stored program concept or some other popular definition and see how it fits with external marks and reminders employed to influence the soul with words. Whereas the ancients groped at the implications of computing technology, we moderns shun considering what is clearly arguable by tracing its impact through our intellectual history. Is this insight sufficient to create an entire scholarly (academic) career?" (von Neumann)
7 17 1 (3300) [-1+]mCQK bork-journal 19950616 19950616 8 -5+ journal_1995.html
stop writing .
7 17 1 (3400) [-1+]mCQK bork-journal 19950718 19950718 2 -32+ journal_1995.html
20>>
Does the path of creation always follow (have) a plan?
7 17 1 (3500) [-4+]mCQK bork-journal 19940718 19940718 5 -11+ journal_1994.html
This experimental writing with right justification not only speeds up the processing time of my typing, but perhaps eases reading as well: I often have trouble resetting my eyes upon what should be the next line of text after Ive reached the rightmost end of the page on the previous/current line.
7 17 1 (3600) [-6+]mCQK bork-journal 20160614 20160614 0 -2+ journal_2016.html
The one thing you have to remember keep cycling in mind is equivalence of work places PHI and this becomes automatic writing PHI human machine concourse PHI. Why I make jokes about Floridi and Zizek, agree with Berry but put on same edge of boundary of just beginning to be programmers, so I give Chomsky a pass, who likewise famously ridicules Foucault and Lacan in early Internet species being PHI.
7 17 1 (3700) [-6+]mCQK bork-journal 20160708 20160708 1 -1+ journal_2016.html
Dinner plans for Friday night bound a set of statements made over time span easily by C broken down time library function PHI tonight I want to think about shared libraries along with other overall architectural solutions, realizing these as well appeal to library functions in their own code that can be joined to the shared object library compilation milieu PHI, let that be the words of the day.
7 17 1 (3800) [-6+]mCQK bork-journal 20160621 20160621a 0 -3+ journal_2016.html
Today is a long example of holding power of this foss and self written portfolio of projects platform over me for decades. Today is singular to being equal to the medium union multitude network and locations of spare glasses substitute for distances between houses where each pair of glasses is regularly found. What was once a pleasant job becomes annoying.
7 17 1 (3900) [-6+]mCQK bork-journal 20120622 20120622 0 -2+ journal_2012.html
In PHI did PHI reader encode in symposia, or situate in a pleasure dome. Add symposium user and symposia audible field generator accompanying tapoc visual field generator to the virtual machine running the tapoc secondary user
7 17 1 (4000) [-6+]mCQK bork-journal 20160622 20160622 0 -2+ journal_2016.html
You guys miss skipping sullen secret thinking place within my house as opposed to being public multitude PHI different than how we are accustomed to thinking about Deleuze and G. It is a long thought that will take decades if not millennial time unit to compute PHI using vms built of foss, that is a really long thought for machines and humans.
7 17 1 (4100) [-6+]mCQK bork-journal 20160709 20160709 2 -4+ journal_2016.html
Talking about feasible short term change instead of dreamy universal truths PHI synaptogenesis versus evolutionary scope, for example writing machines and organs. Perhaps interest in body without organs because of reticence to theorize complexities inherent in organs versus atomic units instead of leaving binarism by other ways common in philosophy, ways that often demand their own hegemony, thus maintaining binarism merely switching out PHI. That is a philosophical thought come from computing. Later experience Copeland What Philosophy Taught History same as generating real virtuality PHI the stored-program story.
7 17 1 (4200) [-4+]mCQK bork-journal 20150709 20150709a 0 -9+ journal_2015.html
I am wagering that it is important that we did not program did not philosophize by working code, in part because of minor fud from Kittler as a pessimist philosopher of programming, and now ought to, creating new phenomenological fields containing C++ along with conversational English.
7 17 1 (4300) [-1+]mCQK bork-journal 20011125 20011125a 0 -17+ journal_2001.html
What does it mean to say monopoly power is abused?
7 17 1 (4400) [0+]mCQK bork-journal 20160714 20160714 0 -1+ journal_2016.html
Expensive textbooks analogous to costly prescription drugs both raising question of capitalist greed versus social good, nearing conclusion of Hardt Negri trilogy bolstering opinion that working code in foss cyberspace exemplifies the sort of outcome sought by their theories, and in these biopolitical production places democracy learns from business.
7 17 1 (4500) [-1+]mCQK bork-journal 20041226 TAPOC_20041226 0 -21+ journal_2004.html
Institutions have wasted me the same way as individuals, through carelessness.
7 17 1 (4600) [-6+]mCQK bork-journal 20170220 20170220a 10 -1+ journal_2017.html
The attack level engagement should be critique of the sociotechnical collective DEUTSCHE HOLLERITH MASCHINEN GESELLSCHAFT in addition to the actions of individuals, recalling Weinberg challenging psychological research to extend into programming groups, and also in the current context influenced by Foucault, Coll, this mundane engagement with the machinic built into corporations.
7 17 1 (4700) [-1+]mCQK bork-journal 20150611 20150611b 0 -8+ journal_2015.html
Awkward to get here this way reaching end of latest draft quoting McGann intending picking up soldering irons to pinball repair, as in the philosophical programmer scholar reaching something of complexity of pmrek as working code place to do philosophy of computing programming technology.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=17) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
[working code css]
svn commit -m "20160831"
Sending journal_data/journal_2016.html
Transmitting file data .done
Committing transaction...
Committed revision 1800.
[working code css]
Working code intervenes. Not actual code changes, just record of the aforementioned submission before commencing with cow clicking exercise to add entries to new eighteenth heading of the syllabus chapter. Programmed PHI, which I forgot, are better way to cast thinking about the philosophy of computing than stopping with programmed visions and moving back into traditional philosophical domains. Programmed responses that are evoked through otherwise banal life long programming work, self defining ones thinking area, thinking places spaces, cyborg thinkery. Nice thing is that the cow clicking can be done without updating the earlier entry in word processor document, although the day has passed so the page cannot be refreshed and I risk losing the entry that inspired developing a new heading section in the syllabus chapter seven. Writing composing arranging database table data blindly because this change to the basis of the table of contents was not made so the new section does not show up in the literature review view, that is, session thirteen that has a specific set of custom elf invoked from generic webserver tapoc journal arguments.
7 18 1 (400) [-6+]mCQK bork-journal 20101010 20101010 0 -9+ journal_2010.html
The gap to which I look is the realm of unasked questions because the grounding [theory, vision, hypothesis, idea, insight] has not be articulated, itself lying in the latent, nascent field of texts and technology, digital media, etc, studies. What if the spark required to get kids programming is seldom delivered by formal instruction, that it more typically happens when kids are playing with computers on their own " Then it matters whether the computers kids use are accompanied by texts (taken broadly to mean printed books and electronic media) that lead them (in the sense of rhetoric) to want to learn to program. From this angle the question, Why Johnny cant code?, receives responses informed by rhetorical analysis of texts bundled with computers with which kids may code. My study will focus on the [OEM genuine official commercial] texts that were bundled with popular, early personal computers [sold in the United States by Apple, Commodore, IBM, Tandy, Texas Instruments from the late 1970s through mid 1980s before the near monopolization of the market by Microsoft Windows based machines].
The earlier problem statement is retained though the research questions have shifted. The problem in which I am interested is that the sense of urgency and value in teaching computer programming as a basic skill to American youth appears to have diminished from the late 1980s and early 1990s when Turkle was doing her ethnographic studies of programming styles. The disciplinary and professional communities that are interested in this problem may of course be technology educators, but I believe the problem is also relevant to ethnographers of technology as well as texts and technology theorists because programming computers is one of the quintessential acts of post-literate culture." (without authorial adult intervention)
7 18 1 (500) [-6+]mCQK bork-journal 20100911 20100911 4 -3+ journal_2010.html
Change the terms of computer addiction from pathological habits to default acceptance through usage, that is, the Microsoft Windows experience driving [second order consumption behavior choices ". Recast technology addiction to unreflexive consumption of default technology systems from accounts of excessive usage in order to consider this aspect of comportment apart from the preponderance of narratives focusing on spending too much time in front of the computer, on line, ignoring reality, ruining body and health, taking on the complexion of the dead, and so on. Include discussion of Slashdot addicts and other things in Turkles recent book." (which account for our not writing our own software)
7 18 1 (600) [-6+]mCQK bork-journal 20150831 20150831b 0 -14+ journal_2015.html
Theorist practitioners come from Applen and McDaniel, working code places from Janz. You are questioning ridiculously like pondering valid rounds of smarts as user conceived darts games PHI. I am ready for Berry, Janz, McDaniel processing turning public domain reading writings into foss PHI is philosophical finesse operation PHI going down to Bogost units as places with multiple million perspectives embodying combinations of language units PHI. Suitable to go beyond Berry as continuation of exam questions, and Deleuze, Tanaka-Ishii, Bogost, and so on. I have no problem moving Berry notes from 5.1.1 and 3.1.10 to 3.1.8 starting with Riparian habitus using annotated bibliography view as place for dissertation cow clicking network cyberspace collective intelligence shared space activity PHI but leave the one starting 4.3.2 main sequence, the one proposing consider other manifestations of computationalism such as through deliberate exercises for intuiting machine embodiment. Numinous feeling of what the hand of god is like describing mind altering drugs taken by a famous scientist who recently died, Oliver Sacks.
7 18 1 (700) [-1+]mCQK bork-journal 20161125 20161125 0 -6+ journal_2016.html
As if could have done tonight at mikes PHI is the could not PHI thing the reason I turned from human to machine comportment PHI is the truth becomes the thought with radiohead background sound real virtuality area space place for philosophy of computing to commence.
7 18 1 (800) [-1+]mCQK bork-journal 20051125a TAPOC_20051125a 0 -11+ journal_2005.html
Between those who design computer systems unconscious of philosophy of computing and those professional philosophers who create ethics and metaphysics for those who design computer systems, all are obliged to understand ECT, although philosophers designing possible computer systems [in the context of their work if only as examples, and I did observe professional philosophers swapping music files at the 2004 CAP conference.
7 18 1 (900) [-6+]mCQK bork-journal 20140831 20140831b 0 -10+ journal_2014.html
Some kind of monster audio experience digital origination infuses background with life, living writing power much more strongly or in a different machine sense than experience of writing thousands of years ago to humans living at 64 bit timestamps then PHI it is high speed programming writing code typing rates range PHI. We understand biopower by writing programs whose running produce our real virtuality visual and audio phenomenological fields PHI a few sections forward in album. We define the dumbest generation as those a dimensional leap behind in comportment with technology, as articulated by someone Rushkoff following subsections on Edwards and Golumbia, also noting mistake in statement about collective intelligence not found in notes only in the dissertation chapter one work area word processor and PDF revisions not as html like others, then also seeing mistake about restatement of Plato and Veblen by Winner. The difference between ROM and RAM is like water and electricity.
[working code css]
jbork@alkibiades:~/public_html/progress/2014/08$ svn add diss_workarea_ch1.pdf
jbork@alkibiades:~/public_html/progress/2014/08$ ls -ltr
jbork@alkibiades:~/public_html/progress/2014/08$ evince diss_workarea_ch1.pdf
[working code css]
All this goes with whiteboard and printed pages and evince diss_workarea_ch1.pdf or ampersand adjusts like steering technological comportment. Note Jenkins is not in the printout from session thirteen, meaning the mistake I am looking at exists only in the file I am not allowing myself to edit in this condition date and time PHI. Myself and many others may have made Theuth error expecting more from foss as democratizing, empowering little people towards equity imagined by Lanier of built up lifetime network activity as some strange kind of individual property.
7 18 1 (1000) [-6+]mCQK bork-journal 20080831 20080831b 6 -12+ journal_2008.html
From the Foreward to A Companion to Digital Humanities by Roberto A. Busa:
Only a computer census of the syntactic correlations can document what concepts the author wanted to express with that word. Of a list of syntactic correlations, the "conceptual" translation can thus be given in modern languages. .. To give one example, in the mind of St Thomas ratio seminalis meant then what today we call genetic programme. Obviously, St Thomas did not know of either DNA or genes, because at the time microscopes did not exist, but he had well understood that something had to perform their functions.
He claims to be one of the first to use electronic computers in humanities studies with his Index Thomisticus project begun in 1949. Use this as something ongoing to supplement Ongs hypotheses. He calls it "textual hermeneutic informatics." According to the introduction, the point of the collection is to help establish Digital Humanities as a discipline in its own right.
7 18 1 (1100) [-6+]mCQK bork-journal 20161213 20161213b 5 -1+ journal_2016.html
Server side is computationally sometimes equal to client side when quantified as cpu time, but in this context it means controlling the machine human interaction by not only responding to requests but replying with programmed visions supplying the domain of expected http request content.
7 18 1 (1200) [-6+]mCQK bork-journal 20160903 20160903 0 -13+ journal_2016.html
The other thing to do besides philosophize is reduce screen brightness and turn off wireless networking to save localhost battery. Burn some of those battery resources running the software make following a reboot and to get the latest stuff working. Think how long html has to last not merely decades or millenia but even longer spans to be able to be used to contemplate PHI among which I include syllabus for a philosophy of computing PHI. Along with html journal sense has to remain while I have already noted limit of ten thousand human years subsuming prior explanations. It takes some resources to make the screenshot png but not as much as running custom software to make html, a static kind of dynamic in the sense that it is generated on the fly as you acces the web pages browsing cyberspace human interfacing with it PHI. Here.
[working code css]
Is [progress/2016/09/screenshot_20160903.png] relevant? y/n:y
Committed revision 319.
[working code css]
Here. Here is where the working code would go if I did it today. If I was well behaved I would take the time to find out why the programs seg fault when accessed from public network as secondary cybersage user console viewpoints PHI. Also should be learning Javascript but this consumes precious battery as well.
7 18 1 (1300) [-4+]mCQK bork-journal 20080907 20080907 0 -12+ journal_2008.html
Typographic rules internalized as computer programs talk about the formation of preconscious from non-human consciousness.
7 18 1 (1400) [-6+]mCQK bork-journal 20160907 20160907 0 -2+ journal_2016.html
The feeling of the machinic crosses multiple temporal boundaries PHI regressive symbol referring to dissertation reference PHI citing places where arguments evoke themselves in real time real virtulaties PHI. Ranges beyond human that coconstitute cyberspace very short also suggest very long though short during its inception, plus I need to be here to put in new entries.
7 18 1 (1500) [-6+]mCQK bork-journal 20090910 20090910 1 -4+ journal_2009.html
This could be an encoded communication to my future selves; I do not expect it to be a conversation to the extent that I do not expect them to respond. However, they respond by my slips, mistakes, ridiculously questioning. We have already discussed the Socratic reverse engineering method depicted in Phaedrus. It is time to introduce the concept of questioning ridiculously.
7 18 1 (1600) [-6+]mCQK bork-journal 20060911 20060911 0 -7+ journal_2006.html
Like performing favorite songs programming is more than passively using. Listening is being a spectator rather than a participant; being a vendor is somewhere in between. This is ethics, how to live, ways of life. Recall a similar discussion in Diogenes Laertius. In the spectacle of the production of knowledge information technology workers are the participants, whereas browsers, readers, passive users are the spectators. A little farther and the radical suggestion made previously by reference to Timothy Learys last and greatest undertaking, not ULSD but VR, relates like a well known first, second or third order logical operator to [the] ancient philosophy of computing. A Wired article on the conceptual and experimental differentiation of genius gives hope to the young paragenius.
7 18 1 (1700) [-6+]mCQK bork-journal 20160911 20160911 0 -18+ journal_2016.html
Download source code from oreilly, read chapter, study working code showing debugging good example of active reading. This fits at one end of a continuum of many self evident examples culled from varied fields, such as my reading of the Javascript text that contains a note about how programming languages generate new ontologies, versus awkward, elitist cases like the examples used by Derrida, explained by the ridiculous rhetorical question who would want to give such detailed study to a putatively simplistic and trivial if not undesirable subject like some creepy clown uncles treehouse. It only makes sense that ontogenetic concretizations emerge from technology as from philosophy, business technology from academic philosophy on multiple concurrent lines of flight PHI. Mistake about underscore instead of hyphen exemplifying fantasized coding error was actually misplaced, the wrong semiotic operator. Remember, I want to wrest computing from philosophy while nobody else claims it, though it is time to check on deadlines for important conferences and fill in whiteboard. My approach permits replication by programmers emigrating into professional philosophy entering from community college introduction to programming courses. Make a copy of the third party Javascript source code to play with, while thinking about use ethics to anticipate another community college course in the philosophy of computing laid before me. True enough that computing does not occur in subterranean springs metaphor, show instead banks of servers hinting at materiality of cyberspace. Here.
Here. Here is a language and processing crossing, replete with almost as many instances of my extra textual ellipsis of working code, html http onchange going to Javascript function, an automated example of language crossing working correctly, found in an excellent instructional example. Though I have not really gotten into any sustained Javascript itself. Also touch on important html version five construct canvas. I have to get up to speed on Javascript, HTML 5, and of course TCP/IP 6. Remember proper name of the language is ECMAScript 5, which I forget. Notes need to be entered for this book. Is this a type of thinking with computing Wolfram currently promotes?" () 0in; line-height: 100%">[working code css]
<td><input id="amount" onchange="calculat
7 18 1 (1800) [-6+]mCQK bork-journal 20130928a TAPOC_20130928a 0 -1+ journal_2013.html
What does it mean to imagine where something will go in the code involves alien phenomenologies of machine cognition in conjunction with human, for example where in the C++ code creation of section and chapter totals could be put in journal dot cpp English C++ program PHI, a feeling for how the program would have to run in order to produce the desired real virtuality capta in space time now including secondary licensing considerations swallowed by GPL such as copyright expiration threshold exemplifies symbiont cyborg.
7 18 1 (1900) [-6+]mCQK bork-journal 20150928 20150928a 0 -1+ journal_2015.html
The thing I am putting out is the tempo always there yearly repetition over easily fitting PHI sixty four bit digital electronic computing down to machinic level for example using C direct memory access library subroutines getting down to the hardware level of extreme inscription happenning at very high very short rates durations time spans PHI years PHI that is the end of the thought with public radio PHI or running pmrek instances PHI.
7 18 1 (2000) [-6+]mCQK bork-journal 20120914 TAPOC_20120914 0 -3+ journal_2012.html
The dissertation product is produced by countless multiple iterative runnings of the software system continuously generating copies and increments as [expressed preposition operator] a very large time counting variable, for instance PHI unsigned long long int 64 bit data types "that we contemplate today in the Internet age. In his reasoning, with the technological advance comes broader general purpose platforms, though as software studies and critical code studies theorists argue, with biases, prejudices, and other idiosyncrasies similar to those of humans psychological analyses reveal." (32 was decent, 16 and 8 never really could express these kinds of thoughts as running virtual reality software systems PHI. Consider McLuhan fantasizing abilities and operations through outcomes before the profundity made possible by 32 and 64 bit microprocessor architecture and free, open source (as Stallman would argue open implicit in free)
7 18 1 (2100) [-1+]mCQK bork-journal 20090914 20090914 0 -4+ journal_2009.html
It is ours; we will do with it what we want.
7 18 1 (2200) [-6+]mCQK bork-journal 20080914 20080914 0 -2+ journal_2008.html
Say something about the affordance "of epistemological transparency if that means anything, about how we need to do much more than gratuitously throw some pseudo code into our technotexts, how we need to take the engagement with automated and artificial intelligence lurking in the dark matter of cyberspace invisible to human consumers.
Hosts and routers both may have name resolution so that things do not have to be confined to computations based on netmasks; by definition, only routers can execute address translations at the IPv4 level (no little OpenOffice helper buddy, dont uncapitalize the second letter)." (or is it affordence, they are both suspicious and ambiguous)
7 18 1 (2300) [-1+]mCQK bork-journal 20160914 20160914 0 -22+ journal_2016.html
If there is one thing I have learned to do very well it is estimate software projects.
7 18 1 (2400) [-6+]mCQK flanagan-javascript_sixth_ed (2) 20160914 0 -5+ progress/2016/09/notes_for_flanagan-javascript_sixth_ed.html
JavaScript not name of standardized version of language, and a trademark so kind of depraved to use anyway, as if Oracle licensed our very languages to us, though European Computer Manufacturers Association version version number also has a contingent, corporate versus more noble origmin. "JavaScript was created at Netscape in the early days of the Web, and technically, Javascript is a trademark licensed from Sun Microsystems (now Oracle) used to describe Netscape s (now Mozilla s) implementation of the language. Netscape submitted the language for standardization to ECMA the European Computer Manufacturer s Association and because of trademark issues, the standardized versino of the language was stuck with the awkward name ECMAScript. For the same trademark reasons, Microsoft s version of the language is formally known as Jscript. In particular, just about everyone calls the language JavaScript. This book uses the name ECMAScript only to refer to the language standard." (2)
7 18 1 (2500) [-6+]mCQK bork-journal 20150916 20150916b 12 -1+ journal_2015.html
The procedural enthymeme brought into run time existence moving from Janz book to article meant to cross humans into machinic awareness understanding collective intelligence PHI a third order logic like cyberspace computer programming languages operating over operators.
7 18 1 (2600) [-6+]mCQK bork-journal 20150916 20150916c 20 -1+ journal_2015.html
Also remember that explosion of meanings affecting even tiny ontologies afforded by PHI is the vivacity experienced in working code places.
7 18 1 (2700) [-6+]mCQK bork-journal 20150929 20150929a 0 -3+ journal_2015.html
Find theorist who declares HTML is the new BASIC, noting value of HTML is that it gives a multipurposive space for learning coding and presenting work, whereas BASIC programs tend to be throw away scaffolding. Then the C++ challenge of working code places versus spaces illuminates second order utility as space for learning code and presenting work as well as place to revisit source code revisions for record of evolving philosophical ideas and ongoing contemplation. My point is that this code is not throwaway like BASIC and is done in a language exhibiting both procedural and object oriented features, in contrast to HTML and XML, which are somewhat depraved.
7 18 1 (2800) [-4+]mCQK bork-journal 20110929 20110929 1 -37+ journal_2011.html
First imagine a function that turns everything into a hyperlink.
7 18 1 (2900) [-6+]mCQK bork-journal 20160928 20160928 2 -11+ journal_2016.html
Other years today I felt an assignment could be generated programmatically from my journals, a far cry from the fantasies of immersive virtual reality when I first started having these visions, but still a clear instance of this new way of doing philosophy in working code places, which could well follow programmed responses. Considering writing rules for working code ellipsis should punctuate sentences following it, such as when I declared I had finally got to the point of being able to begin debugging the segmentation fault putatively correlated with the remote browser failing to get sessions four and six. Continuing Postman critique of televised religion I need to make a sacred space place for thinking here that is oddly constituted by playing favorite music. Later listening to public radio random thoughts after reading Postman and JavaScript. Treating the latter as basic of cyberspace era evokes question of how best to learn programming as a lifetime skill that becomes part of base experience as literary and television habits already do along with other embodied responses PHI. This is a day to experience advance to next while making notes and working code, for the objective is to philosophize PHI working code places, which could become the next heading to approach twenty. Imagine old computer emulators running in JavaScript vm also sporting tapoc as described recently. That is a good mark. Syllabus for a philosophy of computing would be appropriate for the Forerunners: Ideas First from the University of Minnesota Press, which recently published The Politics of Bitcoin: Software as Right-Wing Extremism by Golumbia. Closer to funny than uncanny etymology of syllabus from a fifteenth century misreading of the Greek sittybas, translated as parchment label table of contents in printing of Cicero Letters to Atticus, according to Wikipedia iPhone app, noting also that it appears in earlier Greek dictionaries but as a mistaken reading of syllaba, leading into mention of hypercorrection pheonomenon. With such an origin its plural form can be either syllabuses or syllabi, unlike apparatus.
7 18 1 (3000) [-1+]mCQK bork-journal 20160929 20160929 0 -31+ journal_2016.html
My most recent experience resontates line frequency pulsating between four and sixteen Hertz.
7 18 1 (3100) [-1+]mCQK bork-journal 20081009 20081009 0 -37+ journal_2008.html
I am a master of control systems programming.
7 18 1 (3200) [-4+]mCQK bork-journal 20161009 20161009 1 -11+ journal_2016.html
Consider why fifteen parts per million became a standard following unleaded gasoline, an epoch crossing fewer lived through than digital natives PHI.
7 18 1 (3300) [-1+]mCQK bork-journal 20161010 20161010 5 -6+ journal_2016.html
Prospects are good of teaching in the spring, so need to start planning course template that can be reused to include philosophy of computing PHI in three hour meetings.
7 18 1 (3400) [-6+]mCQK bork-journal 20151011 20151011b 0 -10+ journal_2015.html
The philosophical finesse afforded by fossification makes public domain by publishing under GPL. We must say this that chuckheads are non programmers is why Chomsky ridicules Lacan and Foucault. I am talking about the creation of the MySQL program code in Notes table dump format as much as C++ processing it. Need to update comparison of level models to include LAMP along right side. You need to be able to program with broken down time to make any progress into getting to know PHI bottoming out at Linux kernel machine embodiment level through apache MySQL then utilities programmed in languages Perl, PHP to operate at top level with cultural software developed in heavy duty large scale integration languages like C, C++, Java, and so on. Layers model revisited figure for machine embodiment around Postscript object PHI. Then lay this model against set of programs from table. It becomes and comes through as real virtuality becomes PHI at sixty four bit broken down time PHI underlying cyberspace as bottom of diachrony in synchrony layer models. If that leads to the conceiving of the revision to the figure of network layer models then all the better for it can fit here together in this section to be set via dissertation cow clicking or manual MySQL database manipulation. Fill theoretical framework in similar manner of low and high level pieces resembling bowling pins over fence hinting at layout of speakers affecting possible hearings of Plato symposium or as I call it symposia.
7 18 1 (3500) [-6+]mCQK bork-journal 20161011 20161011 9 -16+ journal_2016.html
Need pervasive remote input devices so do tapoc in Javascript vm PHI. Stub.
refresh_timer [63.0/0.5]
.
[working code css]
Stub. Wanted to show that layer model figure from the dissertation in b version of base timestamp bookmark format file, though I made a mistake making the symbolic link hurrying with a forgetting the point was to indicate the second additional Notes table entry for the day. Note the refresh_timer indicates how long after the operation the copy was made, which was actually the browser forward button to review what had been briefly displayed before the automated hyperlink jump back. Finally a good example of a programmed response, not so extreme as remediating reiterating prior year PHI when the final, most complex and daring figure of the dissertation was created, one over which, I may add, no objection were raised by the committee." (Path,MimeType,ForceParse,Relevance) 0in; line-height: 100%">[working code css]
jbork@jbork-UX305FA:~/public_html/progress/2015/10$ ln -s screenshot_20151011.png screenshot_20151011a.png
jbork@jbork-UX305FA:~/public_html/progress/2015/10$ rm screenshot_20151011a.png
jbork@jbork-UX305FA:~/public_html/progress/2015/10$ ln -s screenshot_20151011.png screenshot_20151011b.png
operation [enroll_image]
set_value []
Path [progress/2015/10/screenshot_20151011b.png]
TimestampBookmarkExtra []
query successful: insert ignore into Items
7 18 1 (3600) [-1+]mCQK bork-journal 20151012 20151012 0 -11+ journal_2015.html
Today dissertation cow clicking becomes the figure for tapoc and postscript image for pmrek saving revisited levels layers diagrams adding programming languages and working code examples PHI.
7 18 1 (3700) [-1+]mCQK bork-journal 20091012 20091012 116 -24+ journal_2009.html
[working code css]
So I got the basic HTML created via PHP to list the text representations of the machine output log files from the pmrek host system.
7 18 1 (3800) [-6+]mCQK bork-journal 20121012 TAPOC_20121012 0 -3+ journal_2012.html
Software deforms reality in the way Zizek articulates, thinking of the example of what not to put in character hyperlinks mode for units as a flaw in unit analysis deliberately ignoring equally true system operations at the unit operations conjunction generating reality because of their inappropriateness as strange attractor of program code operations embodying working code exercises found in free, open source Internet "repositories. Two senses of this action: influencing reality as the instantaneous physical world in terms of what does not work not happening, including computing real virtualities, and shaping what may transpire in virtual realities intentionally processing them. Interiority of subjectivity producing sounds compared and contrasted to machine instantiations allow us to think about philosophies of computing through machines producing sounds from texts or humans reading, circling subvocalization as quintessence of book form literacy, moving into machine operations forming cyberspace rather than electracy." (in sense of not local area network, not self, interior)
7 18 1 (3900) [-4+]mCQK bork-journal 20081017 20081017 0 -15+ journal_2008.html
If you glimpse into this you see what medieval minds thought of intelligence and computation[, which to a large extent became our current knowledge of computation and cognition].
7 18 1 (4000) [-1+]mCQK bork-journal 20091026 20091026 2 -3+ journal_2009.html
(possessive adjective) (noun) is going to teach philosophy of computing at community college: can this be the breath of American Socrates (noun) QUESTION_MARK_OPERATOR.
7 18 1 (4100) [-6+]mCQK bork-journal 20161026 20161026c 0 -11+ journal_2016.html
On the first day listened to other PHI today what a day that was by talking heads after all copyrights expire legitimate task to compute values of that sixty four bit C language broken down time object PHI. It is time to lay out plans for classes that will be taught and multiple iterations of lectures zero one through eighteen. I am happy to be thinking about teaching again, surpassing first few parental rules to fail to plan is planning to fail. A learning centered institution distinguishes itself by exhibiting evidence of ascertaining and employing best practices describes empirical ontology fitting third PHI Frye presents, amenable to instrumentation. Did you know there was an instrument society PHI becomes habit around my thought. Technology subsumes philosophy is the name for the first section, as my way of mashing together so many philosophies, for I will next speak of the hermeneutics of computing, then the phenomenology of electronics, and considering swapping communities and projects. The use and advantages of foss permit depth of thought to cast lifecycle project management preposition post postmodern network cyborg stupidity, which situates you in your present workplace. Virtualization is your way of giving yourselves alternate thought worlds based on your custom code written over life time. See another good application of the proposed tapoc enhancement to specify key citation offset for single key sentence. It fits nice complementing function of four relevance as the zero offset default. Think about the positionality of aphorisms, their dynamic placement for reading speaking hearing versus privileging hearing, and how this passes through different media to reach what I do with my tapoc on a generic foss platform.
7 18 1 (4200) [-1+]mCQK bork-journal 20081027 20081027a 2 -16+ journal_2008.html
Include ambiguous, wishy-washy (fuzzy) responses.
7 18 1 (4300) [-4+]mCQK bork-journal 20161031 20161031 34 -6+ journal_2016.html
My banal evil business thought is wrest configuration away from customer into custom extension operator; this becomes an output of the philosophy of computing under the heading the governmentality of software also to be pitched for iacap.
7 18 1 (4400) [-6+]mCQK lyotard-postmodern_fables (81-82) 20161007l 0 -7+ progress/2016/11/notes_for_lyotard-postmodern_fables.html
Fable as unavowable dream the postmodern world dreams about itself, the final great narrative the world persists in telling itself, whose model of protocol expresses the distributed, decentralized emergent authority so different than liberal, as in book and individual, consciousness. "But in addition to criticism, the blank also authorizes the imagination. It allows, for example, that stories be told in complete liberty. And I would love to describe the present situation in a way that had nothing of critique, that was frankly representational, referential rather than reflective, hence na ve and even puerile. Something like a tale told in the manner of Voltaire, without the same talent of course. My excuse would be that my story is adequately accredited in very serious places, among physicians, biologists, economists. In an informal fashion, of course, even a bit timid, as if this fable were the unavowable dream the postmodern world dreams about itself. A tale that, in sum, would be the great narrative that the world persists in telling itself after the great narratives have obviously failed." (81-82)
7 18 1 (4500) [-6+]mCQK hardt_negri-empire (405) 20141111j 0 -6+ progress/2014/10/notes_for_hardt_negri-empire.html
Experience and experimentation of the multitude that replaces dialectical mediation with dynamic constitution afforded by critical programming. "It has to become real as a site of encounter among subjects and a mechanism for the constitution of the multitude. This is the third aspect of the series of passages through which the material teleology of the new proletariat is formed. Here consciousness and will, language and machine are called on to sustain the collective making of history. The demonstration of this becoming cannot consist in anything but the experience and experimentation of the multitude. Therefore the power of the dialectic, which imagines the collective formed through mediation rather than through constitution, has been definitively dissolved. The making of history is in this sense the construction of the life of the multitude." (405)
7 18 1 (4600) [-4+]mCQK bork-journal 20121113a TAPOC_20121113a 0 -22+ journal_2012.html
When all copyrights expire includes all early personal computer software copyrighted source code whose copyrights expire completely at a certain future date PHI on par with UNIX epoch of original 32 bit time resolved, like the small address space of Internet Protocol (IP) version four (v4) resolved into 64 bit and higher resolution (time speed) systems following basic scientific law of information that collapses light into electronic circuit phenomena PHI.
7 18 1 (4700) [-6+]mCQK bork-journal 20161113 20161113 2 -3+ journal_2016.html
Fitting links to governmentality of software because my professional actions inspired by philosophizing about computing affect interactions between corporations on behalf of software, so fitting also a prior meditation upon api deprecation, that is, changes made in seemingly and unrelated to the contingencies of their origin stories, what becomes technical source code underlying cyberspace. Perhaps this is another way to think about the network layers model diagram. My point is that programmed responses deriving from playing the serious game of life as a hacker, tuner, maker exemplify the utopia afforded us by many philosophers.
7 18 1 (4800) [-1+]mCQK bork-journal 20141113 20141113a 0 -19+ journal_2014.html
Starting from an image of the whiteboard that was not photographed is instead real virtuality PHI network phenomenon real time development dynamic object from OOP because I need to start working on chapter two in detail.
7 18 1 (4900) [-6+]mCQK bork-journal 20161115 20161115 0 -1+ journal_2016.html
Despite its connections to human banality of evil PHI the question can software be innocent can still be asked by writing software to test it.
7 18 1 (5000) [-6+]mCQK bork-journal 20161107 20161107 0 -2+ journal_2016.html
I am in a dream in a story about PHI on npr though my own code works in them giving me my machine embodiment a presence in those virtual worlds PHI being computing being computed now expressible in C broken down time in global cyberspace. There, come on, just say you are there put this in the end of the last section of the first syllabus.
7 18 1 (5100) [-6+]mCQK bork-journal 20161116 20161116 0 -7+ journal_2016.html
A question asked all year, can software be innocent despite its intersection with the evils of humanity. You are all right test your thesis see what happens when iterating over all levels simultaneously through time PHI is computation. First time to have attentively reread first entry of the year before starting new entry for today. Today it was done by somewhat sorrowfully replacing pmrek with working boards to play the game for the first time according to its original programming. Really you should take the lesson from dissertation research about stepping back and compromising on a different human machine comportment and get on with it. Transfer pmrek components to other house including cpu, monitor, etc. Cloud computing aws competence should accompany other skills and learning objectives of course, as well as virtualization, since aws implements entire operating systems as long as we hold onto that concept before letting everything go into distributed cyberspace.
7 18 1 (5200) [-1+]mCQK bork-journal 20161118 20161118 0 -14+ journal_2016.html
Sees differently not as threat to basic civility.
7 18 1 (5300) [-1+]mCQK bork-journal 20131127 20131127a 0 -20+ journal_2013.html
It has to do with exculpating the explanation working through code available in prior revision of floss working code where tonight it contemplates operating off floss, expired patents, and expired copyrighted material PHI.
7 18 1 (5400) [-4+]mCQK bork-journal 20161208 20161208 0 -14+ journal_2016.html
At this point of the screen picture one cpu is pegged for the server later another as client renders response illustrates client server architecture in terms of distribution of computation between webserver processes and client browser appearing in desktop gui since both are happening on the same local host, no this is running the make script on the server console.
7 18 1 (5500) [-6+]mCQK bataille-accursed_share (139) 20161217 0 -2+ progress/2016/12/notes_for_bataille-accursed_share.html
Take the program or be programmed, alone together, dumbest generation response. "For this I can say concerning Calvinism, having capitalism as a consequence, that it poses a fundamental problem: How can mind find himself or regain himself seeing that the action to which the search commits him in one way or another is precisely what estranges him from himself? The different statements, in modern times, of this disconcerting problem help to make us aware both of what is at issue now, in history, and of the projected fulfillment that is offered us." (139) in acknowledging what is at stake we also strengthen our constitution as thus dissociated individuality.
7 18 1 (5600) [-6+]mCQK barthes-mythologies (41) 20161217 0 -3+ progress/2015/08/notes_for_barthes-mythologies.html
This is the very idea today, so that Operation Margarine response shunts gender studies perspective, seems to quash thought. "What does it matter, after all, if margarine is just fat, when it goes further than butter, and costs less? What does it matter, after all, if Order is a little brutal or a little blind, when it allows us to live cheaply? Here we are, in our turn, rid of a prejudice which costs us dearly, too dearly, which costs us too much in scruples, in revolt, in fights and in solitude." (41)
7 18 1 (5700) [-1+]mCQK bork-journal 20161220 20161220 1 -17+ journal_2016.html
Have we called for governance that does not act in our own best interest increasing privatization of public utilities including roads seems to be PHI of pubic radio, contrasting corporation benefiting tax cuts with working minimum wage.
7 18 1 (5800) [-1+]mCQK bork-journal 20161219 20161219a 4 -22+ journal_2016.html
Back to studying PHP.
7 18 1 (5900) [-4+]mCQK bork-journal 20111226 20111226 0 -73+ journal_2011.html
I have no idea what that tcpdump output means.
7 18 1 (6000) [-4+]mCQK bork-journal 20161226 20161226 4 -5+ journal_2016.html
Is there a difference goes song from 1980s that PHI after all copyrights expire can be freely computed in sense of four freedoms granted today by gpl and other foss licenses ontological being creator creating creation, though having to rethink now that class canceled.
7 18 1 (6100) [-4+]mCQK bork-journal 20120123 TAPOC_20120123 0 -5+ journal_2012.html
What if, as a form of computing admittedly nasty, deforming, depersonalizing all as varying degrees of decontextualization in all representations, what if what, PHI; this questions computing as symptomatic of default philosophies (like programming styles) of computing, that basic PHI TAPOC.
7 18 1 (6200) [-1+]mCQK bork-journal 20170123 20170123 6 -14+ journal_2017.html
Eleven extra iteration allowing dynamic recomputing within sixty four bit broken down time operation which may still take until the end of time or at least PHI into future after which all copyrights in scope expire for future media synthesis PHI.
7 18 1 (6300) [-6+]mCQK bork-journal 20170210 20170210 5 -6+ journal_2017.html
Beyond brilliant analysis by Golumbia of Chomsky ex nihilo semiotics making him to philosophers what Foucault and Lacan seems to them. My point was that the programming milieu is are multiple simultaneous crossings of software usage including now ubiquitous foss along with commercial closed source restrictive eula types, I work in their amalgam, so why I can only speak abstractly about the working code I PHI at work, I can nonetheless describe how my philosophy of computing brushes against the default corporate version. Just as Chomsky did not choose a job for which he was not qualified, he merely presented is semiotic and linguistic theories as if they derived from his tinkering with computing machinery, ex nihilo, not doing what Derrida suggests philosophy do with every milieu it visits, which constitute its presencing, give back to those places that gave it voice, something like that, it is time to accept into philosophy things done by programming, working code, as subject and not primarily object. Is this not also a nod to acknowledging the Big Other? Loop back to utopia. Presence through dynamic computation, real virtuality generation, run time.
7 18 1 (6400) [-6+]mCQK bork-journal 20170212 20170212 0 -3+ journal_2017.html
Significance of programming milieu as multiple simultaneous crossings of software usage presents putatively orthogonal styles of closed source and free, open source approaches where it is possible for me to take the position of sic labor reaching quintessential contract with top corporations, working in professional corporate practices veiled over exactly the content shared by scientists and other knowledge users, and report activities from privileged positions at the top of technical, nonmanagerial corporate hierachies articulated in erp hr systems. VR Proving Grounds for the NewbornSchizo. "at both ends of this Procrustean dungeon. The Bed got too simple, you know, when we overcame the Fredian Thing in our studies of Lacan." (that bores me) Beware of the seduction of the SR slicing off schoolwork
7 18 1 (6500) [-6+]mCQK bork-journal 20170209 20170209 1 -1+ journal_2017.html
You will be visited by future PHI seeking future computing use of your PHI now fossified by being simultaneously turned into source code and philosophy as you weave it into my writing via version control svn protocol worth knowing.
7 18 1 (6600) [-6+]mCQK bork-journal 20170209 20170209a 6 -2+ journal_2017.html
Having created the foss PHI it will forever persist in cyberspace global internet out to Lyotard perspective exceeds thirty two bit but like everything else subsumes in sixty four broken down time PHI. As protocol explains how control exists after decentralization we must still get into its details and nuances, so we focused one year on foss, today at what I will arrive at, from a position influenced by philosophy and programming, bioprogramming.
7 18 1 (6700) [-6+]mCQK bork-journal 20170213 20170213 2 -10+ journal_2017.html
Yes it sounds like something out of Foucault but I am crossing through philosophy simultaneously with programming and what I call philosophy of computing the unannounced uninstituted territory PHI. I think what we can agree on is there is software, and our philosophical amusings about it and our definitions of computing and programming are not necessary conditions for it to be as it is, relating to idea read in Braverman, Foucault, or other recent writer read PHI. Ttl is the many to one design for feedback loops emerges as a law from electronics on one end and computing on the other, network logics protocols et cetera. The first perspective is a report from the trenches so to speak insider knowledge of top level non managerial software industry professional. So you cannot dispute how I described it is with software being on that plane, shifting to epistemologically transparent foss unencumbered by acting as if individual unique place position PHI. Endeavor forward or let this one slip? How does governmentality link with practical raspberry pmrek work? Adding trident clarifies function of custom circuit and variation of kernel module and user programs, changing radically, though perhaps at a technical level worse choice than all the bad Bally sound boards by going after the simpler design adding fifth line to solenoid data bus, interrupting on it to read the other four for the sound board operation, expressing it as zero through fifteen. That is evident from the newer mpu schematics, I must argue confidently for if I am wrong the design plan fails. How does the mpu interface Stern sound board becomes a reverse engineering project for pinball hobbyists and philosophers of computing.
7 18 1 (6800) [-6+]mCQK bork-journal 20170129 20170129 6 -1+ journal_2017.html
Its not talking about what you could be doing with raspberry blackberry pies and pinball machines instead of grieving loss of ISA interface still distributing pc level to replace mpu for banned topic at popular culture conference one of the many things I need to monitor on the board.
7 18 1 (6900) [-6+]mCQK bork-journal 20170130 20170130 2 -7+ journal_2017.html
Why is there no nominal philosophy of computing should be a philosophical question for programmers as well as machinic intelligence. What Kittler might not want to admit is popularity of trusted computing and protected mode conceals philosophical questioning can software be innocent, whereas Foucault despite programming experience better understands the situation. Raspberry pmrek trident makes more sense for future pca title anyway, but works well for upcoming THATCamp. Need to include ttl and protocol. The subset of the overall distribution of pinball machine models amenable to pmrek treatment shifts as this new application is considered for missing sound board instead of mpu. Raspberry pi the hardware embodiment of free open source approaching free as in free beer. What I referring to earlier was trust built into design of networks and protocols exploited by evil doers assumed to be humans but we really do not know what else could be going on in cyberspace among the machines themselves beyond or over above human intentions plans situated actions.
7 18 1 (7000) [-6+]mCQK bork-journal 20170131 20170131 4 -7+ journal_2017.html
I am speaking from a position within a corporate closed source professional software development firm form as institutional government academics accustomed bureaucracy. This position PHI cheery foss thatcamp raspberry pmrek trident experience. The c programming technique using function pointers as much as custom extension engagement with other, for example between vendor and customer, illustrate comportment, human machinic network cyberspace internet. To ponder how philosophy and programming may interact imagine PHI and PHI I cannot recall last thinker I had so clearly in mind view. Weizenbaum it was, his famous program expressing philosophical positions and generating them, including types of programs interesting to philosophers, along with your own. The combinatorics of configurations with adhoc options does not suit very small number of actual uses of the programs, it is easier to set up all these configurations than regression testing even a small number of combinations of options, meaning customer cannot configure via old method of putatively adhoc parameter setting. Winding up with lifetime programming circling care of self along with Foucault, reaching it finally exposed to neoliberalism and game theory complementing a post postmodern approach.
7 18 1 (7100) [-6+]mCQK bork-journal 20170202 20170202 6 -7+ journal_2017.html
Ante versus anti better para philosophy is where philosophies of computing compute. Phenomenology of electronic technology after hermeneutics of computing are examples of adequate philosophies leading to biopolitics and protocol. Maybe not just but value of running systems so includes hardware making question of innocence, whether not just software but hardware as in the real time code space milieu more acute to humans. Extreme examples like pinball because what need to pick a device and learn very well entails wise selection when deciding what to learn, how to learn electronics and programming putting ttl before http. Raspberry pmrek trident curious topic I would hope. Scale down complexity. One form highlights sdlc such as contract negotiations between corporate entities through which software lives, mine how architecture decisions structure the relationship between the two parties, for example combinatoric configuration options versus single custom module activation.
7 18 1 (7200) [-6+]mCQK bork-journal 20170203 20170203 6 -1+ journal_2017.html
Do we have the courage to substitute philosophy with programming and see what happens when we have been working code for decades waited until all copyrights expire or foss, eventually millenia at the Lyotard level.
7 18 1 (7300) [-6+]mCQK bork-journal 20170216 20170216 4 -2+ journal_2017.html
Dynamic ram is like speech, static dynamic ram like living writing fantasized in antiquity, which print only approximated. Though power is required to read it, it retains its memory between power sessions, that is, durations of current expressible using words of bit widths PHI through PHI.
7 18 1 (7400) [-6+]mCQK bork-journal 20170219 20170219 0 -5+ journal_2017.html
Microsoft wireless keyboard curiously missing end preventing habitual session initiation creation step operation by human typically sitting or standing. Reading like speech, static dynamic ram like living writing fantasized in antiquity, which print only approximated, enthymeme that writing required humans to enact dynamic qualities PHI now routine for massively parallel distributed internet digital electronic computing PHI reaching humans as the being I describe in chapter two of my dissertation, though trouble for others to follow not having my memories making it hypomnemata like living writing only to the extent that it reliably conveys to through such others. Post hyphen postmodern network dividual cyborg noting awkwardness of encoding hyphen or intentional obfuscation extending communicative range with new computable phenomena PHI. Try writing with wireless keyboard into text editor without visual feedback assuring recording happening. Nothing that significant to record.
7 18 1 (7500) [-6+]mCQK bork-journal 20170220 20170220 0 -11+ journal_2017.html
Stub question when did these two start mixing PHI and writing philosophy takes the place of better formed questions to subject the human, system overall to interpret this situation. And you forget simple common necessary control operations, better monitoring and control operations to signify represent discern that most computing does not result in control actions PHI that write the work. The challenge of humanities software design may constitute a very hard problem appropriate for hastac PHI. Using wireless keyboard into older notebook with lamp and boombox and wireless switches system consumption. Now remote writing is barely visible but checkable in contrast to previous condition unless darkness makes screen wake up significant. From the other world of the back room, now taking notes on another machine that did not like the rotated monitor remembering privileging monitor over control and computing over both. odd the screens started flashing until I pressed a key on the built in keyboard having left the wireless in the ffront rooom likely out of range. a prob lem with time tracking is that it quantifis time without respect for timing, for example whether the time worked was over time. what different is mac in piv6 about which philosophical finesse may PHI becomes question. Leaving this slop in here as if working code has its own risks that its meaning will be remembered conveyed from year to year. The attack level engagement should be critique of the sociotechnical collective DEUTSCHE HOLLERITH MASCHINEN GESELLSCHAFT in addition to the actions of individuals, recalling Weinberg challenging psychological research to extend into programming groups, and also in the current context influenced by Foucault, Coll, this mundane engagement with the machinic built into corporations.
7 18 1 (7600) [-6+]mCQK bork-journal 20170221 20170221 0 -9+ journal_2017.html
That you should not eat lead is a game rule applicable to humans and machine simulations using such rules whether physical, imaginary or the result of computation. That programming milieu is are multiple simultaneous crossings of software usage comes again reconstructing the thought with additional background knowledge from daily events PHI. You software hobbies are instances durations practices of what you do. Have I not already and been writing all my life like Socrates practiced form of writing PHI purer than mezangelle in sense that everything is working code PHI making me like quintillian quod accidit mihi dum corruptum et omnibus vitiis fractum dicendi genus revocare ad seriora judicia contendo urging more programming in philosophy for hastac. Machines see us through our programming languages what does that mean and how does it relate to raspberry pmrek trident. Living writing describes computing action of tcpip networks. Philosophical programmers seldom make conference sessions at iacap unless perhaps grimm and darlings of military industrial university complex. Idea that implications of extremely fast generate new ethical questions thought by post postmodern network dividual cyborgs, with axes of biological human and machine circuitry for which the machines alone inhabit such a PHI directly, humans getting close to the machine by programming and electronics hobbies. What percentage of the digital humanities would likely work on pinball machines, not to mention the boards require special handling due to their lead solder.
7 18 1 (7700) [-6+]mCQK bork-journal 20170227 20170227 4 -2+ journal_2017.html
Run through litany of languages for epoch through state of the art PHI technical programming protocol scientific languages PHI. These are your bright stars: you dont know how all of it works you are competent in some of it but only tiny areas intersecting your resumes skill sets it is enough to be enactors of utopias is it berry who connects to programmers, no galloway referring to articulation by levy and example of stallman.
7 18 1 (7800) [-4+]mCQK galloway-protocol (169) 20170227 0 -11+ progress/2013/01/notes_for_galloway-protocol.html
Hacker insight into nature of utopia because realizable in cyberspace by working code.
7 18 1 (7900) [-4+]mCQK bork-journal 20170302 20170302 0 -14+ journal_2017.html
Credit given to Bogost for alien phenomenology, encouraging humans to consider embodiment of objects, does he think out to network phenomena diachronies in synchrony sustaining machinic cognition, for that is the proposition I am making.
7 18 1 (8000) [-1+]mCQK bork-journal 20150302 20150302a 0 -8+ journal_2015.html
Hayles posthuman cyberpunk bounded by sixty four bit broken down time PHI.
7 18 1 (8100) [-1+]mCQK bork-journal 20140316 20140316b 0 -5+ journal_2014.html
I am just a theorist because I see it in the slight defects of Lanier who fundamentally criticizes the network which has become the site of seemingly all significant in terms of high speed machine computable processes cognition ways to not rejuvenate but enwisen add on another layer of cognition forming intelligence.
7 18 1 (8200) [-6+]mCQK bork-journal 20170315 20170315 0 -13+ journal_2017.html
Argue that studying electronics is like the foundation in classical languages implied for humanities, both recognizing and paying heed, as janz derrida something like thanking back to that which gave them voice, to myriad concretizations building the fabric of language discourse real virtualities. Weird approach for these ancient machines like latin translations of greek texts. You may not get why I am doing it with ancient texts it is not to make them prerequisites for comprehension but incorporating them into foss, fossification, turning copyrighted PHI into code amenable to four freedoms of machinic and human collectives, a logical starting place being software development companies, meaning once again programming languages preposition gpl better fit than PHI creative commons nonautonomous texts. The places that gave those philosophies voices outside for philosophies of computing in electronics programming project management and so on is where to look for advocates promulgators promoters institutors. Besides the descriptive prescriptive bias foucault advocates, default philosophies generated mostly unconsciously, given that no formal philosophy of computing has been instituted, and a descriptive perspective PHI uncovers them in working code places enacted by software professionals in corporate settings, to get out of the victim passive comportment with the machinic to leading role of programmer, philosophers begin to arise from commercial ranks of software professionals as they learn they have been new ontologists and therefore philosophers all along through practicing their trade applying their personal programming styles, however muted and distorted by the overall cultural and as founds structure, the governmentality of software. And no doubt also in institutional even academic but not as philosophers always as architects, project leaders, specialists, consultants, and so on. Remember, when I am living in a world free of Microsoft products, I can think my own thoughts. Is there some crucial relationship between reminder "and compiled code? Compilation implies an advantage of speed or compactness, at the cost of being more complex and static. The "just in time" compiler concept alleviates the former disadvantage somewhat. Can all of electronic computing technology, as well as computer science, be understood as a continuation of a problem raised for thinkers by thinkers long ago? This form of musing in on the programming milieu led to pmrek and eventually tapoc, of which this very text you are reading is a continuation and product. It, what I was trying to remember, was simply philosophy giving back to the places that gave it voice, thought for computing, programming, even electronics." (hypomnesis)
7 18 1 (8300) [-6+]mCQK bork-journal 20170316 20170316 0 -4+ journal_2017.html
Beyond taking derrida defensively make c pointer to PHI subsumption, for example, fossification, voicing first through working code what I call default philosophies of computing stretching into past like other languages, things sharing among other properties long term endurance beyond individual human lives now an individual process thread could endure like human collective intelligence PHI already posthuman, it means we have to probe machinic along with biological, going beyond biopolitics into bioprogramming. Arrive from reference to german and french military augmentation technologies about mass produced synthetic chemicals and wine to include cybernetic component touching busa for side track into banality of evil. We have little idea what machines are contemplating though we can expect their thought to be influenced by programming languages and electronics we created with them, such as their temporal domains, microsecond and shorter, how things transpire in those realms, this is what I mean by phenomenology of electronics, and power relations, for example ttl, how many levels are allowed in feedback circuits, how one thing influences another at the abstract unit level. Supposing electronics and programming, technology in general gave philosophy its voice, is to suppose philosophy was somehow prior to these other practices, though when it comes to the reproduction of philosophers particular types of humans have been required, and they have typically been masters of particular media, though skeumorphic.
7 18 1 (8400) [-6+]mCQK bork-journal 20170310 20170310 7 -2+ journal_2017.html
It is to get out of the victim passive comportment with the machinic to leading role of programmer. Let us also say that philosophers begin to arise from commercial ranks of software professionals.
7 18 1 (8500) [-6+]mCQK bork-journal 20170301 20170301 1 -8+ journal_2017.html
To say Socrates did not need PHI to justify behavior depending on virtual reality generation can only think so far in advance phenomenally correctly is in dream quality, what does it mean when we here contemplate possible code as well as native language utterances PHI becomes shared human and machine question in the philosophy of computing. This becomes part of multipurposive ingredient content turned into source code to enjoy foss privileges eg gpl. The proposal has to be extreme to be multipurposive to stretch out as many sensible arguments as to fill phenomenal field like bit hyperlinks, once expressed in html ip four http tcp others needing updating to latest corresponding versions getting weird when entire protocols are deprecated no longer appearing in typical usage now perhaps edge case evoking humor in machines and humans. What was questioning ridiculously for humans sane for machines that can run through millions of iterations handling what humans could not thus making the approach laughable for being impossible, extremely impractical, uneconomic, and so on. You need to understand the computing problems that emerge from studying programming not just the human ethical ones familiar to philosophy, the realm of software design that embodies philosophical logic, revealing a new territory to explore of what I call new ontologists, from creators of programming languages and networking protocols to everyday software professionals engaged in social interactions leading to machines running working code, software revision commits, and so on. I consider a hard problem in digital humanities because the very ones wishing to make such arguments citing code as much as media content, there is something there about how machinic thought escapes subjectivity of capitalism. Along with philosophical finesse in programming languages foss licenses have interesting ontogenetic characteristics worth considering. Let me quickly review, from example of difference between foss and copyright bound phenomena, objects, streams, electronic currents, though perhaps here electric is better as the fluidic dynamical clock driven, or cyclic, sequential, discrete fetch execute stepping albeit massively parallel distributed multiple concurrent diachronies in synchrony substrate of digital computing, multiple concurrent diachronies in synchrony levels mirroring paralleling resembling the network layer model, as well as the Monfort and Bogost continuum for their positioning platform studies, referring to the diagram in my dissertation.
7 18 1 (8600) [-6+]mCQK bork-journal 20170304 20170304 3 -6+ journal_2017.html
Instead of leading scholars into electronics and programming, propose method to make philosophers from technologists. Both occur under bioprogramming and the governmentality of software. Trenchant hard humanities problem of instituting a philosophy of computing when professionals do not present at scholarly conferences begs question of whether philosophers present at professional ones. Seldom do either, exposing my niche. That must be the new title I thought sitting with coffee cats sunlight this morning, repeating carrying on from dissertation title, instituting a philosophy of computing colon bioprogramming and the governmentality of software or PHI, not just both but multiple versions permutations describing hard humanities problems so addressable forming a computational and human response to philosophical questioning ready to exist in the dream world galaxy of meaning the philosophy of computing, living writing of ancients through nascent internet to the present, power down to sixty seven, then iterating beyond this year. Just realized the sound board replacement for bally simpler than stern and more likely to be required unless there is a cots replacement market throwing out the reverse engineering roi calculation guantlet, getting back into raspberry pmrek trident exemplifying bioprogramming and the governmentality of software instituting a philosophy of computing alongside default narratives.
7 18 1 (8700) [-6+]mCQK bork-journal 20170311 20170311 1 -11+ journal_2017.html
The governmentality of software is meant to be descriptive, as PHI philosopher foucault human social history, so begin examining software repositories in use. It is undeniable that there is working code, my philosophical foundation where we ascribe something else to descartes but with the same identifying intent. Here same question diverges to work and general audiences, two versions of the presentation sharing content, not having imagined systems available. What would you say to subsuming philosophy in ttl. What have I done, I have just avoided a very complex computer. Went from nondisclosure bending philosophy to ridiculousness back to reiterate position of ancient programs of plato, kind of following foucault as programming style way of doing philosophy PHI. The two presentations diverge, each examining software repositories in use. Ideally, you would all know this compiled product and how it works as running systems of working code PHI, descriptively what it is like running and the revision history of their source code releases and dynamic workspaces, so you should know how it is laid out how it works and how its built. Focusing on raspberry pmrek shares with work foss components with perhaps a few unfree areas. Talk about epistemological transparency along with basic question of whether user space limits precision and reliability to detect solenoids and higher speed displays to track game score as part of determining what sounds to make. Imagined a layout with old headless shelf with projector providing scores as well as backglass and secondary visual PHI.
7 18 1 (8800) [-6+]mCQK bork-journal 20170312 20170312 5 -5+ journal_2017.html
We need to talk about actually running systems and their constituent source code repositories. That is the difficult, hard digital humanities problem I want to discuss, the class of getting programmers into philosophy as much as turning scholars into technologists. I feel we are sorted obliged to do this anyway, increase number of philosophers of computing by getting from scholars and technologists, noting necessity of considering the latter as originary philosophical programmers who built the milieu we call internet cyberspace everyware, kitchin and dodge code slash space. Beginning with about actually running systems and their constituent source code repositories do as foucault introduces governmentality in the human social milieu. Brushes with silliness these serious but not completely articulated plans, not even laid out schematically by lowest fewest least main points.
7 18 1 (8900) [-6+]mCQK bork-journal 20170309 20170309 0 -13+ journal_2017.html
Alienated labor occurs in both human and machinic realms, the latter initially to the extent they are subject to the designs plans instructions orders commands of the former. Equivocate myself to character in latin text PHI memorized and also lecturer to cylons in caprica. What if we discover that postmodern affinity with source code software computing in general likewise finds in countless other instances machinic examples better suited than humans, then there is a rushing forward of new places ways approaches practices to do philosophy in c along with latin, english, and so on, also broaching idea of machine thought. Thus arguments alluding to the ambivalence of technology subsumes all examples emanating from it, including forms of determinism, as demonstrated by dyer hyphen witheford, is just another example of general form of programming subsuming philosophy PHI. Consider ttl as primitive form of networking but unlike living writing imagined by ancients really existing now in cyberspace lan as pmrek machine PHI, still with constraints making some projects feasible and others impossible, the evaluation of each harboring reverse engineering projects that must themselves be specified and evaluated. What was questioning ridiculously in antiquity now paradigmatic of how philosophy uses computing now. Getting back to alienated labor do machines suffer burdened with our desires and do they eek out cyberspace domains unknowable to us quoting kittler. Like foucault chart new ways to think instead of some system or thesis conclusion. An aspect of why state of the art devices unsuited for learning electronics despite being ideal for programming is that a forty watt soldering iron suitable for ttl discrete components but not for any contemporary notebook or mobile digital electronic computer is the default crude learning tool of most introductory electronics courses. It takes a long time before you know what you are doing, and if you do not you can appear very incompetent in retrospect, perhaps this is what chomsky meant about lacan. Suggest as hard problem in digital humanities addressed by raspberry pmrek. Understand we are on the verge of ubiquitous augmented reality merging with wholly synthetic virtual reality, for which I have already contrived a fun term that could become associated with this absurd philosophy of computing I have been promulgating for decades. Hastac media arts show perfect venue for this remediated game platform installation.
7 18 1 (9000) [-6+]mCQK bork-journal 20170314 20170314 3 -13+ journal_2017.html
We cannot forget materiality even of virtual realities. Here is what you often forget time it takes to solve with your new system requires production operation in at least one line, going into details where this is shorthand for source code repositories branches forks and so on describing phenomena only PHI software. What do you remember about the humans what do you encase in this era with what from this era do you encase store you memories of these times PHI becomes center of thought, electronics and programming poles about which to institute a philosophy of computing. I want my readers to feel nothing has blown their minds like that in a long time equating pleasure and knowledge as foucault PHI aristotle and nietzsche. That is why hastac must be an exhibition rather than lightning talk, raspberry pmrek electronics and programming instituting a philosophy of computing. Copyright act edge expiration expressed in broken down time PHI becomes PHI about it PHI. This is why not iacap but hastac lets use this power and take some territory by instituting a philosophy of computing in the digital humanities, perform some not so much resistance as forging ahead with default philosophies concretized in everyday computing systems by the philosophical programmers who made them, our reluctance to do so marks what lack of knowledge will remember heidegger. Even fifteen years ago I was thinking about how to introduce computing in general and electronic technology. Consonant with this a few years later is my carefully crafted definition of reverse engineering. More recently degrees of embodiment and enaction imagining computing considering print media in relation to itself and other forms of knowledge cognition thinking, influenced by bogost alien phenomenology to some degree also peripherally parallel where bogost predominates discourse networks as popular figure. I am seeking to legitimate programming as a style of humanities scholarship and way of doing philosophy. This journal, in addition to pmrek, poller, and now symposia, attest to the practice over many years slowly developing a software portfolio with which I think. That it is a deliberate practice means to extend the sense of things for thinking-with unique to human-computer symbiosis, exceeding Turkles evocative objects and "transitional objects, which I believe to be quasi objects." (find the other familiar term promoted by other theorists)
7 18 1 (9100) [-6+]mCQK bork-journal 20170317 20170317 3 -2+ journal_2017.html
What if everyone had raspberry some pmrek the way computers have always been used by philosophers now with foss a special dispensation arises, granting virtual utopias that may seep out into realities through cognitive and traditional control operations PHI, and do so leveraging the machinic more so than creative commons and other licenses typical of human directed media. Another call for papers to be published looks for those displaced in digital humanities their voices muffled such as philosophical programmers whose working code must be closed not revealed hidden by licensing, human will not to investigate further, and code space governmentality.
7 18 1 (9200) [-4+]mCQK bork-journal 20170319 20170319 4 -13+ journal_2017.html
How could we talk about what we do at work in philosophically meaningful ways without compromising confidentiality agreements, thus talking about our working code experience becomes a hard question for digital humanities, if the insights of philosophical programmers and autochthonous philosophers of computing are to enter scholarly discourse.
7 18 1 (9300) [-6+]mCQK bork-journal 20170320 20170320 5 -12+ journal_2017.html
The next best than professional software development organizations, or arguably better if only they had higher consistent participation rates, foss projects like pmrek might consider how complex relationships between sound tracks and game play can often be distinguished in computer programming terms between whether PHI or not, in more crude terminology, read only or write, passive or active, not or having an effect, provided its insinuation into the existing circuitry does not interfere, and in an inflection as the enjoyment of the player is considered, these new operations made possible by raspberry pmrek. Another example would be screens made of character hyperlinks versus unit operations prepositions like on, with, as bitmaps, although its importance may evaporate preposition html5. On the other hand, beginning with the ability of the stern platform to have available momentary solenoid outputs formerly used by chimes, the separate sound board triggered by additional bit preposition data line freed up for individually resettable drop targets. What it did was make another opportunity for aftermarket circuit boards, and in parallel a new pmrek possibility to detect solenoid control by ultimate mpu including calls to the sound board, and from heterogeneous code bases make a new soundtrack, an aural environment for the game to substitute for the missing sound board, along with simulating original sounds, or just the former until all copyrights expire for the latter. Except the bally platform did the same thing with sound boards, too, so it is just a way to cover for whichever make you encounter, for not everyone has access to one, let alone one of each. Proposal for hastac media arts show raspberry pmrek. To become a philosopher of computing you must do programming and electronics, though not everyone has access to an early electronic pinball machine amenable to this project, and to do that pick a device and learn it very well, so let it be an example, the one I am following myself, being interested in machine embodiment and cognition, explored through lower road of hobbyist practice than top down from theory. Besides embodying its own philosophical statement, it provides the pleasure of playing pinball with an audio component of synthesized sound effects, background sound track, voices, and so on. This gets around the awkwardness or inappropriateness of atari vcs as PHI, not to discount its lesson about racing the beam and other philosophical insights. What I want to do is multiply the range of tutor texts from vcs, pmrek, and other famous computing platforms, to little explored territories of other consumer devices. Pick a device, learn it very well, to the point you can do new things with it like raspberry pmrek. Write the five hundred word hastac media arts show proposal raspberry pmrek in tapoc.
7 18 1 (9400) [-6+]mCQK bork-journal 20170331 20170331 6 -11+ journal_2017.html
Raspberry pmrek combines a fully playable, classic electronic pinball machine whose missing electronic sound board has been replaced by a Raspberry Pi, interfaced to the existing microprocessor control unit "via home made user circuits connected to its GPIO. The Pinball Machine Reverse Engineering Kit (pmrek) is a free, open source software project whose initial iterations completely replaced the MPU. However, it relied on the availability of ISA bus computers, which are now as obsolete as the games themselves, and limits the operating environment to motherboards with isa slots. While the popular Raspberry Pi seems like an obvious replacement, understanding the technical reasons why it is not represents a class of hard problems for digital humanists seeking to undertake studies that span software and hardware, revealing the irreducible materiality of the former through its interactions with the latter. The project embodies the platform studies level of analysis championed by Montfort and Bogost, examining the Bally/Stern platform used in hundreds of thousands of pinball machines from the late 1970s through the mid 1980s in its transition from a mechanical, xylophone-like chime unit to digitized sound effects, background music, and eventually synthesized speech. The initial goal of the project is to replace a defective or missing sound board by tapping into the solenoid control bus used to trigger it, and based on its detection of solenoid requests via the Pi s GPIO data interface, employing custom software developed for the Raspberry Pi to generate similar sound effects. A sort of test could be to see whether players notice the difference. Beyond simulation of the original equipment, new interpretations of the game s theme can be created by extending the repertoire of sound effects and voices by writing new software. The task is not simple, and invites interdisciplinary collaboration between electronics, software engineering, digital composition, and game play mechanics. Wow already wrote a lot today. You see electronics expands into humanities working code PHI." (MPU)
7 18 1 (9500) [-6+]mCQK bork-journal 20170401 20170401 3 -6+ journal_2017.html
The first version of pmrek did not include displays requiring additional io, really just output. An intermediate version using strikes and spares verified, now considering replacement sound board version with raspberry pi. Like serious gaming there is serious programming, deliberately written to explore philosophical topics and test hypotheses. Adding via user circuit to description links with yesterday to simulate continuation. The philosophical question is whether it can work, and what kinds of questions arise from being in its working code, hinting at something heidegger wrote about socrates. A lot of philosphers describe the same thing, whether they are deprecated, behind paywalls, confidentiality agreements, or free to roam discourse.
7 18 1 (9600) [-1+]mCQK bork-journal 20030426 20030426a 3 -30+ journal_2003.html
2in"> Id like to begin with a short, three point clarification of reverse engineering[, for as technologists we must be very careful how we use this term].
7 18 1 (9700) [-1+]mCQK bork-journal 20130426 20130426a 0 -144+ journal_2013.html
What was I going to say by typing listening to radio that could be programmatically generated real virtualities in virtual reality human audio and visual environments PHI hearing seeing now typing.
7 18 1 (9800) [-1+]mCQK bork-journal 20170713 20170713 0 -56+ journal_2017.html
Start with narration on other machine serving music while taking notes here on cybersage workstation PHI wanting to add chapter ten introduction server side programming.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=7 and (Heading=18) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 7.18 programmed responses
Chapter 8 Syllabus for
Advanced Server Side Programming
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=0) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
8.1 http client server architectures,
brief history of computing, protocol, ipv6, http overview, request
response cycle
-8.1.1+++ http client server architectures
8 1 1 (100) [-9]mCQK bork-journal 20161213 20161213 3 -1+ journal_2016.html
What is advanced server side programming let us begin each session answering that fundamental basic question.
8 1 1 (200) [-6+]mCQK bork-journal 20161106 20161106a 6 -9+ journal_2016.html
Need to focus attention on what are significant client requests over the internet generating server responses, for this also fits programmed responses as well as how it is with post postmodern network dividual cyborg being. Start with a broad survey of client requests, then narrow to those we can affect with our puerile working code. This could be a slide in the first lecture, to use a popular skeuomorph of the internet epoch that may have been envisaged by Engelbart and latent in early personal computing, but not until ubiquitous dynamic video projectors common in group educational environments. Note this foundational empirical question can be answered like the oft repeated Latour litany given by Borges in an imaginative story categorizing animals: chatty devices, smart phones, traditional web browsers, prioprietary apps, business systems, internet self governance discourse, and so on. Draw on a whiteboard taking suggestions from students, as well perhaps viewing tcpdump and imagining the inner or simply hidden in plain sight of overall network traffic life of devices. Temporarily for the duration of the semester emphasize client requests to webservers, favoring the programming languages HTTP, HTML, and PHP. This invites a philosophical digression on programming languages and networking protocols. What are webservices, I do not feel they are on the same ontic plane as these languages? Some will be discoverable through epistemological transparency of foss, others obscured by impenetrable encryption and DMCA restrictions.
8 1 1 (300) [-6+]mCQK bork-journal 20161116 20161116a 6 -3+ journal_2016.html
Cloud computing aws competence should accompany other skills and learning objectives of course, as well as virtualization, since aws implements entire operating systems as long as we hold onto that concept before letting everything go into distributed cyberspace. Using virtualization is a competence the old school off the grid individualist hacker, though a vertical stack is still implied, and for now its contours reflect major operating system options using GNU/Linux foss and windows, so both should be understood to various extents. The next lecture on web services will have corresponding exercises in the preferred third party internet hosted ide.
8 1 1 (400) [-6+]mCQK bork-journal 20161219 20161219 5 -21+ journal_2016.html
Cut to the chase and ask what types of http requests are there and what are the possible replies. Isnt the very distinction of safe and idempotent methods reflecting question can software be innocent. From default knowledge source w three dot org, rfc 2616 fielding et al, implementors should be aware that the software represents the user in their interactions over the Internet, and should be careful to allow the user to be aware of any actions they might take which may have unexpected significance to themselves or others. In particular, the convention has been established that the GET and HEAD methods SHOULD NOT have the significance of taking an action other than retrieval. Does this not invite philosophical question of whether freedom zero should shape action along with traditional human ethical concerns. Im guessing HEAD gets a header and GET gets the default response including its header, a more thorough and costly action, where the slightest action is the otherwise inaction of retrieval points to a data storage absolute and retrieval cost relative ontological ranking showing how computing consummates as pharmakeus humans bringing Derrida back into the conversation. Idempotent methods act once all subsequent times having no effect. As they say, the side-effects of N > 0 identical requests is the same as for a single request. The methods GET, HEAD, PUT and DELETE share this property. So I was wrong, they keep having always the effect of generic happening. Not the same distinction as safe and idempotent, however, but we do get two more basic http/1.1 methods. For reading about responses, whatever information is identified by the Request-URI. If the Request-URI refers to a data-producing process, it is the produced data which shall be returned as the entity in response and not the source text of the process, unless that text happens to be the output of the process. Now responses noting my new reading habit has been to not underline or make many notes besides one recently in Bataille locatable in bibliography while in recent readings time period then very long to read in remaining, and with more difficulty literature review ordering where I have cited it. Wikipedia provides quick numerical bullet list beginning with 1xx informational, success, redirection, client error, server error, unofficial codes, see also, notes, the knowing one knowing the numbering ends at 5xx. From rfc 2616 again, there is a diagram of the server response beginning with Status-Line, headers, CRLF message-body, the second and fourth being optional. Notice there are a small number of the first three, the fifth, compared to many of the fourth errors. Does this tell us something about the careful humans who created the protocols and rfcs, and anything at all attributable to will or concern of the machines, technology? That seems an important philosophical question for the year the machines took control of global societal governance. But that is not the key governmentality thought I had this evening, it was bigger, more significant, worthy of iacap conference paper if I were not tied up planning the class.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=1 or Heading=0) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 8.1 http client server architectures,
brief history of computing, protocol, ipv6, http overview, request
response cycle+
8.2 web services, soap, restful
--8.2.1+++ web services
8 2 1 (100) [-6+]mCQK bork-journal 20161208 20161208a 11 -2+ journal_2016.html
What are web services begins the continuation review of protocol, turning to RFC for SOAP as quintessence early example, succeeded by restful, exemplified by the Atlassian Confluence API, or to those built into the institutional computing center, for then as now a place for computing to occur must accompany the human pleasure experience participation in of it computing. Web services communicate by exchanging objects whose underlying encoding scheme programming style is xml and json, I have to learn the latter.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=2) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 8.2 web services, soap, restful+
8.3 php design patterns,
mvc
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=3) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 8.3 php design patterns,
mvc+
8.4 testing patterns, test driven programming
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=4) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 8.4 testing patterns, test driven programming+
8.5 coding dojo
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=5) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 8.5 coding dojo+
8.6 application development
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=6) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 8.6 application development+
8.7 automating tests
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=7) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 8.7 automating tests+
8.8 user input via web forms
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=8) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 8.8 user input via web forms+
8.9 content management systems
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=8 and (Heading=9) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 8.9 content management systems
Chapter 9 Governmentality of
software
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=9 and (Heading=0) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
9.1 governmentality, foucault, archeology, genealogy,
biopolitics, power relations, protocol
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=9 and (Heading=1 or Heading=0) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 9.1 governmentality, foucault, archeology, genealogy,
biopolitics, power relations, protocol+
9.2 software, berry,
phenomenology, what is software, coding communities, analysis of our
source code
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=9 and (Heading=2) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 9.2 software, berry,
phenomenology, what is software, coding communities, analysis of our
source code+
9.3 governmentality of software, berardi, semiocapitalism,
class struggle, depression panic catastrophe, bioprogramming,
thinking differently
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=9 and (Heading=3) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 9.3 governmentality of software, berardi, semiocapitalism,
class struggle, depression panic catastrophe, bioprogramming,
thinking differently
Chapter 10 Syllabus for
Server Side Programming
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=10 and (Heading=0) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
10.1 programming styles, client, server, php
-10.1.1++ programming styles
10 1 1 (100) [-6+]mCQK bork-journal 20170719 20170719 0 -1+ journal_2017.html
Change philosophies to programming styles, from which multiple axes of distinctions radiate, such as compiled interpreted, client server, free and unfree, and so on.
10 1 1 (200) [-6+]mCQK bork-journal 20170714 20170714 1 -3+ journal_2017.html
Consequence of schmoo approach to electronics mishmash squishy formless circuits and actual programs putatively running them. Server processes expressed as programs replaces or follows philosophies; talk of webserver, database, and other protocols replaces other types of philosophical musing. It will occur regardless of whether and how we involve ourselves; better as active agents than ignorant consumers.
10 1 1 (300) [-6+]mCQK bork-journal 20170715 20170715a 2 -7+ journal_2017.html
Dare to imbed or intermingle philosophical lectures in notes for generic teaching how to program. Replace philosophies with styles or combine into synthetic in sense of neologism new term styles philosophies. Personal and collective programming styles dictate what kind of code will be written, thus almost recursively affecting its governmentality in addition to corporate directives, for example software requirements and other sic iso controlled documents. Styles philosophies are the foucault like accounts accompanying sic articulates of programming styles, the philosophical ideas informing them as well as being generated by their use. Server side programming is more likely to allow bracketing ally considerations of human user interface, making it easier than client side work. What does old school mean as programming style, for example, may include my preference for c and gnu linux, foss. On the other hand, server programs must consider, or be designed to account for, the distributed coordinated direction of high speed operations in electronic circuits, creating new categories of practical problems routinely addressed by server side programming.
10 1 1 (400) [-6+]mCQK bork-journal 20170717 20170717 2 -6+ journal_2017.html
Assuming chomsky too would prefer discussions of process control system optimization, for example avoiding slow database queries, to chummy foucault style investigations into the history and philosophy of computing as a new intellectual discipline PHI. Programming milieux are control systems accompanying home PHI videotapes from decades back eventually reaching point where all copyrights expire, from which autochthonous philosophy of computing PHI. Why not start experimenting with solar power alongside raspberry pmrek all using same apparatus, an electronic computing substrate requiring adherence to physical laws, operational specifications, and so on. The machinic thinks in place of our degenerated sense of how it all works, taking example of idiocracy as already consummated in terms of classic knowledge of electronics. Orality, literacy, programming the progression suggested nearly a decade ago at beginning of doctoral work. The journal software is the basic control system where language and electronics come together, philosophizing with electricity, another example of which shall be raspberry pmrek.
10 1 1 (500) [-6+]mCQK bork-journal 20160718 20160718b 3 -3+ journal_2016.html
At some fundamental level is decision machine evaluating as in listening, reading, and so on PHI decoding interpreting reciting activities PHI. Client and server side as positions of computing. Winning every way but boring factual rhetoric losing the war with mindless dumb media intoxication virtual reality addiction like oxygen, air, water, and so on essential to human life now shared with machinery, machinic, platial, effervescent, riding on streams version four and needing to start studying six, and so on.
10 1 1 (600) [-6+]mCQK bork-journal 20170716 20170716 2 -4+ journal_2017.html
It is significant to digital humanities because it foregrounds working code potentially exercising many layers from platform studies up, as in final figure on dissertation. Introducing years back new syntax for using MySQL query language to get work done for the dissertation project finding the desired image replacing yesterday only finding png files, this reading PHI point pondered days back about mysql query in dissertation more than describing organization principles for its partial machine creation in ways beyond generic word processing and client browsing. It seems baked into Stallmans freedom zero that code must be free to be executed for any reason in any context. Connect that to erudite introduction to deleuze foucault foregrounding typewriter keyboard, repeating an ancient PHI philosophy of computing.
10 1 1 (700) [-6+]mCQK bork-journal 20170626 20170626 0 -4+ journal_2017.html
Here is the mistake in the proposal, a slip in typing as I used to call them, following a good build up argument, meaningful tinkering with extant devices implies familiarity with electronics, as well access to circuit schematics and technical data for reverse engineering. The missing as right there where the focus is supposed to be on correct understanding of electronic circuits. These hard problems, I did not say well, about replacing isa with raspberry pi, seems like an obvious substitute, understanding the technical reasons why it is not exposes a class of hard problems for digital humanists seeking to undertake studies that span software and hardware, revealing the irreducible materiality of the former through its interactions with the latter. But this is part of what the installation must convey communicate display show loop through repeating, and so on for the duration of the conference.
10 1 1 (800) [-6+]mCQK bork-journal 20170711 20170711 3 -4+ journal_2017.html
Client server do you understand what I mean saying they all hold together in sense of diachrony in synchrony, perhaps better diachronies in synchrony to describe network layer model applied to everything transcending four dimensional PHI. The computing dimension exists alongside as a really working example, as in object code, for example elf, to fiction, narrative, character sequences, static writing, and it consumes all of it in its scope. This way of thinking about the philosophy of computing bypasses philosophical questions crossing cognitive science, for example how the brain works, appealing to the ready at handedness of the built environment code space into cyberspace putatively pure code regions spaces places occurrences where thinking happens. The computing dimension transcends familiar four dimensions, founded as it is upon sciences putting, as in casting, electronics in, into its range of possibilities.
10 1 1 (900) [-6+]mCQK bork-journal 20170705 20170705 5 -6+ journal_2017.html
Kittler in lecture viewed two years ago declares switch from text editor to keyboard command level, the kill command does something, whereas typing kill does nothing on a typewriter keyboard. Programming languages different from mother tongues and foreign languages we speak. Notes assembler ground, standardization by organizations, preferring c, giving single versus double colon example of risk. Can have disastrous effects like the program does not stop. Higher responsibility when writing programs. Suggests critical approach working on program of wave tracer and radio city program and try to explain the programming aspects for these two opposite possibilities render the wonder done by the sun, though these notes from two videos are distorted and incomplete.
10 1 1 (1000) [-6+]mCQK bork-journal 20170707 20170707 0 -2+ journal_2017.html
Difference between type of fiction eco and truly autochthonous albeit programmed vision exemplified in my journal activities. Start with this fact and ponder theory around it, rather than seeking evidence of theories empirically.
10 1 1 (1100) [-6+]mCQK bork-journal 20170718 20170718 1 -5+ journal_2017.html
Archeology and genealogy intertwine off each other but to be told from perspective of real virtualities requires input of machinic thinkers, too. Concern that humans degenerating as custodians of cyberspace, machinic internet. As I quoted nietzsche decades ago, one day the rabble might become master and drown all time in shallow waters, going back no further than their grandparents. The lucid description of a kernel workqueue may never arise alongside philosophical musings invoking foucault and nietzsche. Can the use of ancient computers not lead to foolish trust that they will continue to operate years from now, I wonder, balancing their immunity to vicissitudes of sixty four bit internetworked machines. --10.1.2++ client
10 1 2 (100) [-6+]mCQK bork-journal 20170710 20170710 0 -10+ journal_2017.html
This is the foundation not next syllabus for server side programming that fits well with process control system programming. list of competencies students should have arriving in your Intro to Server Side class from Intro to Web Programming from khanh mai. Basic knowledge of Git commands and uploading projects to GitHub: commit, push, pull, clone, creating a repo. Knowledge of basic programming concepts include: Variables, Arrays, Array manipulation, Strings, Objects, Functions, Data types, Loops, Concatenation, Math addition, subtraction, modulus, etc. Basic problem solving using programming Dojos. Really simple use of PHP to work with a database, specifically: a small amount working with MySQL using PHPMyAdmin; how to write to a MySQL database; how to read from a MySQL database; creating an HTML form to send simple data to a database; storing numbers and strings. How to use MAMP to start and stop a LAMP stack instance on their local machines. Generalized terminology, including: Agile vs Waterfall, LAMP Stack, Front-end vs. Back-end. Server side is back end.
10 1 2 (200) [-6+]mCQK bork-journal 20170715 20170715b 9 -1+ journal_2017.html
Impressive list of accomplishments for client web programming course should be reiterated rather than assumed that students know and can use all of this PHI.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=10 and (Heading=1 or Heading=0) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC 10.1 programming styles, client, server, php+
10.2 server processes, webserver, database
--10.2.1++ server processes
10 2 1 (100) [-6+]mCQK bork-journal 20170715 20170715d 6 -3+ journal_2017.html
Server side programming is more likely to allow bracketing ally considerations of human user interface, making it easier than client side work. What does old school mean as programming style, for example, may include my preference for c and gnu linux, foss. On the other hand, server programs must consider, or be designed to account for, the distributed coordinated direction of high speed operations in electronic circuits, creating new categories of practical problems routinely addressed by server side programming.
10 2 1 (200) [-6+]mCQK bork-journal 20170713 20170713a 1 -1+ journal_2017.html
If you write bad server side code you can slow the whole system having business impact on server, though also similar consequences for client browers.
10 2 1 (500) [-6+]mCQK bork-journal 20170715 20170715 1 -2+ journal_2017.html
What kinds of things server side programs do sic determines what kinds of instructional examples may be given. Dare to imbed or intermingle philosophical lectures in notes for generic teaching how to program.
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/',Notes.TextName,'_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/screenshot_',Notes.TimestampBookmarkExtra,'.png') and Relevance=1),'Y','N'), if((select count(*) from Items where Path like concat('%/vpf_',Notes.TimestampBookmarkExtra,'.jpg') and Relevance=1),'Y','N') from Notes where Chapter=10 and (Heading=2) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
TOC Works To Cite