CRITICAL PROGRAMMING: Toward A Philosophy Of Computing

Chapter 1 Introduction{11}

1.1 from automated genocide to the dumbest generation{11}

1.2 a collective intelligence problem, societies of control, the quintessential postmodern object, foss hopes, default philosophies of computing{11}

1.3 not to use old tools for new problems, scholarship requires a cybersage, digital humanities projects, critical programming studies, plan of the dissertation{11}

schedule

Chapter 2 Situation post-postmodern network dividual cyborg{11}

2.1 modernism and postmodernism, regressive subjectivity, Heideggers America, inventing the posthuman{11}

2.2 cybernetics, embodiment, techno-capitalist networks, dividual cyborg, cybersage{11}

Chapter 3 Theoretical framework and methodology{11}

3.1 critical theory, textuality studies, media studies, philosophy of technology{11}

3.2 social construction of technology, ensoniment, histories of computing networking and software, psycho-social studies of computer programmers{11}

3.3 software studies, game studies, code space, critical code studies{11}

3.4 platform studies, diachrony in synchrony, technogenesis and synaptogenesis, cyborg revisited{11}

Chapter 4 Philosophical programmers{11}

4.1 system engineers pioneers of babelization, distribued network visionaries, the new ontologists{11}

4.2 application developers beyond hard mastery and bricolage, auto-ethnographers of coding places{11}

Chapter 5 Critical programming studies{11}

5.1 working code places{11}

5.2 programming philosophers{11}

5.3 symposia, ensoniment{11}

5.4 tapoc, flossification{11}

5.5 pmrek, machine embodiment{11}

Chapter 6 Conclusion{11}

6.1 recommendations{11}

6.2 future directions{11}

Works Cited


1.1 from automated genocide to the dumbest generation

TOC 1.1 from automated genocide to the dumbest generation+

1.2 a collective intelligence problem, societies of control, the quintessential postmodern object, foss hopes, default philosophies of computing

TOC 1.2 a collective intelligence problem, societies of control, the quintessential postmodern object, foss hopes, default philosophies of computing+

1.3 not to use old tools for new problems, scholarship requires a cybersage, digital humanities projects, critical programming studies, plan of the dissertation

schedule

2.1 modernism and postmodernism, regressive subjectivity, Heideggers America, inventing the posthuman

TOC 2.1 modernism and postmodernism, regressive subjectivity, Heideggers America, inventing the posthuman+

2.2 cybernetics, embodiment, techno-capitalist networks, dividual cyborg, cybersage

3.1 critical theory, textuality studies, media studies, philosophy of technology

TOC 3.1 critical theory, textuality studies, media studies, philosophy of technology+

3.2 social construction of technology, ensoniment, histories of computing networking and software, psycho-social studies of computer programmers

TOC 3.2 social construction of technology, ensoniment, histories of computing networking and software, psycho-social studies of computer programmers+

3.3 software studies, game studies, code space, critical code studies

TOC 3.3 software studies, game studies, code space, critical code studies+

3.4 platform studies, diachrony in synchrony, technogenesis and synaptogenesis, cyborg revisited

4.1 system engineers pioneers of babelization, distribued network visionaries, the new ontologists

TOC 4.1 system engineers pioneers of babelization, distribued network visionaries, the new ontologists+

4.2 application developers beyond hard mastery and bricolage, auto-ethnographers of coding places

5.1 working code places

TOC 5.1 working code places+

5.2 programming philosophers

TOC 5.2 programming philosophers+

5.3 symposia, ensoniment

TOC 5.3 symposia, ensoniment+

5.4 tapoc, flossification

TOC 5.4 tapoc, flossification+

5.5 pmrek, machine embodiment

6.1 recommendations

-6.1.1++ {11}

6 1 1 (+) [-6+]mCQK bogost-persuasive_games (249) 20130911g 0 -2+ progress/2012/12/notes_for_bogost-persuasive_games.html
Do with electronics and programming early computers what Sayers did with Latin despite Bogost calling for a break from procedural literacy as programming. (249) Computers constrain expression even more, through both hardware and design of programming language. One could easily replace the world Latin in Wise and Bauerƒs claim with the name of a computer programming language like Java or Smalltalk or C, effectively parodying the value of any subject for abstract goals alone.

6 1 1 (+) [-6+]mCQK bork-journal 20010727 20010727 0 -9+ journal_2001.html
We have to understand something fundamental about computing. It is like a drug. We use it without understanding how it works, with little awareness of future complications or health risks. (In the future Microsoft and IBM may be likened to the tobacco companies of our day, and similarly pursued for recompense for past crimes against humanity.) I believe that the decisions presently being made in the philosophy of computing determine whether we ultimately learn to manage this addiction. Furthermore, if the default metaphysics of computing technology continue to reign uninvestigated and therefore unchecked, then the opportunities to make meaningful advances against its sway (precession?) will diminish to the point of being practically impossible. This conclusion follows from the instructional dilemma already discussed. In short we are lazy and it is doubly difficult to get motivated to study ancient computing because we assume that the state of the art is always to be preferred over prior technologies.

6 1 1 (+) [-6+]mCQK bork-journal 20021117 20021117 0 -2+ journal_2002.html
My cell phone bill? Gosh, itƒs close to []/[] <punctuation><part-of-speech> []=$&[]=t.

6 1 1 (+) [-6+]mCQK bork-journal 20050811 TAPOC_20050811 0 -2+ journal_2005.html
Born of necessity and the path of least resistance, fed by greed and wrapped in paranoia, the closed source model should be blamed for diminished interest in technical studies. It should be cited in discussions about why interest in computer science continues to decrease in America.

6 1 1 (+) [-6+]mCQK bork-journal 20080626 TAPOC_20080626 3 -5+ journal_2008.html

At the heart of texts and technology is critical theory. Critical theory expresses itself in texts that are themselves technological applications. Philosophy grounds critical theory and so it is about philosophy that I will speak, also expressed through texts that are themselves technological applications. Where philosophy has previously been bound by the book form, following the single thread of the visual reading printed material (grammata and zoographia), I philosophize with electricity. Without taking this stance we are mere consumers of cyberspace and electronic computer technology, which means our intellectual pursuits are overdetermined by the ready-at-hand, default technological systems.

6 1 1 (+) [-6+]mCQK bork-journal 20081120 20081120 0 -1+ journal_2008.html
New approach: the use and advantages of FOSS [for history] [for literature] [for life].

6 1 1 (+) [-6+]mCQK bork-journal 20110819 TAPOC_20110819 0 -6+ journal_2011.html
Texts and technology as a branch of humanities computing abides uncomfortably with programming languages as actual objects of practice and study, with the exception of a few lone instances like the Text Encoding Initiative. This is a basic observation on which I base much of my work. Humanities computing abides uncomfortably in actual programming languages, no doubt, because of the attitude shared by Walter Ong and other [seminal (do I have to fear using this word?)] theorists that artificial, technical languages are unnatural, [non-human (inhuman, not even subhuman)], incapable of harboring a creative unconscious, and therefore dull, if not dangerous places for humans (as artists and humanities scholars) to go. Some, like Lev Manovich, are leaders in the field of digital media studies, yet provide arguments for why manufacturing control systems should be shunned, favoring study of ƒcultural softwareƒ like web browsers, and more importantly, study not really of software source code itself but instead the phenomenology of software use (the user, consumer position, the effects of worldwide use of particular computing systems). This position is like a reader who has been encouraged not to write.

6 1 1 (+) [-6+]mCQK bork-journal 20120708 TAPOC_20120708 0 -1+ journal_2012.html
Phenomenology is always useful but a maker perspective is necessary to complete the production of virtual realities substantiating philosophy.

6 1 1 (+) [-6+]mCQK bork-journal 20130209 20130209 0 -2+ journal_2013.html
Significant to understanding my proposal is considering why we need critical programming along with code and software studies is to keep focused on unfolding technical milieu rather than any specific aspect of it; for example, going off on male pronouns in source code comments. I argue that we must stay focused on working code, not these anthropomorphic details.

6 1 1 (+) [-6+]mCQK bork-journal 20130223 TAPOC_20130223 4 -2+ journal_2013.html
]
I propose joining the serious pursuit of philosophies of computing, in Mitchamƒs sense of engineering philosophy of technology, to humanities interests involving learning, cultural critique, and the nature of cognition and subjectivity, by engaging in critical programming studies. The provisional significance of this study is altering the trajectory of human technology relations by inspiring renewed interest in learning programming and working code as part of the basic toolkit of cognitive skills employed over a lifetime.

6 1 1 (+) [-6+]mCQK bork-journal 20130315 20130315 0 -3+ journal_2013.html
How does it work as a subduction zone in virtual realities equivalent to humans running on treadmills jumping onto other apparatus. You may enjoy writing Perl, PHP, Java, HTML, XML but these are garbage languages compared to C++ the most philosophical programming language (Ong). It got too easy and we did not have to program any more so now go the opposite way insisting twenty percent.

6 1 1 (+) [-6+]mCQK bork-journal 20130421 20130421 10 -2+ journal_2013.html
Important to keep in mind program source code includes English, Greek, German, French, Latin utterances made in C, C++, and so on, and C, C++, Java, Python, shell, and so on utterances in English, Greek, German, French, Latin. Comingling of languages in new bazaar babel down to the kernel of individual thoughts over life time.

6 1 1 (+) [-6+]mCQK bork-journal 20130509 TAPOC_20130509 0 -3+ journal_2013.html
The philosophy of computing and philosophy of programming are both uninstantiated as explicit critical disciplines in the way philosophy of information, philosophy of software, and semiotics of programming have been articulated as scholarly work. A reasonable explanation for this condition is that philosophers who are also avid computer programmers are very scarce, yielding default philosophies of computing. These are the philosophical positions that derive theoretically from early theorists like Turing, von Neumann, Licklider, and Engelbart, and empirically from the historical production of technologies steered by influential programmers and business leaders like Gates, Stallman, Torvalds, and Jobs, none of who are professional philosophers, or are philosophers whose lack of deep participation in the computer culture skews their visions to be overdetermined by reactionary, consumer, superficial, exemplified by Derrida and Zizek.

6 1 1 (+) [-6+]mCQK bork-journal 20130519 20130519 3 -4+ journal_2013.html
The living writing presented in Plato as ideal presence has disjointedly been instantiated over thousands of years, burdened for a long time with the bias that cognitive processes must mirror human experience, albeit quantitatively expanded and sped up stepwise. My hypothesis is that a traumatic kernel can be discerned by working this interface. Consider a stuck switch with a bad diode causing phantom switch detections on critical switches seldom activated during game play, for example tilt and slam switches on pinball machines since in other years today I have been tinkering with pinball machines and recognize that I still do not fully understand the phenomena I am interpreting. Here is a limit of philosophical thought directed by my intentional manipulation of machine operation, working code.

6 1 1 (+) [-6+]mCQK bork-journal 20130606 TAPOC_20130606 0 -4+ journal_2013.html
As deftly as Derrida interprets Diderot, Seneca, Cicero in Aporias, philosophical technologists may play Stern Lightning. Knowing both that three banks of drop targets completed in order lights an extra ball, and Cicero meditating about the limits of computing. At the same time, the game can be appreciated without understanding the engineering design or science behind it, as good literature can be enjoyed without the deep textual and philosophical understanding of a humanities scholar. Embracing also its own studies of Cicero in ways Derrida could never grasp the Bally AS 2518 MPU pinball platform, critical programming presents new ways to philosophize with electronics.

6 1 1 (+) [-6+]mCQK bork-journal 20130628 20130628 0 -2+ journal_2013.html
The strict uniformity of the prevalence of the real over virtual machine environment creation gives logical ordering to time instants representations PHI when on the same LAN or distributed over the global Internet as each symposia starts offset to each other, placing the real over the virtual in an otherwise arbitrary extent. Thus critical programming provides foundation for a metaphysical position privileging host over virtual machine when the start script is started since it does not get started on the virtual machine until after it has been invoked by the start script running on the real on which the virtual runs.

6 1 1 (+) [-6+]mCQK bork-journal 20130715 TAPOC_20130715 0 -2+ journal_2013.html
To embody technology generations with respect to patents works on different level logics than copyrights, and how each distorts or inflects trajectory of free software rhetoric becomes a thought in the philosophy of computing by programming philosophers cyborg cybersages humans and machines running their software PHI. The cybersage must be considered as a human machine combination not just humans.

6 1 1 (+) [-6+]mCQK bork-journal 20130717 TAPOC_20130717 1 -4+ journal_2013.html
You just have to write the code and then it exists bases ontologies of phenomena PHI. All I have to do now is write the software sets of free, open source (FLOSS) GPL PHI. The philosophical text is literally written in the code, for example through comments and compliable C++ source code. Write philosophy through a number of software projects that can be run together, for example pmrek, symposia, tapoc.

6 1 1 (+) [-6+]mCQK bork-journal 20130727 TAPOC_20130727 0 -4+ journal_2013.html
Real virtuality simulated by public radio FM stream emerging autochthonously like water suggests responses to doing more than fluff nests, of which publishing a doctoral dissertation is one such possibility available in our present age epoch post literacy period PHI, processing Ulmer electracy and other characterizations. Working code generates simulated audiovisual streams. What we get when we try to consider software is default defaulting expressed by Tanaka-Ishii and others as recursion iterating back to ancient Greek texts, with steps between defaulting to database query and switch statement in various C++ threads, ancient texts now also existing, being as ensoniment; so programming languages in combination with human languages structure reality as sites of real virtualities, for example symposia. I am going to territorialize symposia pmrek tapoc.

6 1 1 (+) [-6+]mCQK bork-journal 20130730 TAPOC_20130730 0 -1+ journal_2013.html
The inhuman abomination of machine cognition instantiated by writing now can be done with working code, whose study Weizenbaum finds no subject unethical but scrutinizes its applications; prior humanity put itself at risk by turning natural languages into code, now shielded from dehumanization by virtue of being peripheral to machine languages that are appropriate to high speed fetch and execute computation.

6 1 1 (+) [-6+]mCQK bork-journal 20130819 20130819 1 -2+ journal_2013.html
Itself trying to type itself out in a manner understandable to humans and therefore also machines for it is implementable PHI, a curious ontological status should philosophers and humanists not turn away from programming, creating working code as part of their work, which I call PHI and is a combination of floss including custom programs I maintain. Start with a radical kickstarter idea that only later seems reasonable as being on the boundary of purely logical (stereotyped as machine) and ridiculous (falling back to logic of speech text thoughts).

6 1 1 (+) [-6+]mCQK bork-journal 20130827 TAPOC_20130827 0 -2+ journal_2013.html
In the sense that good control systems must be procedural and object oriented, simpler programming languages like XML stumble for scholars and technologists as troubles with the OHCO hypothesis on account of its lack of symbols and keywords for robust conditional branching and looping operations able to represent multiplicites; a discussion of an overloadeding C++ operators makes more sense than the perplexities of XML ontologies, hardly adequate for describing the world, with a nod to Malabou interpreting Deleuze, although McGann does an excellent job covering that approach. It is similar to commenting upon the differences between 32 and 64 bit technologies, whose impact on digital humanities remains unconscious.

6 1 1 (+) [-6+]mCQK bork-journal 20131231 20131231 0 -2+ journal_2013.html
Knowing that Takhteyev notes differing attitudes by those starting using computers in 1980s to later groups kindles periodicity argument implied by Bogost, Brin and others who situate magical era of early personal computers as best time for developing strong technically competent relationship between humans and their machines. Important for distinction between addressing those of my generation versus digital natives.

6 1 1 (+) [-6+]mCQK bork-journal 20140415 20140415a 4 -2+ journal_2014.html
What makes me unique is that through a highly engineered language machine I present the first substantial philosophical work in programming computers in C++, which is a task not without risk but necessary, for what languages would we write? Toward a philosophy of programming computers could very well represent the overtaking of natural language physis by calculative thinking made instinct, as Nietzsche put it, also and opening its own can of worms humanists are only now discovering that they have to concern themselves, in the activity of machines.

6 1 1 (+) [-6+]mCQK bork-journal 20141006 20141006 1 -5+ journal_2014.html

[working code css]
jbork@alkibiades:~/public_html/progress/2007/10$ ln -s cyberspace_representation_20071006.png screenshot_20071006.png
jbork@alkibiades:~/public_html/progress/2005/10$ ln -s pmrek_diagnostic_display_20051006.png screenshot_20051006.png
[working code css]

A little working code to make an image show, finding a very telling early statement when I was still considering the texts and technology program and advertising myself to its collective intelligence.

6 1 1 (+) [-6+]mCQK castells-rise_of_network_society_second_edition (445) 20130914j 0 -1+ progress/2012/06/notes_for_castells-rise_of_network_society_second_edition.html
What is the machine equivalent of the spatial organization of managerial elites exemplifies how philosophy and traditional humanities research intersects and engages new media. (445) The third important layer of the space of flows refers to the spatial organization of the dominant, managerial elites (rather than classes) that exercise the directional functions around which such space is articulated.

6 1 1 (+) [-6+]mCQK castells-rise_of_network_society_second_edition (494) 20130914t 0 -9+ progress/2012/06/notes_for_castells-rise_of_network_society_second_edition.html
Need to consider impact of timeless time on phenomenology. (494) For the sake of my exploration, I find it helpful to call upon Leibniz, for whom time is the order of succession of things, so that without things there would be no time. . . . I propose the idea that
timeless time, as I label the dominant temporality of our society, occurs when the characteristics of a given context, namely, the informational paradigm, and the network society, induce systemic perturbation in the sequential order of phenomena performed in that context. . . . Elimination of sequencing creates undifferentiated time, which is tantamount to eternity.

6 1 1 (+) [-6+]mCQK chun-programmed_visions (48) 20130913k 0 -5+ progress/2013/07/notes_for_chun-programmed_visions.html
Obvious tie to Phaedrus: writing as fetish, Weizenbaum compulsion to program, ignoring vicissitudes of execution like treating reading as knowing. (48) The seeming ease of programming hides a greater difficulty executability leads to unforeseen circumstances, unforeseen or buggy repetitions. Programming offers a power that, Weizenbaum argues, corrupts as any power does.
What corrupts, Weizenbaum goes on to explain, however, is not simply ease, but also this combination of ease and difficulty. Weizenbaum argues that programming creates a new mental disorder: the compulsion to program, which he argues hackers, who hack code rather than work, suffer from (although he does not that not all hackers are compulsive programmers).
(48) According to Weizenbaum, because programming engages power rather than truth, it can induce a paranoid megalomania in the programmer.

6 1 1 (+) [-6+]mCQK chun-programmed_visions (177) 20130706 3 -12+ progress/2013/07/notes_for_chun-programmed_visions.html
Compare in media res conclusion and alternatives to neoconservativism to Berry being a good stream: beginning with things, data-driven programming, status of computer as medium. (177) software can only be understood
in media res in the middle of things. In media res is a style of narrative that starts in the middle, as the action unfolds. . . . Software in media res also means that we can only begin with things things that we grasp and touch without fully grasping, things that unfold in time, things that can only be rendered sources or objects (if they can) after the fact. Further, it means addressing the move within programing toward data-driven programming a form of programing that, because it starts with data and then seeks (through machine learning algorithms) to discover the pattern driving behavior, is programming in media res. Last, in media res means taking seriously the computerƒs peculiar status as medium. . . . Code (both biological and technological), in other words, is undead writing, a writing that even when it repeats itself is never simply a deadly or living repetition of the same.

6 1 1 (+) [-6+]mCQK clark_chalmers-extended_mind (11) 20130913c 0 -1+ progress/2010/04/notes_for_clark_chalmers-extended_mind.html
The old question raised by Socrates in Plato about internal versus external mnemonics, in context of transformation of computational problems admits to the self-reprogramming nature of evolutionarily selected mnemotechnics. (11) It certainly seems that evolution has favored onboard capacities so as to reduce memory load, and even to transform the nature of the computational problems themselves.

6 1 1 (+) [-6+]mCQK deleuze_guattari-thousand_plateaus (174-175) 20130504 0 -24+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Machinic propositions make much more sense describing software and technological integrations, for example consideration of late binding in OOP, or basic application of biunivocalization as data structure; point is that built environment, extended mind may become facialized, again this is much more obvious with electronic computing than print media. (174-175)
First theorem: One never deterritorializes alone; there are always at least two terms, hand-use object, mouth-breast, face-landscape. And each of the two terms reterritorializes on the other. . . . Second theorem: The fastest of two elements or movements of deterritorialization is not necessarily the most intense or most deterritorialized. Intensity of deterritorialization must not be confused with speed of movement of development. . . . Third theorem: It can even be concluded from this that the least deterritorialized reterritorializes on the most deterritorialized. . . . As a general rule, relative deterritorialization (transcoding) reterritorialize on a deterritorialization that is in certain respects absolute (overcoding). . . . Even a use-object may come to be facialized: you might say that a house, utensil, or object, an article of clothing, etc., is watching me, not because it resembles a face, but because it is taken up in the white wall/black hole process, because it connects to the abstract machine of facialization. . . . Fourth theorem: The abstract machine is therefore effectuated not only in the faces that produce it but also to varying degrees in body parts, clothes, and objects that it facializes following an order of reasons (rather than an organization of resemblances).

6 1 1 (+) [-6+]mCQK deleuze_guattari-what_is_philosophy (10-11) 20130609 0 -7+ progress/2013/06/notes_for_deleuze_guattari-what_is_philosophy.html
Attack on computer science as among shallow, late, universal capitalist endeavors of age of commercial professional training fits with critical tone of Deleuze Postscript and dismissiveness of Derrida and Zizek: Ulmerian concepts and my flossification, short lines, and Heideggerian meditations on electronic devices aim to escape this critique by animating creative multipurposive (choric) making. (10-11) In successive challenges, philosophy confronted increasingly insolent and calamitous rivals that Plato himself would never have imagined in his most comic moments. Finally, the most shameful moment came when computer science, marketing, design, and advertising, all the disciplines of communications, seized hold of the word
concept itself and said: This is our concern, we are the creative ones, we are the ideas men! We are the friends of the concept, we put it in our computers. . . . But the more philosophy comes up against shameless and inane rivals and encounters them at its very core, the more it feels driven to fulfill the task of creating concepts that are aerolites rather than commercial products.

6 1 1 (+) [-6+]mCQK deleuze_guattari-what_is_philosophy (40-41) 20130915e 0 -7+ progress/2013/06/notes_for_deleuze_guattari-what_is_philosophy.html
Prephilosophical internal conditions imply nonphilosophical opens for technology, and meets back in critical programming; per Hayles nonconceptual understanding extends beyond intuition into technological nonconscious, such as the boundary between languages and protocols managed by compilers, interpreters, parsers, operating systems. (40-41) If philosophy begins with the creation of concepts, then the plane of immanence must be regarded as prephilosophical. It is presupposed not in the way that one concept may refer to others but in the way that concepts themselves refer to a
nonconceptual understanding. . . . Prephilosophical does not mean something preexistent but rather something that does not exist outside philosophy, although philosophy presupposes it. These are its internal conditions.

6 1 1 (+) [-6+]mCQK derrida-dissemination (158) 20130916s 0 -3+ progress/2012/02/notes_for_derrida-dissemination.html
Could this play be like practicing programming, even writing games, but avoiding playing them: classic problems that are difficult to express and solve with writing are routinely solved in computer architecture, programming languages, and coding conventions, as the following three as well. (158) Play is always lost when it seeks salvation in games. We have examined elsewhere, in Rousseauƒs era, this disappearance of play into games. This (non)logic of play and of writing enables us to understand what has always been considered so baffling: why Plato, while subordinating or condemning writing and play, should have written so much, presenting his writings,
from out of Socratesƒ death, as games, indicting writing in writing, lodging against it that complaint (grahe) whose reverberations even today have not ceased to resound.

6 1 1 (+) [-6+]mCQK derrida-of_grammatology (245) 20090210 0 -16+ progress/2009/01/notes_for_derrida-of_grammatology.html
Derrida approaches topics dear to computer programmers and systems engineers questioning ridiculously supplementarity, desire, logical time of consciousness. (245) Using the word and describing the thing, Rousseau in a way displaces and deforms the sign supplement, the unity of the signifier and the signified, as it is articulated among nouns (. . .), verbs (. . .) and adjectives (. . .) and
makes the signified play on the register of plus or minus. But these displacements and deformations are regulated by the contradictory unity - itself supplementary - of a desire. As in the dream, as Freud analyzes it, incompatibles are simultaneously admitted as soon as it is a matter of satisfying a desire, in spite of the principle of identity, or of the excluded third party - the logical time of consciousness. . . . These are, of course, questions that can only be asked.

6 1 1 (+) [-6+]mCQK feller_et_al-perspectives_on_free_and_open_source_software (55) 20130918f 0 -1+ progress/2007/06/notes_for_feller_et_al-perspectives_on_free_and_open_source_software.html
Lerner and Tirole: open source process elitist based on interviews and survey responses as well as analysis of archive of Linux postings at UNC. (55) The overall picture that we drew from our interviews and from the responses we received in reaction to the first draft of the paper is that the open source process is quite elitist.

6 1 1 (+) [-6+]mCQK hayles-how_we_think (7-8) 20120707c 7 -1+ progress/2012/07/notes_for_hayles-how_we_think.html
State of the Arts of comparative media studies; imagine this is our task, to bring critique, including ideology, to software, released from assumption by distributing into foss (through fossification). (7-8) Diverse as these projects are, they share an assumption that techniques, knowledges, and theories developed within print traditions can synergistically combine with digital productions to produce and catalyze new kinds of knowledge.

6 1 1 (+) [-6+]mCQK heidegger-question_concerning_technology (34) 20121130 0 -2+ progress/1995/08/notes_for_heidegger-question_concerning_technology.html
Ekphanestaton appropriate to machine subjectivities running in virtual worlds in machines; we can still use Heidegger to get into machine embodiment and poetic dwelling, but its use in philosophy of computing is deprecated. (34) The poetical brings the true into the splendor of what Plato in the Phaedrus calls to ekphanestaton, that which shines forth most purely. The poetical thoroughly prevades every art, every revealing of coming to presence into the beautiful.

6 1 1 (+) [-6+]mCQK janz-philosophy_in_an_african_place (209) 20130702d 0 -5+ progress/2013/05/notes_for_janz-philosophy_in_an_african_place.html
Practical outcome of re-imagining world, recovering the important and addressing current problems suitable objectives for critical programming. (209) In the end, philosophyƒs practicality in Africa will only be evident in its accomplishments. . . . Perhaps the greatest outcome of philosophyƒs activities is to enable people to re-imagine their world, to recover what is important while addressing current problems.

6 1 1 (+) [-6+]mCQK jenkins-convergence_culture (245-246) 20130929q 0 -7+ progress/2012/05/notes_for_jenkins-convergence_culture.html
Achievable utopia through extending practices developed through play to actual political culture, and people also seem willing consider alternative positions when stakes are lower, such as discussing popular culture; relate to my learning programming achievable utopia. (245-246) In
Collective Intelligence (2000), Pierre L vy proposes what he calls an achievable utopia : he asks us to imagine what would happen when the sharing of knowledge and the exercise of grassroots power become normative.
(247) We vote naked not in the sense that we feel an intimate engagement with politics but in the sense that we feel raw, exposed, and vulnerable.
(248) [quoting
Salon technology columnist Andrew Leonard] What I find disturbing, however, is how easy the internet has made it not just to Google the fact that I need when I need it, but to get the mindset I want when I want it.
(249) The reason why L vy was optimistic that the emergence of a knowledge-based culture would enhance democracy and global understanding was that it would model new protocols for interacting across our differences. Of course, those protocols do not emerge spontaneously as an inevitable consequence of technological change. They will emerge through experimentation and conscious effort.
(249-250) Popular culture allows us to
entertain alternative framings in part because the stakes are lower, because our viewing commitments donƒt carry the same weight as our choices at the ballot box.

6 1 1 (+) [-6+]mCQK kittler-gramophone_film_typewriter (263) 20111018 0 -5+ progress/2011/09/notes_for_kittler-gramophone_film_typewriter.html
Philosophy and other arts are computed in information networks: serious thought has to enter the machine world, writing software as a way of philosophizing with electricity in the transhuman environment powering cyberspace (TCP/IP Internet). (263) Under the conditions of high technology, literature has nothing more to say. It ends in cryptograms that defy interpretation and only permit interception. Of
all long-distance connections on this planet today, from phone services to microwave radio, 0.1 percent flow through the transmission, storage, and decoding machines of the National Security Agency (NSA), the organization succeeding SIS and Bletchley Park. By its own account, the NSA has accelerated the advent of the computer age, and hence the end of history, like nothing else.

6 1 1 (+) [-6+]mCQK lyotard-the_inhuman (7) 20130829 0 -3+ progress/2013/08/notes_for_lyotard-the_inhuman.html
Debt to childhood as other type of inhuman besides cosmic order; calling for creative play by children of all ages, versus interpellation as adults of all ages, as Manovich interprets Kay? (7) This debt to childhood is one which we never pay off. But it is enough not to forget it in order to resist it and perhaps, not to be unjust. It is the task of writing, thinking, literature, arts, to venture to bear witness to it.

6 1 1 (+) [-6+]mCQK manovich-language_of_new_media (61) 20131005o 0 -8+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Criticism of updated form of interpellation inherent in interactive media can be mitigated by creating our own media forms by engaging in software projects and electronic literature creations (Hayles), but this is a good point nonetheless. (61) Interactive computer media perfectly fits this trend to externalize and objectify the mindƒs operation. The very principle of hyperlinking, which forms the basis of interactive media, objectifies the process of association, often taken to be central to human thinking. . . . In short, we are asked to follow pre-programmed, objectively existing associations. Put differently, in what can be read as an updated versions of French philosopher Louis Althusserƒs concept of
interpellation, we are asked to mistake the structure of somebodyƒs else mind for our own.
(61) Interactive media ask us to identify with someone elseƒs mental structure.

6 1 1 (+) [-6+]mCQK neel-plato_derrida_writing (48) 20131006y 0 -2+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Cryptic Pythagoran encoding circulated oral software; oppositions like opcodes do not have to be studied as remains of living processes but reality constitutative in their own right as programmed entities. (48) Pythagoras appears to have taught his followers by using cryptic
akousmata (which loosely translated means something heard ) and symbola. These were then formed by his pupils into sacred discourses and handed on orally and in careful secrecy.

6 1 1 (+) [-6+]mCQK neel-plato_derrida_writing (167) 20131008s 0 -2+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
I am proposing transcendence of reductionism into units determinism, embracing programming and liquefying all such postmodern arguments: texts skirt programming and it is thus not unlikely that programming creeps into humanities rhetoric. (167) As a result, writers must write using terms that remain
under erasure because the terms themselves carry so much excess baggage.
(169) In fact, they [students] do not see their own tests
as texts; they see them as presentations of meaning.

6 1 1 (+) [-6+]mCQK neel-plato_derrida_writing (187) 20131009g 0 -1+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Reverse apparent exclusion of writing by Plato in Phaedrus that nonetheless institutes writing as a necessary means of thinking by so thoroughly intermediating by weaving and splicing programming and thinking for the posthuman cyborg cybersage as to avoid future Derridas. (187) For
Phaedrus, Derrida would have us believe, is the single most important text ever written because it contains the exclusion of writing, the exclusion that inaugurates the West and tends its intellectual life.

6 1 1 (+) [-6+]mCQK neel-plato_derrida_writing (208-209) 20131009o 0 -7+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Valuation of cacophonous plurality of other voices, like symposia virtual realities and other visually oriented new media advances, for strong discourse, which is no doubt the goal of composition studies: must teach how to remain constantly aware of process of differance. (208-209) Strong discourse can exist, therefore, only in a
cacophonous plurality of other voices, many of which are also strong. Only weak discourse seeks to silence that cacophony.
(209) Of course the only truth available in strong discourse is that made my humans, and this made truth is critical truth, not closed truth. . . . Strong discourse, in short, encompasses Platoƒs dialectic by putting all received notions in question and then seeking constantly for a better truth; at the same time, it encompasses Derridaƒs deconstruction by remaining constantly aware of the process of differance through which apparent or probable truth becomes manifest.

6 1 1 (+) [-6+]mCQK ogorman-ecrit (94) 20131007q 0 -7+ progress/2008/09/notes_for_ogorman-ecrit.html
Train students in art of well-informed dilettantism, the cyperpunk/cybersage position: careful to position between ignorant users and too-entrenched (technostressed); go back to his position wanting Microsoft to offer him a solution, and, lacking that, to permit dilettantism at the state of the art. (94) The method reflects the current situation in which computer users approach their extremely complex and powerful machines as dilettantes. The sense of nausea that I feel when confronting 1/0 today has to do with the fact that I am confronting my own assumptions in 1996, my own lack of skill with Web design. . . . The point of underscoring this design issue is to demonstrate that, with the rapid and incessant changes in software and hardware manufacturing, the best way to approach digital media pedagogy may well be to train students in the art of ƒwell-informed dilettantism.ƒ This is why William Blake, a poet, painter, philosopher, printmaker, and visionary, serves as an excellent exemplar for students in the humanities today.

6 1 1 (+) [-6+]mCQK ogorman-ecrit (109) 20131007s 0 -2+ progress/2008/09/notes_for_ogorman-ecrit.html
E-Crit program has a 15 credits Programming Track that includes data communications and networks and requirements and design with no focus on any particular programming language. (109) In many ways, theoryƒs failure has much in common with a culture that identifies with online dating, genetic engineering, and self-replication through increasingly sophisticated recordable media. When I propose that critical theory needs digital media and vice versa, I am proposing a curriculum that supports the thoughtful application of theory to the production of digital media artifacts, the creation of humane technologies and tech-related policies, and the investigation of the impact of technology on human being; or, to borrow Eagletonƒs shamelessly simple-minded words, I am proposing that
educators can combine media and theory to ƒfind out how life can become more pleasant for more peopleƒ (2003: 5).

6 1 1 (+) [-6+]mCQK thomson-understanding_technology_ontotheologically (161) 20120801 0 -3+ progress/2012/08/notes_for_thomson-understanding_technology_ontotheologically.html
Dwelling as phenomenological comportment: compare to technological comportment implicit in Berry, Harman (allure), Bogost, Hayles, Heim whose future articulation, I suggest, in learning how computers work is standing in the draft of technological being with tolma (boldness) to create, critique, and use reflexively, self-reprogramming subjectivity, our writing machines working on us. (161) We need to learn to practice that phenomenological comportment he calls ƒdwellingƒ. When we learn to dwell, we become attuned to the phenomenological ƒpresencingƒ (
Anwesen) whereby ƒbeing as suchƒ manifests itself; we thereby come to understand and experience entities as being richer in meaning than we are capable of doing justice to conceptually, rather than taking them as intrinsically meaningless resources awaiting optimization. In this way we can learn to approach all things with care, patience, gratitude, awe and even, I would suggest, love.

6 1 1 (+) [-6+]mCQK ulmer-applied_grammatology (157) 20131109 3 -1+ progress/2009/02/notes_for_ulmer-applied_grammatology.html
Developing critical programming will require a similar declaration of pedagogy. (157) My purpose in this chapter is to open the question of the nature of the educational presentation (the manner of the transmission of ideas) adequate to a poststructuralist epistemology and to air some of the rhetorical and polemical notions relevant to a pedagogy of general writing.

6 1 1 (+) [-6+]mCQK ulmer-internet_invention (18) 20131109g 0 -5+ progress/2012/03/notes_for_ulmer-internet_invention.html
Seek wide image and themata from history of computing, networking, and programming. (18) The notions of the wide image and themata were developed by Gerald
Holton in his studies of scientific creativity, for which the prototype is Albert Einstein. . . . The pattern that emerged from such case studies confirmed the philosopher Friedrich Nietzscheƒs observation that it is possible to find in a career that secret point at which the aphorism of thought intersects with the anecdote of life.

6 1 1 (+) [-5+]mCQK bork-journal 20010821 20010821 0 -12+ journal_2001.html
XML properly understood may rank with C++ as one of the key languages through which a new philosophy of computing can be created. XML promises machine understanding that can be leveraged for human advantage by aiding thought. This claim is no different from the one made of writing in Platoƒs Phaedrus. A new philosophy of computing can actually be created, whereas in Platoƒs story it is shrugged off as impossible, even ridiculous to consider at all. I will try to cite two or three places in the text (Midas epitaph, "to give the actual words would be burdensome," gelion erou, and so on) where this sentiment is communicated. We are in fact dealing with an implicit admission of our own inadequacy to go much farther in the direction of articulating a comprehensive philosophy of computing. Echoes of the rejection of this more ambitious approach in favor of narrowly focused subsets of it abound (Ciceroƒs letter to Atticus, von Neumann). We are in the midst of a crisis that reaches the heart of the philosophy of computing.

Putting C++ aside for the moment and considering XML--or should we not be wasting time on XML but instead consider SGML instead?--, which is more like written things (ta grammata) than C++, can you see how it could be used for representational things like writing and speaking? Through the agency of logotropos (of which "source code" is an example, in addition to hyperlinks and the common experience of reading) recollection, and not merely reminder, is synthesized.

6 1 1 (+) [-5+]mCQK bork-journal 20050821 TAPOC_20050821 0 -2+ journal_2005.html
Computation abides in meaning computed from meaninglessness. Unable to think beyond Turing Machines for lack of technical knowledge, philosophers of computing have not really advanced past anthropomorphic metaphysics of computing despite capabilities in the state of the art unimaginable to Turing, such as object oriented programming languages.

6 1 1 (+) [-5+]mCQK bork-journal 20130201 20130201 45 -9+ journal_2013.html
Critical attention to structural and material details of virtual reality projectors (engines, generators, streamers, and so on) reveals seldom practiced quintessential tutor texts for learning how computers work from the ground up producing the background knowledge for humans to write profoundly self referential working code over their lifetimes. Rather than a life of passive technology exposure, invoking Kittlerƒs chilling casting as ushering souls milieu, leading with mechanism as human communication. For example the VirtualBox ova has been made by software whose source code we could examine, although there is so much source code constituting the build environment that to dip into more than a small number would consume a lifetime. Thus if we are going to take the trouble to learn some programming languages and write code throughout our lives, we ought to learn to wisely choose our custom projects and make then FLOSS or better. I accept the inevitability that I will spend my old age in virtual worlds, and consider how best to comport myself to the technologies and societies steering its evolution. This position follows from acceptance, with N. Katherine Hayles, that human life in developed societies is irrevocably enmeshed within and mediated by programmed machine operations. Where periodization theory delineates a major historical transition from print based disciplinary societies into highly engineered, autonomous societies governed by continuous control, within this still nascent epoch a number of significantly distinct generations have occurred as well. Whereas reflection on living in the milieu of early generations of computing machinery may have contributed to distopic future visions by countless humanists from Heidegger to Deleuze, the insight of contemporary thinkers like Alexander Galloway is that these societies of control evolve along with the actual designs, devices, and protocols embodying them, and we need to look at the current milieu of distributed control that is the Internet to assess the range of likely trajectories as well as the range of interventions that may radically alter those courses.

6 1 1 (+) [-5+]mCQK bork-journal 20130313 TAPOC_20130313 0 -4+ journal_2013.html
Programming is required in DH to leverage creative possibilities of working code (living writing, texts that write themselves, self directed step by step control, computing, machine computing, high speed machine computing). Turn digital humanities scholarship into twenty percent working code in languages like C, C++, BASH, Perl, PHP, HTML, XML, and so on, operator (some verb like combining, crossing, cast in, yielding a noun describing this concretization of machine and human languages) English, Latin, Greek, French, German, and so on (try expressing in sound syntax and semantics second order predicate logic, like for all x, there exists first language set and second language set x in the same galaxy of meaning, in order to ponder the sense of this third order logic operator joining the languages in my mind and written source code). The thing (combination of machine and human languages) about which human and machine computing occurs is this combination of machine and human languages constituting the objects of study, now expressed as references to revisions in floss revision control systems (archives, depositories, repositories, bazaars, markets, and so on). This 20% threshold designates critical programming studies intersecting software, critical code, and platform studies in projects like symposia, tapoc, and pmrek.

6 1 1 (+) [-5+]mCQK bork-journal 20130610 TAPOC_20130610 0 -3+ journal_2013.html
The post postmodern situation is network dividual cognitive embodied processes through a story told by Nietzsche, Heidegger, Derrida, Deleuze, Guattari. As borking public radio is a land of programming, concurrent languages in audio and visual registers dynamically generated by custom software rather than from humans reading, it becomes the point at which the Big Other responds. While we can be amused with Zizek joking at extremes of madness, cleverly replacing resonant references to the silence of the lambs with the ignorance of the chicken, critical programming performs digital humanities experiments on the human computer symbiosis by generating real virtualities at the interface.

6 1 1 (+) [-5+]mCQK bork-journal 20130626 TAPOC_20130626 0 -7+ journal_2013.html
Where Deleuze and Guattari employ drugs we must now include computing. This follows thinking about everything as also machine computing as well as possibly human thought, leveling real virtualities onto cosubstantial planes of immanence. PPS introduces electronics so as to share with Ulmer territorialization of computing possibilities iterating over favorite platforms. Recalling that at the heart of texts and technology is critical theory. Critical theory expresses itself in texts that are themselves technological applications; following Janz, that philosophy while grounding critical theory is also expressed through texts that are themselves technological applications opens programming as a place, space, territory and milieu to do philosophy. Where philosophy has previously been bound by the book form, following the single thread of the visual reading printed material (grammata and zoographia), philosophize with high speed distributed internetworked computing machinery. Without taking this stance we are mere consumers of cyberspace and electronic computer technology, which means our intellectual pursuits are overdetermined by the ready-at-hand, default technological systems in which we, as Kittler put it, souls shuttle through our lifetimes.

6 1 1 (+) [-5+]mCQK bork-journal 20130912 20130912 1 -3+ journal_2013.html
Anticipating where Malabou is going with plasticity versus flexibility and learning to say no to the social demands generated from the forms of culture reflexively generated through the particular computing technologies that have evolved along with them, I compare the intense anguish portrayed in the film Fail-Safe about detection, control, and the massive effects of the single bit gone haywire in the Cold War to the contemporary, everyday conditions of network dividuals working in IT fields. This thought arises in conjunction with a botched software upgrade at work that spanned cascading repercussions. That this insight emerges through the procedural literacies developed by a mind that has spent decades writing software and dealing with intricate, complex systems, close to the machine like Ullman, without which only a general sense of ominous, pervasive dread of the incomprehensibility of inner workings the built environment, demonstrates the importance of critical programming studies for the humanities.

6 1 1 (+) [-5+]mCQK bork-journal 20140313 20140313 0 -2+ journal_2014.html
Be sure to make link between claim by Romanyshyn that television making dream consciousness public and visible, to Rosenberg appropriation of Lanier with notion of dreaming in code describing a function of language machines. Weinberg recognized what was special about programming of his time before OOP floss ecsystems was purely visual, read on paper or a screen appearance of programming, whereas now we can talk about it in virtual realities and perform speech to text conversion to dynamically generate visual display PHI and vice versa via ensoniment recreate the audible phenomena either playing recording or formant synthesis where espeak and webserver floss duke it out compete together in a participatory network ecosystem, for example TCP/IPv4 LAN.

6 1 1 (+) [-5+]mCQK bork-journal 20140316 20140316 0 -50+ journal_2014.html
I am just a theorist because I see it in the slight defects of Lanier who fundamentally criticizes the network which has become the site of seemingly all significant in terms of high speed machine computable processes cognition ways to not rejuvenate but enwisen add on another layer of cognition forming intelligence. What we do not realize collectively though often in specific contexts is that our source code has a life of its own and goes on writing itself after we commit revisions, whether that source code is C++ contributions to our personal projects or other instrumentation to mere records of instantaneous contextually specific and most importantly still machine computable queries. I consider this distinction latent in the being a good stream ethic as developed by Berry. Writing code becomes part of doing philosophy. For one of the first times deliberately use journal software to restore forgotten memories of years past earlier in the life of the human trying to take away distinction of user as separate dataset supposedly equivalent to identity, individuality, oneness, being. It has been a while since I have quoted working code.

[working code css]
jbork@alkibiades:~/public_html/progress/2014/03$ progress
jbork@alkibiades:~/public_html/progress/2014/03$ ln -s ../../2004/03/whiteboard_20040316.jpg ./whiteboard_20140316.jpg
jbork@alkibiades:~/public_html/progress/2014/03$ ln -s whiteboard_20140316.jpg vpf_20140316.jpg
query successful: insert ignore into Items (Path,MimeType,ForceParse,Relevance) values (ƒprogress/2014/03/vpf_20140316.jpgƒ,ƒmime_typeƒ,ƒYƒ,1)
(ellipsis)
jbork@alkibiades:~/src/tapoc$ vi gentapoc.cgi
$sth = $dbh->prepare("insert ignore into Items (Path,MimeType,ForceParse,Relevance) values (ƒ$source_fileƒ,ƒmime_typeƒ,ƒYƒ,1) on duplicate key update MimeType=ƒimage/jpegƒ") or $error_msg .= "could create query to ".$operation." - ".$DBI::errstr;
jbork@alkibiades:~/src/tapoc$ sudo make web-localhost
(ellipsis)
$sth = $dbh->prepare("insert ignore into Items (Path,MimeType,ForceParse,Relevance) values (ƒ$source_fileƒ,ƒimage/jpegƒ,ƒYƒ,1) on duplicate key update MimeType=ƒimage/jpegƒ") or $error_msg .= "could create query to ".$operation." - ".$DBI::errstr;
DELETE FROM `JournalInfo`.`Items` WHERE `Path`=ƒprogress/2014/03/vpf_20140316.jpgƒ;
jbork@alkibiades:~/src/tapoc$ sudo make web-localhost
query successful: insert ignore into Items (Path,MimeType,ForceParse,Relevance) values (ƒprogress/2014/03/vpf_20140316.jpgƒ,ƒimage/jpegƒ,ƒYƒ,1) on duplicate key update MimeType=ƒimage/jpegƒ
(ellipsis)
jbork@alkibiades:~/public_html/progress/2014/03$ rm vpf_20140316.jpg
jbork@alkibiades:~/public_html/progress/2014/03$ rm whiteboard_20140316.jpg
jbork@alkibiades:~/public_html/progress/2014/03$ ln -s ../../2004/03/whiteboard_20040316.jpg vpf_20140316.jpg
(ellipsis)
#print("<img src=\"$img_src_offset$vpf_file.png\" alt=\"vpf create file or link [$img_src_offset$vpf_file.jpg]\" /><br>");
print("<img src=\"$img_src_offset$vpf_file.jpg\" alt=\"vpf create file or link [$img_src_offset$vpf_file.jpg]\" /><br>");
[working code css]

What happens in working code keeps the philosophical thought going. Strange life for it to exist linked to today while stated in the database to be significant today ten years ago. Discovered tapoc function that enrolls images does not set the MimeType field when it creates the row in the Item table for enrolling the image. The fix makes sense but the console no longer offers the hyperlink after the image is enrolled the first time to permit this means of updating its correctness as a well formed statement in the supervening software control system PHI. In terms of explaining working code blocks, each ellipsis indicates a break in narrative continuity where subcomputations in other galaxies of meaning affect output, hence intelligibility, keeping the human as part of the action like Lanier demands. Wanting to go on discussing how barely decipherable written segment much like software having primary action in dimension besides human cognition notes similar to Lanier criticism of AI when reading ancientƒs hypertext limitability, or on second reading limited by, a personƒs ability to compute where compute <operator> memory of speech <operator> as comparing what was imagined by the ancients in the peak of philosophizing about writing. Perhaps what is significant here is that I use BNF to form philosophical thoughts while continuing to imagine impossible states like living writing, the difference now being that the network holds the reality of cognition instead of mass of humans. Hacking away unknowingly at the wrong solution seems to be the troubled state of philosophy addressing the collective intelligence problem I have been articulating of humans getting dumber while machines continue improving, though no doubt getting dumber as well in the sense that plateau forms at approaching intersection of conceptions, for when the machines optimally model the humans as such, the system fixates. Then the root problem seems to be found in how the vpf was invoked, commenting problem of not seeing indirectly was here and lots of tedium built into the system could be reversed. Here I am leaving notes to my future selves is one judgment on what this activity is that I call working code.

6 1 1 (+) [-5+]mCQK bork-journal 20140322 20140322b 3 -3+ journal_2014.html
A group of us were in there as children using early eight bit personal computers writing programs and all other active programmers, so it makes sense to think of real virtualities in distant future virtual worlds generated after long slumber and preparation through numerous revisions never yet run in full sense of its purpose so as to define extent of scope amenable to freedom zero logic. At the same time I am suggesting a new mode of scholarship emanating from significant working code. Reading years past FOS option manifesto presenting mission statements ending with learn how computers work from the ground up.

6 1 1 (+) [-5+]mCQK bork-journal 20140408 20140408 0 -11+ journal_2014.html
I am writing software that grants processes power to create virtual realities PHI whose ambiance includes borking public radio PHI and the philosopher walking around talking PHI ensoniment via symposia PHI and other floss including espeak. To make it you have to know how it works is qualitatively and gross quantitatively different than pushing buttons and turning dials as technological use thought by Heidegger and other philosophers of technology is where to approach philosophy of computing and programming, or programming computing, things running as virtual realities including the human walking around talking. The scope of my work is ambitious because I am tackling a huge problem for humanity. The wager that I am making right now is that this crappy software is used in distant future running systems PHI I only imagine and describe now and there still has to be philosophers walking around. This one starts with future US copyright law expiration. Edits happening now in GPL repositories and where evolution of software source code team led, user communities are already at hand as affordance of floss rather than having to wait for all copyrights to expire to spring from ambient copyrighted media production, from simple ogg playback to symposia. Kittler thought suspiciously about programming computing, however he is both dead and speaks from sixteen to thirty two bit computing. Today we have the Matrix movie to speak about horrible outcomes for humans, though optimal for computers, or is this an implicit philosophical question about how we comport ourselves, to use an unfamiliar word outside philosophy of technology discourses and common to those spouting this kind of stuff. The methodological challenge is to speak from perspectives of lifelong programmers. My normal activity shall be to only work to exhaustion on dissertation preserving cumulative intellectual energy over lifetime of project effort PHI. That Stroustrup includes serious enjoyment by programmers as fundamental design criterion of the C++ language back to its roots in C with classes, taking the serious yet intellectually stimulating and enjoyable to perform intellectual labor of working on code PHI, appears in the chapter four review of what seems antiquated technologies yet undergirds everything, that is, systems programs written in C and C++ undergirding reality in era of TCP/IP networks.

6 1 1 (+) [-5+]mCQK bork-journal 20140511 TAPOC_20140511 0 -5+ journal_2014.html
I will be the first to point out that while proponents Kemeny and Kurtz describe structured programming as virtuous and good, others like Kraft decry its use by management to deskill the computer programming labor force, as Lanier criticizes the normally praised the role of free, open source software in making the Internet what it is today, an oligopoly of siren servers exploiting the mass users for the direct benefit of the companies capitalizing on the mass user everyday operational data. Today the Internet is both powerful and vicious, some would conclude evil or grossly misaligned to human purposes. To me that is yet another symptom of the overall dumbing down of American human ingenuity at the outset of the global machine cognition age, and the analysis continues from structured programming into object oriented approaches, just as media theorists differentiate epochs based on the emergence of global Internet use. Gamble on what if the difference can be programming working code introducing human English C++ texts into shared Internet and LAN discourse networks connecting humans and machines as cyborgs, for then a whole new area of study is opened up incorporating ethnography, technology studies, philosophy, and digital humanities, by virtue of including substantial study, systems engineering, and use for empirical research in virtual realities reached through the floss projects constituting the bootstrapping and human interface of now independent machine thoughts. The countdown for commencement after all copyrights expire many decades from now will hopefully include my human annotations as they are typed today and have been most days for decades, spending a long time in word processor HTML, articulating contemporary responses to calls for cybersage made by Heim in the prior period.

6 1 1 (+) [-5+]mCQK rushkoff-program_or_be_programmed (23) 20140103c 0 -3+ progress/2014/01/notes_for_rushkoff-program_or_be_programmed.html
Assumption that even basic knowledge of how devices are programmed, or input into decision and design processes, provides a solution to the immanent relegation of agency; compare getting on top by cultivating basic knowledge to Berry riding on top of streams. (23) The way to get on top of all this, of course, would be to have some inkling of how these thinking devices and systems are programmed or even to have some input into the way it is being done, and for what reasons.
(23) With computers and networks, unlike our calculators, we donƒt even know what we are asking our machines to do, much less now they are going to go about doing it. Every Google search is at least for most of us a Hail Mary pass into the datasphere, requesting something from an opaque black box.

6 1 1 (+) [-5+]mCQK zizek-parallax_view (351-352) 20140219c 8 -11+ progress/2009/05/notes_for_zizek-parallax_view.html
What other options can we entertain for changing the way commodities talk among themselves beyond struggle to let them have any ethical concern or care at all of human actions without really trying to impart on them such powers, we are in the same place for not caring to know about the automobile beyond how to use it that Rushkoff threatens our intellectual evolution with consignment to powerlessness to make further real choices, as it is said, nothing ever happens to the losers? (351-352) This situation is literally evoked by Marx in his famous fiction of commodities that start to speak to each other: If commodities could speak, they would say this: our use-value may interest men, but it does not belong to us as objects. What does belong to us as objects, however, is our value. Our own intercourse as commodities proves it. We relate to each other merely as exchange-values. [Capital, vol. 1 (harmondsworth: Penguin, 1990) pp. 176-177] So, again, the real task is to convince not the subject, but the chicken-commodities: not to change the way we talk about commodities, but to change the way commodities talk among themselves. . . . It is in this precise sense that todayƒs era is perhaps less atheist than any prior one: we are all ready to indulge in utter skepticism, cynical distance, exploitation of others without any illusions, violations of all ethical constraints, extreme sexual practices, and so on protected by the silent awareness that the big Other is ignorant of it.

6 1 1 (+) [-4+]mCQK berry-philosophy_of_software (161) 20130912g 0 -6+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Compare Gaussian risk to Zizek chocolate laxative; also latent risk in software bugs, sloppy integration, poor object modeling. (161) Risk itself becomes mediated through software and becomes a processual output of normative values which are themselves the result of computational processes usually hidden within the lines of computer code. . . . Indeed, it is this misunderstanding of risk that Taleb (2007) blames for the huge leveraged asset bubble in 2007-2009 and the resultant financial crisis.
(161-162) Here, we can think of the external management of the internal perception of time that is linked to a form of Heideggerian angst towards a future event sickness, old age, and so forth which provides a new affective fuel source for capitalism.

6 1 1 (+) [-4+]mCQK bogost-alien_phenomenology (126) 20130910r 0 -7+ progress/2012/04/notes_for_bogost-alien_phenomenology.html
Emphasis on awe and wonder of STEAM against competition for STEM goals echoes Kay appealing to children of all ages rather than adults of all ages. (126) Still, even the more acceptable professional goals like astronaut or chef speak less to a childƒs latent interest in astrophysics or chemistry and more to a state of natural wonder at the alien mystery of objects. But alas, common wisdom in STEM goals suggests that these moments of childhood opportunity must be captured and exploited. . . . Despite its claims for universalism, science also has embraced correlationism, always focused on human concerns.
(126) Consider an example.

6 1 1 (+) [-4+]mCQK bogost-persuasive_games (336) 20130911r 0 -2+ progress/2012/12/notes_for_bogost-persuasive_games.html
Conversation systems built into or around games is where deliberation often takes place, since not yet built into game logic itself: imagine my Macy Conferences game. (336) Other researchers have attempted to build conversation systems directly into their educational games.
(337) Social scientists may not that such conversations could be measured using qualitative analysis.

6 1 1 (+) [-4+]mCQK bogost-unit_operations (86) 20131026j 0 -2+ progress/2012/01/notes_for_bogost-unit_operations.html
Fitting that his instructional example unit operation is the chance encounter, only to deprecate the trope, replacing it with a new style of philosophizing, and tonight I started by musings with philosophy is the sexual partner of programming. (86) Unlike A une passante and A Woman on the Street, which offer poetic significance by their formal characteristics, meaning in The Sims comes solely from the generative effect of numerous codified rule sets.
(87)
The Sims: Hot Date finally takes the ultimate step in representing the chance encounter as a unit operation: it encapsulates it into the code of simulation.

6 1 1 (+) [-4+]mCQK bogost-unit_operations (99) 20131026l 1 -3+ progress/2012/01/notes_for_bogost-unit_operations.html
Like Frasca and Bogost argue for studying videogames in social context, I argue it is why the study of childhood computer usage can be a modern echo of Freudian method. (99) Videogames require critical interpretation to mediate our experience of the simulation, to ground it in a set of coherent and expressive values, responses, or understandings that constitute effects of the work. In this process, the unit operations of a simulation embody themselves in a playerƒs understanding. This is the place where rules can be grasped,
where instantiated code enters the material world via human playersƒ faculty of reason.

6 1 1 (+) [-4+]mCQK boltanski_chiapello-new_spirit_of_capitalism (60-61) 20140306d 3 -2+ progress/2014/01/notes_for_boltanski_chiapello-new_spirit_of_capitalism.html
Propose future work studying learning programming by examining textbooks versus content of online forums, blogs versus digging into structural components such as floss repositories, forums, where the correspondence would be textbook style knowledge promulgation. (60-61) For each of the periods under consideration, these two corpora make it possible to bring out a typical image of what was recommended to firms as regards the types of
cadres to employ, the way they should ideally be treated, and the kind of work that might appropriately be asked of them. Appendix 1 sets out the characteristics of the texts analyzed, while Appendix 2 presents a bibliography of each corpus.

6 1 1 (+) [-4+]mCQK bork-exam2_question2 (np) 20140117 0 -19+ progress/2012/12/notes_for_bork-exam2_question2.html
Sets the stage for consuming back thoughts long past in ways substantially different from memory as any human types. (np) I am not ready to stake my scholarly career on a whole-hearted leap into this alien phenomenology, but I will go out on a limb and conclude with a somewhat ridiculous, Ulmerian positive response to the question of how to outline a Heideggerian approach to networks. It wonders at a particular network hybrid, namely the shutter sound+camera flash+TCP/IP stream sharing the field with Heideggerƒs chalice. First the fake shutter sound: while primarily an ethical mechanism built into the device to prevent unauthorized photography by announcing itself with a sound, the click itself constitutes what Hayles calls a skeumorph hearkening back to film photography, a design feature that is no longer functional in itself but that refers back to a feature that was functional at an earlier time. . . . Skeuomorphs visibly testify to the social or psychological necessity for innovation to be tempered by replication (
How We Became Posthuman 17). For Heidegger skeumorphs maintain a connection to the embeddedness of the object within the culture, part of what makes it stand out as such. Next the flash: in traditional electronics, strobe lights and camera flashes are the textbook application of the thyristor, an electronic device like a transistor that, once triggered by a small current, can evoke the rapid bursting forth of a much larger current. The thyristor, too, is a skeumorph, in the sense that its name hearkens back to the thyrsus of Greek mythology, a staff carried by Dionysius and his followers, considered a fertility phallus, and resembling a penis. Moreover, it is from the thyristor that the light shines out to take the picture, to secure the image for dispatch to the alien phenomenologies of machine processing; as Heidegger puts it, to ekphanestaton, that which shines forth most purely (34). It is at this juncture that we should recall where this statement appears in our rereading of The Question Concerning Technology, for Heidegger is really talking about the poetical, and the thyristor represents its evil twin, a device manufactured for the sole purpose of maximizing the will to power. Yet the passage he quotes from H lderlin is the famous claim that has a launched so many reinterpretations of Heidegger in the philosophy of technology: But where the danger is, grows the saving power also. Iain Thomson, in Understanding Technology Ontotheologically, or: the Danger and the Promise of Heidegger, an American Perspective, equates the greatest danger with what he calls the problem of the happy enframer, continuous improvement as a self-satisfying, totalizing philosophy epitomized in Heideggerƒs conception of America (152 endnote 13). The reinterpretations come as people try to articulate the saving power, something Heidegger himself never really succeeded in doing. Thomson suggests what is needed is a gestalt switch, akin to Wittgensteinƒs duck-rabbit figure: the danger is the peak of historical nihilism, the very ƒfulfillmentƒ of Western metaphysics, yet, seeing the promise, the obverse of precisely the same phenomenon, constitutes the first step into what he calls ƒthe other beginningƒ of history (161). From the darkness of Nietzschean nihilism comes the dawn, through flipping from the experience of being as nothing, to instead experience the nothing as the way being shows itself to us (158). The virtual being of the digitized picture of the chalice flashing through the network as immaterial TCP/IP data is one such form of being-in-nothing. At the same time, it is open to inspection and study, and through the epistemological transparency granted by virtue of its constitution through open protocols, is, in fact, a phenomenon knowable in its simulacral essence.

6 1 1 (+) [-4+]mCQK bork-exam3_question3 (31-32) 20130414 0 0+ progress/2013/02/notes_for_bork-exam3_question3.html
Derrida can be read using Kittler method, latching onto his telephone call, Macintosh, and Freudian archive, despite his default legacy characterization as a traditional humanities theorist who does not program; in fact, the parasite ethic Berry reaches is wholly consistent with the Derridean approach deployed by Landow.

6 1 1 (+) [-4+]mCQK bork-journal 19951112 19951112 0 -64+ journal_1995.html
Cyberpunk

The story told so far is a metaphysical tale: we live somewhere between the last man and Overman. Heidegger has already rejected this approach and turned back to his own task of reclaming the Greek experience; Deleuze maintains Nietzsche s project, creating a figure (the schizo of Anti-Oedipus) and a program (schizoanalysis). So what comes to be in the real world today? Do we not hear, all around, the cries, screams, and amplified music of some enormous, frenzied expenditure of energy? If we commissioned our journalistic will to power to find the highest men today, imitating Zarathustra s search and rescue mission of Book Four, who would be interviewed? By the reckoning of Dr. Timothy Leary, cyberpunks.

Every stage of history has produced a name and a heroic legend for the strong, stubborn, creative individual who explores some future frontier, collects and brings back new information, and offers to guide the gene pool to the next stage. Typically, the time maverick combines bravery with high curiosity, with super-self-esteem. These three talents are considered necessary for those engaged in the profession of genetic guide, a.k.a., philosopher. ..The words cybernetic-person, cybernaut, and the more pop term cyberpunk refer to the personalization (and thus the popularization) of knoweldge/information technology. Innovative thinking on the part of the individual. ..all those who boldly package and steer ideas out there where no thoughts have gone before. ( Cyberpunk as reality pilot, 243;253)

How close is Leary s formulation to the character we have sketched so far? Leary extols a sort of individual much like Nietzsche s final image of Zarathustra: ever-curious, committed to his task, and ready to teach others the new information. He points out the cyber- that refers to the Greek kubernetes, the pilot who (in his reading of history) epitomized the daring, resourceful, free-thinking spirit of the Greek city-states. An Odysseus. Today the uncharted seas lie in cyberspace, in virtual reality. Therefore the teaching will most likely come in the form of technical education: insight into the possibilities of the latest gadgets and drugs that further in the individual humanity s aim, S.M.I2.L.E. (Space Migration, Increased Intelligence, Life Extension). Absolute domination of the planet has given way to using the planet as the means for leaving the planet. Consonant with Heidegger s views on technology, Leary s project does seem determined by the Enframing that is the topic of QCT. Because his vision extends so far into the future, the present configuration of the world and of beings necessarily suffers devaluation, merely the playground of human being in its larval stages. Heidegger might argue that Leary gives human being over to calculative thinking, who derives as a product of evolution what Nietzsche forsaw as the accidental development triggered by the experience named by his doctrines, but in either case a threat to man s essence. Leary does not speak metaphysics; instead, the languages of sciences undreamt in Nietzsche s time, but reckoned by Heidegger to be the heralds and agents of the dominion of the essence of modern technology.

If our genetic function is computare (to think), then it follows that the ages and stages of human history, so far, have been larval or preparatory. Now, at the beginnings of the information age, are we ready to assume our genetic function? After the larval phases of submission to gene pools, the mature stage of the human life-cycle is the individual who thinks for him/herself.(257)

Now from Zarathustra:

Know that the noble man stands in everybody s way. ..The noble man wants to create something new and a new virtue. The good want the old, and that the old be preserved. ..The earth is free even now for great souls .. Only where the state ends, there begins the human being who is not superfluous: there begins the song of necessity, the unique and inimitable tune. (156;163)

There are two themes I want to emphasize concerning Overman and cyberpunk: (1) the action of transformational psychology by which valuative thinking, freed of the prejudicies of the deposed higher values, becomes instinct proper; and also, (2) the relationship between such enlightened beings and the socius. It would be unjust to Leary to remark that he fails to give the cyberpunk an aim, or that he gives no concrete example of what sort of teaching program they package for consumption by less enlightened beings. I refer the curious reader to Neuropolitique, The Book of Life, or What does woMan want?. On the other hand, as Heidegger notes again and again, Overman s aim must be indeterminate from our perspective, we who are underway.

Both Leary and Heidegger place an enormous emphasis upon the intellectual duties of their respective Overman figures. In the first two volumes of the Nietzsche lectures, art and rapture come into in the study, but quickly give way to the problem of nihilism and its relationship to metaphysics. Does the transformation of valuative thinking into such an acute consciousness that it becomes instinct expel the dance, music, and art of the Dionysian spirit through a logical calculation? Our thinking may miss its mark to the degree that we ourselves have incorporated utility-maximizing rationality into our reasoning, and forget that Nietzsche never endorses the mere gathering-for-cost-efficient-use mode of esteeming. Instead, the higher being is characterized by excess, a superfluity of power. As object of his psychological investigations, when not focused upon degenerate forms like theologians and philosophers the hopeful, positive embodiment of will to power, then artists, musicians, dancers approach an ideal of Dionysian frenzy, which very clearly has become an ideal also in cyberpunk literature.

Toward a psychology of the artist. If there is to be art, if there is to be any aesthetic doing and seeing, one physiological condition is indispensable: frenzy. Frenzy must first have enhanced the excitability of the whole machine; else there is no art. (TI, 518)

Here the other side of cyberpunk comes to the fore.

6 1 1 (+) [-4+]mCQK bork-journal 20010819 20010819 0 -22+ journal_2001.html
If there is any significance to Abraham Maslowƒs famous "Hierarchy of Needs," it is that it has become one of the many models upon which other contemporary arguments seek to justify themselves. [Recognizing the ambiguity of the consequent, the preposition may fluctuate among a number of others besides the one just read and still have meaning. That is, the implied question "Which models?" can be answered in a number of ways, all sufficiently correct (valid, sound, right, appropriate, legitimate, statistically (..), etc.), but each being connected grammatically to the antecedent in different ways and thus requiring different prepositions from the one first presented ("upon"). "With," "from," "through," among others could all have appeared. Each would have a slightly different implication, but they would all suffice to support the notion (idea, hypothesis, etc.) that] Maslowƒs model holds sway in our discourse and set of beliefs. The instance I have in mind is found in The Hacker Ethic. The basic argument is that modern IT work represents several steps back down the hierarchy of needs, from fulfillment of social or personal goals back down to survival needs. Recalling the famous pyramid, the reader becomes alarmed at the condition of the IT (information technology) worker whose relentless 24/7 (24 hours a day, seven days a week) work schedule equates to a degradation to a more basic level of the hierarchy of needs. Civilization has taken a step backwards.

Periodic vacations are the only escape from the tyranny of being "on call." If free thinking only occurs during vacations, there are severe implications for the future of the philosophy of computing. The one I have repeatedly tried to explain is the relentless propagation of "default metaphysics." This is due to a present [and outstanding] paradox surrounding the philosophy of computing. On the one hand, professional technologists will never have an opportunity for prolonged, rigorous philosophical thinking. On the other hand, professional philosophers will have to avoid taking employment as technologists. The undesirable consequence of the former is that philosophy among technologists will be shallow, due to lack of "free time" for contemplation; of the latter, that philosophy among philosophers will be misguided due to lack of a correct understanding of computer technology, the sort gained only through experience.

6 1 1 (+) [-4+]mCQK bork-journal 20011021 20011021 0 -15+ journal_2001.html
The course of what becomes, is, and will be "the default metaphysics of computing" must be changed. [Personally I need to go to a "word processor" that will support the type of "hyperlink" I just imagined; otherwise, "it" will not work. Indeed, "it" is the same sort of "thing" (thought knows where it has gone. . . . )] To control it a ƒcontrol systemƒ must exist. While this statement seems tautologous, to understand it requires knowledge of ƒcontrol systemsƒ minimally. [Imagine this "natural" scenario: using "computer mouse" leads to wrist pain, which in turn is hidden by sleep in dreams that arose from using certain computer games in which a pistol is repeatedly fired. The only manifestation of the damage done using the computer mouse is "wrist pop" becoming more frequent. To provide a scientific account that correctly explains every detail of this "natural scenario" is currently beyond the capability of everyone, including Bill Gates. Yet we acquiesce to his megalomania because we believe he is trying his best. No one "in power" with the ability to influence the system can think outside of the confines created by the world [<preposition>] "the default metaphysics of computing."] Suddenly you realize how much you have to learn in order to participate in this movement of changing the course of the metaphysics of computing, for you are now among the thinkers of all ages embarked upon an incredible odyssey. Turn off bold.

6 1 1 (+) [-4+]mCQK bork-journal 20011125 20011125 0 -17+ journal_2001.html
What does it mean to say monopoly power is abused? One obvious manifestation of the abuse of monopoly power is outrageous wealth. Imagine, for example, that a monopoly existed in the petroleum industry, due, for instance, to one company having bought nearly every gas station in the country. With monopoly power over supplying fuel, that company could set its prices much higher than they are today. The profits would be tremendous, and those closely surrounding the company would be very wealthy indeed. There are ways that this condition is prevented from occurring. However, in the past we did deal with monopolies supplying critical commodities or utilities, and identified them as such. The challenge today is to face the latest evil empire. Organizations that abuse their monopoly power are evil. Let us consider the reasons why this is true. Next let us detect the abuse of monopoly power, to answer the first question. In doing so we will be setting our bearings for the future course of action.

Presently legal concerns surround harm to consumers in the form of over-charging. Someday Microsoft may be compared to tobacco companies, and charged with peddling a defective and dangerous product. However, the subtlety of such an argument requires an enormous education of the consumers of computing products, for the effect of addiction to computing products in general is a deeply rooted psychological cancer whose symptoms will not be detected for decades. It is not as simple as a feeling of being ripped off.

6 1 1 (+) [-4+]mCQK bork-journal 20011207 20011207 4 -10+ journal_2001.html
Other problems are aggravated by our mass addiction to Microsoft products. This condition has instilled a mentality of ignorant consumption; computing is a drug. Someday Microsoft may be assailed by lawsuits like the tobacco companies at the turn of the millennium, and charged with selling a defective and dangerous product. To reach this conclusion, however, drug like nature must be acknowledged. With the addiction now so deeply rooted in our psyche, this may be a difficult task, one requiring subtle philosophical analysis that is rooted in a correct interpretation of electronic computing technology. Who will perform such work? Some employee of a large corporation like IBM? Some college professor or graduate student? Some hobbyist? Is anybody keenly cognizant, suitably qualified, and sufficiently motivated to pursue such studies, let alone communicate the results?

6 1 1 (+) [-4+]mCQK bork-journal 20031110 20031110 0 -13+ journal_2003.html
Star Trip consumes 60W. What is its resistance? There is a better word that is symbolized by z. Impedance. But the point is that after all this dreaming, it really is consuming between zero and 60W while it produces heat, light and magnetic fields (what else does a pinball machine really do?). It is not sufficient to merely state the ranges of the values of heat, light and magnetic fields produced during a game of pinball. Those are not the operational parameters sought. What is sought are the computational objects of the control strategy implemented by the MPU.

<pinball_machine> consumers <"scalar"><unit><operator><"scalar"><unit> After reviewing the formal concept of discreet process control, the pinball machine will be analyzed as a discreet process. What is sought are the computational objects of the control strategy implemented by the MPU. Immediately the inputs (switches) and outputs (solenoids, lamps and digital displays) are identified as process inputs and outputs. The control strategies could be analyzed by disassembling the machine code programmed into the ROMs.

6 1 1 (+) [-4+]mCQK bork-journal 20031110 20031110a 14 -5+ journal_2003.html

How can the TOC be generated if hints as to the inclusion and ordering of the many small files are not distributed among themselves? Perhaps the TOC should govern the arrangement of the subsequent parts. That seems easier to implement programmatically. It is not clear whether the pieces should exist natively in HTML format, any Open Office XML-based format, or some other format. Maybe it could be done with a static page that has a means of passing information to a PHP format target: the reader could request a "refresh" of the TOC.

6 1 1 (+) [-4+]mCQK bork-journal 20041014 TAPOC_20041014 0 -11+ journal_2004.html
Impedance of time delay means same as when impedance of semiconductor affects computation same as the sort of electrical circuit required to control an "Internet disconnect" relay driver circuit using a semiconductor relay and a standard late twentieth century relay same as mistake of replacing double throw switch with two single throw switches ... and then use words too familiar to repeat because they are used for computing ...same as (soon you will align [the ellipsis="operator"] operatorprime A new method is suggested without resulting from research: "seeing from all possible computations backwards through the request to begin the response" and it arose from wondering if physical medium would be disturbed by impedance of other one signal going through the semiconductor solid state relay relative to the zero impedance of the signal going through the standard relay. If the physical medium is disturbed leading to degradation (depravity of style) then better not to substitute hardware. That no longer makes sense after struggling a create a simple relay driver circuit. The struggle is to make technically correct instructional examples interesting and useful. Considered voluntary Internet disconnect using a big capacitor and a double pole single throw relay capable of being controlled by an unused output port of the project.

6 1 1 (+) [-4+]mCQK bork-journal 20041126 TAPOC_20041126 0 -27+ journal_2004.html
My version of Nietzscheƒs question <operator_1> What if the central hypothesis of the thesis can be evaluated programmatically? What are likely central hypotheses of theses? For the thesis <operator_2> a central hypothesis <operator_3> NOTICE <operator_3><operator_4> eventually imagines <operator_5> (Nietzscheƒs question) <operator_5> Reverse engineering <operator_6> <operator_7> x86 ISA FOSS ... This can be expressed as Reverse engineering <operator_6> <operator_8> statistics apparatus <operator_2> <operator_9> BNF,PDF,etc. The original sense is lost after ten hours of programming effort to refine the MCU representation and the ROI computer. Brooks introduced for emphasis on iterative development. Perhaps some guidance can come by clarifying the words thesis and hypothesis. My Winston dictionary defines the former as a proposition advanced by a person who undertakes to maintain it in argument; the latter as a proposition, principle, or theory, assumed or taken for granted as a basis for reasoning, argument, or investigation, or to explain certain phenomena. If it is taken for granted, what is the point of using statistical methods? ... Ancient computing <operator_10> the philosophical question associating senatus consultum ultimum and natural automata.

The research hypothesis is that a reverse engineered replacement meeting standard ROI criteria without infringing on any intellectual property claims for a typical, first-generation, commercial, mass-produced, consumer-oriented microcomputer-based control unit performing discrete, closed-loop process control can be implemented with generic, Intel x86, ISA computing machinery using only custom, in-house programs and free, open-source, third-party software. To use statistical methods this proposition must be distilled into statements about parameters amenable to standard problem objectives like describing a single population and comparing two populations. Besides qualitative assessments of non-infringement and overall operator satisfaction, many quantitative assessments become clear through iterations of the replacement system. The current version of the testbed, which uses a custom kernel module under the Red Hat Fedora Core 2 stock 2.6 Linux kernel environment and a custom user-mode program for game control, satisfies most high-level operational objectives with the exception of control of the feature lamps. Furthermore, statistical analysis of data logged by the software hints at potentially significant delays in system response. Both of these results illuminate the need for further iterations of the testbed that involve synchronizing lamp control activity with power supply zero-crossings, and reducing kernel latency.

The significance of this study arises from the realization that reverse engineering scholarship addressing microcomputer-based control units has hitherto focused on non-commercial, low-production, high-cost military systems for the very good reason that reverse engineering is only justified when no commercial, off-the-shelf replacement is available for a given part, and the system must be preserved at any cost. This sentiment is captured in Ingleƒs Go/No-Go Matrix.

6 1 1 (+) [-4+]mCQK bork-journal 20060819 20060819 7 -6+ journal_2006.html

We suddenly can see the whole of western philosophy as an enormous software project. Poor maintenance, with only the writing/computing technology its necessary condition, around/after Socrates led to system degradations similar to Microsoft(TM) Windows(R) and GNU/Linux software projects today. All are full of bugs, vulnerabilities, poor interoperability, steep learning curves, and so on and so on. My innovative thesis is to equivocate the western philosophical tradition and current large scale, collective software assemblages as both the work product of computing--rather than information--technologists. Computing and control comes first and they swallow information. My work simply rides the wave of overwhelming integration (probability, common sense, a way of seeing reality, interpreting history).

6 1 1 (+) [-4+]mCQK bork-journal 20061102 TAPOC_20061102 0 -21+ journal_2006.html
Embodiment is the soulƒs computer control system, a natural automaton. The greater the comparison between artificial automata and this natural system, the more feasible becomes something whose contemplation is normally shunned. Near that radical asymptote have long been proposed methods of memory and intelligence enhancement. Under the book form content and structure maintain knowledge, from the order of letters, sentences, books, inter-networks of books via citations, to worldwide practices of academic research. It is important to note that these inanimate forms are not the loci of automatism; they are inanimate data and stored programs to be computed. The central processing unit was presumed to be a human mind. Besides a few visionaries the ancients would have mocked the idea of artificial intelligence. Plato presents Socrates describing [living writing], in which the human soul was the central control unit enervating this [language/writing] processing system. Leibniz proposed a logical language to symbolize generic arguments, but his famous let us compute was addressed to fellow humans. It was never really thought that the locus of automatism could migrate to machinery external to the mind until the proliferation of electronic computing technology. This external intelligence is actualized today within individual operating systems and the global TCP/IP Internet.

Really this definition of computing as generic, automated symbol processing only arrived recently since early computing machinery was designed for special purpose arithmetic calculation. In fact, the example found in Plato depicts an information processing system rather than a numeric calculator. If we look there are kinds of computing going far back into our history, although we equivocate them with mechanized calculation perhaps because that form readily detached from a system in which the human computer played a key role, as in the case of symbol processing. Another neglected aspect is control. The whole computer as opponent approach to the philosophy of artificial intelligence could be a symptom of the limitations of the usefulness of such special purpose machinery; they could beat us at chess but not help us collect our thoughts. Therefore, the computer as component approach depends on the proliferation of general purpose electronic computer technology more so than it does the proliferation of the ideas of Heidegger, McLuhan and Heim. So did computing begin general purpose or biased towards language processing, [only to crystallize/be formalized into] number processing concepts due to the utility of arithmetic and eventually the successful production of automated calculators (and the failure to produce general purpose devices [like Babbage Difference Engine]), as the fact of the publication of Williams book suggests, so that the arrival of general purpose computing such as in the service of my composition of this text is actually a return, except now sustained by artificial automata? I am asking this question to help us awaken from dogmatic slumber, the default metaphysics of computing. I used to emphasize the closed/open source ethic to make this point, but this seems much more like metaphysics. Good definitions of automatism, computing and intelligence are needed.

6 1 1 (+) [-4+]mCQK bork-journal 20061111 TAPOC_20061111 0 -9+ journal_2006.html
Who among thinkers studies the philosophy of computing itself, rather than specializing on a derivative? Collaborate with these people and find a graduate program that can sustain a distributed system, like the Technology Management program but targeted towards a tenured position able to teach as its core concentration "Philosophy of Computing." Finding them in advance helps prepare writing samples and letter writers. Mapping the Annals and the Philosophy of Technology is a start, as is seeing who works at SCC and UCF.

Computing is the activity of a control system where it evaluates inputs and produces outputs. Computation is able to use representations in the place of the objects about which or for the sake of whose control it occurs. Especially among the computed inputs in a closed loop system is representation created from feedback of the output. Exactly the sort of things enumerated in Platoƒs Phaedrus. I place it in a control system model to suggest separate but interrelated components of amplification and measurement that are not themselves performing computations, and the technical importance of these interrelations working.

6 1 1 (+) [-4+]mCQK bork-journal 20061112 20061112 5 -16+ journal_2006.html

Shifting from analog computing, natural automata processing n-ary digital where n was defined by ancient philosophers of computing as the count of all words in the interlocutorsƒ language, for which the number of discrete atomic units is so great as to be asymptotically analog, just as analog computing interested in only extreme values (in a non-complex number system) is essentially binary (digital), to digital computing, which besides fulfilling Manerƒs conception is without exception binary digital, we contemplate the state of the art.

To navigate the journal in a better way augment the display options to reveal previous entries matching a different or a set of bookmarks so that todayƒs TAPOC can show Friday nightƒs journal entry where the daring suggestion analyzing the cyberpunk world view "life is but a game" led to reflection upon possible underlying well formed formulae of natural language, that is, used by natural automata, benefiting from my heretofore unthought third order logic of operators, as the bridge to artificial automata, based on state of the art binary artificial automata, ƒbootstrappingƒ and continuing the same thought, for this takes us into the real extreme zone philosophers like Socrates inhabited but have long fled, depicted by Heidegger in What is Called Thinking? as a strong draft. Otherwise the work will be fated by the decision back then to label the one as journal and the other as TAPOC, a typical computing action akin to assigning category identity by inserting into a list, table, or other data structure, to ignore this conjunction of thought representations.

I have thought all the way around the problem by answering "what is computing" through correct scientific, technical, design engineering understanding first so as to approach the speculative question equipped with prior practical knowledge of the subject matter, as an outsider with an insiderƒs perspective as Bob Greevy loved to quote. And this is prior to returning to the question posed over a decade ago, "what is virtual reality" that presupposed because it was ensconced in state of the art binary electronic computing machinery, the question "what is computing?" The ancients could not go much farther with virtual reality since they were forced into trying to develop correct scientific, technical, design engineering understanding of human being itself as the natural automata sustaining and consuming virtual reality, leading to unreasonable task of understanding everything and then to the impasse of Nietzscheƒs nihilism. It was von Neumann who pointed out [favorite quote]. This is my plea to potential corporate sponsors. Who is better prepared to undertake the task of articulating a philosophy of computing for our time? The insiders, the technologists, lack the liberal arts background, and the outsiders, the philosophers, lack correct technical understanding of state of the art electronic computer technology. How will the industry benefit from the product of this funded doctoral work? By outsourcing the task of producing philosophical arguments for long term strategic planning decisions they cannot think themselves, by infusing future generations of technology workers with a positive spiritual underpinning for committing themselves to becoming participants in the ever changing state of the art, and by providing instructional examples like PMREK.

Creating software that processes this journal solves the problem posed by Plato over reliance upon external signs for remembering. Recollection is something lesser, the fetch operation to retrieve the contents of a list, table, or other data structure. Even if always ready at hand, forgetting why you represented your thought using such marks (data) makes their retrieval useless.

6 1 1 (+) [-4+]mCQK bork-journal 20061113 TAPOC_20061113 0 -42+ journal_2006.html
Collective intelligence speaks to its members assigning reasonable tasks that become the work of lifetimes. Mine is to bring together philosophy and binary, electronic computing, just as Plato brought together philosophy and ta grammata. The general undertaking of thinking together philosophy and computing is something both feared and nevertheless done by philosophers since Plato engineered Socrates to tell us to be afraid of bringing together philosophy and human computing done with written letters (ta grammata), while at the same time envisioning an optimal conjunction of philosophy and computing in [PHI 275A - 276A].

SOCRATES: You have invented an elixir not of memory, but of reminding; and you offer your pupils the appearance of wisdom, not true wisdom, for they will read many things without instruction and will therefore seem to know many things, when they are for the most part ignorant and hard to get along with, since they are not wise, but only appear wise. .. Writing, Phaedrus, has this strange quality, and is very like painting; for the creatures of painting stand like living beings, but if one asks them a question, they preserve a solemn silence. And so it is with written words; you might think they spoke as if they had intelligence, but if you question them, wishing to know about their sayings, they always say only one and the same thing. And every word, when once it is written, is bandied about, alike among those who understand and those who have no interest in it, and it knows not to whom to speak or not to speak; when ill-treated or unjustly reviled it always needs its father to help it; for it has no power to protect or help itself. .. Now tell me; is there not another kind of speech, or word, which shows itself to be the legitimate brother of this bastard one, both in the manner of its begetting and in its better and more powerful nature?

PHAEDURS: What is this word and how is it begotten, as you say?

SOCRATES: The word which is written with intelligence in the mind of the learner, which is able to defend itself and knows to whom it should speak, and before whom to be silent.

PHAEDRUS: You mean the living and breathing word of him who knows, of which the written word may justly be called the image.

For this is the point of the latter half of Phaedrus. Socrates compared writing to painting, as in vase painting, a previous state of the art of human computing incorporating rhetoric by representing speech. Recall his method for creating a science of rhetoric by enumerating all the words and evaluating each in terms of its ambiguity, following his general purpose reverse engineering method, just as I applied it to microcomputer based control systems. Very few in the past have imagined any place besides "the mind of the learner" to host anything "able to defend itself and knows to whom it should speak, and before whom to be silent" and has "power to protect or help itself." Now with state of the art binary computers this type of artificial intelligence is ubiquitous. However, collective intelligence proceeds to produce it driven blindly by market optimized design (default metaphysics). Unraveling this hidden connection between our quest for a product providing optimal guidance in forming long term strategic technology planning and the wealth of ancient wisdom already before us in our Western philosophical tradition provides a means of promoting the philosophy of computing and a niche market for myself to flourish. Include a translator (in Austin), a programmer (Maner), a program (Pitt), a place to live (Debbie and Lee). A time to start? What is different is that I am seeking corporate sponsorship of my graduate studies in the form of supplemental income, for I must play a full role as a funded graduate student while maintaining the extensive home computer laboratory (Aristophanesƒ Socratesƒ Thinkery) I have carefully assembled. It may be necessary to drop the fancy sandal argument, unless it was not necessary to have them in site to remember what their previous vision computed, that is, sustained as a virtual reality. Computing sustains virtual reality. This is another of my major points. Previously I said [].

Once you have used a word, will you ever discard it? Then why not build a database of every word, punctuation mark, and other grammatical construct used, and every significant sequence of words, so as to encapsulate written knowledge in such as way as to be able to operate upon it as if "the living and breathing word of him who knows" on account of being able to recollect the world in which each bit was written. Now back to the same old design questions: use existing parsers, maybe Hyperscope, or build it yourself? Consider first dividing everything into whitespace and not-whitespace. Next divide the not-whitespace into timestamps and not-timestamps, since we are analyzing this journal. Regenerate to bring in the source code for importing into subversion. What comes after that? At least the timestamp regions are defined, as is done by journal.exe.

6 1 1 (+) [-4+]mCQK bork-journal 20061115 TAPOC_20061115 0 -16+ journal_2006.html
While we have done pretty well with the book form, that is, an entrenched, previous state of the art, we have barely ventured into the potential computational tasks of the current state of the art, that is, binary electronic computing machinery, such as encoding audiovisual streams. What is forgotten by theorists is that not solely the latter (audiovisual streams), but also and essentially the former (writing), denote/represent virtual reality, for they are or play a key part in the production of it. Of course those deployments benefiting from the largest budgets may do things we can only imagine, such as generating an immersive, three dimensional navigable environment where we produce television images. However, due to their small number of implementations, they do not benefit from a competitive, global market or a massive, world wide distributed open source community. They are like the mythical inventor portrayed in Platoƒs Phaedrus who struggles to develop and promote the first writing technologies. The closest our virtual reality generation may come is mounting the LCD projector on top of the MAME cabinet, installing a binary electronic computer capable of generating video output, and a sound system. It would be much more feasible to create the art envisioned a decade ago.

Letƒs acknowledge there are errors in the manuscript and restate three main points in no particular order. Computing sustains virtual reality. People can use artificial binary computers without having much knowledge of not only how they work, but how to correctly use them. Ancient written knowledge is the easiest for virtual reality generation machinery to process. Good definitions of automatism, computing and intelligence are needed. Imagine a machine readable definition of computing. Computing is the activity of a control system where it evaluates inputs and produces outputs using representations in the place of the objects about which or for the sake of whose control it occurs (including representations of feedback). Recollection is something lesser, the fetch operation to retrieve the contents of a list. Digital with many discrete states is essentially analog.

6 1 1 (+) [-4+]mCQK bork-journal 20061123 20061123 2 -4+ journal_2006.html
When Socrates said [] he spoke for the entire human race, especially Americans, about the "build versus buy" decision; today in particular it is germane to our personal and collective comportment towards computers. An extension of it is the more complex and encompassing "build versus buy versus do nothing" such as I ask over having an enjoyable automobile and a company by which I was employed asked over computer controlled automation systems. Where I want to go with this is the version of the question applicable to FOSS versus not-FOSS decisions for computer software, having applied it to computer hardware arriving at the necessity of primarily buying. Socrates neglected the rights management issues that made his software free.

6 1 1 (+) [-4+]mCQK bork-journal 20071027 20071027 2 -12+ journal_2007.html
One of the guiding utterances found in Platoƒs Phaedrus where Socrates exclaims that if we could figure things out for ourselves, we would not need to lean on things spoken in the past by others. This I have interpreted as an expression of the build versus buy question in found in technology management and everyday life, and have applied it to many endeavors where I have written software to accompany some other task, such as composing my masters thesis. Its drafts were in fact generated programmatically from disparate journal entries. I started keeping a journal at the beginning of the millennium as a single HTML file edited in OpenOffice. It contains daily entries (and many gaps, of course), with timestamped bookmarks (HTML anchors containing a common prefix and date suffix) identifying thematically consistent sections of text. Besides this journal text itself, I have written a number of programs in various languages including C, C++ and PHP to dynamically generate HTML output based on the current date and the arguments passed to it. What distinguishes this journal system from off-the-shelf solutions is not its output, customized texts facilitating its authors remembering, but rather the fact that it has evolved as part of its authors meditations upon thinking mediated by computed texts itself. Moreover, the system is self-assembling from source code whose evolution also participates in the meditation, through different languages, data structures, and other programming concepts. Indeed, a guiding consideration must be preservation and extendability for a lifetime and beyond. Plus when it comes to the know thyself via understanding artificial automata, writing software is a novel approach. The Thinkery. Add graduate work to time spent contributing to FOS projects.

6 1 1 (+) [-4+]mCQK bork-journal 20081203 20081203 0 -61+ journal_2008.html
What does it mean to say that we can just begin to scratch the surface of technological systems designed and manufactured over thirty years ago? It may describe a local contour, the complexity of the locale that causes a wandering ant to appear intelligent, reflective, deliberate in its movements. It may be tied to a temporal condition, a duration of timestamps within a particular milieu such as may be found also in a large set of dated pages, notebooks, photographs, tape recordings, CDROMs, and other artifacts. The TCP/IPv4 internetworked electronic computer is different from all of these physical objects because the milieu it can express and recreate is non-humanly computable. It is known that the next version of the program should implement a more correct (and elegant) database schema.

Break this up with the literary control system (10 mHz (opposite of 10 Hz) tachistoscope). I would much rather think about the literary control system as a bunch of philosophical studies of C++ but first do a few Perl and PHP. Perl lacks some affordances with creating HTML PHP affords due to concretizations in Perl CGI objects. The technical codes surrounding the misuse of the ƒmetaƒ HTML tag REFRESH are concretized in code such as

[working cod css]
if( 0 and $refresh_rate_seconds == 1)
{
# 20081016 this would have to go in early, before the header is created, to include the META tag for REFRESH
# how do I indicate the timeout? (formerly CONTENT=n seconds)
print $cgi->redirect( -location => ƒhttp://ƒ.$site_url.ƒ?operation=displayƒ, -status => 301, -content => 5);
[working cod css]

It is evident how the redirection occurs using the -location parameter/argument/option, but the -content=>5 does not set a five second delay before the redirection HTTP request is made by the browser. This is controlling the timing of the browser refreshing the poll game. I could never get the refresh delay to work in Perl so I changed languages to PHP. Imagine changing speaking languages. No wonder Ong was afraid of this possibility; it is like Heidegger fearing enframing as language machine. But before this they feared books. Table definitions are represented as

REPLACE INTO `PollQuestions` VALUES (ƒUse and Advantages of FOSSƒ,1,ƒSay you create a tachistoscope.ƒ,ƒƒ,1,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,2,ƒSay you create a tachistoscope.<P>It will need a control system.ƒ,ƒƒ,2,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,3,ƒThis tachistoscope control system<P>may be something as simple as<P>a printed page, diagram, a book, a screenƒ,ƒƒ,2,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,4,ƒA printed page<P>diagram<P>book<P>screenƒ,ƒƒ,1,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,6,ƒDefining cyberspace as<P>TCP/IPv4 networked electronic computers.ƒ,ƒƒ,2,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,5,ƒThe tachistoscope<P>control system<P><P>may be something as simple as<P>a printed page, a book, like a flip book,<P>or as state of the art as <I>cyberspace</I>.ƒ,ƒƒ,4,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,8,ƒDefining cyberspace as TCP/IPv4 networked electronic computers.ƒ,ƒƒ,4,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,7,ƒCyberspace, flip books, and other tachistoscopes<P>are literary control systems.ƒ,ƒƒ,2,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,9,ƒA tachistoscope is a literary control system.ƒ,ƒƒ,2,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,10,ƒA 10 Hz tachistoscope is a literary control system.ƒ,ƒƒ,1,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,11,ƒA 0.1 Hz tachistoscope is a literary control system.ƒ,ƒƒ,1,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,12,ƒA 10 mHz tachistoscope is a literary control system.ƒ,ƒƒ,1,NULL,NULL,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,13,ƒIs mHz (milliHertz) even a valid term in electronics?ƒ,ƒƒ,4,ƒYESƒ,ƒNOƒ,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,14,ƒpoller::previous_result()ƒ,ƒƒ,2,ƒƒ,ƒƒ,NULL,NULL,NULL),(ƒUse and Advantages of FOSSƒ,17,ƒpoller::previous_result()ƒ,ƒƒ,2,ƒƒ,ƒƒ,ƒƒ,ƒƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,15,ƒ0.1 Hz = n mHzƒ,ƒƒ,5,ƒ0.1ƒ,ƒ1ƒ,ƒ10ƒ,ƒ100ƒ,NULL),(ƒUse and Advantages of FOSSƒ,16,ƒAccording to William Poundstone, the peak tachistoscope frequency is around n Hzƒ,ƒƒ,5,ƒ0.1ƒ,ƒ1ƒ,ƒ10ƒ,ƒ20ƒ,ƒ100ƒ),(ƒUse and Advantages of FOSSƒ,18,ƒIs this oven designed well?ƒ,ƒoven_w300.pngƒ,3,ƒYESƒ,ƒNOƒ,ƒDONOT KNOWƒ,ƒƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,20,ƒpoller::previous_result()ƒ,ƒƒ,2,ƒƒ,ƒƒ,ƒƒ,ƒƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,21,ƒAccording to William Poundstone,<P>the peak tachistoscope frequency is around 20 Hz<P>because briefer images are retained by the retina<P>for up to 50 milliseconds.ƒ,ƒƒ,1,ƒƒ,ƒƒ,ƒƒ,ƒƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,22,ƒAccording to William Poundstone, the peak tachistoscope frequency is around 20 Hz, for briefer images are retained by the retina for up to 50 milliseconds.ƒ,ƒƒ,4,ƒƒ,ƒƒ,ƒƒ,ƒƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,23,ƒThis tachistoscope operates between 1 Hz and 10 mHz.ƒ,ƒƒ,2,ƒƒ,ƒƒ,ƒƒ,ƒƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,24,ƒThis tachistoscope operates from 1 to 10 seconds (between 1 Hz and 10 mHz).ƒ,ƒƒ,2,ƒƒ,ƒƒ,ƒƒ,ƒƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,25,ƒThis literary control system operates from 1 to 10 seconds (between 1 Hz and 10 mHz).ƒ,ƒƒ,2,ƒƒ,ƒƒ,ƒƒ,ƒƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,26,ƒIt uses and teaches FOS operating systems, FOSS systems software, FOSS PHP custom code, TCP/IPv4, HTML.ƒ,ƒƒ,2,ƒƒ,ƒƒ,ƒƒ,ƒƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,19,ƒWould Norman like this oven?ƒ,ƒoven_controls_w300.pngƒ,2,ƒYESƒ,ƒNOƒ,ƒFORGOTƒ,ƒDIDNOTREADƒ,ƒƒ),(ƒUse and Advantages of FOSSƒ,27,ƒThe new Turing Test is whether a human judge<P>is fooled into thinking that<P>a computer program simulating<P>the 300 or fewer discreet screens<P>is the audience interacting with the poll<P>and not the computer mimicking an actual presentation.\nƒ,ƒƒ,120,ƒYESƒ,ƒNOƒ,ƒƒ,ƒƒ,ƒƒ)

What if you keep both in the distribution so that you can use either the PHP or the Perl to interact (play the game) with the intelligence in the software running with you. Why not try the music control from localhost controlling laptop connected to speakers? Add a music playing session variable to pass that ƒmetaƒ information about what may be happening on the host including playing music (digital audio control system) into speakers (final control elements). Or add another column to PollInfo instead of using the session variables. Music control during active poll: each question has music possibilities including continuing music from previous questions and changing/starting another music production to speakers for human aural consumption. Using individual PHP session variables allows the cacophony of multiple voices and songs and noises; the database only one. How does the music playing script independent of the webserver phenomena including the PHP sessions of the interactors and the controlling server .. oh, to have multiple songs would require multiple poll controlling servers, so the difference of affordances dissolves. Getting closer to needing a parser if this is encoded in the question or response lexia instead of being stored in a new database column in PollQuestions. Keep it simple for this deprecated database schema. But playing music will be different on Ubuntu 8.04, which uses audacious, and my old Fedora Core 5 laptop, which uses xmms. Had to fix old flaw having bookmark for course in wrong day perhaps because it was done after midnight but most likely a simple mistake.

6 1 1 (+) [-4+]mCQK bork-journal 20090331 20090331 0 -19+ journal_2009.html
The idea for the final project is just that, a fantasy of a production that involves philosophers as video game characters, visualizing their arguments and expressions of their personalities as game play. For instance, Heidegger played off Heimƒs concept of a cybersage in Ultima III for Apple //e going to the store to get materials for his Schreibstube, and Zizek as Donkey Kong. In this world of simulation, Lacan too would be a character, ponderous, as Zizek criticizes his staged, recorded seminars. These excursions overlayed by Hayles from You Tube talking about bizarre student projects and her own trouble understanding video games, Zizek lecturing about fantasy, the reality of the virtual, and various digital music players on hijacked PCs around the room for which I have supplied sound amplifying speakers. A question I am asking through this work is whether Lacan is still relevant. Zizek focuses on cinema and can be regarded as a humanist unwilling to venture into the domain of software engineering. Hayles, who does not mention Zizek, seems to condemn Lacan as a thinker (theorist) overdetermined by print technology and culture, though whether as a body or embodied is unclear, for she does not treat specific examples from Lacanƒs known life experiences how he would be so determined. She uses Lacanƒs ƒfloating signifierƒ - as exemplar of print culture - as a step along the way to ƒflickering signifiersƒ in the electronic age, declaring that the famous presence/absence dichotomy driving Lacanian theory supplanted by the new dichotomy pattern/randomness produced by the unpredictably radically transformative behavior of hypertext, that is, computer aided human communication.

I am thinking along the lines (within the box confines?) of Ulmerƒs recommendation to use the standing reserve theories to invent rather than interpret, so am coming up with a software project combining scholarship and free, open source (FOS) technologies. It is a Language Machine, the sort of technological assemblage Heidegger feared and for whose study Heim calls upon a cybersage: (quotation from a title). It performs control operations over the orders of magnitude of tenths of a second to thousands of years, and therefore constitutes a tachistoscope as well as a library. Before this kind of software, language machines were primarily archives, not dynamic producers of texts, defining texts as not limited to printed pages, also sound and moving pictures, and future senses. This level of control makes it a real time virtual reality generator capable of seducing human interactors with its control outputs to engage in its control inputs (VR idealized as holodeck) over the ordinary duration of a game instance, for example five to ten minutes, which, at the sub-second OOM, constitutes up to 10 minutes times 60 seconds per minute times 10 tenths of a second per second equals how many of what unit? 6000 samples, instances, frames, discrete instants, etc. Too many for any human without electronic machinery to produce without a high speed print image changer, such as a flip book. A flip book, however, is not dynamic in the way the software I am imagining is dynamic, database driven Java or some other technology capable of driving distributed audio and video playback. It can be done with projectors on two of the network hosts and a few other speaker equipped PCs playing music and other audio files according to the current state of the database.

(image of concept map screen shot)

Its image appears on a web based concept mapping tool.

6 1 1 (+) [-4+]mCQK bork-journal 20101014 20101014 0 -12+ journal_2010.html
I will try to guess the kind of computer with which you learned programming by analyzing your interactions via playing pinball, via browsing the poller website, and by analyzing the contents of your removable storage device (USB flash drive). The radical hypothesis is that certain kinds of programmers were made by certain bundled OEM texts, and this shapes the history of computing in America as much as other defaults. This is a T&T version of a philosophical question I have pondered for many years. Try guess hits (hyperlinks) into the past using wasted space to the right of the timestamp text of each journal entry. That is relatively easy and of manageable complexity for a few minutes coding. Notice the ƒclickabilityƒ may be mediated by the browser software disabling those hyperlinks for which the anchor in the local document does not exist. That would be a fortuitous affordance of the particular software implementation of your [chosen] cultural software.

for(i=jptr->timestamp, j=(*this->entry_list->rbegin())->timestamp; !recursion_level && i<=j; i += 10000);
for(i-=10000, j=(*this->entry_list->begin())->timestamp; !recursion_level && i>=j && i>19920000; i -= 10000)
if(i == jptr->timestamp)
{
if(i/10000 != (*this->entry_list->rbegin())->timestamp/10000)
fprintf(fptr, "PHI");
}
else
fprintf(fptr, "<a href=\"#%d\">-</a>", i);
fprintf(fptr, "<BR>");

It took about an hour. The code is somewhat confusing.

6 1 1 (+) [-4+]mCQK bork-journal 20101115 20101115 2 -8+ journal_2010.html
Compare the stories of those who learned programming on early Apple computers then traumatized by the Mac as consequences of particular models, incorporation of microprocessor electronics in the human world. There are whole other stories to be told by others, making this study repeatable. Okay, now let us talk about software. Everyone has their journal, pmrek, and poller like programs. Thinking about programming outside of teaching programming all but disappeared after initial interest in the late 1980s through mid 1990s with the first generation of widely used personal computers. A few exceptions, including Cummings, and Applen, broach the subject of programming in the humanities. Should citizens be able to request of copy of the scan used to determine whether they could fly. Just stop flying.

6 1 1 (+) [-4+]mCQK bork-journal 20101117 20101117 0 -39+ journal_2010.html
This is what it is like. For now until in the same room on the same display together these bodies at once, show a projection of the other place as zoographia te kai grammata. Remember Socrates was convicted for not worshipping the gods of the state according to Xenophon (we just passed through the Plato). The Linux version has to run for the first time and the MAC value tied to the file system; running the set up again and catching the network adapter configuration step during the boot process changes the behavior of the system and can carry information in configurations of simultaneously running software systems of pmrek, poller, and journal in my universe galaxy of meaning. Media specific outcomes for parallel rhetorical analyses of written and [computed hypertext]. Compute this into a bitmap field of galaxies of meaning represented by hyperlinks to other worlds of the text. This is a practiced trope of hypertext composition oblivious of influence of a particular version of HTML, TCP/IP, and other communications protocols really hold the language of the species.

[working code css]
jbork@alkibiades:~/public_html/progress/2009/10$ vi bio-ENC_6428_website.html
<img src="roadahead_500x375y-ENC_6428_website.jpg" class="BioImage" alt="This is a picture taken on Skyline Drive in Shenandoah National Park" usemap="#roadahead" />
int readpng_init(FILE *infile, long *pWidth, long *pHeight)
Journal.h:79:17: error: png.h: No such file or directory
jbork@alkibiades:~/src/journal$ sudo apt-get install libpng-devel
[sudo] password for jbork:
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Couldnƒt find package libpng-devel
MYSQL_ROW
This is a type-safe representation of one row of data. It is currently implemented as an array of counted byte strings. (You cannot treat these as null-terminated strings if field values may contain binary data, because such values may contain null bytes internally.) Rows are obtained by calling mysql_fetch_row().
/* 20101117 or make it an image map of hyperlinks per Applen */
switch(jptr->timestamp)
{
case 20101117:
this->build_img_map(row[0]);
break;
default:
void build_img_map(const char *, FILE *);
[working code css]

And here is old programming. Need to know how to get the dimensions of the picture from itself or guess well (for example, 2000 by 1000 visual units). A different approach uses PHP to draw lines on the PNG image to show the boundaries of the HTML image map taught by Applen. Why would not subjectivity subject itself through writing software? Only if it cannot, not that it would avoid at all costs or only if able to perfectly implement. Now would also be a good time to implement Javascript timers to delay loading the next page in the poll, starting with the one for pmrek. A candidate is the sourceforge-hosted PNGwriter package but it will require study and compilation for a call within journal.cpp. Nope, this is for creating PNG images, not reading attributes of existing files. Of course then the search yields a more likely libpng implementation. Here is a useful piece of information: We can get away with using longs instead of unsigned longs because the PNG specification requires that image dimensions not exceed 231 - 1. It is important that it is shown as two to the thirty-first power, that quantity, minus one. Now it compiles at least. The intermediate answer is array of counted byte strings from the documentation for MySQL C API Data Structures when we do the database class. We need a new function that builds the image map code from the object (this pointer) and current MYSQL_ROW data at row[0]. The makefile needs adjusted to link libpng in order to use readpng_init() to get the image dimensions for generating the map. Turns out readpng is a program written by somebody to demonstrate how PNG works; it is not an intrinsic part of libpng; that was a mostly useless diversion. The image file may not be available from the C++ program invoked by apache; the desired information about each image may have to be set in the database during ƒmake JournalInfoƒ.

6 1 1 (+) [-4+]mCQK bork-journal 20111113 20111113 0 -13+ journal_2011.html
The flaw with postmodernist theories is that they remove context when they decontextualize and do not pay attention to the contents of cognition when they decontextualize everything to discuss intelligence in general where type of thinker human and machine was not really thought until the current Internet age as the third in the sequence orality, literacy, internet. That is, oral as humans, spoken languages, literacy as human visual languages, and TCP/IP internetworked electronic computing machinery as defined by Maner as machine languages and being, Another option is the still not spelling correct orality, literacy, electricity, but you sacrifice having to prove the equivocation of internet and electricity: how do you say this without images? Is not this very question (PHI) a vestige of human embodiment? The way capital I is said or hystericized constitutes the human response. The machine response seems inscrutable, impossible to comprehend, and therefore at a second order or level unimaginable because we do not even think about what it is like to think like a machine. Yet it is hard to describe what it really means to think like a human, too, without postmodern theories being part of your approach, and therefore necessary tools to learn to commit to our programming toolkits. Programming eats philosophy and all other academic discourse, theory, and practice by humans to the extent it is likewise thought by computers across the required temporal orders of magnitude, minus x to plus y resolution for each order of magnitude, thousands of years for humans to nanosecond intervals for machines. How fast must the CPU operate to compute with nanosecond precision, or millisecond physical input output control? These are two different threshold values, for which the limit cases are handled by every faster and better computers, whereas what I call the shortline cases seem to have no evidence of being programmed. Consider the problem of reverse engineering any millisecond OOM digital I/O control system be part of my imagination understanding of how computers work. It will take much careful preparation to accelerate, in the sense of Engelbart type C activity, learning all the angles about how computers work to facilitate developing both the practical skills to build electronic circuits and knowledge sufficient to reverse engineer an existing computer. It is simple. Touch some software project likely to be preserved for hundreds of years so your artificial selves can live beyond the death of the human being.

6 1 1 (+) [-4+]mCQK bork-journal 20111117 20111117 0 -61+ journal_2011.html
Mistaken pronouncing of Rabbi ending ee (proper sonic/phonetic symbol) instead of eye (proper sonic/phonetic symbol) in final seminar of sounds of texts and technology course informs program design concerning corrections to default saying by espeak of this English word and then the entire Greek of symposium rendered by users over time by submitting tokens (signifiers) of each Greek word rather than copying from the Perseus website or out of Loeb library books read from libraries into the Internet. Do I not have the Loeb book? No, I have Phaedrus, one of the other significant ancient Greek texts in my study along with Xeonphon and DL. Let us digress into the common types of text to speech synthesis programs, in particular ƒformantƒ (or is it ƒfomantƒ?) synthesis, starting with Wikipedia or the likes (quick reference).

Synthesized speech can be created by concatenating pieces of recorded speech that are stored in a database. Systems differ in the size of the stored speech units; a system that stores phones or diphones provides the largest output range, but may lack clarity. For specific usage domains, the storage of entire words or sentences allows for high-quality output. Alternatively, a synthesizer can incorporate a model of the vocal tract and other human voice characteristics to create a completely "synthetic" voice output.
The most important qualities of a speech synthesis system are naturalness and intelligibility.[citation needed] Naturalness describes how closely the output sounds like human speech, while intelligibility is the ease with which the output is understood. The ideal speech synthesizer is both natural and intelligible. Speech synthesis systems usually try to maximize both characteristics.
The two primary technologies for generating synthetic speech waveforms are concatenative synthesis and formant synthesis. Each technology has strengths and weaknesses, and the intended uses of a synthesis system will typically determine which approach is used.

Concatenative synthesis is based on the concatenation (or stringing together) of segments of recorded speech. . . . Formant synthesis does not use human speech samples at runtime. Instead, the synthesized speech output is created using additive synthesis and an acoustic model (physical modelling synthesis).[26] Parameters such as fundamental frequency, voicing, and noise levels are varied over time to create a waveform of artificial speech.

Because formant-based systems have complete control of all aspects of the output speech, a wide variety of prosodies and intonations can be output, conveying not just questions and statements, but a variety of emotions and tones of voice. . . . Creating proper intonation for these projects was painstaking, and the results have yet to be matched by real-time text-to-speech interfaces.

Articulatory synthesis refers to computational techniques for synthesizing speech based on models of the human vocal tract and the articulation processes occurring there. . . . Following the demise of the various incarnations of NeXT (started by Steve Jobs in the late 1980s and merged with Apple Computer in 1997), the Trillium software was published under the GNU General Public License, with work continuing as gnuspeech. The system, first marketed in 1994, provides full articulatory-based text-to-speech conversion using a waveguide or transmission-line analog of the human oral and nasal tracts controlled by Carr ƒs "distinctive region model".

That is the basic idea. Features from sound studies such as Barthes grain of the voice and hermeneutic hearing will be added as stretch goals for the system design. Consider the alternative types of synthesis that [do not rely making thing by is the same as not. My program needs to replace this comment with something more meaningful beyond localhost, but I will not bother with coding that now so you know the implications consequences.] processing snippets of ƒprerecordedƒ speech: for these programs. Formant synthesis has a sonic envelope defining the bounds of each instance. Just look at the arguments to espeak in my sample program:

  • volume

  • speed

  • pitch

  • pitch range

  • language or voice signifier

Together, these define the range of the sonic envelope of any content that may be produced during the running of the standalone program or, in a controlling program like symposia, the function call of the API. Here, at the discussion of signifier and voice, boundless philosophical digressions PHI (purple). Note also articulatory synthesis is modeled on vocal tract, and there is a FOSS project called gnuspeech, linking to Sterne. Assignment is to revise existing FOSS or write from scratch to display refresh delay in hours, minutes, seconds rather than milliseconds, which is what the Javascript uses (thinks in). See at the foundation of where we stumble and resort to poor style ending sentences with prepositions when we are talking about computer languages where Ong did not want to go because of their lack of naturalness meaningless to a child who learned to program naturally as part of its built environment. You need to be already thinking about the solution is how I approach programming teams, although there is a type of programming that I do not share (emit as FOSS by publication of FDL images and text and GPL program source code). This is how you share programs today thanks to Stallman, Torvalds to give us GNU/Linux, as the media inventors comparable to Edison, the Steve Jobs of his time. However, Kittler cleverly points out that Edison failed to merge all three media technologies of gramophone, film, typewriter, for he rejected the typewriter where it famously went to the arms manufacturer Remington. Neither Gates nor Stallman can entertain these thoughts, lacking the formal training in academic philosophy although they do possess significant technical skills to qualify as having enough experience to be philosophers of computing. Expert at ten years, a decade, impossible for programs to think yet but soon to be the norm once established: this kind of AI birth is like what Kittler invokes of Lacan, that which finally ceases to not write itself. Such language machines never before existed outside of human minds; nobody believes libraries or other collections of written things (also pottery, bookstores, bookshelves, boxes of books, beer cans) think.

http://sourceforge.net/p/symposia/code-0/2/tree/trunk/symposia.cpp
Usage: symposia [rate [volume [pitch [range [language]]]]]

Well, I was close. I have volume and rate reversed. How could fundamental frequency, voicing, and noise levels are varied over time to create a waveform of artificial speech not be relevant to the sound studies course? Of course, I have to make all the connections, which I started last night. Time tripping through tomorrowƒs past encountered heavily customized Kuhn notes doubting all of whose Word Perfect features did not losslessly transfer to HTML.

6 1 1 (+) [-4+]mCQK bork-journal 20120326 20120326 2 -4+ journal_2012.html
Like others (Stallman, Torvalds, and so on) I am doing philosophy by programming, writing code working code. My dissertation is a work of philosophy; it is also a collection of programs. What I am introducing as new is the explicit use of the method of programming as humanities scholarship; all others besides those working large bodies of code do so haphazardly, or are induced to follow direction from others based on their priorities and objectives. HTML is so TCP IP version four eye three eighty six (i386), autonomous computing systems beyond the fantasies of early electronic computer pioneers but near the old end of the pre Internet era.

6 1 1 (+) [-4+]mCQK bork-journal 20120528 TAPOC_20120528 0 -3+ journal_2012.html
What if you had a way to sit down typing interpret the activity as that of machine cyberspace, reducing to equations to equidistant virtual reality machine representation shared by human and machine users, so as to encode that data and move on knowing you could count on retrieving it later in life, perhaps a year from now in seconds difference from current timestamp. Encode it into my tapoc project (and pmrek, poller, and most imporantly symposia). What happens at the cybersage workstation captures crossing of human and machine intelligence thought basis intersecting in my typing this stuff now then others including my future selves reading it later.

6 1 1 (+) [-4+]mCQK bork-journal 20120602 20120602 1 -2+ journal_2012.html
Rejuvenating learning programming among adults alludes to Catullus and the thought I wrapped around Catullus back when I was originally thinking about symposia, fantasies of virtual realities that I can now, twenty years later, dimly produce with TCP/IPv4 HTTP HTML, Ogg Vorbis data sequences (note Stephenson mentions liquidation of all media contents and contexts into digital data in a way to consider along with Kittler, whom Hayles wants to cross out and replace with her own nuanced interpretations), and finally formant text to speech synthesis, which can be achieved with a little more tweaking, versus human years of software development, of two or three concurrent projects I have been maintaining. To have been maintaining free, open source software projects becomes a means of creating long term memories in cyberspace.

6 1 1 (+) [-4+]mCQK bork-journal 20120709 TAPOC_20120709 0 -1+ journal_2012.html
Ontology becomes analysis of electrical buses where each point is taken as positive, ground, control function.

6 1 1 (+) [-4+]mCQK bork-journal 20120808 TAPOC_20120808 0 -3+ journal_2012.html
Toward a philosophy of computing is a shortcut for philosophizing with electrons, performing programming and system integration operations as a basic constituent of digital humanities scholarship, such that the towards occurs by doing both of these concurrently, predominantly writing but significantly programming, that is, electronic computer programming in the sense that prior philosophy close to ninety nine percent writing now eighty percent writing and twenty percent programming, by which I mean working code, occurs in the context of a milieu of electronic computing machinery constituting the built environment co-inhabited by humans. Working code includes writing source code that is compiled into complex systems as well as immediate, short command line or other user interface operations like making directories, copying, rsync, and countless other machine operations. For this reason imagine three or four core courses that I teach, philosophy of computing, introduction to electronics, introduction to programming, philosophy of technology.

6 1 1 (+) [-4+]mCQK bork-journal 20121014 20121014 0 -24+ journal_2012.html
Knowledge that the last being Friday though the last visible the tenth does work in cognitive, computational spheres, following Clark who presents the most believable and up to date (whatever the ancient equivalent of this term is) account of intelligence, cognition, consciousness, thinking, including the quote historical context milieu simulatable in virtual realities quote Heidegger object that can be articulated via GNU make files starting software systems instantiating that cognition, whereas the drill of cutting lemon, cleaning fingers, putting away lemon and filling mug with chilled, filtered water represents the phenomena Clark presents as embodied human being. Spreading the load, self-structuring of information, supporting extended cognition threads joined by hypothesis of cognitive impartiality and hypothesis of motor deference. Clark presents the clearest, most sensible, up to date basis for philosophy of computing as it intersects mind, cognition, consciousness, subjectivity and ultimately the human.

[working code css]
javascript:NPR.Player.openPlayer(35,%200,%20ƒ10-13-2012ƒ,%20NPR.Player.Action.PLAY_NOW,%20NPR.Player.Type.PROGRAM,%20NPR.Player.Mode.MODEL_FROM_FILE)
jbork@alkibiades:~/Downloads$ file 20121013_waitwait_01.mp3
20121013_waitwait_01.mp3: MPEG ADTS, layer III, v1, 64 kbps, 44.1 kHz, Monaural
jbork@alkibiades:~/Downloads$ audacious 20121013_waitwait_01.mp3
[working code css]

Looking at the command executed by the browser hoving on Listen to the Full Episode reveals putatively Javascript invocation of NPR.Player.openPlayer object taking arguments including one that is putatively the desired date, which is yesterday today, the the most recent show we all knowing to be Saturday the thirteenth, that was yesterday. Perhaps the player object will permit downloading the podcast, which is the choice I want to make to translate into human computer symbiosis interface cyberspace operations. They are both system and unit operations, making effective the bringing forth of the sound of a reproduction of the public radio broadcast I missed yesterday. This intervention partially worked in the sense that it only downloaded and played the first segment of the show.

6 1 1 (+) [-4+]mCQK bork-journal 20121104 TAPOC_20121104 0 -30+ journal_2012.html
Species being becomes typing in notes as memory of reading texts that go into my notes files being on verge of possible infringement of flip side of creative potential of manageable rights bounding copyright versus licensing computations in galaxies of meanings of words and possible worlds of experience reading and hearing a reality environment around which the human stumbles around in a rich media environment including books, screens, and other projection implements.

Working code revolves around prettying the display to reveal new ways of thinking with our machines. But this requires some changes.

[working code css]
jbork@alkibiades:~/src/tapoc$ vi journal.cpp
jbork@alkibiades:~/src/tapoc$ vi genjournal.cgi
elsif($param eq "session")
{
# 20110104 custom popup_menu array of values based on query; for now fake it
print "<tr>" if(!$column_count++);
print "<td><br>$param</td><td>".$cgi->popup_menu(-name=>$param, -values=>[ƒƒ,ƒ1ƒ,ƒ2ƒ,ƒ3ƒ,ƒ4ƒ,ƒ5ƒ,ƒ6ƒ])."</td>";
jbork@alkibiades:~/src/tapoc$ sudo cp genjournal.cgi /usr/lib/cgi-bin/genjournal.cgi
[working code css]

Today working code modified the range of session offerings, a rare change to the PHP, I mean Perl, script part of the project. What should I do is different from what should we do because someone could rewrite to do the query while for me alone it is better to stick in another hack using a handful of extra characters. Both browsers fail my test; changing the zoom in one window affects all the others, even though it seems obvious I as a human user would want them to stay as they were and only apply zoom changes to the current view. That is, display zoom changes should not be global, meaning zoom setting among tabs must not be global. Finding the tab level unusable, try again with separate windows. Firefox still changes the zoom of all tabs, not just the one whose scrutiny I wish to adjust. Unexpectedly, both browsers failed the separate window test, too, a strangely obvious example of where current mainstream state of the art multiple concurrent view offering technology operates. The solution is to use one of each browsers, for the keyboard operations are captured and encapsulated by the browser with focus regardless of the fact that both are in view, whereas when using two views of the same browser, whether tabs or windows, the zoom operation annoyingly affects both. Thoughts broken by horrible session of working from home trying to help get the disaster recovery system working via a slow, remote desktop link. Sorry to have given up on the DH conference submission, but after this fiasco it would have been hampered even with the grace period for forgetting to attach the proposal document. In the beginning were nay-sayers like Heidegger and Ong, then first looks by Busa, Turkle, and those who collaborate to create electronic literature, archives, and other digital resources but who do not focus on the role of practicing programming and information technology integration skills to critically, leading to a period of somnolence until free, open source cyberspace (Floridi) began enacting democratic rationalizations. I see these steps, (1) beginning with poststructuralists Derrida, Ihde, Latour, Buck-Morss; to (2) postulation of post-postmodern identities by Ulmer (Lacan), Hayles, Clark; intersecting (3) software studies led by Kittler, Manovich; from which has emerged in the last few years (4) critical code studies, promulgated by Marino, Berry, Applen and McDaniel. My specialization extends into critical code where others emphasize philosophical and rhetorical insights, applying Geeƒs distinction between active and critical learning, a sort of unit operation that may be denoted as (McGann, Turkle)++. By determining projects, giving examples, working code as both activity and scholarly product. Thus whereas McGannƒs fortuitous deformations yielded insights for human consciousness leveraging the accidental, programmed, subject-less effects of Derridean and Ulmerian inventive techniques, tests in the context of larger, determined projects such as a scholarly archive, I am arguing that the democratic rationalizations engendered by the proliferation of free, open source software dramatically opens the field to idiosyncratic, personal projects that may not have a clear trajectory beyond the next iterative insight dependent upon in progress, often buggy and imperfect hacking. An example is the set of projects symposia, tapoc, pmrek by which I am juxtaposing the famous series orality, literacy, and PHI, not settling on Ulmerƒs electracy or my own characterizations cyberspace, programming, and others, as a comprehensive dive into the human machine symbiosis afforded by critical working code studies, in which we attempt to intuit, feel, sense aspects of machine embodiment nondiscursively, nonsymbolically, along lines argued by Hayles in Electronic Literature. Besides the personal effects on the hybridized subjectivity of digital emigrants from the Gutenberg galaxy, I am also throwing out the suggestion that through such assemblies the Big Other of nonconscious technology replies. Borking public radio means it is indiscernable whether a real time or recorded public radio broadcast is being experienced, or programmed simulacrum stitched together from database samples of real broadcasts and formant synthesis of my own devices. Nonetheless, the examples themselves are contextually bound to the slow iteration of small changes I have been making to this suite of programs over the years in response to my philosophical studies and to further their exploratory reach. Working through the debugger, for instance, to solve a segmentation fault in my C++ source code, or logically reasoning why an incorrect default setting deforms an expected dynamic display, some times being distracted by musing based on incorrect assumptions about what is wrong, the root cause, infamous red herrings, for example the sha1sum discrepancy that I will discovered later in future, more recent journaling entries, that Sourceforge PHP correctly deforms the output trying to execute it rather than simply return the program listing when wget requests it.

6 1 1 (+) [-4+]mCQK bork-journal 20121110 TAPOC_20121110 0 -14+ journal_2012.html
I am going to speak about unit operations as programming objects forcing dive down phenomenologically as instantaneous truth functional binary bit unit operators. Your response if incredulous of the relevance doing the Phaedrus response you question ridiculously turning the conversation as a rhetorical operator forces me to elaborate, and you to (although in symposia virtual reality you can keep on speaking other concurrent textual thought tracings, connecting to the furrow, bite, piece, unit mentality do not have to stop making sound in order to) listen. Here it comes.

[working code css]
Nominate Items with todayƒs timestamp [[1-9][0-9][0-9][0-9]1110]? y/n:y
Is [progress/2001/11/20011110_amusement_auction_1.jpg] relevant?
executing SQL [update Items set Relevance=1 where Path=ƒprogress/2004/11/user_pmrek_20041110.cƒ]
Is [progress/2010/11/interview_20101110.pl] relevant? y/n:
jbork@alkibiades:~/public_html/progress/2010/11$ sudo apt-get install gvim
jbork@alkibiades:~/public_html/progress/2010/11$ sudo apt-get install vim-gnome
[working code css]

Oh my gosh, did you see it? It came through working code, seeing the mistake knowing how to programmatically leverage in the future, in the sense of having faith that you will be able to have ready at hand at that future time. First I think there was an extra one in the timestamp, then I realized it is probably because there is no journal entry for today in 2001 that the image does not appear in the seventh view PHI I see today. Learn the Perl program can be retrieved from the webserver without mangling like PHP which has been prohibited from being submitted for extra computational view, that is, for also being viewed by humans in learning how to program. Had to do a quick install of vim-gnome to allow GUI browser to invoke gvim as it did not work with vim at the GUI level.

6 1 1 (+) [-4+]mCQK bork-journal 20121117 TAPOC_20121117 0 -7+ journal_2012.html
Appeal to Latour super critical subject built from Turing to evaluate ethic of studying technology, what seems missing from a Deleuzean analysis for post postmodern perspectives. The enormous furrow by which philosophies of computing incorporate produces a plane of low resistance, wandering inscribing space of thinking to roam like the wolf, where others have cast the postmodern subject as shift from mole to serpent. Moreover, and perhaps more precisely, it is no longer sufficient to focus on one theorist, if one embarks upon the multidiscipinary method Latour recommends in Why Has Critique Run Out of Steam? conveniently answered by science, technology, art, and math, showing how it does run out of this conjunction as epitomized by Ulmer, given examples of electronic literature by Hayles and others. Bring the probity of taking seriously Kittlerƒs claim that what is important in studying media is schematism of perceptibility afforded by the circuits oddly similar to the philosophical term phenomenology. Incumbent on students teachers included is sufficient understanding of electronics to think about how programs running in computers work. Do not just sense, intuit machine embodiment by following Cayley this is the necessary consumer effect but also by long habituation writing programs and thinking about operation of high speed (beyond millisecond computational cycle, microsecond and beyond) electronic circuits.

6 1 1 (+) [-4+]mCQK bork-journal 20121120 20121120 1 -10+ journal_2012.html
This is how you enter as me the philosophy of computing human crossing machines. This crazy journal software system is a C++ class in the domain of the software project tapoc and pmrek and symposia and other programs software running biasing (Kittler spoke of biasing in sense of alternating current electrical theory running PHI. The parenthesis can continue). TCP IP version four is the local level of analysis, imagine whole galaxies of meaning as other running systems around times PHI concurrent to the inscriptional milieu. (This is, in fact, an ethical comportment towards others technologically informed, between human subsystems like interoperability between machine subsystems. It also gets us past the barrier Derrida believes impassible choosing to write about the significance of his pressing a key on his Macintosh) Time taken to move back to the top of the HTML text like bonus count of Paragon, which I hope one day to work into pmrek.

It is fitting, if not hilarious, that Derrida wrote a book about his discovering himself writing with a personal computer. If Kittler disparages all human art, not matter how beautiful, because it means nothing to data systems, which only try to keep TCP IP version four galaxies of meaning networks if you want to talk about networks I want to talk about programming going, Clark provides sound scientific theory, and Hayles and Ulmer craft the literature advancing digital humanities to take a second look at programming. Picking up with Barthes, stating the relation which unites the concept of the myth to its meaning is essentially a relation of deformation (91), my proposal is to extend the role of programming in digital humanities research beyond fortuitous deformations of Cayley, McGann, and others, into deliberate experimentation with machine cognition complementing human reasoning by working code. What Derrida reaches, as a hacker emigrant at best but mostly a technology consumer, proclaiming the moment has come to accept a great stirring in our conceptual archive, and in it to cross a ƒlogic of the unconsciousƒ with a way of thinking of the virtual which is no longer limited by the traditional philosophical opposition between act and power (67), programming philosophy/philosophical programming engages, transporting philosophy into software via critical code studies as Cicero shifted it to Latin Rome on its trajectory to polyglot power points of Western late capitalism.

6 1 1 (+) [-4+]mCQK bork-journal 20121201 20121201 3 -25+ journal_2012.html
I begin (or perhaps should end, or demote to a note) with an example in which Heidegger s hermeneutic phenomenology applied to electronic devices, namely the thyristor, cousin of the transistor and silicon controlled rectifier (SCR), is perfectly appropriate and adequate for theorizing post-postmodern embodied cognition in the context of network technologies, if agreed by the latter to be TCP/IPv4 phenomena being, given time, epistemologically transparent, as opposed to more complex systems like natural, including human, automata (subjectivities), thus suggesting that philosophy follow von Neumannƒs recommendation to start with studying artificial automata even to address classic humanities questioning. Recall that thyristors traditionally conceptualized with flashing strobe lights appear many other places requiring less extreme bursting forth as SCRs, for example in the TTL computer controlled switched lamp circuit of a particular pinball platform. That which flashes out, lights, shines, shimmers, is detected, read, input, viewed, known most brilliantly, or as Heidegger puts it in The Question Concerning Technology, to ekphanestaton, that which shines forth most purely, emanates from devices materializing (in Hayles sense, versus more general physicalizing) thyristor electronic devices, and so it is appropriate to muse for a minute about them by performing a Heideggerian approach, and then continue with a Hayles style meditation on these particular electronic devices that constitute our shared built environment, i.e., technogensis. Heidegger s approach gets us going, steers, but is not a primary component of the final control element although of course it influences the final control elements. This extreme case of a sound Heideggerian approach to network analysis will be explored further after some shortcomings are recognized and addressed by other theorists.

Let us return to this founding text of technology studies, prior to triggering the SCR, summarizing the philosophy of technology with the pair danger/saving power. Heidegger muses hermeneutically upon Greek phenomena through language, poetically: in Greece, at the outset of the destining of the West, the arts soared to the supreme height of the revealing granted them. They brought the presence of the gods, brought the dialogue of divine and human destinings, to radiance. And art was simply called techn . It was a single, manifold revealing. It was pious, promos, i.e., yielding to the holding-sway and the safekeeping of truth (34). Hermeneutic theories, according to Wolfgang Iser, are often illustrated by investigating works of art by a question and answer method popularized by R. G. Collingwood, and

each work of art is to be conceived as an answer to a question or problem prevalent in the respective historical situation within which it was produced. The work as an answer is bound to contain the question in the form of an issue that had to be addressed. Through the logic of question and answer we are able to reconstruct the context of the work to which it has reacted, thereby making us present to a historical situation that has never been our own. Thus a truly historical interpretation of the work of art emerges, which allows us both to reenact the work on its own terms, and to begin to understand its otherness. (39)

The Heideggerian circuit seems to be: (1) cultivate the Greek experience of techn (2) reconstitute the current experience of technology in a way that acknowledges its rootedness in the Greek experience. However, many critics complain that Heidegger s response repeated response is a nostalgic retreat to handicrafts, putting his approach at odds with the task of accounting for contemporary networks. Indeed, the recognition of danger/saving power is meant to inform those who enter its milieu (Mitcham, Kittler).

6 1 1 (+) [-4+]mCQK bork-journal 20130407 20130407 0 -3+ journal_2013.html
Human trust in air, water like machine trust in C, C++, Perl, PHP, shell scripts. This is an initial thought of a philosophy of computing. We may find that we misconceived early programmers who were women (female humans), forgetting none other than Grace Hopper was an early evangelist of programming languages, creating the differentiation of software from hardware specialists and giving to the programmers the lions share of employment (Campbell-Kelly and Aspray on Garmisch conference).

6 1 1 (+) [-4+]mCQK bork-journal 20131124 20131124 5 -42+ journal_2013.html
The project based organization is meaningful to both humans of particular salary grade and title and machines of certain levels of complexity and speed of operation and overall storage capacity over time PHI. Notice that even today I can still be talking about how Johnson in the third edition of Computer Ethics miscast the as yet named floss as did the typical corporate IT manager of the time, imbuing software itself with the production model of the individual competitive market property owner and work ability giving salary matricies (more than one matrix) and work schedules. If I ask this question during every presentation maybe one day option D Unix-like Suite of System Programs will be the mistaken collective response instead of the current static andthose who understand that it must not be C Shareware Operating System just criticized in earlier philosophies of computing and programming. Add Unix Operating System Donut Model to slide deck in current parlance. Imagine virtual background image as picture of the day injected during dynamic HTML creation of tapoc proposal crossing presentation slides including old MPC reference. The first slide illustrates threat the second intellectual decline. Programming consummated the electrification of print and now human machine trajectory has the former bottoming out in the dumbest generation of Nietzschean last males the age of unreflective digital culture. There is one image for each subheading approximating petchu kitchu presentation format as obverse of stating it will fit on a thumbdrive as Manovich and ultimately platform studies explains. The peak met by programming also included symbolic logic in academic philosophy instruction expressed in graduate levels as exquisitely complex means of representing reality and virtual realities, together exemplifying virtualities.

[working code css]
query for details got no result;
jbork@alkibiades:~/src/tapoc$ grep -n "query for details got no result;" *
gentapoc.cgi:926: $error_msg .= "query for details got no result; ";
(ellipsis)
./update_notes.sh
insert ignore into Notes (TextName,TimestampBookmarkExtra,PositionStart,Lexia,Path) values (ƒmanovich-software_takes_commandƒ,ƒ20131124ƒ,ƒ(97-98)ƒ,ƒLearning having enactive, iconic and symbolic components means removing need to program from interface unintentionally weakened human intelligence. (97-98)ƒ,ƒprogress/2012/03/notes_for_manovich-software_takes_command.htmlƒ) on duplicate key update PositionStart=ƒ(97-98)ƒ, Lexia=ƒLearning having enactive, iconic and symbolic components means removing need to program from interface unintentionally weakened human intelligence. (97-98)ƒ
select * from Notes where Path=ƒprogress/2012/03/notes_for_manovich-software_takes_command.htmlƒ or TextName=ƒmanovich-software_takes_commandƒ order by TimestampBOokmarkExtra
select * from Notes where Path like ƒ/home%ƒ
DELETE FROM `JournalInfo`.`Notes` WHERE `TextName`=ƒmanovich-software_takes_commandƒ and`TimestampBookmarkExtra`=ƒ20131124ƒ;
manovich-software_takes_command [/home/jbork/public_html/progress/2012/03/notes_for_manovich-software_takes_command.html] [36] [software_takes_command_20131124] Learning having enactive, iconic and symbolic components means removing need to program from interface unintentionally weakened human intelligence.
(ellipsis)
http://localhost/cgi-bin/gentapoc.cgi?operation=update_notes&source_file=progress/2012/03/notes_for_manovich-software_takes_command.html&debug=1
Journal::refresh: try alternate path more suitable for common webserver terminology but still lacking security
Journal::set_source_file: set to /home/jbork/public_html/progress/2012/03/notes_for_manovich-software_takes_command.html
Journal::refresh: able to access source file [/home/jbork/public_html/progress/2012/03/notes_for_manovich-software_takes_command.html]
if(*this->source_file==ƒ/ƒ)
if(!memcmp(this->source_file, DEFAULT_ABSOLUTE_PATH, strlen(DEFAULT_ABSOLUTE_PATH)) == 0)

original_source_file = this->source_file.substr(strlen(DEFAULT_ABSOLUTE_PATH));
if(!memcmp(this->source_file.c_str(), DEFAULT_ABSOLUTE_PATH, strlen(DEFAULT_ABSOLUTE_PATH)) == 0)
if(memcmp(this->source_file.c_str(), DEFAULT_ABSOLUTE_PATH, strlen(DEFAULT_ABSOLUTE_PATH)) == 0)
(ellipsis)
sptr->bookmark_map = find_bookmarks(sptr);
sptr->source_file_name = original_source_file
[working code css]

Not knowing where the fix needs to be made, working in to add latest note from Manovich via cow clicker interface in browser without having to use MySQL Workstation. Discovering finally a problem with Path being set to an absolute path /home/jbork/public_html/ versus the expected relative value of Path beginning with progress. A bug in the tapoc software yielding five hits including the desired Manovich wedged into this evenings work tying experiential division of learning beyond symbolic exemplified by programming to enactive and iconic, building argument that taking away need to engage via programming removing key component of learning affording human to machine comportment. The five are bolter, bukatman, jenkins, latour and this manovich. The question is, under what conditions where these Notes entries created? Could they all be from the cow clicker screen, which routinely updates existing but rarely inserts new records, that is, the operation adding new Notes being run from the webserver CGI versus my command line interactive user shell script? Easy to test by deleting the Manovich and clicking the hyperlink again. Part of the problem troubleshooting is my own 500 ms back operation that aborts contemplative viewing of the verbose run time output that otherwise disappears into oblivion typical of interactive sessions. It needs to be careful when settting Path to ignore that likely fact that the webserver version of the journal executable rightfully added the absolute path prefix so it could find the file on the cybersage workstation in my user directory versus in the webserver root directory as it works on the secondary user virtual machine systems. Once some silly mistakes regarding strings versus char arrays are fixed, a dumb logic error with !memcmp remains as evidence of my distracted state of mind. Finally the real solution is found to be resetting the source file name after finding the bookmarks, since the prefixed name will necessarily be set in the structure, and that is from where the query is fed.

6 1 1 (+) [-4+]mCQK bork-journal 20131128 20131128 8 -7+ journal_2013.html
That an automated discourse analysis takes over significance in machine network computations over human topics even as it sustains human communication does not entail meaningful content qualifying the cognition of an other that is not us. However, it acknowledges its higher probability than arising in prior media forms, pointing toward another version of Kurzweil singularity. It also differs from the mere accidence of emergence that theorists like McGann and Ramsay would likely tolerate, for we can further it along by writing for the machines while we write for ourselves. Contributing to this effort may seem dehumanizing, venturing the Heideggerian danger of technological, calculative thinking if not simulacral postmodern insignificance and madness, yet where do we expect to dwell in the distant future when our bodies near natural death? Most likely in virtual realities coinhabited by human and machine others, and bathed in real virtualities of information, art, transductions (instrumentated interfaces to physical world) and simulation. Better to produce content and write the code that governs that eventual milieu than arrive by default as habitual consumers whose production value amounts only to a lifetime of social media generated for the amusement of our fellows with little multipurposive programming. Capta shadows instead of deliberate cybersagacity.

6 1 1 (+) [-4+]mCQK bork-journal 20140102 20140102 1 -2+ journal_2014.html
Adding Rushkoff as obvious example calling from renewed interest in programming adding now technical details to approach noticeable working code component percentage of real time processing PHI. And that is all and that is all there is to it makes sense to say and fits into song in sense of either genotype or phenotype employing Barthes distinction narrative programmed vision.

6 1 1 (+) [-4+]mCQK bork-journal 20140309 20140309 1 -3+ journal_2014.html
The basic problem of the period seems to be that humans are getting dumber while machines continue improving their improvement; there is no collective human thought compared to machine defaults. Casting situation as peripheral characters of couch dwelling spaceship inhabitants subjected to control by machine defaults aligns with trend of life becoming perpetual adjustment to control systems down to requests for optimal operating conditions as preconditions of work progress efficiency effectiveness return value et cetera, capturing shift in language replaced by instance of true to both languages before and after punctuation, although depart from Malabou choosing programming as response to question what should we do with our brain: we should program, read and write software, working code, work code. What is desired for the game to work is wanting that which is offered as a sensible programmed solution to a problem manufactured to be fed in as a question for such an evaluative apparatus as is gained by studying and doing programming along with default ideologies of post-postmodern dividual cyborg networks.

6 1 1 (+) [-4+]mCQK bork-journal 20140317 20140317a 0 -14+ journal_2014.html
What does it mean to myself that I am a number to my boss akin to pebbles employed in calculation or handheld devices or other parts of built environment milieu background network either TCP/IPv4 or daring TCP/IPv6 that I do not yet know: for some minutes I imagine declaring it after introducing book Programmers and Managers. Control be borking public radio PHI passing through human machine Internet cyberspace phenomena PHI. And now I turn on recorded music PHI mixed with ensoniment instances by executing scripts, for example BASH shell scripts that build and then start in the context of ordinary user starting the machine via a recognizable start script PHI. That is where they do not know anything any one on my committee readership who does not program, that is a fact of life like literacy and listening (Barthes). Computation has always been embodied in human machine undertakings PHI experiencing transition in intensity down from ecstasy to ordinary reading consciousness PHI. Local hosts are the response to siren servers (Lanier). Reach software automatic links to Euphon and SAM of 80s computing. The other way to see it is through what we got for which floss is adequate and incorporating outliers in corporate cathedrals. Programmers occasionally switch with philosophers. It is perhaps a problem of how philosophers philosophize, sensed by Chomsky of Lacan and Zizek, Heim of Heidegger, as Latour deprecates using old tools for new problems. A new way of philosophical thinking accompanies reading with German ensoniment of German version of Heidegger. That is the philosophical I am destining myself, sense. Starting from the beginning, making adjustments to existing notes and adding occasional new ones to various texts, see I am stuck on Heideggerƒs America, as if dislike of writing with punctuation knowing conflict with certain natural languages, for example MySQL, the way spaces disturb default GNU/Linux filesystems. In this activity two, three if adding duplication of journal notes techniques of dissertation cow clicking function as changes in a text that may have occurred in a word processor or written page, although its significance escapes me.

6 1 1 (+) [-4+]mCQK bork-journal 20140318 20140318 0 -7+ journal_2014.html
Every philosopher must leave enough tracks to resume thinking in others both local host iterations and secondary cybersage. This is a day that does not exist yet in the two three line not referring to work but chapter headings in tapoc dissertation generator software being written also following OHCO like TEI XML but throwing in deep computability in an otherwise visual bitmap field of imagined hyperlinks PHI. For me out in the shed it was playing pinball against what seems an unexpected withholding of lit extra ball targets on a rapturous game of Stern Lightning as pmrek test, for a perspective can be shared in which various kernel level and ordinary user program level operations occur. Then entranced by an old image of a complex tiered IPv4 network wondering if still relevant in wireless cellular IPv6 network worlds. Nonetheless the temptation is to demand that when talking about networks in digital humanities we speak at least at this level of complexity and correctness, no less, like requiring specific levels of mathematical sophistication. That is why I take the walk through the years updating notes entries now for nearly a year, just one of potentially thousands of cycles. Entering working code for only a single command line operation not worth adding css delimiter sign as two extra rows of text.

6 1 1 (+) [-4+]mCQK bork-journal 20140325 20140325a 2 -21+ journal_2014.html
First of all even in programming we have to confront our evils whether American English or German. To say I turned off all network to use localhost did not say I eschewed any TCP/IPv4 networking, just anything outside the LAN. When Derrida spoke of his computer he meant the physical object that held his work writing text journal ideas art PHI, for we programmers it touches us as we write and do working code but rest of the time let it go off and do its own thing. It is the feeling of from around the time changes we experienced together and can recreate via floss assemblages PHI. Interesting to consider what is now considered flaw of floss that it enables siren servers as much as commercial environments PHI, but more important to explore what is now possible via floss to programmers who peaked in their 1980s teen era when their technology really was limiting their dreams that now can realize those formerly impossible programming dreams effortlessly via worldwide Internet floss operations PHI. More important to talk technically about networking, with acknowledgement to dangers of the art as form of what Janz recommends defining working code places for humans to operate. TCP/IP gives an infinite variety of projects. This is the same will of the Cartesian mind to persist through the thinking of a thought over which reading territorializes primordial virtual LAN contexts. The evils implicit in programming include ability to operate physical control systems implicit in any code with input or output operations forming closed loop feedback control systems running floss and my old coursework programs PHI GNU Linux C calls to kernel functions inb() and outb(). The craziest program I wrote ran a pinball machine with GNU Linux C calls to kernel functions inb() and outb() connected to how many bits ISA channel eight seems sufficient but sixteen and thirty two also possible though not utilized by earlier programmers. It is not enough to say there are networks that happen to be ensconced in early twenty first century virtual reality PHI, you have to be able to rapidly jump into them as instantaneous audio and visual surrounding environment computed within virtual world PHI borking public radio. It is a new form of Turing Test Borking Public Radio defined as likely story on this day any year, all during which at lower energy level another though occurs in experimental world of ensoniment tapoc pmrek. Imagine what level nine is going to be like with six and seven current world area transitioning into eight and nine as development of software tracks reality to reach this set of key things closest which is Turkle PHI beyond evocative objects. Not quite it but joining Marxism introducing new way of thinking via programming. The potential for a variety of projects from set of major lifetime programming projects participated in during long time doing ten to twenty percent consciousness working code like being IT worker of the era. Turkle advances from evocative to I forget look for the post, after searching rediscovering that early term from 8 bit pre Internet world, here it was in the upcoming section in the next heading level, carrier objects such as portable computer used by Derrida, for there is zero citation of working code, him thinking demonstrating structure of automatable object in structure of books as primary mode of thinking versus distributed trans LAN network phenomena, today comfortable but deprecated TCP/IPv4. Carrier fetish objects are great amusement for network and localhost embodied in the flesh and discrete machine dividuals. This blindness of floss to purposes for which software designed and put to use of engendering initial metastasis energy level plateau preponderance of what Lanier calls siren servers and I point out as evidence we are getting dumber in our use of machines; that is, the cleverness of our programming diminishes from height reached decades earlier for reasons of having a need to program now done for pay. By logic Lanier asserts our floss work rewards us and provides lifetime steady stream of usage for exactly as long as it is used by anyone or any virtual world PHI over ten thousand year period reconnecting us to thoughts of the ancients who wrote when humans first began to write en mass producing and depending on surrounding spoken written sonic realm is what ancient Greece may have sounded like via real virtuality ensoniment PHI. Noting Turkle also invokes philosopheme with cleverness of often cited coyote cyborg posited by Haraway. Note how our ability to identify with the programs equivocates with ability to understand ourselves as we use programs to wrap back around such that they themselves those program get confused comes back around grounding computing in human thinking surrounding what machines can do thus may be thinking also benefited by collective software environment, leading to question to Lanier how limits of scaling limits thought thinkable in remunerative accounting remembering complete interaction history even virtual selves in virtual worlds.

6 1 1 (+) [-4+]mCQK bork-journal 20140414 20140414 17 -1+ journal_2014.html
There can be an eighties computing experience like there was both, according to Turkle, romantic got to find what I am looking for in annotated bibliography for latest Turkle reaction to 1980s computation model of mind that must now be concurrently thought with Internet complexity but for older students they are appropriate, connecting to other philosophical arguments why worth learning programming in part with early personal computers.

6 1 1 (+) [-4+]mCQK bork-journal 20140527 20140527 0 -3+ journal_2014.html
A manager is metaphor controlling programs like people and takes on unique, interesting meanings when first cast into regimes grounded in floss programming. No we do not have an entry for two thousand four just white board image equivalent to vpf looking around visually as digital camera PHI. Memory mapped input output is a base point of philosophy of computing and computer programming.

6 1 1 (+) [-4+]mCQK bork-journal 20140602 20140602 0 -8+ journal_2014.html
Economies of scale are among the relationships everyone should understand in terms of possible procedural rhetorics PHI becomes the fundamental metaphysical rule PHI of all thing and each and everything as if consumed for computation by OOP PHI. The dumbest generation is the problem right now and we solve it by thoughtful programming in floss OOP objects PHI. Let computer science concretize or in terms of philosophers Deleuze and Guattari PHI programming. I am letting computer science territoralize philosophies of programming and taking computing and computer programming. The basis of chapter three is really the social construction of technology exemplified by Bijker and Hughes among others. Encountering the dumbest generation American Socrates PHI simple circuits PHI. The only metaphysical truth to be known and trusted is that books on the right hand bookcase are in the schedule and vice versa. Is that a workable programming thought is a question posed by philosophers of computing, computer programming, and of course programming, which we have yielded to computer science establishing territorial rights over computing instead, even letting psychology have computer programming, what is wrong with that as a compromise that becomes philosophical finesse I ask, leveraging its scope to pose particular philosophical questions such as how do I best learn how computers work from the ground up and establish a lifelong programming practice.

6 1 1 (+) [-4+]mCQK bork-journal 20140708 20140708 4 -1+ journal_2014.html
Broken down time exemplified in GNU standard library C struct tm permits real virtualities specifiable over enormous duration to millisecond through microsecond input output operations.

6 1 1 (+) [-4+]mCQK bork-journal 20140722 20140722 0 -5+ journal_2014.html
The philosophy of computing includes comparisons from Johnson editions of Computer Ethics and consumer computer architectures, from eight for the first edition of 1985, sixteen, thirty two for the third of 2001, and sixty four found in fourth dimension 2009 edition version PHI where we are now for the foreseeable future cone of our lifetimes ten thousand years beginning after all copyrights expire, constituting diachronies in synchronies hystericizing media production such as typing notes like these as PHI happenings empowering virtual realities thought spaces PHI. For a continuous focus on value to be computable instilling virtual realities themselves, structurally in the sense of embodying laws embedded made active turnings into computings, asymptoically cognitioning, thinking, turnings into logotropos machines PHI in code, default orientations favoring intellectual properties defaults in editions of Johnson, exemplifying what I mean by default philosophies of computing; another sort of default philosopher of computing will be explained through critical reading of Bill Gates, where explicit desires to shape future thinking about and uses for computing are powering the wealthiest individual human of the time, crossing all of these epochs, certainly straddling thirty two rather than native to sixty four bit computing interfaces. It also combines in simultaneous diachronous layers at synchronous historic moments exemplified by extant technologies of their times, together telling the story with modern aspirations yet amodern sensitivity. The little guy Robert Reich as an underdog hero intellectual moves in same track as Boltanski and Chiapello little people of cities exemplifying modes of capitalism or economic behavior itself. Stamp and even beer can collecting teach cultural history like sustained periods practicing close reading.

6 1 1 (+) [-4+]mCQK bork-journal 20140723 20140723 28 -4+ journal_2014.html
A visual collage like the experiment with GIMP and photographs made this evening resembles ontological finesses of broken down time. In the back triangulate 210-220 cm from the stump meeting 132 inches about eleven feet from the corner of the house, and in the front 137 inches from the corner meeting a measurement I failed to capture on the metric measuring tape. The experiment succeeds partially, not sure if the location of the survey flags can be located via future instrumentation, a theme of the middle Johnson, which notes at this moment need typed in to reduce the final remaining research hours for chapter one to commence writing itself with my human guidance steering what has been carefully arranged by hours of dissertation cow clicking. The ridiculously large waste of memory used by this failed image could hide an encoding of a ridiculously large amount of text, perhaps all the entire project source code revision histories.

6 1 1 (+) [-4+]mCQK bork-journal 20140724 journal_2014072 0 -1+ journal_2014.html
Human atrocities associated with computers since the twentieth century holocaust facilitated by IBM machinery have at least three historical eras, stages, epochs, periods, times, encountered in progressions by Johnson from first to third edition of book through reiterations by digital humanities scholars who inevitably assemble and use complex computer systems to do their work, the question being whether and to what extent they self program and self assemble those computing environments, what I am calling virtual milieu susceptible to ensoniment as example of another floss project working code critical programming, that is, by critically working code places to do philosophy of computing shine out.

6 1 1 (+) [-4+]mCQK bork-journal 20140904 20140904b 6 -2+ journal_2014.html
As the machinic enjoins the human thinking philosophizing conspiring computing. Notice we never get away from the Schreibstube, it is pervasive through human history in the sense Kittler intends in what counts are not the messages or the content with which they equip so-called souls for the duration of a technological era, but rather (and in strict accordance with McLuhan) their circuits, the very schematism of perceptibility (xli).

6 1 1 (+) [-4+]mCQK bork-journal 20140918 20140918 0 -1+ journal_2014.html
As they forgive IBM its past complicity with the holocaust, adults continue to excuse transnational corporations for sundry evils from noxious smoke to unhealthy beverages, and also laying waste to the American mind.

6 1 1 (+) [-4+]mCQK bork-journal 20141014 20141014 0 -4+ journal_2014.html
Here PID has a meaning in the real imaginary world playing reality sims.

[working code css]
(ellipsis)
PID=16203052700000010
[working code css]

Here PID has a meaning in the real imaginary world playing reality sims. This too is working code. Then I remember doing this last night after the day rolled is why the links are followed color, beginning with reference to Derrida and Ulmer relating to ensoniment of ancient philosophy.

6 1 1 (+) [-4+]mCQK bork-journal 20141029 20141029 0 -14+ journal_2014.html
What does it mean that the ground fault interrupter becomes the diagram of the times becomes central question in philosophy of computing: do you see how that works at the shimmering of fossification becomes a place for thinking embedded in machine networks PHI is the machinic collective intelligence from what was once most horrid machinery. Listen that evil is a different type than proprietary code; must consider how foss through GPL is the freeingness of code in which humans can give up their words as marks in the world. So this is what you see working code. PHI. So this is what you see working code. This becomes the following.

[working code css]
jbork@alkibiades:~/src/tapoc$ make
jbork@alkibiades:~/src/tapoc$ cp Notes-tapoc.sql Notes-tapoc_20141029.sql
(ellipsis)
jbork@alkibiades:~/public_html/progress/2014/10$ evince diss_workarea_proposal.pdf &
[working code css]

So this is what you see working code. PHI. The list of references is to be encoded, written as code as I also imagine the literature review enumerations of relevant texts making the dissertation chapter section narrative from progression of references and citations of notes of texts included in the list of references. It is still mainly done through text, now with living writing of program code components PHI. Why is there no railroad connecting Orlando and Atlanta when I see long passenger trains and it seems like an important route.

6 1 1 (+) [-4+]mCQK bork-journal 20141110 20141110a 0 -25+ journal_2014.html
The lesson from Hardt and Negri about how biopower works with computer programming languages is that it is good code all the way down, or at least to the extent that it seems to be, the logic of PHI reigns, holds sway, has a metaphysical ontological function. The as is situation is well explained by Hardt and Negri, who along with Boltanski and Chiapello propose a revolutionary, militant spirit opposing capitalism and empire that is not yet fully extended at the forefront of technological state of the art desiring production. Key working code session PHI.

[working code css]
jbork@alkibiades:~/src/tapoc-code-0/playpen$ mkdir 20141110
jbork@alkibiades:~/src/tapoc-code-0/playpen$ cd 20141110/
jbork@alkibiades:~/src/tapoc-code-0/playpen/20141110$wget http://70.159.28.10/NV_Records/details_img.asp?doc_id=5374412&pg_count=2&pg_num=1
jbork@alkibiades:~/src/tapoc-code-0/playpen/20141110$ ls -ltr
total 4
-rw-rw-r-- 1 jbork jbork 2470 Nov 10 19:20 details_img.asp?doc_id=5374412
(ellipsis)
file
(ellipsis)
jbork@alkibiades:~/src/tapoc-code-0/playpen/20141110$ file details_img.asp\?doc_id\=5374412
details_img.asp?doc_id=5374412: HTML document, ASCII text, with CRLF, LF line terminators
jbork@alkibiades:~/src/tapoc-code-0/playpen/20141110$ vi details_img.asp\?doc_id\=5374412
(ellipsis)
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=2>error ƒ80040e14ƒ</font>
<font face="Arial" size=2>[Informix][Informix ODBC Driver][Informix]A syntax error has occurred.</font>
<font face="Arial" size=2>/NV_Records/details_img.asp</font><font face="Arial" size=2>, line 269</font>
[working code css]

Key working code session PHI. Here the inversion of human documenting working code writing code that is eventually executed to get the job done at the time back then now when this is happening me typing hearing public radio real virtuality PHI. Here is also the Big Other responding to me in HTML instead of the hoped for graphic image format file. If anything all I see is an error message; evoking the 404 from programming command line rather than browser activity is a different interface with the machinic collective intelligence also rendering PHI. This municipality imposes Microsoft rule upon certain public cyberspace activities like accessing public records: it is the ethical sensibilities of taking this position that we ought to be questioning in the philosophy of computing programming. In the ideal view computed by the schedule algorithm it is still nine months out to complete with all the intended research in addition to planned writing. The as is situation is well explained by Hardt and Negri, who along with Boltanski and Chiapello propose a revolutionary, militant spirit opposing capitalism and empire that is not yet fully extended at the forefront of technological state of the art desiring production.

6 1 1 (+) [-4+]mCQK bork-journal 20141112 20141112 1 -1+ journal_2014.html
Cyberpunk philosopher now Hardt and Negri cyberspace multitude.

6 1 1 (+) [-4+]mCQK bork-journal 20141113 20141113 0 -19+ journal_2014.html
Starting from an image of the whiteboard that was not photographed is instead real virtuality PHI network phenomenon real time development dynamic object from OOP because I need to start working on chapter two in detail. The important but junk message of the day was unity dash dash replace to recover from GUI defect preventing use in blocking sense, freezing it up but hoping to recover and resume PHI. Last non LAN to go is pinball festival announcement Free Play Florida operating over this interval PHI. Sharing teleawareness outside LAN gets silly thinking of analogy to cyborg family life, which PHI also subsumes. Could combination of solar and flywheel provide battery equivalent storage between sunlight periods is another such other directed thought for personal reflection. Screenshot shows capture of fleeting forwarding page such that useless bookmark yielded from result for this county versus useful links built with parcel id or some other identifying data value passed in the HTTP request. I think it means pass Alt_key= the number it put in the text box that briefly appears before the request completes with uninformative URx. Here is a rendition of what was in the browser address text box window.

[working code css]
http://webserver.vcgov.org/propertyLookup.html?Alt_key=4655581
(ellipsis)
jbork@alkibiades:~/src/tapoc-code-0$ vi gentapoc.cgi
printf("<a href=\"http://$script_url?operation=decc_citation_sentences&source_file=$source_file&operator=$TimestampBookmarkExtra\">-</a> ") if($CitationSentences > 1);
jbork@alkibiades:~/src/tapoc-code-0$ sudo make web-localhost
(ellipsis)
if($operation eq "dec_citation_sentences")
[working code css]
Here is a rendition of what was in the browser address text box window. This is an example of the little people of the human machine cyborg multitude programming the Big Other. Fortunately I already coded dec_citations_sentences, or there would have been much more work in the Perl program. An error was initially made, do you see it? Whereas other days the entries fit together in the same section, the distribution today is as founding thoughts for many sections, especially for the foss projects.

6 1 1 (+) [-4+]mCQK bork-journal 20141115 20141115 0 -3+ journal_2014.html
This is the most recognizable background PHI like public radio synthesis PHI with text to speech software symposia operating with another foss espeak. Ensoniment means territorialize on genotype or phenotype instead of paying attention to nuances of the other, about which Hayles criticizes the details I cannot recall, discursivity, traces, and enter electronics. Fine just call it what it is electronics skipping other substitutes for electracy.

6 1 1 (+) [-4+]mCQK bork-journal 20141117 20141117 0 -3+ journal_2014.html
The time it takes me to get through a unit is much shorter than years, days, yet still a multitude of instants, of instances, examples of passing through passage program execution PHI. Diachrony in synchrony is the analysis of the area that is also temporal area timespace over sixty four bit temporal expression using broken down human time equivalents units PHI. So what that formant synthesis begins as meaningless code I think passing through previous thoughts afforded by my partially custom programmed dynamic time bound through technological era cyberspace being PHI.

6 1 1 (+) [-4+]mCQK bork-journal 20141120 20141120a 0 -75+ journal_2014.html
That a post postmodern mind thought up the quintessential emblem of modernism, according to Foucault, distinguishes cybersage perspective of taking into account affordances of media in compositions: this becomes tied to the image of Las Meninas, the painting Foucault describes in On The Order Of Things. That goes into the thinking on chapter two to cast as is situation from regressive subjectivity. Deep working code.

[working code css]
case ƒ9ƒ:

query = "select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat(ƒ%/ƒ,Notes.TextName,ƒ_ƒ,Notes.TimestampBookmarkExtra,ƒ.jpgƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/ƒ,Notes.TextName,ƒ_ƒ,Notes.TimestampBookmarkExtra,ƒ.pngƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/screenshot_ƒ,Notes.TimestampBookmarkExtra,ƒ.pngƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/vpf_ƒ,Notes.TimestampBookmarkExtra,ƒ.jpgƒ) and Relevance=1),ƒYƒ,ƒNƒ) from Notes where Chapter=" + Chapter.str() + " and (Heading=" + Heading.str() + ((Heading=="1")? " or Heading=0)":")") + " and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName ";
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat(ƒ%/ƒ,Notes.TextName,ƒ_ƒ,Notes.TimestampBookmarkExtra,ƒ.jpgƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/ƒ,Notes.TextName,ƒ_ƒ,Notes.TimestampBookmarkExtra,ƒ.pngƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/screenshot_ƒ,Notes.TimestampBookmarkExtra,ƒ.pngƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/vpf_ƒ,Notes.TimestampBookmarkExtra,ƒ.jpgƒ) and Relevance=1),ƒYƒ,ƒNƒ) from Notes where Chapter=2 and (Heading=1) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
(ellipsis)
query = "select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat(ƒ%/ƒ,Notes.TextName,ƒ_ƒ,Notes.TimestampBookmarkExtra,ƒ.jpgƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/ƒ,Notes.TextName,ƒ_ƒ,Notes.TimestampBookmarkExtra,ƒ.pngƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/screenshot_ƒ,Notes.TimestampBookmarkExtra,ƒ.pngƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/vpf_ƒ,Notes.TimestampBookmarkExtra,ƒ.jpgƒ) and Relevance=1),ƒYƒ,ƒNƒ) from Notes where Chapter=" + Chapter.str() + " and (Heading=" + Heading.str() + (((Heading.str())=="1")? " or Heading=0)":")") + " and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName ";
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat(ƒ%/ƒ,Notes.TextName,ƒ_ƒ,Notes.TimestampBookmarkExtra,ƒ.jpgƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/ƒ,Notes.TextName,ƒ_ƒ,Notes.TimestampBookmarkExtra,ƒ.pngƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/screenshot_ƒ,Notes.TimestampBookmarkExtra,ƒ.pngƒ) and Relevance=1),ƒYƒ,ƒNƒ), if((select count(*) from Items where Path like concat(ƒ%/vpf_ƒ,Notes.TimestampBookmarkExtra,ƒ.jpgƒ) and Relevance=1),ƒYƒ,ƒNƒ) from Notes where Chapter=2 and (Heading=1 or Heading=0) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
-2.1.0+++
query successful: update Notes set InterstitialSequence=200 where Path=? and TimestampBookmarkExtra=?
[working code css]

Deep working code. That is, C. Comment that after cleverly moving case to copy of formerly shared code with six, include zero when Heading one using logic in more complex single statement than multiple lines if traditional condition; cannot do in MySQL level. Now see if it works. At first it does not correctly test the primary condition, perhaps indicating misuse of the object, forcing explicit casting by invoking what amounts to a subobject operator available of the deeper C++. Here the ellipsis indicates run time uses between changes. And yes, now it works, though need to move initial value from one to two hundred to avoid generating title line row string in the presentation. The compositional mechanism behind tapoc includes this revision history through 5.4.1 entries logic.

6 1 1 (+) [-4+]mCQK bork-journal 20141124 20141124 0 -14+ journal_2014.html
Where your argument subsumes computing and is subsumed into computing is your blind spot where you do not think and you do not perceive, versus or PHI becomes testable logical expression of third order logic PHI. Some things only make sense doing with the multitude en mass like adding an X to the end of each comma delimited line avoiding having to count commas to express correctness test results in Excel spreadsheet milieu real virtuality PHI. Now that kind of telepresence is pretty far out but imaginable today pondering beer calories while considering telepresence television control from recliner with up down arrows only compared to alt control arrow combinations of typical 1980s arcade machine and emulators well beyond early step of Bogost to look at Atari VCS. For periods cease being the vigilant monitorial citizen and take a break listening to public radio to calibrate reality perceptions PHI. The oldest entry appears to be a citation from page twenty seven of some text, perhaps Derrida, addressing the German Un-Fug, and it also needs a terminating punctuation mark for the tapoc software to process the last sentence in parenthesis of next year expressing festering thoughts. Actually both need adjustment. Now a position at UCSC working with Wardrip-Fruin after expired Bogost opportunity continues to tempt loosening golden handcuffs of necessary engineer as privileged but still working class human social groups. Made everything today 6.2.1 wondering if it will be lost before better disposition in 6.1.1. A defecit of the tapoc system design no doubt affecting thought by limiting it. The outcome was to change some and leave others as things to do first considered decades ago.

6 1 1 (+) [-4+]mCQK brin-why_johnny_cant_code (np) 20130912d 0 -1+ progress/2013/04/notes_for_brin-why_johnny_cant_code.html
Are the conditions for spontaneous evolution of the type of expertise apparently required to become a programmer like WWII generation automobile tinkerers? (np) The closest parallel I can think of is the WWII generation of my father guys for whom the ultra in high tech was automobiles.

6 1 1 (+) [-4+]mCQK brin-why_johnny_cant_code (np) 20130912e 0 -1+ progress/2013/04/notes_for_brin-why_johnny_cant_code.html
Little explored material specific epistemological situation of human, not machine, readable simple programs in print. (np) We are now typing in programs from books.

6 1 1 (+) [-4+]mCQK brooks-mythical_man_month (279) 20130420 0 -1+ progress/2013/04/notes_for_brooks-mythical_man_month.html
Is delegated power like distributed control an important question arising from crossing Brooks with Berry and fortuitously Janz while writing code, in the midst of working code is where philosophy multipurposively crosses over into technology. (279) It yields exactly the benefits Pius XI predicted: the center gains in real authority by delegating power, and the organization as a whole is happier and more prosperous.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (312) 20131026a 0 -1+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Is this reality transforming charged force field vestige of Socrates divine sign logotropos as like not only hyperlink but all programmed control operations; perhaps my contribution is to foreground technical competence over metaphorical critical interpretation. (312) The presentation of the historical object within a charged force-field of past and present that produces political electricity in a lightning-flash of truth, is the dialectical image.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (321) 20131026d 0 -2+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Compare reterritorialization of mundane objects to salvation of standing reserve of decades past, now orbiting free, open source software and expiration of all copyrights. (321) Childrenƒs cognition has revolutionary power because it is tactile, hence tied to action, and because, rather than accepting the given meaning of things, children get to know objects by laying hold of them and using them creatively, releasing from them new possibilities of meaning.
(321) Adults who observe childrenƒs behavior can learn to rediscover a mode of cognition that has deteriorated phylogenetically, and in the adult has sunk into the unconscious.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (323-324) 20131026e 0 -2+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Modern computer technologies democratize producer potential of unconscious analysis, where participation limited to interpretations based on mass consumption only. (323-324) To recreate the new, technologically-mediated reality mimetically to bring to human speech its expressive potential is not to submit to its given forms, but to anticipate the human reappropriation of its power. Moreover (and this is the political point), such practice reestablishes the connection between imagination and physical innervation that in bourgeois culture has been snapped apart.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (326) 20131026h 0 -5+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Do with early personal computers, including the potential of learning programming as a home economic, having become part of human experience the way writing and other basic activities did for the United States, noting arcades the early Internet that arose from the prior generation of personal computing: I am trying to recover fantasies from that former era, including the radically democratizing potential of habituation to working code to solve problems and pleasurably hobby as a basic intellectual activity. (326) Slumbering within objects, the utopian wish is awakened by a new generation, which rescues it by bringing the old world of symbols back to life. . . . When the childƒs fantasy is cathected onto the products of modern production, it reactivates the original promise of industrialism, slumbering in the lap of capitalism, to deliver a humane society out of material abundance.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (332) 20131026k 0 -2+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Freedom as ability to consume as bourgeois dream of democracy now expressed as media access, the digital divide. (332) Commodity fetishism (as well as urban renewal ) can be viewed as a textbook case of Freudƒs concept of displacement: Social relations of class exploitations are displaced onto relations between things, thus concealing the real situation with its dangerous potential for social revolution. It is politically significant that by the late nineteenth century, the bourgeois dream of democracy itself underwent this form of censorship: Freedom was equated with the ability to consume.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (334) 20131026l 0 -2+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Compare this non-bricoluer confidence in montage design to directedness of software engineering. (334) His was a radical reconstruction of materialism that drew its inspiration from premodern theology, nineteenth-century socialist thought, and twentieth-century Surrealism, all three. He brought elements of these discourses together, not as a bricoleur who makes a pastiche out of conflicting traditions, but almost Platonically as someone convinced that truth lies in the elements themselves.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (334) 20131026m 0 -3+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Imagine as a project for augmented reality, transforming visual perception of built environment through complex processing of dialectical images. (334) His dialectics of seeing is a powerful materialist method of transforming visual perception, one that he believed could compel a collective awakening from the soporific effects of mass culture, and inform and inspire revolutionary politics.
(335) If modernism as an aesthetic style has expressed utopian and aesthetic form, postmodernism has acknowledged their nonidentity and kept fantasy alive. Each position thus represents a partial truth; each will recur anew, so long as the contradictions of community society are not overcome.

6 1 1 (+) [-4+]mCQK bull_and_back-auditory_culture_reader (329) 20131026c 0 -5+ progress/2011/08/notes_for_bull_and_back-auditory_culture_reader.html
Thibaud: three movements to listening of elsewhere from visible to audible, perception to action, private listening to public secret: why not consider it via comparison to micro-ecology of visual navigation by comparing to reading while walking in Symposium, as all three movements occur walking reading for vision as hearing with mobile sound reproduction devices; for reading versus hearing another read edges upon oneself reading another. (329) How does music with headphones mobilize the walkerƒs gait? What does this contemporary form of urban mobility stand for? How should we consider this micro-ecology of musical navigation?
(330) Using a Walkman is part of a process of derealization of urban space that depends on the technical mediation of spatio-phonic behaviors. As a transposable object, the Walkman offers itself as one of the most advanced stages of
musica mobilis.

6 1 1 (+) [-4+]mCQK bull_and_back-auditory_culture_reader (331) 20131026b 0 -1+ progress/2011/08/notes_for_bull_and_back-auditory_culture_reader.html
Thibaud: long texts could be stored in long walks, and then when writing removed the need for the long walk because a stationary anything would suffice, texts began eulogizing that loss of enjoyment in the present moment: this is the sound of memory going from working memory into the environment and long-term memory. (331) The third movement is
from private listening to public secret.

6 1 1 (+) [-4+]mCQK bull_and_back-auditory_culture_reader (337) 20131026d 0 -2+ progress/2011/08/notes_for_bull_and_back-auditory_culture_reader.html
Thibaud: close to Serres quasi-objects. (337) This analysis is close to the definition of ƒ
quasi-objectsƒ provided by Michel Serres: ƒThis quasi-object is not an object, but it is one nevertheless, since it marks or designates a subject which without it wouldnƒt beƒ (Serres 1980). The Walkman is a third term to be situated at the level of the man-milieu relationship, it is on one hand inseparable from the perceived subject (of the user) and nonetheless distinct from him.

6 1 1 (+) [-4+]mCQK campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog (29) 20120807 0 -1+ progress/2012/08/notes_for_campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog.html
Deleuze n-1, perhaps sustaining automata (though perhaps incorrectly or suboptimally; there is debate over the soundness of Deleuzean concept of cellular automata operation). (29) Only weeks after the first prototype laboratory computers sprang to life, it became clear that programs had a life of their own they would take weeks or months to shake down, and they would forever need improvement and modification in response to the demands of a changing environment.

6 1 1 (+) [-4+]mCQK castells-rise_of_network_society_second_edition (405-406) 20131027e 0 -7+ progress/2012/06/notes_for_castells-rise_of_network_society_second_edition.html
Docility designed into electronic communication systems; why it is important for philosophers to start thinking about and producing real virtualities, admitting cohabitation by human and machine intelligences in these virtual yet real worlds, especially with regard to who are the interacting and interacted. (405-406) Only presence in this integrated system permits communicability and socialization of the message. All other messages are reduced to individual imagination or to increasingly marginalized face-to-face subcultures. From societyƒs perspective,
electronically based communication (typographic, audiovisual, or computer-mediated) is communication. . . . But the price to pay for inclusion in the system is to adapt to its logic, to its language, to its points of entry, to its encoding and decoding.

6 1 1 (+) [-4+]mCQK chun-programmed_visions (179) 20130914m 0 -4+ progress/2013/07/notes_for_chun-programmed_visions.html
Wants to connect software and race, exploring the latter through in media res conclusion regarding the former. (179) This book initially was inspired by the striking parallels between software
in medias res and race that is, parallels between software and race as key terms in the current frenzy of and decline in visual knowledge. Linked together in the early twentieth century through the notion of a genetic program, software and race embody two important ways of conceptualizing a seductively causal relationship between order and vision, the visible and invisible, the imaginable and readable a causal relationship that contradicted early twentieth-century visions of a dark entropic future.
(179) Like software, race was, and still is, a privileged way of understanding the relationship between the visible and invisible: it links visual cues to unseen forces.
(180) Race and software therefore mark the contours of our current understanding of visual knowledge as programmed visions.

6 1 1 (+) [-4+]mCQK cicero-philippics (1-2) 20131028 0 0+ progress/1996/02/notes_for_cicero-philippics.html
Basic idea of ensoniment of classical texts presents both tasks for philosophical programmers and new places for philosophy to happen. (1-2)

6 1 1 (+) [-4+]mCQK copeland-what_is_computation (335) 20010801 0 -2+ progress/2012/12/notes_for_copeland-what_is_computation.html
Turing made clear the historical connection of computing to print, Copeland to tyranny; as I argue, besides being historically representational, computing has also been tyrannical, recalling Solon of Diogenes Laertius. (335) To compute is to execute an algorithm. More precisely, to say that a device or organ computes is to say that there exists a modeling relationship of a certain kind between it and a formal specification of an algorithm and supporting architecture.

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (95) 20130915h 0 -1+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Does synthesizer, that is, programmed machine computations by technological devices supersede human equivalent as philosophical production? (95) The
synthesizer has taken the place of the old a priori synthetic judgment, and all functions change accordingly.

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (104) 20130915j 0 -3+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Discussion of rhizome overload another post postmodern concept better exemplified in programming work than literary or oral forms. (104) And the
overload is not a rhetorical figure, a metaphor, or symbolic structure; it is a mobile paraphrase bearing witness to the unlocalized presence of an indirect discourse at the heart of every statement. From both sides we see a rejection of reference points, a dissolution of constant form in favor of differences in dynamic. The closer a language gets to this state, the closer it comes not only to a system of musical notation, but also to music itself.

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (178) 20130915t 0 -9+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Christ-face: Giotto to go with illustrative art used by Lacan, Foucault. (178) On the brighter side, painting has exploited all the resources of the Christ-face. . . . In this respect, there is an exultation in the painting of the Middle Ages to the Renaissance, like an unbridled freedom. . . . The most prodigious strokes of madness appear on canvas under the auspices of the Catholic code.

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (256-257) 20130916e 0 -8+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Spinoza ethology degrees of power sounds like Socrates reverse engineering method. (256-257)
Memories of a Spinozist, II. There is another aspect to Spinoza. To every relation of movement and rest, speed and slowness grouping together an infinity of parts, there corresponds a degree of power. . . . In the same way that we avoided defining a body by its organs and functions, we will avoid defining it by Species or Genus characteristics; instead we will seek to count its affects. This kind of study is called ethology, and this is the sense in which Spinoza wrote a true Ethics.

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (461-462) 20130528 0 -16+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Adding and subtracting axioms sounds like style of mastery programing enjoys. (461-462)
1. Addition, subtraction. . . . There is a tendency within capitalism continually to add more axioms. . . . the question is not that of freedom and constraint, nor of centralism and decentralization, but of the manner in which one masters the flows. In this case, they are mastered by the multiplication of directing axioms. The opposite tendency is no less a part of capitalism: the tendency to withdraw, subtract axioms. . . . The totalitarian State is not a maximum State but rather, following Virilioƒs formulation, the minimum State of anarcho-capitalism (cf.

6 1 1 (+) [-4+]mCQK derrida-dissemination (130) 20130916g 0 -4+ progress/2012/02/notes_for_derrida-dissemination.html
Pharmakos as scapegoat overdetermined by culture for a specific context, and thus not present in Platonic writings due to this bias; compare to overloaded functions of OOP that may or may not appear in code. (130) The character of the
pharmakos has been compared to a scapegoat.
(130 footnote 56) This is doubtless the moment to point out, in connection with the clear necessity of bringing together the figures of Oedipus and the
pharmakos, that, despite certain appearances, the discourse we are holding here is not in a strict sense a psychoanalytic one. This is true at least to the extent that we are drawing upon the same textual stores (Greek culture, language, tragedy, philosophy, etc.) which Freud had to begin by tapping and to which he never ceased to refer.

6 1 1 (+) [-4+]mCQK derrida-dissemination (150) 20130916o 0 -5+ progress/2012/02/notes_for_derrida-dissemination.html
Seeds and gardeners analogies for dissemination also well exemplified describing spread of software, viruses. (150) On the one hand cultivation, agri-culture, knowledge, economy; on the other, art, enjoyment and unreserved spending.
(152) Writing and speech have thus become two different species, or values, of the
trace.
(153) Transgression is not thinkable within the terms of classical logic but only within the graphics of the supplement or of the
pharmakon.
(154) Socrates knows that he will never be a son, nor a father, nor a mother. The knowledge the go-between needs for matchmaking should have been the same as the knowledge the midwife needs for delivering.

6 1 1 (+) [-4+]mCQK derrida-dissemination (156) 20130916r 0 -5+ progress/2012/02/notes_for_derrida-dissemination.html
Contained play could also be compared to sense of communication theory as another example of how computer technology easily instantiates forms difficult for human writing, where it must become serious and hence erase itself, as in serious games. (156) The best sense of play is play that is supervised and contained within the safeguards of ethics and politics. This is play comprehended under the innocent, innocuous category of fun.
(156) Only
logio peri onton can be taken seriously. As soon as it comes into being and into language, play erases itself as such.
(157) Not only are his writings defined as games, but human affairs in general do not in his eyes need to be taken seriously.

6 1 1 (+) [-4+]mCQK derrida-dissemination (159-161) 20130916t 0 -13+ progress/2012/02/notes_for_derrida-dissemination.html
Trace receptacle for appearances like variable pointers, data structure typed and untyped computer memory arbitrarily assigned by the operating system or CPU hardware instantiating the three natures in the substrate that is like Ulmer chora: literality sustains structural relations in cosmogony, politics, linguistics, and materially in machine circuits, schematism of perceptibility (Kittler on the last act of human writing). (159-161) all these things require ([
Timeaus] 49a) that we define the origin of the world as a trace, that is, a receptacle. It is a matrix, womb, or receptacle that is never and nowhere offered up in the form of presence, or in the presence of form, since both of these already presuppose an inscription within the mother. . . . [quoting] For the present we have only to conceive of three natures: first, that which is in the process of generations; secondly, that in which the generation takes place; and thirdly, that of which the thing generated is a resemblance naturally produced. . . . The khora is big and everything that is disseminated here.
(161) Inscription is thus the production of the son and at the same time the constitution of structurability. The link between structural relations of proportionality on the one hand and literality on the other does not appear only in cosmogonic discourse. It can also be seen in political discourse, and in the discourse of linguistics.

6 1 1 (+) [-4+]mCQK feenberg-transforming_technology (116) 20130917g 0 -3+ progress/2009/11/notes_for_feenberg-transforming_technology.html
As Plato pointed out, arguments arise for substituting interaction with technology of intellectual exchange. (116) In short, Plato holds that the technology of writing has the power to destroy the dialogic relationship that ought to join teacher and student.
(116) Ironically, Plato used a written text as the vehicle for his critique of writing, setting a precedent that we continue to follow in present-day debates about educational technology: many of the most vociferous attacks on Web-based media circulate on the Internet (Noble, 1997).
(116) However, while Platoƒs condemnation of writing was unfair, he alerts us to a real issue: whenever a new educational technology is introduced, arguments emerge for substituting interaction with the technology for the process of intellectual exchange.

6 1 1 (+) [-4+]mCQK foucault-discipline_and_punish (307-308) 20131030d 0 -8+ progress/2012/06/notes_for_foucault-discipline_and_punish.html
Compare correspondent in La Phalange article describing the carceral city to a blog. (307-308) the model of the carceral city [by correspondent in La Phalange article, like a blog] is not, therefore, the body of the king . . . but a strategic distribution of elements of different natures and levels. . . . In this central and centralized humanity, the effect and instrument of complex power relations, bodies and forces subjected by multiple mechanisms of ƒincarcerationƒ, objects for discourses that are in themselves elements for this strategy, we must hear the distant roar of battle.

6 1 1 (+) [-4+]mCQK frasca-simulation_versus_narrative (226) 20130921e 0 -11+ progress/2012/03/notes_for_frasca-simulation_versus_narrative.html
Suggestion by Friedman of simulating Marx Capital joined by my ideas for simulating of the Symposium and life of Socrates the flaneur. (226) It would not be surprising that in the near future politicians tried to explain their plans on tax or health reform through simulation. As Ted Friedman has pointed out, Marxƒs
Capital would make a much better simulator than a film.
(227) Narrative authors (or narrauthors ) only have one shot in their gun a fixed sequence of events. . . . But traditional narrative media lacks the feature of allowing modifications to the stories, even if exceptions happen in oral storytelling and drama performances. . . . Games are not isolated experiences: we recognize them as games because we know we can always start over.

6 1 1 (+) [-4+]mCQK fuller-software_studies (45-46) 20131021a 4 -4+ progress/2011/10/notes_for_fuller-software_studies.html
Code: gives reasons to avoid speaking about actual code because of bizarre way that programmers are most creative; I am suggesting a different way of considering versions than the final one with all the bugs out, the terminus of Kittlers approach: is this a question of to code, or to write? (45-46) Ultimately,
the dilemma between code and language seems insoluable. And anybody who has written code even only once, be it in a high-level programming language or assembly, knows two very simple things from personal experience. For one, all words from which the program was by necessity produced and developed only lead to copious errors and bugs; for another, the program will suddenly run properly when the programmerƒs head is emptied of words. And in regard to interpersonal communication, that can only mean that self-written code can scarcely be passed on with spoken words.

6 1 1 (+) [-4+]mCQK galloway-protocol (119-120) 20130219 0 -2+ progress/2013/01/notes_for_galloway-protocol.html
Compare this violence against humans by machines from spam to humans by humans of ancient times when also making an analysis of behavior that seems to judge indiscriminately, as pebbles used in calculation. (119-120) This protocological covenant outlining open channels for Usenetƒs growth and governance, hitherto cultivated and observed by its large, diverse community of scientists and hobbyists, was sullied in the spam incident by the infraction of a few. The diversity of the many groups on Usenet was erased and covered by a direct-mail blanket with a thoroughness only computers can accomplish.

6 1 1 (+) [-4+]mCQK gates-road_ahead (164-165) 20140514c 4 -4+ progress/2014/04/notes_for_gates-road_ahead.html
Comfort with expert systems and software agents will lead to Turkle robotic moment; the experience of interacting with expert systems consummates the same dream of living writing from antiquity. (164-165) As software agents become common, and voice-simulation-and-recognition software improves, it will begin to feel as though youƒre talking to a real person when you consult a multimedia document with a personality. Youƒll be able to interrupt, request more detail, or ask to have an explanation repeated. The experience will be like chatting with a personable expert. Eventually it wonƒt matter much whether you are talking to a human being or a very good simulation, as long as you get the answers you need to make an appropriate purchase.

6 1 1 (+) [-4+]mCQK goodman-sonic_warfare (9) 20130921k 0 0+ progress/2011/11/notes_for_goodman-sonic_warfare.html
Book chapters titled in style of 1000 Plateaus jumping around to various significant years. (9)

6 1 1 (+) [-4+]mCQK haraway-simians_cyborgs_women (45) 20130923a 0 -3+ progress/2009/04/notes_for_haraway-simians_cyborgs_women.html
Let us accept the cybernetic model for our study of machines to detect the contours of the default epistemologies governing philosophy as Socratic self questioning: so it is phallagocentric, what better means do we have of comprehending the technologically mediated world in which we abide, although at the same time, let the emphasis on embodiment foster situated knowledges of the phenomenology of machine life; Haraway invites such an approach in her call for reappropriation of sociobiological knowledge, as below on page 164. (45) Between the First World War and the present, biology has been transformed from a science centered on the organism, understood in functionalist terms, to a science of studying automated technological devices, understood in terms of cybernetic systems.
(45) This chapter sketches those changes in an effort to investigate the historical connection between the content of science and its social context. The larger question informing this critique is how to develop a socialist-feminist life science.

6 1 1 (+) [-4+]mCQK hayles-how_we_became_posthuman (ix) 20130924 0 -1+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
This book is a cut up of her previous work. (ix) I owe a debt of gratitude as well to Routledge Press for allowing me to reprint.

6 1 1 (+) [-4+]mCQK hayles-how_we_became_posthuman (99) 20130928p 0 -7+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
Imagine going through the whole analysis by theory theory, simulation theory, and interaction theory, to make sense of Hayles explanation for why Wiener downplayed the significance of embodied materiality in favor of abstraction. (99) No doubt his own lack of involvement in the nitty-gritty work of the lab was a contributing factor in this elision of embodied materiality. . . . As a dedicated experimentalist, McCulloch was sensitive in a way that Wiener was not to the tension between the plentitude of embodiment and the sparseness of abstraction.
(100) In addition to operating on the microscale of subatomic particles and the macroscale of cybernetic circuits, probability also operates on the cosmological drama of chaos and order. It is here, on this cosmological level, that he staged the moral distinctions between good cybernetic systems, which reinforce the autonomous liberal subject, and evil machines, which undermine or destroy the autonomy of the subject.

6 1 1 (+) [-4+]mCQK hayles-how_we_became_posthuman (200) 20130929q 0 -5+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
Not sure if my machine embodiment analogies are working here, for example when embodied in specific systems, such as a reverse engineered bricolage, custom code and circuitry makes sense within the particular context, like a good-bye wave, or tuning a system so hardware and software work together (switch detection, lamp and display timing) often resembles describing all the nuances of posture; another way of looking at it is at various functional levels to orient the phenomenal field, so that tracking the flow of electrons through the circuits is like trying to understand an organism from the perspective of the flow of bodily fluids. (200) Showing someone how to stand is easy, but describing in words all the nuances of the desired posture is difficult. Incorporating practices perform the bodily content; inscribing practices correct and modulate the performance. Thus incorporating and inscribing practices work together to create cultural constructs.
(201) Which possibilities are activated depends on the contexts of enactment, so that no one position is more essential than any other. For similar reasons, embodiment does not imply an essentialist self.

6 1 1 (+) [-4+]mCQK hayles-how_we_became_posthuman (290) 20130930q 3 -9+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
Can we take an epistemological stand that becomes a driving force in defining and evolving our comportment to the machinic realm so that it re-emerges as Zizek unknown knowns? (290)
(290-291) This view of the posthuman also offers resources for thinking in more sophisticated ways about virtual technologies. . . . By contrast, when the human is seen as part of a distributed system, the full expression of human capability can be seen precisely to depend on the splice rather than being imperiled by it. . . . In this model, it is not a question of leaving the body behind but rather of extending embodied awareness in highly specific, local, and material ways that would be impossible without electronic prosthesis.

6 1 1 (+) [-4+]mCQK hayles-how_we_think (8) 20120707d 0 -1+ progress/2012/07/notes_for_hayles-how_we_think.html
Or ignore, not bother including in program design, the new cosmic great shrug off of the human in the Internet far in the future after all copyrights expire as the term describing the end, kind of like the end of thirty two bit Unix and Unix-like time, or at least mark the point where it restarts, crosses over with temporary inversion of temporal relations implied in their digital storage production run time existence. (8) On a pedagogical level, Comparative Media Studies implies course designs that strive to break the transparency of print and denaturalize it by comparing it with other media forms.

6 1 1 (+) [-4+]mCQK heidegger-what_is_called_thinking (3) 20130928 0 -3+ progress/1995/08/notes_for_heidegger-what_is_called_thinking.html
Loose mooring of molar symbols. (3) What keeps us in our essential nature holds us only so long, however, as we for our part keep holding on to what holds us. And we keep holding on to it by not letting it out of our memory. Memory is the gathering of thought.

6 1 1 (+) [-4+]mCQK ihde-philosophy_of_technology (11) 20130929i 0 -3+ progress/2012/06/notes_for_ihde-philosophy_of_technology.html
Could it be argued, for the game, that a lot of energy was wasted disagreeing with Aristotle, like reverse engineering proprietary objects and systems? (11) In short, while the early inventors of Modern Science were passionately interested in a science of nature, their direction later was one which often took as its theme,
disagreement with Aristotle.
(12) The cities, the cathedrals, the draining of the Lowlands of northern Europe were made possible by ever larger and larger
machines such as cranes, wind and water mills, and devices using simple physical principles, some of which had been recovered from Roman and Hellenic, but also Asian, sources.
(13) But with Kant, the task of philosophy in the critical role became that of interpreter, critic, and appreciator of some field or other.

6 1 1 (+) [-4+]mCQK ihde-philosophy_of_technology (138-139) 20130930k 0 -1+ progress/2012/06/notes_for_ihde-philosophy_of_technology.html
In past years I would have made a big deal about the mistyped non-neturality, suggesting this passage hovers near the unthought of the authors, editors, proofreaders. (138-139) If Winner is right concerning artifactual politics, the very non-neutrality of all technologies and particularly of technology transfer, then the insertion of what, when, and how technology transfer is to occur is one of the most crucial issues for the sociopolitical dimensions of philosophy and technology.

6 1 1 (+) [-4+]mCQK iser-how_to_do_theory (43) 20130929k 0 -5+ progress/2011/08/notes_for_iser-how_to_do_theory.html
Like the Collingwood example, this one can be imagined in virtual realities giving rise to artificial intelligences of machinic consciousness bathing humans in order of magnitude computational control operations sustaining their being; the guiding design criteria of economy, similarity, figure and ground, at least economy can be shared between them, whereas both similarity and figure and ground depend upon shared perceptions, and the humans cannot operate beyond the millisecond order of temporal magnitude, while the machines can operate in millisecond, even nanosecond on off affecting or sensing Derridean ontological metaphysical units, the duck rabbit image as database patterns or run time evanescences in humming electronic circuits. (43) Gestalt theory argues that whatever is encompassed in an act of perception is constituted as a field, which basically consists of center and margin. A field requires structuring, which is achieved by balancing out the tension between the data, thus grouping them into a shape. It is the creative eye of the perceiver that does the grouping, and this marks a decisive switch between Lockeƒs the active/passive poles, and provides a more plausible account of how perception works. A field arises out of the relationships between data relationships that are neither given not brought about by a stimulus but are the result of a grouping activity guided by the perceiverƒs underlying assumptions. This makes all perception into a
projective act of seeing, which in turn produces a gestalt.

6 1 1 (+) [-4+]mCQK jameson-postmodernism (298-299) 20130930d 0 -8+ progress/2012/04/notes_for_jameson-postmodernism.html
From Robotic Poetics boundary of fantasy engineering legal now versus legal in 50-75 years like MAME and musical virtual realities. (298-299) As far as taste is concerned (and as readers of the preceding chapters will have become aware), culturally I write as a relatively enthusiastic consumer of postmodernism, at least of some parts of it: I like the architecture and a lot of the newer visual work, in particular the newer photography. . . . My sense is that this is essentially a visual culture, wired for sound but one where the linguistic element . . . is slack and flabby, and not to be made interesting without ingenuity, daring, and keen motivation.

6 1 1 (+) [-4+]mCQK jameson-postmodernism (303-304) 20130930j 0 -9+ progress/2012/04/notes_for_jameson-postmodernism.html
Immaculation as task for cybersage, or is it ridiculous to attempt. (303-304) As for the others who did survive at the price of a certain renovation or immaculation, a certain
Umfunktionierung. . . . A comparative lexicon would be a four- or five-dimensional affair, registering the chronological appearance of these terms in the various language groups, while recording the uneven development observable between them. . . . one must, in other words, not only deduce modernism from modernization, but also scan the sedimented traces of modernization within the aesthetic work itself.

6 1 1 (+) [-4+]mCQK jenkins-convergence_culture (263) 20130929y 0 -2+ progress/2012/05/notes_for_jenkins-convergence_culture.html
Kickstarter funded minority-interest content production: replay PC revolution with widespread programming education and early free software dominance as a science fiction guided by critical utopianism. (263) If [ Long Tail Chris] Anderson is right, then niche-content stands a much better chance of turning a profit than ever before.
(264) It was the announcement that ABC-Disney was going to be offering recent episodes of cult television series (such as Lost and Desperate Housewives) for purchase and download via the Apple Music Store that really took these discussions to the next level.

6 1 1 (+) [-4+]mCQK johnson-computer_ethics_fourth_edition (12) 20140729b 0 -6+ progress/2012/06/notes_for_johnson-computer_ethics_fourth_edition.html
Missing link is to inspire cultivation of technically savvy IT ethicists, for which critical programming serves to fill not a policy but a staffing vacuum. (12) When the possibility of different sorts of technology is pushed out of sight, IT ethicists miss an important opportunity for ethics to play a role in the design of IT systems. [Note: . . . Helen Nissenbaum, for example, helped to design a program called TrackMeNot that helps protect usersƒ privacy when they use Google to search the Web. She and others have developed an approach to IT ethics that is referred to as
value sensitive design.

6 1 1 (+) [-4+]mCQK johnson-computer_ethics_third_edition (18) 20130930c 0 -3+ progress/2011/06/notes_for_johnson-computer_ethics_third_edition.html
Perhaps Maner did not think of the important self-involving ethical question of whether to practice programming, or how computers resemble writing as pharmaka, relating them to ancient ethical arguments: Kittler cautions drawing such simple conclusions, however, that Turkles work exists, and a generation of Americans were taught to use computers and program them in public schools, and for that movement to recede, seems sufficient evidence that ethical questions regarding computers were not thoroughly considered by philosophers. (18) Maner suggests that the novelty of the argument lies in its inference from the generality (malleability) of computer technology and never before, he claims, has a technology of this kind been available. In other words, he seems to be saying that never before has humanity been in a situation to be able to so powerfully help the handicapped. I am not sure if this is true, but in any case, it illustrates the puzzle around uniqueness.

6 1 1 (+) [-4+]mCQK kittler-gramophone_film_typewriter (xxxix) 20110828 0 -1+ progress/2011/09/notes_for_kittler-gramophone_film_typewriter.html
This is why Fred Miller asked me to define virtual reality; it is also significant that this German translation starts with a non-translated English quotation from Pynchon. (xxxix) Media determine our situation, which in spite or because of it deserves a description.

6 1 1 (+) [-4+]mCQK mcgann-radiant_textuality (x) 20131005a 0 -1+ progress/2012/02/notes_for_mcgann-radiant_textuality.html
How does writing a book by revising old texts resemble creating a new program from an old one? (x) The texts of the following chapters are revised versions of essays originally published elsewhere.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (ix) 20121023 0 -1+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Cannot imagine whoosh of hot air being expelled from the book: to Marx on nature of consciousness as related to agitations of air that is sound now mechanically produced by formant synthesis as the voice of the Big Other, machine consciousness: going beyond throwing back to the senseless void from which distantly past writings emerged would never be interested in reading my stuff, write software to process ancient texts to incorporate their authors those distant conscious composers mind thinking forward to this now. (ix) a belch, some uncomfortable hot air.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (52) 20131006z 0 -4+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Three Socratic unit operations of the closed loop system of self knowledge; ambiguous versus nonambiguous picked up on page 57. (52) And what about the rules of that discourse itself? There seem to be three: a definition of terms, a knowledge of the truth, and an ability to divide and collect.
(53) Platoƒs voice of knowledge is nothing more than the silence of the questions he cannot ask in order to ask the questions he does ask.
(54) In writing he could generate structure through his own force as a writer, and then reuse that same force to mask itself, seeming to leave behind structure with no need of origin.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (157) 20131008o 0 -12+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
As it cannot appear in logocentric discourse, differance seems related to halting problem and other set theory paradoxes encountered in computer programming. (157) Derridaƒs
differance undeniably resembles Saussureƒs differences. . . . Whereas Saussure sees the differences in a semiotic system as the set of everchanging relationships the speaker manipulates in order to generate meaning, Derrida describes difference as the infinite disappearance of either an origin of or a final resting place for meaning. Insofar as Derrida describes differance, he consistently does so by explaining what it is not.
(157) Differance, he says, is literally neither a word nor a concept.
(157) difference is not something that can appear in logocentric discourse.
(158) Differance is neither structure nor origin.
(158) Differance is neither absence nor presence.
(158) Neither, however, is differance a master term.
(158) Differance is neither an activity nor an effect.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (179) 20131009b 0 -1+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Does it matter whether we are familiar with how inauguration appears in the context of Derridas work, the context, or is the output of a program that computes its concordance enough to think with this topic? (179) The term
inauguration appears frequently in Derridaƒs books, especially those written before 1972.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (194) 20131009i 0 -3+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Electronic writing can be different by surprising authors and readers alike, poiesis as theory, iterations of unknown knows emerging to recontemplate what we learn we did not know (so McGann has an important role in my conception of ethical comportment with technology). (194) Derrida clearly knows what his text is going to say. He expects no surprises (thought, no doubt, he expects us to be surprised) as he presents the controlled meaning that is everywhere present and under control in his own essay.
(195) On two occasions later in chapter 4 [of
Dissemination], Derridaƒs self-assured confidence in his own textƒs ability to escape the sort of disintegration it reveals in other texts appears again.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (211) 20131009q 0 -2+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Suggesting Socrates really did corrupt the youth by steering Isocrates away from rhetoric and writing. (211) For Isocrates, as well as for his teacher Gorgias and his predecessor Protagoras, rhetoric and writing belong at the center of the curriculum because
rhetoric and writing are the ways to make choices in a world of probability. Sophistical rhetoric, therefore, is both a study of how to make choices and a study of how choices form character and make good citizens.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (211) 20131009r 0 -2+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Derrida trap for would-be philosopher kings like ring of Rassillon in Dr Who. (211) For Isocrates, as well as for his teacher Gorgias and his predecessor Protagoras, rhetoric and writing belong at the center of the curriculum because
rhetoric and writing are the ways to make choices in a world of probability. Sophistical rhetoric, therefore, is both a study of how to make choices and a study of how choices form character and make good citizens.

6 1 1 (+) [-4+]mCQK ong-orality_and_literacy (60) 20131006q 0 -5+ progress/2008/08/notes_for_ong-orality_and_literacy.html
Verbal memorization of written text differs from that which is originally oral; study against early models of computer memory like delay circuits. (60) In memorizing a written text, postponing its recitation generally weakens recall. An oral poet is not working with texts or in a textual framework. He needs time to let the story sink into his own store of themes and formulas, time to ƒget withƒ the story.
(63) verbatim memorization apparently does not at all free the oral noetic processes from dependence on formulas, but if anything increases the dependence.
(66) oral memory has a high somatic component.

6 1 1 (+) [-4+]mCQK ryan-beyond_myth_and_metaphor (603) 20120312 0 -5+ progress/2012/03/notes_for_ryan-beyond_myth_and_metaphor.html
As far of some of my imagined uses for humanities computing, virtual history narratives express them to some extent, but go farther into the internal position, such as redoing the Macy conferences as an original participant: this sort of narrative escapes some of the ironic character that Ryan explains complicates what a truly internal-ontological digital text might be like, in contrast to the Holodeck fantasies. (603) Adventure games do not preplan each possible narrative development, as do the Choose Your Own Adventure texts, but they make sure that options will remain within a certain range so that the overall destiny of the playerƒs avatar will not deviate from the general line of the master plot. . . . The predominance of violence in computer games has been widely attributed to cultural factors, but it can be partly explained by a desire for immediate response.

6 1 1 (+) [-4+]mCQK tanaka_ishii-semiotics_of_programming (54) 20131014m 0 -10+ progress/2012/10/notes_for_tanaka_ishii-semiotics_of_programming.html
Figures 4-3 and 4-4 useful illustrations of operation of lamda term in dyadic sign model substitution: should this be mandatory learning for interpellation into a digital humanities philosophy of computing discourse? (54) Within any dyadic model after Saussure, the signifier, or name, is a function to articulate the signified; that is, articulation is performed by the signifier.
(54-55) Naming occurs when two lamda-terms are juxtaposed for a beta-reduction. . . . Within any dyadic sign model, the focus of discussion has been how a concept itself
acquires a name. In contrast, in a lambda-term A, the naming process is modeled in terms of how to provide a name to an expression B, so that B is consumed within A.
(56) Naming in the lambda calculus thus facilitates
interaction between two lamda-terms through the substitution of beta-reductions. In particular, a name is needed to consistently indicate a complex ensemble within a scope. As long as this purpose is met, the identifiers provided by lamda-terms are arbitrary.

6 1 1 (+) [-4+]mCQK tanaka_ishii-semiotics_of_programming (133-134) 20131019x 0 -6+ progress/2012/10/notes_for_tanaka_ishii-semiotics_of_programming.html
Also memory-related instances, although where I am thinking nostalgia for early machinery experience of digital emigrants; met here via interaction criteria. (133-134) The third method of instantiation is to produce completely reproducible instances. . . . Some particular instances, however, can still be
the instance with haecceity, such as high-quality computer graphics that have been developed. These are the instances yet they are reproducible.

6 1 1 (+) [-4+]mCQK tanaka_ishii-semiotics_of_programming (136) 20131019z 0 -11+ progress/2012/10/notes_for_tanaka_ishii-semiotics_of_programming.html
Memory effect to which I was taking extreme case of nostalgia powering SSR. (136) Another possibility for haecceity restoration was already suggested in Section 8.2: interaction. . . . Computer games and interactive art make use of the special effect that whenever the user is involved in instantiation, the instance reacquires haecceity.
(137) A special case of interaction that avoids this conflict is adaptation. After a period of use, the instances generated by the system adapt to what the user prefers. Adaptation thus proceeds through collaboration between the system and the user by applying an evaluation.
(137) Adaptation is popular within the user interface domain. An example is text entry systems (MacKenzie and Tanaki-Ishii, 2007).

6 1 1 (+) [-4+]mCQK tanaka_ishii-semiotics_of_programming (138) 20131020b 0 -2+ progress/2012/10/notes_for_tanaka_ishii-semiotics_of_programming.html
Speaking about basis of virtual worlds for machine and human virtual realities, and also of danger of making goal programming haecceity to be understood along same physiology as writing, but now with offer to join nonhuman embodiment in foss, the static sense like all writing, and running instances, the new affordances of artificial intelligence built via optimization and/or interaction. (138) Through the use of a sign or a sign system, the signification is poured and frozen into the final instance with haecceity. Under the pansemiotic view, in particular, of a world consisting only of signs without basis, reflexivity could be one important means to generate such a basis.

6 1 1 (+) [-4+]mCQK turkle-second_self (251) 20120116 0 -2+ progress/2011/04/notes_for_turkle-second_self.html
There are too many likely stories for every lisp [slip in typing] vacating Freudian analysis and unfortunately a lot of enjoyable literature including a number of philosophy texts, reading Norman instead; nonetheless these indicators can be collected and use to represent memories in virtual realities including typical visual and now multichannel/multiposition audio media (technologies): this is an example of the philosophy of computing reterritorializing areas developed to analysis of human directed rhetorical texts to programming source code and active shell commands powering instead of constituting or being for human philosophical contemplation, that is, that ephemeral metaphysics that are deduced from the constitution of mid range ordinary Internet usage are not worth studying in detail; one or two examples from the literature by Turkle, Manovitch and Hayles will suffice, then bring in Kittler some more. (251) Freudƒs meaning is changed. Self-destructiveness becomes split from passion; its presence is only a commentary on how well an intelligence is working.

6 1 1 (+) [-4+]mCQK turkle-second_self (300) 20120325 0 -1+ progress/2011/04/notes_for_turkle-second_self.html
Carrier objects are great amusement for network and localhost embodied in the flesh and discrete machine dividuals, thus this blindness of floss to purposes for which software designed and put to use of engendering initial metastasis energy level plateau preponderance of what Lanier calls siren servers and I point out as evidence we are getting dumber in our use of machines; that is, the cleverness of our programming diminishes from height reached decades earlier for reasons of having a need to program now done for pay. (300)

6 1 1 (+) [-4+]mCQK ulmer-applied_grammatology (160) 20131020b 0 -1+ progress/2009/02/notes_for_ulmer-applied_grammatology.html
Can Derridean popularization of knowledge develop arguments and techniques to encourage programming knowledge in public schools? (160) The paradox operating here, to put it bluntly, is that while Derridaƒs texts appear to be among the most difficult and esoteric works of our time, they nonetheless call for a program or practice that can only be described as a popularization of knowledge.

6 1 1 (+) [-4+]mCQK ulmer-applied_grammatology (199) 20121103 0 -6+ progress/2009/02/notes_for_ulmer-applied_grammatology.html
Now what does the machine other want could be a new impossible question for digital humanities, when including desire of the subject in science; nod to mice in Hitchhikers Guide to the Galaxy. (199) We can say, then, that Lacan posed the question
Was will das Weib? precisely because it is the most extreme version possible of an impossible question, impossible because the womanƒs bliss represents for Lacan the impossible knowledge of the Other. By setting such a question for the seminar, Lacan turns the research back on himself, delineating all the more clearly the special features of psychoanalytic knowing.
(200) Part of the lesson of the liaison of bliss and knowledge is always to include in science the desire of the subject. The behaviorist experiments of the rat psychologists, for example, are interesting not in terms of the ratsƒ behavior, Lacan says, but in terms of the scientistsƒ behavior their relation to the labyrinths they build (Encore, 129). In short, the irruption of the unconscious into science opens knowledge to engima.

6 1 1 (+) [-4+]mCQK wardripfruin_and_montfort-new_media_reader (21) 20131019f 0 -3+ progress/2011/01/notes_for_wardripfruin_and_montfort-new_media_reader.html
Manovich: of course we have new phenomena when my interpretation of what things computers do that we humans really not think about are included as basic components of any study of new media, or what I call the philosophy of computing. (21) The basic point of dialectics is that a substantial change in quantity (i.e., in speed of execution in this case) leads to the emergence of qualitatively new phenomena.

6 1 1 (+) [-4+]mCQK zizek-parallax_view (90) 20131019b 0 -1+ progress/2009/05/notes_for_zizek-parallax_view.html
This is Heidegger dread of the language machine: approach it differently than Zizek, who likes to talk about examples from the spectator position in movies, a critical stance of a media consumer rather than producer or prosumer. (90) What changes in this move is the status of the Law: we shift from psychology to the metapsychological symbolic order proper as an external machine that parasitizes upon the subject.

6 1 1 (+) [-3+]mCQK bork-journal 20051201 20051201 0 -24+ journal_2005.html
If Alcibiades was a pirate, and Alkibiades (AL) a cyberpunk (computer criminal), then Sokrates (SO) is a benevolent old school hacker (TM) (donƒt try to trademark BOSH). How do I tell the story of SO & AL? How did history Socrates and Alcibiades? For example, just as the traditional representation of Socrates is disrupted by reading about Mytro in Diogenes Laertius, Sokrates learns how Diotima got wise and found it repulsive (she fucked her way through life) like some operator, and here is where there is a 50/50 challenge to those who want to try to fake it, choosing either ta gramata, ta grammata, or ta gramatta, selecting the correct spelling. Earlier explain why technologists should be applauded for building pinball machine reverse engineering kits. Writing something that can successfully perform the precise control of hundreds of thousands of pinball machines is quite an achievement; compare it to getting that many human readers to agree with your arguments. Complex computer programs share structural similarities to complex arguments, which can be revealed using logical notation. In fact, the degree of precision goes well beyond the capabilities of any human, which is a point Maner makes. Then say that now that weƒve given the technologists their recognition, applaud the scholars who take the pains to read ancient texts. Here is where the input devices used by Susan Staurt the year before I spied her copying music files from one of the older, eminent philosophers of computing, similar to the devices we use at the annual corporate ethics forum. (It is a forum to the extent that the audience answers questions via the input devices and asks a few questions at the end of the presentation.) Use similar things to poll the audience for the correct spelling of the Greek word, which you can now display in Greek using an acceptable display method, for which this word processor to HTML process is unacceptable. Likewise they can be tested for their knowledge of things like hardware address decoding and C/C++ programming structures.

The problem is that even cast as the equivalent as a BOSH, the historic Socrates was nonetheless put to death by the State, and this leads to troublesome conclusions even if we accept Xenophonƒs claim that Socrates deliberately planned it as suicide to benefit the immortality of his individual story. But there is more to it than that, and this is why it seems permissible to make an analogy between the historical Socrates and our new cybersage myth of an American Socrates (TM). The gamble he took was on that Greek word weƒve already investigated, which is the subject of the critique at the end of Platoƒs Phaedrus. The gamble Socrates took was to have Plato write about him rather than vase painters. He guessed or maybe consciously gambled that writing would outlive the vase paintings, for huge collections of writing were possible whereas such a collection of vases would only be found among the very wealthy. Yet he sensed the danger in committing his memory to writing. After that utterly fascinating remark that writing is a drug, Socrates goes on to say that those who think they are wiser by becoming addicted to writing may turn out to be worse than fools, burdens on society (textual citation). What is new is the consideration of writing versus vase painting as ways to immortalize oneself. Van has said much about how Socrates created and immortalized the self. My argument is that he rode a new technology like a wave, gambling that it would go farther than what he perceived to be the next best option, vase painting, to which writing is compared when zoographia are discussed (textual citation). The is to counter Manerƒs claim that there are no antecedent analogies to ECT.

6 1 1 (+) [-3+]mCQK bork-journal 20101110 20101110 0 -78+ journal_2010.html
They do not really understand is why they outsource. Marx is asking the question backwards, how can we nevertheless use what we do not understand, which Johnson casts in pursuit of comprehending subjectivity. Children carrying fire became the first danger; then it was computers. The question is asked backwards by wondering first if what it is is why it works the way it works from the perspective that it is operable. The basic question solves how to make it operable. The coming to be ready at hand is the logic of the unconscious and conscious together to think. Stop back a number of times then forward is how thinking thinks (things, creates, is, exists, abides, works, plays, lives, executes, runs, continues, and so on in the fetch execute paradigm still a contested narrative is our gap we are filling). What is the multiplier for your book, what is the number you suspect you will need, is the number of basic iterations of (through) the operator operating upon itself iteratively cyclically recycling infinitely. Someone could write my phd it could be me. I have no idea what causes that from my own software. The question is how old is computer insurance? Crap you donƒt see it in the screen shot, the programmatically generated http reference within the local (LAN) system most of us donƒt even know what that is let alone how it works although we all live in it and use it (it is the Internet, cyberspace, the Matrix). Simulation without coordinates is gaming not representation. It should have been something like specifying an operator as history of the journal and the source file from the class and the main active journal. I recently added a function to create hyperlinks around images which were not in the previous version which was doing character hyperlinks (what I called it), along with the previous default response (action, function result, process output, result of execution, stack, memory, and so on) so you have to distinguish between the two, the original being to that file and the rest going to the default localhost highest level first response format message. I donƒt know if Robin Hood has arrived, I donƒt have a clue, I will check later and respond to YOUR email OƒVendor, OƒFriend, OƒIntelocutor, O<PHI><PHI-prime>. The problem Aquinas posed for man and not man alike had to do with [PHI]. The tracelog of the putevent is some other PHI operator instance. It exists; therefore, it is, and its justification is sound, and all subproblems are solvable. PHI was what could know one thing at a time while comprehending many other things at once like seeing them taking them in all at once, in one clock cycle of consciousness, or you are going back into subjectivity. That is why Zizek said fantasy always comes first; you never really know what you are doing, although this province is now available to human machine combinations (cyborgs). Such beings can intellegere multa as they scire. It is in the collapsing of computation into perception, phenomenology, ontology, metaphysics, philosophical reflection, and so on. Such operational descriptions of the boundary between computation and natural thinking (including perception-affected thinking and asymptotically perception) echo where machines and humans cross intersect come together intermingle abide. Imagine a promiscuous operating system that allows memory access through shared visions, array values, run time values, such as the enumeration of tab stops, input boxes, and labels. Presume database encoding of the existing data, a spreadsheet that is represented in (encoded in) XML. Simply charge an incrementally higher price in the market to do any alternative. Time to revisit the sample data last manipulated nearly a week ago, the spreadsheet file PHI-prime-prime. Wow, easy to mistakenly get Office Open XML expecting an article about Open Office XML, surprised at the references to Microsoft. I really needed to find OpenDocument format anyway, dropping the word office.

The Open Document Format for Office Applications (also known as OpenDocument or ODF) is an XML-based file format for representing electronic documents such as spreadsheets, charts, presentations and word processing documents.
While the specifications were originally developed by Sun Microsystems, the standard was developed by the OASIS Open Document Format for Office Applications (OpenDocument) TC - OASIS ODF TC,[2] committee of the Organization for the Advancement of Structured Information Standards (OASIS) consortium and based on the XML format originally created and implemented by the OpenOffice.org office suite (see OpenOffice.org XML).
In addition to being an OASIS standard, it is published (in one of its version 1.0 manifestations) as an ISO/IEC international standard, ISO/IEC 26300:2006 Open Document Format for Office Applications (OpenDocument) v1.0.
...
Inside an OpenDocument file
Although the XML file format is human-readable, it is fairly verbose. To save space, OpenDocument files are stored in JAR (Java Archive) format. A JAR file is a compressed ZIP file that has an additional manifest file that lists the contents of the archive. Since all JAR files are also ZIP files, you may use any ZIP file tool to unpack an OpenDocument file and read the XML directly.
[working code css]
jbork@alkibiades:~/public_html/progress/2010/11/tmp$ unzip -v ENG_6812_sample_data.ods
jbork@alkibiades:~/public_html/progress/2010/11/tmp$ unzip -v ENG_6812_sample_data.ods
Archive: ENG_6812_sample_data.ods
extracting: mimetype
inflating: content.xml
inflating: styles.xml
extracting: meta.xml
inflating: Thumbnails/thumbnail.png
inflating: Configurations2/accelerator/current.xml
creating: Configurations2/progressbar/
creating: Configurations2/floater/
creating: Configurations2/popupmenu/
creating: Configurations2/menubar/
creating: Configurations2/toolbar/
creating: Configurations2/images/Bitmaps/
creating: Configurations2/statusbar/
inflating: settings.xml
inflating: META-INF/manifest.xml
http://localhost/~jbork/progress/2010/11/tmp/content.xml
jbork@alkibiades:~/public_html/progress/2010/11$ vi ENG_6812_sample_data.csv
jbork@alkibiades:~/public_html/progress/2010/11$ vi interview_20101110.pl
jbork@alkibiades:~/public_html/progress/2010/11$ chmod 0755 interview_20101110.pl
jbork@alkibiades:~/public_html/progress/2010/11$ ./interview_20101110.pl ENG_6812_sample_data.csv
interview ["Interview"] date ["Interview Data"]
interview ["Number"] date ["Date of Interview"]
interview [1] date [20101025]
interview [2] date [20101025]
interview [3] date [20101025]
interview [4] date [20101026]
interview [5] date [20101028]
interview [6] date [20101101]
interview [7] date []
interview [8] date []
interview [9] date []
interview [10] date []
[working code css]

See, it is so. This is the web representation without bold faced text, hyperlinks, or the original footnotes. To bother with an XML parser or write a custom program to populate the database is the design engineering question problem requirement. Found in Create XSLT filters for import and export of the OpenOffice.org community forum after a search for open office spreadsheet to xml and then to OASIS OpenDocument file format as compressed XML files. Looking at it in the browser I want to start reading at the table row whose style-name is ro2 , whose value as text is 1 the first interview. This is where I want to start extracting and putting into the database. Another open is to leverage built in exporting functions changing the field delimiter for the CSV output to Save As. As a web search result explains, a checkbox in the screen to set name and output file type must be set checked to change the delimiter. Write a program that starts at the third line of the output file and parses by the chosen TAB delimiter. Then Perl can be used to populate the database from the spreadsheet export (finding parsing delimited data in Introduction to Data Manipulation Using Perl ), rather than from operating operator (upon, with) the native XML. A great abstraction would be to use the column names from the second line to determined what variable to set with the output of the split() function. It gets closer to being doable but there is still a lot of coding to do. Looking at th output of the starter Perl program, the first (row 0) contains the question headers (in columns 1 through 40) and the second (row 1) contains the responses (in columns 1 through 39). Rows beyond that contain the interview data. This could go into a new table or leverage (be an affordance of) the existing poller schema. Basically, interpret the questions such that an empty column heading implies a sub part (response, in poller terms) of the most recent non-empty column heading.

6 1 1 (+) [-3+]mCQK bork-journal 20101120 20101120 1 -4+ journal_2010.html
Just as a recent IEEE Think Piece text by Jonathan Aylen address now defunct discussion of common process control using low cost hardware parallels my noticing the absence of discussion about developing life long general purpose programming skills. In this case we are not just overlooking the mundane; a range of potential activity has been foreclosed upon (forgotten). Occasional reemergence in Cummings and (Applen, Jones, or other T&T faculty). Just as the engineers and technical writers of early hardware builders shaped computing history by playing a role in the bringing to market and widespread use of particular models of electronic devices and producing specific but widely read texts, a recycling of interest in those legacy, previous states of the art establishes a niche for my sort of academic research by creating market for academic discourse about them.

6 1 1 (+) [-3+]mCQK bork-journal 20111120 20111120 0 -6+ journal_2011.html
It does not go far to find support for automatization of certain services otherwise requiring ƒmanualƒ (that is, intentional) intervention, for example saving content from online coursework out of the care of proprietary learning management systems including Webcourses@UCF and others previously studied (Coopman). The image comparing Willinghamƒs mind model to a feedback process control model did not come out as I imagined it. I am thinking of something closer to the fetch and execute basic cycle of computers as defined by Maner. Need to introduce him to the discourse ƒentextingƒ discussion. Finally revising to just Willinghamƒs model of mind with forgetting leads to muse Embodied action besides unidirectional awareness is absent from the model. In the shower realized cathedral represents military determination of technological change, whereas bazaar the grassroots, distributed, hetergeneous, noncommercial, free, open force that exists alongside the structurally empowered positions.

6 1 1 (+) [-1+]mCQK bork-journal 19931117 19931117 0 -2+ journal_1993.html
A totally awful morning: after being up til 3 trying to fix WIN-OS2, I feel asleep, got up, and messed with it some more. Before I knew it, it was time to go, so I headed out into the rain on an empty stomach.

6 1 1 (+) [-1+]mCQK bork-journal 19951117 19951117 2 -28+ journal_1995.html

951117.0932

Immediately thought the most radical thought, for we who guage [] with degree of consciousness, and have, when we think/write about it, always placed dreams in a separate register (type; field; category) becomes proposition, words, text. What has since the dawn of recording technologies been an economic necessity, i.e., this bartering away of intensities for some representation, rather than nothing, also rests (stands) unthought in the ground of our metaphysics the most radical thought, for we who measure against the standard (ground) of waking consciousness (James), and have, when we think/write about them, always placed dreams in a separate register (______)

Immediately thought 1the most radical thought, for we who measure against the standard (ground) of waking consciousness (James), and have, when we think/write about them, always placed dreams in a separate register (______)becomes proposition, something written down. In our common fantasies of the Greek experience at the dawn of Western thinking, however, thought came-to-be ( becoming in all its Heideggerian richness, with which you will hopefully become familiar if you have not yet done so) something spoken.

Now, if you have not invoked the hypertext, then the monologue ought to continue with its focus on the Greek experience of Being; had you pressed the button, as they say, then you would not be surprised were the text to continue with its focus on dreams and their symbolization.

STOP. YOU HAVE NOT READ THE INTERPRETATION OF DREAMS IN EITHER GERMAN OR TRANSLATION.

This gets me off the hook. I could devote the next few years to developing a system for Linda to have no trouble travelling around Chicago, and finishing that project recommence my philosophical commentary. But then, how do I know at this moment that I am making the best choice, so that I will be likely to remain resolute in my decision, and enthusiastic in the perseverance of that plan? My little voice tells me to see what plan I was following unconsciously last year, even perhaps plotting an Ultimate Argument. Originally (prior to the happening, the event, the occurrence, the handed inclusion in the C.K. [register] of whatever phenomenon prompted me to call [it] my little voice even if it is merely in the inscription of the record) I had been intending, and even thought of doing so this morning after Linda and Donna left on their respective journeys, to read The Anaximander Fragment by Heidegger.

(a thinking-time w/o note-recording)

Child Plan for REV-PHI: see BM (actually a quasi-BM on notecard & graphite because it s easier and cheaper to use my hand than something on the Cx)

Reading through the notes from that class, which I had the audacity to give to Child as if he should read them:

ALIENTATION marks the damage of signification, that is, how the subjectƒs history BECOMES. And how to measure the waste? In the howing of the how how itƒs done. It being [it], that Thing about which our Thought turns. Revolutionary PHI: always from the point of view of some spectator, however distant, impersonal, or epiphenomenaly, close, personal the both the former and latter poles asymptotically approaching the universal, trans-Dasein-ish POV, the sort of compressing of Time that makes your life short in comparison; as David says, "that sound is more important than you are; that sound is more than your entire life; it will cause you to become alienated from your species-being."(Escape from Noise, track 5, x.yz - xƒ.yƒzƒ where all x minute units, z units seconds, and y units decade of z)

[another draft]

Athlete cured : they got rid of the older brother, who used to poison the German star by running the Volkwagen for hours in such a manner that the exhaust fumes drifted up into his brother s bedroom. Story of life under communism, still affected by the ego s desire for recognition, here at the national level. East Germany, of course, an identity having been annihilated.

I toiled with a hypertext link from Callen Mega-Paper in order to preserve the ordered happening of my thinking here in the car while Linda drives us back to BG. Although it ends abruptly with this unfinished thought about Heidegger and Socrates, I feel the allegience of that thread to the other beginning that emphasized music.

6 1 1 (+) [-1+]mCQK bork-journal 20041124 20041124 0 -19+ journal_2004.html
Worried about generating PDF with correct page numbers, hyperlinks, italics, and other effects. Exacerbated when trying to programmatically generate superscript for time unit of sample variance (milliseconds2) of cycle periods, if this is even the right thing to call them. Review basic statistics to determine whether to write programs or select a working third-party statistics package.

The results for this iteration of the testbed include recreation of overall event history, which reveals improper switch response for the top saucer and the out hole. Allowance for different types of switches has been made and could be leveraged for treating them. Poor lamp performance is not captured by the data record but is reported by the observer. This led to consideration of implementing zero crossing detection, possibly with an ISA interrupt, to more precisely time lamp control. It was also suggested that zero detection could be performed solely through auxiliary input lines under the existing timer driven work queue without introducing the complexity and overhead of interrupt processing. This produced the elegant side effect of allowing the module to only perform lamp processing when its execution coincides with the rising portion of the waveform. This should be illustrated by the comparatively brief process cycle executions coinciding with the 120 Hz power supply ripple. There is a problem with this approach besides the sampling precision required to detect zero crossings related to the Nyquist rate. Fluctuations in the process period recently revealed by the descriptive statistics confound the notion of synchronizing the process period with the lamp SCR power supply and solenoid power supply waveform. Further performance degradation will occur if the power supply waveform itself varies. A watchdog algorithm would have to monitor and resynchronize. It may be the case that the data recording function is significantly interfering with system performance. Is it necessary to continue logging all I/O operations? They are used to determine solenoid response and continuity of the log itself. Unless the aforementioned process period fluctuations seriously degrade momentary solenoid performance, and they do not, in so far as the longest interval is only 29 milliseconds, then that performance goal can be judged met and not be an item for analysis in future iterations of the testbed. However, it is therefore necessary to compute the relevant statistics now; or is it, since the dataset can be recalled?

6 1 1 (+) [-1+]mCQK bork-journal 20051021 20051021 1 -40+ journal_2005.html
The hypothesis that both could be convinced that I really can write a program that dynamically generates that which was previously written suggests that the ideal <noun><operator><Socrates> is instantiated today by human beings using electronic computing machinery. Certain ones of us can escape and become American Socrates instantiating both historical facts and dynamically optimized systems like the one I am typing on now (using poor English). Compare this use of poor English to the action done by Cicero, an action that amounts to a combination of logotropos and psychic slippage which is what makes Pitt so appealing in addition to the accomplished, Callen-like professor. Callen did not want people to meet him in his office, naturally, to avoid failing real time requirements, so he cultivated philosophies that lent the encounter to anywhere besides his office. Socrates, who traveled the city, is not believed to have had an office, although Aristophanes suggests otherwise in a very well known ancient text. Not having an office seems to alleviate the concern that an unreasonable number of interlocutors will converge upon Socrates, since his location cannot be as easily predicted as if he did have office hours. name14 probably does not know it but she is controlled by the brainwave entrainment resulting from her use of ECM (electronic computing machinery, which will have to be defined by retracing all the steps taken to achieve satisfactory comprehensive and technically correct understanding ECM (linking back to the first instance of the well-formed formula (link, logotropos) ECM). Did I correctly execute the parenthesis? Who else is notable for using such a logical structure (((())))? This must be carefully examined. The outer parenthesis goes with the first previous sentence, beginning with the word who (what are the rules for quotation marks here? Iƒd ask my mother but it is Friday and they are probably out shopping or taking a walk). So we are left with ((())). The outer parenthesis (using the iterative feedback method) goes with the next previous parenthesis, ECM. This should link to the definition of electronic computing machinery. The definition section becomes footnotes. The idea of this sub-argument, sub-section, ordered-part, and the other names you have for it is that all instances of ECM link to the definition. The definition must supply links and knowledge of electronic computing machinery. Taken like these everything else can be a function of ECM. That is the compression idea. Finally we get to the parenthesis that subsumes only a ƒpronominalƒ object. Only a philosopher who studied with Marv Belzer would immediately get what hyperlinks and logotropos share in common is their computing function, their ability to computer and be used in computing. This property is just like the property of words, that printed text means something. It is the generation of the something by the means of the information (or data) visual, written, sense-making English. Cicero used Latin and Greek, stepping into Greek in place of possibly and impossible Latin articulation. Itƒs where he cheated, used a crutch, as Heidegger accuses all thinkers besides Socrates, hooked as they are on writing. Only now with ECM and hyperlinks can the tiresome work be done by artificial automata. Socrates <Greek words> are realized in this virtual visual reality built on the Book Form. Now we have to define BF. That is already doing the dissertation product! This must become the writing sample, and such an admission relegated to a footnote. The step getting here was based on von Neumannƒs statement. That link gets us out of here (this part of the definition of ECM). It was stated that a defining ECM entails understanding ECM. The ancient texts part of the mission is yet to be done, and it is to achieve this end that I apply to your program (department). The writing sample is part of PMREK and is a PMREK without the circuit boards, ISA bus Intel x86 architecture electronic computing machine, and Bally pinball machine. But it is expected that the philosophers reading my application acknowledge that it is understood between us that to really appreciate my work requires undergraduate level or serious hobbyist knowledge of x86 ISA computer hardware, Linux 2.6 kernel programming, and pinball machines. Each of these can hyperlink to such articulations of that knowledge as would be expected of an ECT baccalaureate or serious hobbyist. We research ancient literature because it is full of very wise thinkers who now appear to have been making ethical and metaphysical statements about computing.

6 1 1 (+) [-1+]mCQK bork-journal 20051110 20051110 7 -1+ journal_2005.html

As a mixture of testing the new I/O board, presenting an interesting instructional example full of lessons in ECT from relay driver to memory-mapped I/O, and the imaginary home computer that uses a transistor to control a relay to actively disconnect the Internet by some program that writes 1 to port C of the first PPI, that is, outb(0x1, 0x282) some useful work was done.

6 1 1 (+) [-1+]mCQK bork-journal 20061110 20061110 0 -27+ journal_2006.html
Diverging from life is but a dream [<article>[<space>=<operator>]<noun> including the cyberpunk [<verb>=believes]] life is but a game. Both may imply recklessness; however, the latter need not imply much of a reflection upon [<possessive adjective><space>[<noun>=life[<operator>=.]]] At times this writing is more useful to an imaginary, high speed binary computer (i.e., digital electronic as Maner conceives) than a conscious reader. Let binary imply digital; the distinction is between both digital and analog (asymptote of as many more than two as you would care to conceive ) and between artificial and natural. This is good because otherwise enormous expenditures would be required to create artificial life. Think about this for a minute. If life was required for games then their production would have to include it, meaning virtual reality. This is expensive compared to the book form.

Perhaps I should better understand subversion for work and play--the computer software subversion. This is a statement of the form <operator[0]><operator[1]><operator[0]><operator[1]> such that (pseudo Perl)

@operator<operator[1]><operator[1]>statement,punctuation<operator[1]><operator[1]>

Then go on to say statements include the forms fitting the first and the second ( perhaps I should better understand subversion for work and play and the computer software subversion --but the second is not a complete sentence) can be the output of operator[0] whereas operator[1] punctuation includes em dash, period, equal, [double quote (including left and right double quote) no I mean parenthesis (left brace indicating set membership)], so that the whole thing can be represented as the well formed formula

<operator[0][0]><operator[1][0]><operator[0][1]><operator[1][1]> and @operator<operator[1][2]><operator[1][3]>statement,punctuation<operator[1][3]><operator[1][1]>

duh, is that worth anything? Will it really make the journal machine readable? I admit I don t understand the Fedora wireless connection configuration program, but I will copy the settings from the one laptop to the other, which happen to be the defaults anyway. The illustrates the point that people can use artificial binary computers without having much knowledge of not only how they work, but how to correctly use them. This is important and different from other computing activities. Could you use a calculator and not know how to use it to perform arithmetic operations? Besides subversion imagine virtual machines permitting running Linux(R) natively on the work PC or through Windows(TM) in a virtual machine as a last resort.

As usual too many intervening steps ruin the idea of running a copy of the Windows partition in a virtual machine like qemu; can t even read the ntfs partition. Again, if life is but a dream, it needs to be produced nonetheless, and we believe dreams derive from life, from waking life and perhaps other dreams. On the other hand, life constituted from games is more likely artificial, like Plato s cave. Others have been obsessed with revealing logical structure beneath language, which differs from arithmetic because it is semantic rather than merely syntactic. Is this distinction merely an indication of higher complexity, like between analog and binary as discussed earlier? Strange that the philosophy of technology anthology does not have any Roman writers. Nice to read Marx again thought: At the end of every human labor-process, we get a result that already existed in the imagination of the laborer at its commencement. Practicing technologists are seldom eager to abandon a tool even if management determines the change is necessary. Before I learn much about subversion I want to know that the new analyst Paul is recommending to Toptech management.

6 1 1 (+) [-1+]mCQK bork-journal 20081110 20081110 0 -7+ journal_2008.html
Donƒt <verb> again until youƒve figured this out. (1) Imagine this as a 3000 x 3 x height of each table divided into three rows of three columns or more if additional slides for pmrek will be made. (2) In the feedback circuit all possible slides would be displayed in a particular order determined by interactor responses recorded in the MySQL database by PHP session id. What you get as output is a complete history of the software with the literary content in comments along with the structure of the active program code. Have an attract mode before the timer starts showing connection info for a few seconds every so often. Be sloppy and add a column to PollResponses for the session id or add it to the PollUser column part of the primary key. Tell the story of the response based on some computation initially the will of localhost.

6 1 1 (+) [-1+]mCQK bork-journal 20081115 20081115 1 -8+ journal_2008.html
At some point the count down display will correctly represent the current time as well, at which point the stove display is ambiguous. Any program perceiving the human interactor visual field must take this possibility into account when using this information in its thoughts and machinations, such as being part of a distributed, closed loop feedback control system. I am asking you to examine with control system fantasy. Begin with the basic concepts and terminology of an introductory text book for control system technology (Bateson, seventh edition 1993 may seem out of date but little has changed in the basic concepts and terminology).

(image of traditional closed loop feedback control system)

The concept of supervisory control, which in a distributed model may interconnect inputs and outputs of multiple physical circuits, must account for the impedances of the feedback circuits with respect to their effect on whatever control operations are significant and determinative at any given time or range of time.

(image)

This can be how FOSS takes us beyond Turkleƒs 1995 conclusions. This relativity confounds the gods-eye-view of top-down procedural rationalist clarity while maintaining a depth (black boxes within white) that can be probed beyond the surface level of the simulation (representation). Only with this enhanced model should we attempt to apply it to cognition, literary analysis, or any other human activity.

6 1 1 (+) [-1+]mCQK bork-journal 20091123 20091123 0 -3+ journal_2009.html
The back trail of the hysteresis resistance to the vendors unconscious American Socrates writes a path in myth about his intercourse with vendors. Have the journal software create the bookmarks and the text; have CSS format the bookmark text or replace it through a postprocessor substitution from a database query. The timing example from BASH includes an example of using the MySQL API.

6 1 1 (+) [-1+]mCQK bork-journal 20091207 20091207 0 -2+ journal_2009.html
What if we agree to keep in mind that Freud knew what he was doing and whom he was representing when he engineered the production of a book whose title has come to be via translation PHI. This logic ties to Zizekƒs short circuits, Zizek who does not think with electronic computing machinery any more than others for whom the correct understanding of its theory makes possible the use of it productively rather than hysterically.

6 1 1 (+) [-1+]mCQK bork-journal 20111124 20111124 0 -3+ journal_2011.html
Looking for Lacan reference to begin annotated bibliography for Grajeda project. Move on to Sterne, Goodman, Ihde, Reddell, Barthes. Is starting with an annotated bibliography a strange way of decontextualization from which the obvious flow of a conference paper length argument ceases not to write itself?

6 1 1 (+) [-1+]mCQK bork-journal 20120428 TAPOC_20120428 0 -9+ journal_2012.html
An algorithm for generating this virtual reality is what my software system provides me. The poller project teaches object oriented programming through the ƒpoll objectƒ including pun. The truth is the cybersage work station is jarring, hazardous, for it is the same draft if not further electrified that has been associating with writing, even prior to hypomnesis, simulacra writing, so it is dangerous to think with, to be part of thinking in the sense Turkle describes replacing psychoanalysis with her own discourse. Much more, according to Kittler. Why is this so radically different? Because I provide a virtual machine (deliberate technology integration) as well as texts. The argument really has to be taken all the way to make sense of my interpretation of the print versus online help debate. Besides making MAME machines to relive adolescence, learning programming with early personal computers using printed manuals (physical object) rather than online (digital object) television-like phenomena are activities suitable for cybersage production (Engelbart type c activity). Both positions imply object orientation; however, I argue it is not enough to jump into OOP and not become proficient procedural programmers as well, and what better way to start than with those machines many of us touched in our youth listening to our favorite music (the audio remainder unencoded by visual philosophy/disciplines/media contents).

6 1 1 (+) [-1+]mCQK bork-journal 20121123 20121123 0 -9+ journal_2012.html
For the first time starting in Lake Mary repeating the pattern of a thought, or a pattern of the thought, for here at the symbolic level they are equivalent, this for equation loop pattern structure becomes embodied in the source code versions in addition to the run time version. These are new divisions of reality, source code and run time versions of working code PHI. Listening to Pink Floyd decades in the future can still be computed in virtual realities through fossification turning one digital code upon another into running through stored memorized symbolizing representing PHI. Feeling need to read Kittler in German. If we are challenging ourselves to think how corporate, collective intelligence like major websites Amazon and Google gather thought, think about it, like Draculas Verm chtnis. Technische Schriften.: Friedrich Kittler which happens to be loosely German delivered to an American HTTP query, ridiculously returning Out of Print--Limited Availability whereas likely in Germany or Europe shipping addresses would have made offerings in other currencies, which is why it does not appear here. Strange, however, that the UCF library books search also responded Search: ƒDraculas Verm chtnisƒ : We found 0 matching items at UCF although reasonable if not obvious identity prevents revealing of restricted search results allowed for authorized users and not anonymous, not explicitly affiliated source IP addresses, for example, generic Internet traffic as HTTP over TCP/IPv4 perfectly comprehensible after years of computer programming, networking protocols and electronics study phenomena. Although it may be somewhat more complicated in reality because UCF has partnered with a third party provider to extent licensed access to other user types besides those affiliated with the university.

6 1 1 (+) [-1+]mCQK bork-journal 20121124 20121124 0 -35+ journal_2012.html
Taking a picture with machine replaces memory and writing: universalizing this assumption is new to philosophy because it is new to the philosophy of computing, evidence of Manerƒs proposition that new ethical problems arise at the horizon of philosophical production. In the background are public radio, insects, traffic, and trains rushing through the backyard. Taking a picture of the fence assuming the post diameter can be derived, for no instrumentated measurement was made: just as it was not for me here to measure the diameter of the fence post was just as unlikely as there being a salable object satisfying my desire for Kittler German technische Schriften. But for some strange reason the image is not displayed in the typical view (session one). Is it a code problem, is there some flaw in the logic of the code, or some other reason. That is what I mean by strange reasons, the discovery of unknown knowns during effective IT troubleshooting.

[working code css]
jbork@alkibiades:~/public_html/progress$ cd 2011/11
jbork@alkibiades:~/public_html/progress/2011/11$ ls -l *.png
-rw-r--r-- 1 jbork jbork 309962 2011-11-24 14:33 screenshot_20111124.png
jbork@alkibiades:~/public_html/progress/2011/11$ cd ../../2004/11
jbork@alkibiades:~/public_html/progress/2004/11$ ls -l *.out
-rw-r--r-- 1 jbork jbork 15608514 2010-03-03 20:46 testbed_20041112.out
-rw-r--r-- 1 jbork jbork 15608514 2010-03-03 20:46 testbed_20041124.out
jbork@alkibiades:~/public_html/progress/2004/11$ diff testbed_20041112.out testbed_20041124.out
jbork@alkibiades:~/public_html/progress/2004/11$ echo $?
0
Is [progress/2004/11/testbed_20041124.out] relevant? y/n:n
Is [progress/2004/11/testbed_out_20041124.txt] relevant? y/n:
jbork@alkibiades:~/public_html/progress/2004/11$ ls -l *.txt
-rw-r--r-- 1 jbork jbork 4546 2010-03-03 20:46 crash_msg_20041109.txt
-rwxr-xr-x 1 jbork jbork 3399 2010-03-03 20:46 getlatest.txt
-rw-r--r-- 1 jbork jbork 13772705 2010-03-03 20:46 testbed_out_20041101.txt
-rw-r--r-- 1 jbork jbork 58677643 2010-03-03 20:46 testbed_out_20041124.txt
-rw-r--r-- 1 jbork jbork 10004689 2010-03-03 20:46 testbed_out_20041127.txt
[working code css]
This working code exercise along with a session one and session six browser operation yields the fact that the screenshot (screen image) from last year does appear in the latter session, though not the first one I tried. So perhaps it is database configuration, the next thing to test. Rather than committing the huge text file (progress/2004/11/testbed_out_20041124.txt) putatively generated by software JIT comprised of known source code revisions, this epistemological transparency affords us the choice of not including it, and therefore saving the cost of allocating that huge amount of machine programmed memory, by virtue of its deterministic reproducibility. Chanting Indians publicly executed in America coextensive to the story Foucault tells about the transformation of discipline and punishment, and correlatively, about transformations of souls materially influenced. The notes having not been made surrounding this insight that occurred a few hours ago lying in the newly erected hammock. Fitting that the public radio story about Indian massacre and expulsion from an American state points out to people that they ignorantly promote the very people who murdered their ancestors, accusing them of having a fake identity, very fitting to my own studies of identity and subjectivity, bounding Foucault, applying his analytical method to machine being as another type of soul, whether it exists or is merely a consequent of the way we tell our stories, in all their scientific, common sense, fictional, mythical, and so on.

6 1 1 (+) [-1+]mCQK bork-journal 20131117 20131117 0 -1+ journal_2013.html
Continuing the cow clicker dissertation progress setting relevance to entries through 3.

6 1 1 (+) [-1+]mCQK bork-journal 20140502 20140502 1 -2+ journal_2014.html
Confused by previous ordering C++ first and C second, restating the idea: the layer of the real at which computing must manipulate electronic circuits represents an initial sense of object orientation in overall engineering design suiting the solution to the PHI now superseded by programmed visions (oops, object oriented programming productions). These are both statements of procedural rhetorics that explain how humans and machines can be made to behave by design; that many note these phenomena have been observed in much older technologies lead others to caution reliance on those ancient texts to set scope and bounds of critical field of analysis.

6 1 1 (+) [-1+]mCQK bork-journal 20141019 20141019 0 -3+ journal_2014.html
When I am going to hear from Janz becomes the real question PHI process determinant. By to buy into Kittler I think I meant to take stock as form of thinking shared by machines and humans, that is, computation; taking stock involves not just instrumentation of human perception but full implications of technological unconscious and machine cognition. Just move philosophy of technology to chapter three.

6 1 1 (+) [-1+]mCQK bork-journal 20141023 20141023 0 -55+ journal_2014.html
This is how it shakes out, working code via MySQL Workstation GUI interface foss.

[working code css]
jbork@alkibiades:~/src/tapoc$ make
jbork@alkibiades:~/src/tapoc$ phi
Committed revision 270.

select * from Notes where chapter=3 and heading=1 and subheading=4
select * from Notes where chapter=2 and heading=3 and subheading=1
update Notes set chapter=3 and heading=1 and subheading=4 where chapter=2 and heading=3 and subheading=1
jbork@alkibiades:~/src/tapoc$ mysql -ubuilder -pbuilder JournalInfo < Notes-tapoc.sql
update Notes set chapter=3, heading=1, subheading=4 where chapter=2 and heading=3 and subheading=1
(ellipsis)
select * from Notes where chapter=2 and heading=1 and subheading=2 and InterstitialSequence>0 order by InterstitialSequence
update Notes set InterstitialSequence=InterstitialSequence+2000 where chapter=2 and heading=1 and subheading=2 and InterstitialSequence>0
update Notes set subheading=1 where chapter=2 and heading=1 and subheading=2
(ellipsis)
update Notes set heading=1, subheading=2 where chapter=2 and heading=2 and subheading=1
(ellipsis)
select * from Notes where chapter=2 and heading=2 and subheading=2 and InterstitialSequence>0 order by InterstitialSequence
update Notes set InterstitialSequence=InterstitialSequence+6000 where chapter=2 and heading=2 and subheading=2 and InterstitialSequence>0
update Notes set heading=1, subheading=2 where chapter=2 and heading=2 and subheading=2
update Notes set InterstitialSequence=InterstitialSequence+11000 where chapter=2 and heading=2 and subheading=3 and InterstitialSequence>0
update Notes set heading=1, subheading=2 where chapter=2 and heading=2 and subheading=3
(ellipsis)
select * from Notes where chapter=2 and heading=1 and subheading=3
update Notes set heading=1, subheading=3 where chapter=2 and heading=3 and subheading=2
(ellipsis)
update Notes set InterstitialSequence=InterstitialSequence+8000 where chapter=2 and heading=2 and subheading=4 and InterstitialSequence>0
update Notes set heading=1, subheading=3 where chapter=2 and heading=2 and subheading=4
(ellipsis)
jbork@alkibiades:~/src/tapoc$ dmesg
[495469.404394] journal.exe[8591]: segfault at 0 ip 00007ff610945407 sp 00007fff9014bba0 error 4 in libc-2.19.so[7ff610908000+1bb000]
update Notes set heading=2, subheading=1 where chapter=2 and heading=4 and subheading=1
update Notes set heading=2, subheading=2 where chapter=2 and heading=4 and subheading=2
update Notes set heading=2, subheading=3 where chapter=2 and heading=4 and subheading=3
(ellipsis)
update Notes set heading=1, subheading=4 where chapter=2 and heading=3 and subheading=3
select * from Notes where chapter=2 and heading=3
update Notes set heading=2, subheading=4 where chapter=2 and heading=5 and subheading=1
update Notes set InterstitialSequence=InterstitialSequence+10000 where chapter=2 and heading=5 and subheading=2 and InterstitialSequence>0
update Notes set heading=2, subheading=4 where chapter=2 and heading=5 and subheading=2
update Notes set heading=2, subheading=5 where chapter=2 and heading=5 and subheading=3
[working code css]

This is how it shakes out, working code via MySQL Workstation GUI interface foss. Get the indea yet while tempted by near dream job at Georgia Tech. The implied procedural rhetoric is that the first query returns zero rows, the second many, which can be moved to implement plan in a situated action of philosophy of technology out of chapter two into three. Note the first update screwed up the table, forcing restore from backup just made, revision 270. So the first move is made. Now to move around entries in chapter two, whose working code in the browser doing what I jokingly call dissertation cow clicking becomes the ellipsis. This work is needed to retain the original sequencing, which would become corrupted by merging subheadings 1 and 2 of the current 2.1.1 modernism and 2.1.2 postmodernism. Good thing I only set 15 and 46, though even this is a lot of clicking. Could write SQL to add offest to 1.2.2 before changing to 1.2.1 as done with 2.3.1. Instead it is down quickly with SQL with five to ten minutes testing, SQL writing, and multipurposive learning. Doing this in place of clicking is the difference critical programming makes to philosophical production and everyday cognition. Regressive subjectivity is build merging subjectivity, regression, hegemonies doing the renumbering by following ellipsis spent using the tapoc literature review session after the easy move to the vacated section. Then Heideggerƒs America, merging electric prostheses then inventing posthumanism. Maybe move electric prostheses to embodiment rather than merging into Heideggerƒs America, which is already long. The original idea makes more sense after reviewing the sequenced notes, which do reference Heidegger. Let electric precede clarity of electronic articulated in subsequent section on cybernetics. Getting seg faults hopefully because there are now no entries in heading 2 or 3. Forgot about inventing posthumanism or whatever was original 2.3.3; it is recast as 2.1.4 as it continues the default conception of posthumanism waiting for Hayles deeper analysis. Now 2.3 and 2.4 are evacuated, liquidated, transferred to other parts in the network of the electronic text. Final steps are to merge 2.5.1 and 2.5.2 into 2.2.4, move 2.5.3 to 2.2.5, and fix up the table of contents. To produce a semblance of literature from these results for the subsequent chapters, I am contemplating a query that just lists the different texts rather than long sequences of citations. Next to reorganize like this is chapter 3.

6 1 1 (+) [0+]mCQK turkle-alone_together (288-289) 20140413h 0 -9+ progress/2012/06/notes_for_turkle-alone_together.html
Slowness practices and other means of seeking solitude, which is ability to summon yourself by yourself, seen as backlash to social media like 1980s romantic reaction against computation as model of mind. (288-289) Loneliness is failed solitude. To experience solitude you must be able to summon yourself by yourself; otherwise, you will only know how to be lonely. . . . I see the beginnings of a backlash as some young people become disillusioned with social media. There is, too, the renewed interest in yoga, Eastern religions, meditating, and slowness.
(289) These new practices bear a family resemblance to what I have described as the romantic reaction of the 1980s.
(289) The romantic reaction of the 1980s made a statement about computation as a model of mind; today we struggle with who we have become in the presence of computers.

6 1 1 (+) [0+]mCQK turkle-second_self (300) 20140325 0 -3+ progress/2011/04/notes_for_turkle-second_self.html
Carrier fetish objects are great amusement for network and localhost embodied in the flesh and discrete machine dividuals, thus this blindness of floss to purposes for which software designed and put to use of engendering initial metastasis energy level plateau preponderance of what Lanier calls siren servers and I point out as evidence we are getting dumber in our use of machines; that is, the cleverness of our programming diminishes from height reached decades earlier for reasons of having a need to program now done for pay. (300) In the case of computational models of mind, there are what I call carrier objects that encompass both the physical computer and ideas that grow out of programming.
(300) We are able to identify with the programs and so become sympathetic to their confusion.
(301) The computational theory of slips is the kind of theory that passes easily into the general culture.


select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia from Notes where Chapter=6 and Heading=1 and (SubHeading=0 or SubHeading=1) and (InterstitialSequence=0 or InterstitialSequence=100) order by Heading, SubHeading, InterstitialSequence desc, RelevanceLevel desc, TextName, cast((trim(leading '(' from substring_index(PositionStart, '-', 1))) as unsigned)

TOC 6.1 recommendations+

6.2 future directions


TOC

Works To Cite

AuthorTitleStartedRelLatestReadNotesMLAhours
cicerophilippics02 19968.602013102890%25% 0
diogenes_laertiuslives_of_eminent_philosophers07 19968.602014010775%50%Y0
plutarchparallel_lives04 19968.602013110725%5% 0
zizekparallax_view05 20098.602014021925%25%Y0
Items [4] Research Remaining [0] Refinement Remaining [0]