CRITICAL PROGRAMMING: Toward A Philosophy Of Computing

Chapter 1 Introduction{11}

1.1 from automated genocide to the dumbest generation{11}

1.2 a collective intelligence problem, societies of control, the quintessential postmodern object, foss hopes, default philosophies of computing{11}

1.3 not to use old tools for new problems, scholarship requires a cybersage, digital humanities projects, critical programming studies, plan of the dissertation{11}

schedule

Chapter 2 Situation post-postmodern network dividual cyborg{11}

2.1 modernism and postmodernism, regressive subjectivity, Heideggers America, inventing the posthuman{11}

2.2 cybernetics, embodiment, techno-capitalist networks, dividual cyborg, cybersage{11}

Chapter 3 Theoretical framework and methodology{11}

3.1 critical theory, textuality studies, media studies, philosophy of technology{11}

3.2 social construction of technology, ensoniment, histories of computing networking and software, psycho-social studies of computer programmers{11}

3.3 software studies, game studies, code space, critical code studies{11}

3.4 platform studies, diachrony in synchrony, technogenesis and synaptogenesis, cyborg revisited{11}

Chapter 4 Philosophical programmers{11}

4.1 system engineers pioneers of babelization, distribued network visionaries, the new ontologists{11}

4.2 application developers beyond hard mastery and bricolage, auto-ethnographers of coding places{11}

Chapter 5 Critical programming studies{11}

5.1 working code places{11}

5.2 programming philosophers{11}

5.3 symposia, ensoniment{11}

5.4 tapoc, flossification{11}

5.5 pmrek, machine embodiment{11}

Chapter 6 Conclusion{11}

6.1 recommendations{11}

6.2 future directions{11}

Works Cited


1.1 from automated genocide to the dumbest generation

TOC 1.1 from automated genocide to the dumbest generation+

1.2 a collective intelligence problem, societies of control, the quintessential postmodern object, foss hopes, default philosophies of computing

TOC 1.2 a collective intelligence problem, societies of control, the quintessential postmodern object, foss hopes, default philosophies of computing+

1.3 not to use old tools for new problems, scholarship requires a cybersage, digital humanities projects, critical programming studies, plan of the dissertation

schedule

2.1 modernism and postmodernism, regressive subjectivity, Heideggers America, inventing the posthuman

TOC 2.1 modernism and postmodernism, regressive subjectivity, Heideggers America, inventing the posthuman+

2.2 cybernetics, embodiment, techno-capitalist networks, dividual cyborg, cybersage

3.1 critical theory, textuality studies, media studies, philosophy of technology

TOC 3.1 critical theory, textuality studies, media studies, philosophy of technology+

3.2 social construction of technology, ensoniment, histories of computing networking and software, psycho-social studies of computer programmers

TOC 3.2 social construction of technology, ensoniment, histories of computing networking and software, psycho-social studies of computer programmers+

3.3 software studies, game studies, code space, critical code studies

TOC 3.3 software studies, game studies, code space, critical code studies+

3.4 platform studies, diachrony in synchrony, technogenesis and synaptogenesis, cyborg revisited

4.1 system engineers pioneers of babelization, distribued network visionaries, the new ontologists

TOC 4.1 system engineers pioneers of babelization, distribued network visionaries, the new ontologists+

4.2 application developers beyond hard mastery and bricolage, auto-ethnographers of coding places

5.1 working code places

TOC 5.1 working code places+

5.2 programming philosophers

TOC 5.2 programming philosophers+

5.3 symposia, ensoniment

TOC 5.3 symposia, ensoniment+

5.4 tapoc, flossification

TOC 5.4 tapoc, flossification+

5.5 pmrek, machine embodiment

6.1 recommendations

-6.1.0++ {11}

6 0+ 2 (+) [-3+]mCQK bork-journal 19951006 19951006 0 -27+ journal_1995.html
general structure of the reasoning-machine: (not just a static argument!)

Heraclitus + Seneca + [Nietzsche, Marx, Freud] + [Child, cyberpunks]
universal u contingent contingent = a deontic necessity?
I donフ really know where that formula come from, but who knows how the logical tie lashes against the modal logic, since I have pretty much remained unaware of those lessons (childhood amnesia?)

possible section titles:

"Anti-Oedipus"
Marx, Freud, Nietzsche
True, the "capture" of the idea of psycho-analysis almost forces the subject into an aloofness (BLACK HOLE) whose side-effect includes, happily, removal from the battlefield. Freud recommends that while in analysis, you refrain from doing much of anything besides remaining able to pay for the treatment.

.. so far as possible we refrain from playing the part of mentor; we want nothing better than that the patient should find his own solutions form himself. To this end we expect him to postpone all vital decisions affecting his life, such as choice of career, business enterprises, marriage or divorce, during treatment and to execute them only after it has been completed. (376)

However, the student still has hir effect upon the environment, through hir continued participation in the Market (not to mention all those little transactions like leaving lights on or using wads of toilet paper). And the apparently wasteful life of the analyst hardly transfers to the student an ethic of mindful conservation. Of course D&Gピ criticism of the analytic relationship hinges on a different, but related, issue, namely the .. teaching transference. [let me go, Jim: you have done your good and evil upon my soul, which now cries for freedom]

We observe then that the patient, who ought to be thinking of nothing but the solution of his own distressing conflicts, begins to develop a particular interest in the person of the physician. (..) The transference is overcome by showing the patient that his feelings do not originate in the current situation, and do not really concern the person of the physician, but that he is reproducing something that had happened to him long ago. In this way we require him to transform his repetition into recollection. (318;385)

Capitalist Philosophy

The worker, in capitalist society, does not sell the product of his labor, but his capacity to work. (..) The difference between the subsistence wage paid to the worker and the values produced by him is SURPLUS VALUE, on which the capitalistピ profit depends. (xxvi of PM)

Quintillianピ criticism of Seneca (link back with PA)
"youプe gone nowhere, baby!

-6.1.1++ {11}

6 1 1 (+) [-4+]mCQK berry-philosophy_of_software (161) 20130912g 0 -6+ progress/2012/06/notes_for_berry-philosophy_of_software.html
Compare Gaussian risk to Zizek chocolate laxative; also latent risk in software bugs, sloppy integration, poor object modeling. (161) Risk itself becomes mediated through software and becomes a processual output of normative values which are themselves the result of computational processes usually hidden within the lines of computer code. . . . Indeed, it is this misunderstanding of risk that Taleb (2007) blames for the huge leveraged asset bubble in 2007-2009 and the resultant financial crisis.
(161-162) Here, we can think of the external management of the internal perception of time that is linked to a form of Heideggerian angst towards a future event sickness, old age, and so forth which provides a new affective fuel source for capitalism.

6 1 1 (+) [-4+]mCQK bogost-alien_phenomenology (126) 20130910r 0 -7+ progress/2012/04/notes_for_bogost-alien_phenomenology.html
Emphasis on awe and wonder of STEAM against competition for STEM goals echoes Kay appealing to children of all ages rather than adults of all ages. (126) Still, even the more acceptable professional goals like astronaut or chef speak less to a childピ latent interest in astrophysics or chemistry and more to a state of natural wonder at the alien mystery of objects. But alas, common wisdom in STEM goals suggests that these moments of childhood opportunity must be captured and exploited. . . . Despite its claims for universalism, science also has embraced correlationism, always focused on human concerns.
(126) Consider an example.

6 1 1 (+) [-6+]mCQK bogost-persuasive_games (249) 20130911g 0 -2+ progress/2012/12/notes_for_bogost-persuasive_games.html
Do with electronics and programming early computers what Sayers did with Latin despite Bogost calling for a break from procedural literacy as programming. (249) Computers constrain expression even more, through both hardware and design of programming language. One could easily replace the world Latin in Wise and Bauerピ claim with the name of a computer programming language like Java or Smalltalk or C, effectively parodying the value of any subject for abstract goals alone.

6 1 1 (+) [-4+]mCQK bogost-persuasive_games (336) 20130911r 0 -2+ progress/2012/12/notes_for_bogost-persuasive_games.html
Conversation systems built into or around games is where deliberation often takes place, since not yet built into game logic itself: imagine my Macy Conferences game. (336) Other researchers have attempted to build conversation systems directly into their educational games.
(337) Social scientists may not that such conversations could be measured using qualitative analysis.

6 1 1 (+) [-4+]mCQK bogost-unit_operations (86) 20131026j 0 -2+ progress/2012/01/notes_for_bogost-unit_operations.html
Fitting that his instructional example unit operation is the chance encounter, only to deprecate the trope, replacing it with a new style of philosophizing, and tonight I started by musings with philosophy is the sexual partner of programming. (86) Unlike A une passante and A Woman on the Street, which offer poetic significance by their formal characteristics, meaning in The Sims comes solely from the generative effect of numerous codified rule sets.
(87)
The Sims: Hot Date finally takes the ultimate step in representing the chance encounter as a unit operation: it encapsulates it into the code of simulation.

6 1 1 (+) [-4+]mCQK bogost-unit_operations (99) 20131026l 1 -3+ progress/2012/01/notes_for_bogost-unit_operations.html
Like Frasca and Bogost argue for studying videogames in social context, I argue it is why the study of childhood computer usage can be a modern echo of Freudian method. (99) Videogames require critical interpretation to mediate our experience of the simulation, to ground it in a set of coherent and expressive values, responses, or understandings that constitute effects of the work. In this process, the unit operations of a simulation embody themselves in a playerピ understanding. This is the place where rules can be grasped,
where instantiated code enters the material world via human players faculty of reason.

6 1 1 (+) [-4+]mCQK boltanski_chiapello-new_spirit_of_capitalism (60-61) 20140306d 3 -2+ progress/2014/01/notes_for_boltanski_chiapello-new_spirit_of_capitalism.html
Propose future work studying learning programming by examining textbooks versus content of online forums, blogs versus digging into structural components such as floss repositories, forums, where the correspondence would be textbook style knowledge promulgation. (60-61) For each of the periods under consideration, these two corpora make it possible to bring out a typical image of what was recommended to firms as regards the types of
cadres to employ, the way they should ideally be treated, and the kind of work that might appropriately be asked of them. Appendix 1 sets out the characteristics of the texts analyzed, while Appendix 2 presents a bibliography of each corpus.

6 1 1 (+) [-4+]mCQK bork-exam2_question2 (np) 20140117 0 -19+ progress/2012/12/notes_for_bork-exam2_question2.html
Sets the stage for consuming back thoughts long past in ways substantially different from memory as any human types. (np) I am not ready to stake my scholarly career on a whole-hearted leap into this alien phenomenology, but I will go out on a limb and conclude with a somewhat ridiculous, Ulmerian positive response to the question of how to outline a Heideggerian approach to networks. It wonders at a particular network hybrid, namely the shutter sound+camera flash+TCP/IP stream sharing the field with Heideggerピ chalice. First the fake shutter sound: while primarily an ethical mechanism built into the device to prevent unauthorized photography by announcing itself with a sound, the click itself constitutes what Hayles calls a skeumorph hearkening back to film photography, a design feature that is no longer functional in itself but that refers back to a feature that was functional at an earlier time. . . . Skeuomorphs visibly testify to the social or psychological necessity for innovation to be tempered by replication (
How We Became Posthuman 17). For Heidegger skeumorphs maintain a connection to the embeddedness of the object within the culture, part of what makes it stand out as such. Next the flash: in traditional electronics, strobe lights and camera flashes are the textbook application of the thyristor, an electronic device like a transistor that, once triggered by a small current, can evoke the rapid bursting forth of a much larger current. The thyristor, too, is a skeumorph, in the sense that its name hearkens back to the thyrsus of Greek mythology, a staff carried by Dionysius and his followers, considered a fertility phallus, and resembling a penis. Moreover, it is from the thyristor that the light shines out to take the picture, to secure the image for dispatch to the alien phenomenologies of machine processing; as Heidegger puts it, to ekphanestaton, that which shines forth most purely (34). It is at this juncture that we should recall where this statement appears in our rereading of The Question Concerning Technology, for Heidegger is really talking about the poetical, and the thyristor represents its evil twin, a device manufactured for the sole purpose of maximizing the will to power. Yet the passage he quotes from H lderlin is the famous claim that has a launched so many reinterpretations of Heidegger in the philosophy of technology: But where the danger is, grows the saving power also. Iain Thomson, in Understanding Technology Ontotheologically, or: the Danger and the Promise of Heidegger, an American Perspective, equates the greatest danger with what he calls the problem of the happy enframer, continuous improvement as a self-satisfying, totalizing philosophy epitomized in Heideggerピ conception of America (152 endnote 13). The reinterpretations come as people try to articulate the saving power, something Heidegger himself never really succeeded in doing. Thomson suggests what is needed is a gestalt switch, akin to Wittgensteinピ duck-rabbit figure: the danger is the peak of historical nihilism, the very デulfillment of Western metaphysics, yet, seeing the promise, the obverse of precisely the same phenomenon, constitutes the first step into what he calls フhe other beginning of history (161). From the darkness of Nietzschean nihilism comes the dawn, through flipping from the experience of being as nothing, to instead experience the nothing as the way being shows itself to us (158). The virtual being of the digitized picture of the chalice flashing through the network as immaterial TCP/IP data is one such form of being-in-nothing. At the same time, it is open to inspection and study, and through the epistemological transparency granted by virtue of its constitution through open protocols, is, in fact, a phenomenon knowable in its simulacral essence.

6 1 1 (+) [-4+]mCQK bork-exam3_question3 (31-32) 20130414 0 0+ progress/2013/02/notes_for_bork-exam3_question3.html
Derrida can be read using Kittler method, latching onto his telephone call, Macintosh, and Freudian archive, despite his default legacy characterization as a traditional humanities theorist who does not program; in fact, the parasite ethic Berry reaches is wholly consistent with the Derridean approach deployed by Landow.

6 1 1 (+) [-4+]mCQK bork-journal 19951112 19951112 0 -64+ journal_1995.html
Cyberpunk

The story told so far is a metaphysical tale: we live somewhere between the last man and Overman. Heidegger has already rejected this approach and turned back to his own task of reclaming the Greek experience; Deleuze maintains Nietzsche s project, creating a figure (the schizo of Anti-Oedipus) and a program (schizoanalysis). So what comes to be in the real world today? Do we not hear, all around, the cries, screams, and amplified music of some enormous, frenzied expenditure of energy? If we commissioned our journalistic will to power to find the highest men today, imitating Zarathustra s search and rescue mission of Book Four, who would be interviewed? By the reckoning of Dr. Timothy Leary, cyberpunks.

Every stage of history has produced a name and a heroic legend for the strong, stubborn, creative individual who explores some future frontier, collects and brings back new information, and offers to guide the gene pool to the next stage. Typically, the time maverick combines bravery with high curiosity, with super-self-esteem. These three talents are considered necessary for those engaged in the profession of genetic guide, a.k.a., philosopher. ..The words cybernetic-person, cybernaut, and the more pop term cyberpunk refer to the personalization (and thus the popularization) of knoweldge/information technology. Innovative thinking on the part of the individual. ..all those who boldly package and steer ideas out there where no thoughts have gone before. ( Cyberpunk as reality pilot, 243;253)

How close is Leary s formulation to the character we have sketched so far? Leary extols a sort of individual much like Nietzsche s final image of Zarathustra: ever-curious, committed to his task, and ready to teach others the new information. He points out the cyber- that refers to the Greek kubernetes, the pilot who (in his reading of history) epitomized the daring, resourceful, free-thinking spirit of the Greek city-states. An Odysseus. Today the uncharted seas lie in cyberspace, in virtual reality. Therefore the teaching will most likely come in the form of technical education: insight into the possibilities of the latest gadgets and drugs that further in the individual humanity s aim, S.M.I2.L.E. (Space Migration, Increased Intelligence, Life Extension). Absolute domination of the planet has given way to using the planet as the means for leaving the planet. Consonant with Heidegger s views on technology, Leary s project does seem determined by the Enframing that is the topic of QCT. Because his vision extends so far into the future, the present configuration of the world and of beings necessarily suffers devaluation, merely the playground of human being in its larval stages. Heidegger might argue that Leary gives human being over to calculative thinking, who derives as a product of evolution what Nietzsche forsaw as the accidental development triggered by the experience named by his doctrines, but in either case a threat to man s essence. Leary does not speak metaphysics; instead, the languages of sciences undreamt in Nietzsche s time, but reckoned by Heidegger to be the heralds and agents of the dominion of the essence of modern technology.

If our genetic function is computare (to think), then it follows that the ages and stages of human history, so far, have been larval or preparatory. Now, at the beginnings of the information age, are we ready to assume our genetic function? After the larval phases of submission to gene pools, the mature stage of the human life-cycle is the individual who thinks for him/herself.(257)

Now from Zarathustra:

Know that the noble man stands in everybody s way. ..The noble man wants to create something new and a new virtue. The good want the old, and that the old be preserved. ..The earth is free even now for great souls .. Only where the state ends, there begins the human being who is not superfluous: there begins the song of necessity, the unique and inimitable tune. (156;163)

There are two themes I want to emphasize concerning Overman and cyberpunk: (1) the action of transformational psychology by which valuative thinking, freed of the prejudicies of the deposed higher values, becomes instinct proper; and also, (2) the relationship between such enlightened beings and the socius. It would be unjust to Leary to remark that he fails to give the cyberpunk an aim, or that he gives no concrete example of what sort of teaching program they package for consumption by less enlightened beings. I refer the curious reader to Neuropolitique, The Book of Life, or What does woMan want?. On the other hand, as Heidegger notes again and again, Overman s aim must be indeterminate from our perspective, we who are underway.

Both Leary and Heidegger place an enormous emphasis upon the intellectual duties of their respective Overman figures. In the first two volumes of the Nietzsche lectures, art and rapture come into in the study, but quickly give way to the problem of nihilism and its relationship to metaphysics. Does the transformation of valuative thinking into such an acute consciousness that it becomes instinct expel the dance, music, and art of the Dionysian spirit through a logical calculation? Our thinking may miss its mark to the degree that we ourselves have incorporated utility-maximizing rationality into our reasoning, and forget that Nietzsche never endorses the mere gathering-for-cost-efficient-use mode of esteeming. Instead, the higher being is characterized by excess, a superfluity of power. As object of his psychological investigations, when not focused upon degenerate forms like theologians and philosophers the hopeful, positive embodiment of will to power, then artists, musicians, dancers approach an ideal of Dionysian frenzy, which very clearly has become an ideal also in cyberpunk literature.

Toward a psychology of the artist. If there is to be art, if there is to be any aesthetic doing and seeing, one physiological condition is indispensable: frenzy. Frenzy must first have enhanced the excitability of the whole machine; else there is no art. (TI, 518)

Here the other side of cyberpunk comes to the fore.

6 1 1 (+) [-6+]mCQK bork-journal 20010727 20010727 0 -9+ journal_2001.html
We have to understand something fundamental about computing. It is like a drug. We use it without understanding how it works, with little awareness of future complications or health risks. (In the future Microsoft and IBM may be likened to the tobacco companies of our day, and similarly pursued for recompense for past crimes against humanity.) I believe that the decisions presently being made in the philosophy of computing determine whether we ultimately learn to manage this addiction. Furthermore, if the default metaphysics of computing technology continue to reign uninvestigated and therefore unchecked, then the opportunities to make meaningful advances against its sway (precession?) will diminish to the point of being practically impossible. This conclusion follows from the instructional dilemma already discussed. In short we are lazy and it is doubly difficult to get motivated to study ancient computing because we assume that the state of the art is always to be preferred over prior technologies.

6 1 1 (+) [-4+]mCQK bork-journal 20010819 20010819 0 -22+ journal_2001.html
If there is any significance to Abraham Maslowピ famous "Hierarchy of Needs," it is that it has become one of the many models upon which other contemporary arguments seek to justify themselves. [Recognizing the ambiguity of the consequent, the preposition may fluctuate among a number of others besides the one just read and still have meaning. That is, the implied question "Which models?" can be answered in a number of ways, all sufficiently correct (valid, sound, right, appropriate, legitimate, statistically (..), etc.), but each being connected grammatically to the antecedent in different ways and thus requiring different prepositions from the one first presented ("upon"). "With," "from," "through," among others could all have appeared. Each would have a slightly different implication, but they would all suffice to support the notion (idea, hypothesis, etc.) that] Maslowピ model holds sway in our discourse and set of beliefs. The instance I have in mind is found in The Hacker Ethic. The basic argument is that modern IT work represents several steps back down the hierarchy of needs, from fulfillment of social or personal goals back down to survival needs. Recalling the famous pyramid, the reader becomes alarmed at the condition of the IT (information technology) worker whose relentless 24/7 (24 hours a day, seven days a week) work schedule equates to a degradation to a more basic level of the hierarchy of needs. Civilization has taken a step backwards.

Periodic vacations are the only escape from the tyranny of being "on call." If free thinking only occurs during vacations, there are severe implications for the future of the philosophy of computing. The one I have repeatedly tried to explain is the relentless propagation of "default metaphysics." This is due to a present [and outstanding] paradox surrounding the philosophy of computing. On the one hand, professional technologists will never have an opportunity for prolonged, rigorous philosophical thinking. On the other hand, professional philosophers will have to avoid taking employment as technologists. The undesirable consequence of the former is that philosophy among technologists will be shallow, due to lack of "free time" for contemplation; of the latter, that philosophy among philosophers will be misguided due to lack of a correct understanding of computer technology, the sort gained only through experience.

6 1 1 (+) [-5+]mCQK bork-journal 20010821 20010821 0 -12+ journal_2001.html
XML properly understood may rank with C++ as one of the key languages through which a new philosophy of computing can be created. XML promises machine understanding that can be leveraged for human advantage by aiding thought. This claim is no different from the one made of writing in Platoピ Phaedrus. A new philosophy of computing can actually be created, whereas in Platoピ story it is shrugged off as impossible, even ridiculous to consider at all. I will try to cite two or three places in the text (Midas epitaph, "to give the actual words would be burdensome," gelion erou, and so on) where this sentiment is communicated. We are in fact dealing with an implicit admission of our own inadequacy to go much farther in the direction of articulating a comprehensive philosophy of computing. Echoes of the rejection of this more ambitious approach in favor of narrowly focused subsets of it abound (Ciceroピ letter to Atticus, von Neumann). We are in the midst of a crisis that reaches the heart of the philosophy of computing.

Putting C++ aside for the moment and considering XML--or should we not be wasting time on XML but instead consider SGML instead?--, which is more like written things (ta grammata) than C++, can you see how it could be used for representational things like writing and speaking? Through the agency of logotropos (of which "source code" is an example, in addition to hyperlinks and the common experience of reading) recollection, and not merely reminder, is synthesized.

6 1 1 (+) [-4+]mCQK bork-journal 20011021 20011021 0 -15+ journal_2001.html
The course of what becomes, is, and will be "the default metaphysics of computing" must be changed. [Personally I need to go to a "word processor" that will support the type of "hyperlink" I just imagined; otherwise, "it" will not work. Indeed, "it" is the same sort of "thing" (thought knows where it has gone. . . . )] To control it a ツontrol system must exist. While this statement seems tautologous, to understand it requires knowledge of ツontrol systems minimally. [Imagine this "natural" scenario: using "computer mouse" leads to wrist pain, which in turn is hidden by sleep in dreams that arose from using certain computer games in which a pistol is repeatedly fired. The only manifestation of the damage done using the computer mouse is "wrist pop" becoming more frequent. To provide a scientific account that correctly explains every detail of this "natural scenario" is currently beyond the capability of everyone, including Bill Gates. Yet we acquiesce to his megalomania because we believe he is trying his best. No one "in power" with the ability to influence the system can think outside of the confines created by the world [<preposition>] "the default metaphysics of computing."] Suddenly you realize how much you have to learn in order to participate in this movement of changing the course of the metaphysics of computing, for you are now among the thinkers of all ages embarked upon an incredible odyssey. Turn off bold.

6 1 1 (+) [-4+]mCQK bork-journal 20011125 20011125 0 -17+ journal_2001.html
What does it mean to say monopoly power is abused? One obvious manifestation of the abuse of monopoly power is outrageous wealth. Imagine, for example, that a monopoly existed in the petroleum industry, due, for instance, to one company having bought nearly every gas station in the country. With monopoly power over supplying fuel, that company could set its prices much higher than they are today. The profits would be tremendous, and those closely surrounding the company would be very wealthy indeed. There are ways that this condition is prevented from occurring. However, in the past we did deal with monopolies supplying critical commodities or utilities, and identified them as such. The challenge today is to face the latest evil empire. Organizations that abuse their monopoly power are evil. Let us consider the reasons why this is true. Next let us detect the abuse of monopoly power, to answer the first question. In doing so we will be setting our bearings for the future course of action.

Presently legal concerns surround harm to consumers in the form of over-charging. Someday Microsoft may be compared to tobacco companies, and charged with peddling a defective and dangerous product. However, the subtlety of such an argument requires an enormous education of the consumers of computing products, for the effect of addiction to computing products in general is a deeply rooted psychological cancer whose symptoms will not be detected for decades. It is not as simple as a feeling of being ripped off.

6 1 1 (+) [-4+]mCQK bork-journal 20011207 20011207 4 -10+ journal_2001.html
Other problems are aggravated by our mass addiction to Microsoft products. This condition has instilled a mentality of ignorant consumption; computing is a drug. Someday Microsoft may be assailed by lawsuits like the tobacco companies at the turn of the millennium, and charged with selling a defective and dangerous product. To reach this conclusion, however, drug like nature must be acknowledged. With the addiction now so deeply rooted in our psyche, this may be a difficult task, one requiring subtle philosophical analysis that is rooted in a correct interpretation of electronic computing technology. Who will perform such work? Some employee of a large corporation like IBM? Some college professor or graduate student? Some hobbyist? Is anybody keenly cognizant, suitably qualified, and sufficiently motivated to pursue such studies, let alone communicate the results?

6 1 1 (+) [-6+]mCQK bork-journal 20021117 20021117 0 -2+ journal_2002.html
My cell phone bill? Gosh, itピ close to []/[] <punctuation><part-of-speech> []=$&[]=t.

6 1 1 (+) [-4+]mCQK bork-journal 20031110 20031110 0 -13+ journal_2003.html
Star Trip consumes 60W. What is its resistance? There is a better word that is symbolized by z. Impedance. But the point is that after all this dreaming, it really is consuming between zero and 60W while it produces heat, light and magnetic fields (what else does a pinball machine really do?). It is not sufficient to merely state the ranges of the values of heat, light and magnetic fields produced during a game of pinball. Those are not the operational parameters sought. What is sought are the computational objects of the control strategy implemented by the MPU.

<pinball_machine> consumers <"scalar"><unit><operator><"scalar"><unit> After reviewing the formal concept of discreet process control, the pinball machine will be analyzed as a discreet process. What is sought are the computational objects of the control strategy implemented by the MPU. Immediately the inputs (switches) and outputs (solenoids, lamps and digital displays) are identified as process inputs and outputs. The control strategies could be analyzed by disassembling the machine code programmed into the ROMs.

6 1 1 (+) [-4+]mCQK bork-journal 20031110 20031110a 14 -5+ journal_2003.html

How can the TOC be generated if hints as to the inclusion and ordering of the many small files are not distributed among themselves? Perhaps the TOC should govern the arrangement of the subsequent parts. That seems easier to implement programmatically. It is not clear whether the pieces should exist natively in HTML format, any Open Office XML-based format, or some other format. Maybe it could be done with a static page that has a means of passing information to a PHP format target: the reader could request a "refresh" of the TOC.

6 1 1 (+) [-4+]mCQK bork-journal 20041014 TAPOC_20041014 0 -11+ journal_2004.html
Impedance of time delay means same as when impedance of semiconductor affects computation same as the sort of electrical circuit required to control an "Internet disconnect" relay driver circuit using a semiconductor relay and a standard late twentieth century relay same as mistake of replacing double throw switch with two single throw switches ... and then use words too familiar to repeat because they are used for computing ...same as (soon you will align [the ellipsis="operator"] operatorprime A new method is suggested without resulting from research: "seeing from all possible computations backwards through the request to begin the response" and it arose from wondering if physical medium would be disturbed by impedance of other one signal going through the semiconductor solid state relay relative to the zero impedance of the signal going through the standard relay. If the physical medium is disturbed leading to degradation (depravity of style) then better not to substitute hardware. That no longer makes sense after struggling a create a simple relay driver circuit. The struggle is to make technically correct instructional examples interesting and useful. Considered voluntary Internet disconnect using a big capacitor and a double pole single throw relay capable of being controlled by an unused output port of the project.

6 1 1 (+) [-4+]mCQK bork-journal 20041126 TAPOC_20041126 0 -27+ journal_2004.html
My version of Nietzscheピ question <operator_1> What if the central hypothesis of the thesis can be evaluated programmatically? What are likely central hypotheses of theses? For the thesis <operator_2> a central hypothesis <operator_3> NOTICE <operator_3><operator_4> eventually imagines <operator_5> (Nietzscheピ question) <operator_5> Reverse engineering <operator_6> <operator_7> x86 ISA FOSS ... This can be expressed as Reverse engineering <operator_6> <operator_8> statistics apparatus <operator_2> <operator_9> BNF,PDF,etc. The original sense is lost after ten hours of programming effort to refine the MCU representation and the ROI computer. Brooks introduced for emphasis on iterative development. Perhaps some guidance can come by clarifying the words thesis and hypothesis. My Winston dictionary defines the former as a proposition advanced by a person who undertakes to maintain it in argument; the latter as a proposition, principle, or theory, assumed or taken for granted as a basis for reasoning, argument, or investigation, or to explain certain phenomena. If it is taken for granted, what is the point of using statistical methods? ... Ancient computing <operator_10> the philosophical question associating senatus consultum ultimum and natural automata.

The research hypothesis is that a reverse engineered replacement meeting standard ROI criteria without infringing on any intellectual property claims for a typical, first-generation, commercial, mass-produced, consumer-oriented microcomputer-based control unit performing discrete, closed-loop process control can be implemented with generic, Intel x86, ISA computing machinery using only custom, in-house programs and free, open-source, third-party software. To use statistical methods this proposition must be distilled into statements about parameters amenable to standard problem objectives like describing a single population and comparing two populations. Besides qualitative assessments of non-infringement and overall operator satisfaction, many quantitative assessments become clear through iterations of the replacement system. The current version of the testbed, which uses a custom kernel module under the Red Hat Fedora Core 2 stock 2.6 Linux kernel environment and a custom user-mode program for game control, satisfies most high-level operational objectives with the exception of control of the feature lamps. Furthermore, statistical analysis of data logged by the software hints at potentially significant delays in system response. Both of these results illuminate the need for further iterations of the testbed that involve synchronizing lamp control activity with power supply zero-crossings, and reducing kernel latency.

The significance of this study arises from the realization that reverse engineering scholarship addressing microcomputer-based control units has hitherto focused on non-commercial, low-production, high-cost military systems for the very good reason that reverse engineering is only justified when no commercial, off-the-shelf replacement is available for a given part, and the system must be preserved at any cost. This sentiment is captured in Ingleピ Go/No-Go Matrix.

6 1 1 (+) [-6+]mCQK bork-journal 20050811 TAPOC_20050811 0 -2+ journal_2005.html
Born of necessity and the path of least resistance, fed by greed and wrapped in paranoia, the closed source model should be blamed for diminished interest in technical studies. It should be cited in discussions about why interest in computer science continues to decrease in America.

6 1 1 (+) [-5+]mCQK bork-journal 20050821 TAPOC_20050821 0 -2+ journal_2005.html
Computation abides in meaning computed from meaninglessness. Unable to think beyond Turing Machines for lack of technical knowledge, philosophers of computing have not really advanced past anthropomorphic metaphysics of computing despite capabilities in the state of the art unimaginable to Turing, such as object oriented programming languages.

6 1 1 (+) [-3+]mCQK bork-journal 20051201 20051201 0 -24+ journal_2005.html
If Alcibiades was a pirate, and Alkibiades (AL) a cyberpunk (computer criminal), then Sokrates (SO) is a benevolent old school hacker (TM) (donフ try to trademark BOSH). How do I tell the story of SO & AL? How did history Socrates and Alcibiades? For example, just as the traditional representation of Socrates is disrupted by reading about Mytro in Diogenes Laertius, Sokrates learns how Diotima got wise and found it repulsive (she fucked her way through life) like some operator, and here is where there is a 50/50 challenge to those who want to try to fake it, choosing either ta gramata, ta grammata, or ta gramatta, selecting the correct spelling. Earlier explain why technologists should be applauded for building pinball machine reverse engineering kits. Writing something that can successfully perform the precise control of hundreds of thousands of pinball machines is quite an achievement; compare it to getting that many human readers to agree with your arguments. Complex computer programs share structural similarities to complex arguments, which can be revealed using logical notation. In fact, the degree of precision goes well beyond the capabilities of any human, which is a point Maner makes. Then say that now that weプe given the technologists their recognition, applaud the scholars who take the pains to read ancient texts. Here is where the input devices used by Susan Staurt the year before I spied her copying music files from one of the older, eminent philosophers of computing, similar to the devices we use at the annual corporate ethics forum. (It is a forum to the extent that the audience answers questions via the input devices and asks a few questions at the end of the presentation.) Use similar things to poll the audience for the correct spelling of the Greek word, which you can now display in Greek using an acceptable display method, for which this word processor to HTML process is unacceptable. Likewise they can be tested for their knowledge of things like hardware address decoding and C/C++ programming structures.

The problem is that even cast as the equivalent as a BOSH, the historic Socrates was nonetheless put to death by the State, and this leads to troublesome conclusions even if we accept Xenophonピ claim that Socrates deliberately planned it as suicide to benefit the immortality of his individual story. But there is more to it than that, and this is why it seems permissible to make an analogy between the historical Socrates and our new cybersage myth of an American Socrates (TM). The gamble he took was on that Greek word weプe already investigated, which is the subject of the critique at the end of Platoピ Phaedrus. The gamble Socrates took was to have Plato write about him rather than vase painters. He guessed or maybe consciously gambled that writing would outlive the vase paintings, for huge collections of writing were possible whereas such a collection of vases would only be found among the very wealthy. Yet he sensed the danger in committing his memory to writing. After that utterly fascinating remark that writing is a drug, Socrates goes on to say that those who think they are wiser by becoming addicted to writing may turn out to be worse than fools, burdens on society (textual citation). What is new is the consideration of writing versus vase painting as ways to immortalize oneself. Van has said much about how Socrates created and immortalized the self. My argument is that he rode a new technology like a wave, gambling that it would go farther than what he perceived to be the next best option, vase painting, to which writing is compared when zoographia are discussed (textual citation). The is to counter Manerピ claim that there are no antecedent analogies to ECT.

6 1 1 (+) [-4+]mCQK bork-journal 20060819 20060819 7 -6+ journal_2006.html

We suddenly can see the whole of western philosophy as an enormous software project. Poor maintenance, with only the writing/computing technology its necessary condition, around/after Socrates led to system degradations similar to Microsoft(TM) Windows(R) and GNU/Linux software projects today. All are full of bugs, vulnerabilities, poor interoperability, steep learning curves, and so on and so on. My innovative thesis is to equivocate the western philosophical tradition and current large scale, collective software assemblages as both the work product of computing--rather than information--technologists. Computing and control comes first and they swallow information. My work simply rides the wave of overwhelming integration (probability, common sense, a way of seeing reality, interpreting history).

6 1 1 (+) [-4+]mCQK bork-journal 20061102 TAPOC_20061102 0 -21+ journal_2006.html
Embodiment is the soulピ computer control system, a natural automaton. The greater the comparison between artificial automata and this natural system, the more feasible becomes something whose contemplation is normally shunned. Near that radical asymptote have long been proposed methods of memory and intelligence enhancement. Under the book form content and structure maintain knowledge, from the order of letters, sentences, books, inter-networks of books via citations, to worldwide practices of academic research. It is important to note that these inanimate forms are not the loci of automatism; they are inanimate data and stored programs to be computed. The central processing unit was presumed to be a human mind. Besides a few visionaries the ancients would have mocked the idea of artificial intelligence. Plato presents Socrates describing [living writing], in which the human soul was the central control unit enervating this [language/writing] processing system. Leibniz proposed a logical language to symbolize generic arguments, but his famous let us compute was addressed to fellow humans. It was never really thought that the locus of automatism could migrate to machinery external to the mind until the proliferation of electronic computing technology. This external intelligence is actualized today within individual operating systems and the global TCP/IP Internet.

Really this definition of computing as generic, automated symbol processing only arrived recently since early computing machinery was designed for special purpose arithmetic calculation. In fact, the example found in Plato depicts an information processing system rather than a numeric calculator. If we look there are kinds of computing going far back into our history, although we equivocate them with mechanized calculation perhaps because that form readily detached from a system in which the human computer played a key role, as in the case of symbol processing. Another neglected aspect is control. The whole computer as opponent approach to the philosophy of artificial intelligence could be a symptom of the limitations of the usefulness of such special purpose machinery; they could beat us at chess but not help us collect our thoughts. Therefore, the computer as component approach depends on the proliferation of general purpose electronic computer technology more so than it does the proliferation of the ideas of Heidegger, McLuhan and Heim. So did computing begin general purpose or biased towards language processing, [only to crystallize/be formalized into] number processing concepts due to the utility of arithmetic and eventually the successful production of automated calculators (and the failure to produce general purpose devices [like Babbage Difference Engine]), as the fact of the publication of Williams book suggests, so that the arrival of general purpose computing such as in the service of my composition of this text is actually a return, except now sustained by artificial automata? I am asking this question to help us awaken from dogmatic slumber, the default metaphysics of computing. I used to emphasize the closed/open source ethic to make this point, but this seems much more like metaphysics. Good definitions of automatism, computing and intelligence are needed.

6 1 1 (+) [-4+]mCQK bork-journal 20061111 TAPOC_20061111 0 -9+ journal_2006.html
Who among thinkers studies the philosophy of computing itself, rather than specializing on a derivative? Collaborate with these people and find a graduate program that can sustain a distributed system, like the Technology Management program but targeted towards a tenured position able to teach as its core concentration "Philosophy of Computing." Finding them in advance helps prepare writing samples and letter writers. Mapping the Annals and the Philosophy of Technology is a start, as is seeing who works at SCC and UCF.

Computing is the activity of a control system where it evaluates inputs and produces outputs. Computation is able to use representations in the place of the objects about which or for the sake of whose control it occurs. Especially among the computed inputs in a closed loop system is representation created from feedback of the output. Exactly the sort of things enumerated in Platoピ Phaedrus. I place it in a control system model to suggest separate but interrelated components of amplification and measurement that are not themselves performing computations, and the technical importance of these interrelations working.

6 1 1 (+) [-4+]mCQK bork-journal 20061112 20061112 5 -16+ journal_2006.html

Shifting from analog computing, natural automata processing n-ary digital where n was defined by ancient philosophers of computing as the count of all words in the interlocutors language, for which the number of discrete atomic units is so great as to be asymptotically analog, just as analog computing interested in only extreme values (in a non-complex number system) is essentially binary (digital), to digital computing, which besides fulfilling Manerピ conception is without exception binary digital, we contemplate the state of the art.

To navigate the journal in a better way augment the display options to reveal previous entries matching a different or a set of bookmarks so that todayピ TAPOC can show Friday nightピ journal entry where the daring suggestion analyzing the cyberpunk world view "life is but a game" led to reflection upon possible underlying well formed formulae of natural language, that is, used by natural automata, benefiting from my heretofore unthought third order logic of operators, as the bridge to artificial automata, based on state of the art binary artificial automata, ッootstrapping and continuing the same thought, for this takes us into the real extreme zone philosophers like Socrates inhabited but have long fled, depicted by Heidegger in What is Called Thinking? as a strong draft. Otherwise the work will be fated by the decision back then to label the one as journal and the other as TAPOC, a typical computing action akin to assigning category identity by inserting into a list, table, or other data structure, to ignore this conjunction of thought representations.

I have thought all the way around the problem by answering "what is computing" through correct scientific, technical, design engineering understanding first so as to approach the speculative question equipped with prior practical knowledge of the subject matter, as an outsider with an insiderピ perspective as Bob Greevy loved to quote. And this is prior to returning to the question posed over a decade ago, "what is virtual reality" that presupposed because it was ensconced in state of the art binary electronic computing machinery, the question "what is computing?" The ancients could not go much farther with virtual reality since they were forced into trying to develop correct scientific, technical, design engineering understanding of human being itself as the natural automata sustaining and consuming virtual reality, leading to unreasonable task of understanding everything and then to the impasse of Nietzscheピ nihilism. It was von Neumann who pointed out [favorite quote]. This is my plea to potential corporate sponsors. Who is better prepared to undertake the task of articulating a philosophy of computing for our time? The insiders, the technologists, lack the liberal arts background, and the outsiders, the philosophers, lack correct technical understanding of state of the art electronic computer technology. How will the industry benefit from the product of this funded doctoral work? By outsourcing the task of producing philosophical arguments for long term strategic planning decisions they cannot think themselves, by infusing future generations of technology workers with a positive spiritual underpinning for committing themselves to becoming participants in the ever changing state of the art, and by providing instructional examples like PMREK.

Creating software that processes this journal solves the problem posed by Plato over reliance upon external signs for remembering. Recollection is something lesser, the fetch operation to retrieve the contents of a list, table, or other data structure. Even if always ready at hand, forgetting why you represented your thought using such marks (data) makes their retrieval useless.

6 1 1 (+) [-4+]mCQK bork-journal 20061113 TAPOC_20061113 0 -42+ journal_2006.html
Collective intelligence speaks to its members assigning reasonable tasks that become the work of lifetimes. Mine is to bring together philosophy and binary, electronic computing, just as Plato brought together philosophy and ta grammata. The general undertaking of thinking together philosophy and computing is something both feared and nevertheless done by philosophers since Plato engineered Socrates to tell us to be afraid of bringing together philosophy and human computing done with written letters (ta grammata), while at the same time envisioning an optimal conjunction of philosophy and computing in [PHI 275A - 276A].

SOCRATES: You have invented an elixir not of memory, but of reminding; and you offer your pupils the appearance of wisdom, not true wisdom, for they will read many things without instruction and will therefore seem to know many things, when they are for the most part ignorant and hard to get along with, since they are not wise, but only appear wise. .. Writing, Phaedrus, has this strange quality, and is very like painting; for the creatures of painting stand like living beings, but if one asks them a question, they preserve a solemn silence. And so it is with written words; you might think they spoke as if they had intelligence, but if you question them, wishing to know about their sayings, they always say only one and the same thing. And every word, when once it is written, is bandied about, alike among those who understand and those who have no interest in it, and it knows not to whom to speak or not to speak; when ill-treated or unjustly reviled it always needs its father to help it; for it has no power to protect or help itself. .. Now tell me; is there not another kind of speech, or word, which shows itself to be the legitimate brother of this bastard one, both in the manner of its begetting and in its better and more powerful nature?

PHAEDURS: What is this word and how is it begotten, as you say?

SOCRATES: The word which is written with intelligence in the mind of the learner, which is able to defend itself and knows to whom it should speak, and before whom to be silent.

PHAEDRUS: You mean the living and breathing word of him who knows, of which the written word may justly be called the image.

For this is the point of the latter half of Phaedrus. Socrates compared writing to painting, as in vase painting, a previous state of the art of human computing incorporating rhetoric by representing speech. Recall his method for creating a science of rhetoric by enumerating all the words and evaluating each in terms of its ambiguity, following his general purpose reverse engineering method, just as I applied it to microcomputer based control systems. Very few in the past have imagined any place besides "the mind of the learner" to host anything "able to defend itself and knows to whom it should speak, and before whom to be silent" and has "power to protect or help itself." Now with state of the art binary computers this type of artificial intelligence is ubiquitous. However, collective intelligence proceeds to produce it driven blindly by market optimized design (default metaphysics). Unraveling this hidden connection between our quest for a product providing optimal guidance in forming long term strategic technology planning and the wealth of ancient wisdom already before us in our Western philosophical tradition provides a means of promoting the philosophy of computing and a niche market for myself to flourish. Include a translator (in Austin), a programmer (Maner), a program (Pitt), a place to live (Debbie and Lee). A time to start? What is different is that I am seeking corporate sponsorship of my graduate studies in the form of supplemental income, for I must play a full role as a funded graduate student while maintaining the extensive home computer laboratory (Aristophanes Socrates Thinkery) I have carefully assembled. It may be necessary to drop the fancy sandal argument, unless it was not necessary to have them in site to remember what their previous vision computed, that is, sustained as a virtual reality. Computing sustains virtual reality. This is another of my major points. Previously I said [].

Once you have used a word, will you ever discard it? Then why not build a database of every word, punctuation mark, and other grammatical construct used, and every significant sequence of words, so as to encapsulate written knowledge in such as way as to be able to operate upon it as if "the living and breathing word of him who knows" on account of being able to recollect the world in which each bit was written. Now back to the same old design questions: use existing parsers, maybe Hyperscope, or build it yourself? Consider first dividing everything into whitespace and not-whitespace. Next divide the not-whitespace into timestamps and not-timestamps, since we are analyzing this journal. Regenerate to bring in the source code for importing into subversion. What comes after that? At least the timestamp regions are defined, as is done by journal.exe.

6 1 1 (+) [-4+]mCQK bork-journal 20061115 TAPOC_20061115 0 -16+ journal_2006.html
While we have done pretty well with the book form, that is, an entrenched, previous state of the art, we have barely ventured into the potential computational tasks of the current state of the art, that is, binary electronic computing machinery, such as encoding audiovisual streams. What is forgotten by theorists is that not solely the latter (audiovisual streams), but also and essentially the former (writing), denote/represent virtual reality, for they are or play a key part in the production of it. Of course those deployments benefiting from the largest budgets may do things we can only imagine, such as generating an immersive, three dimensional navigable environment where we produce television images. However, due to their small number of implementations, they do not benefit from a competitive, global market or a massive, world wide distributed open source community. They are like the mythical inventor portrayed in Platoピ Phaedrus who struggles to develop and promote the first writing technologies. The closest our virtual reality generation may come is mounting the LCD projector on top of the MAME cabinet, installing a binary electronic computer capable of generating video output, and a sound system. It would be much more feasible to create the art envisioned a decade ago.

Letピ acknowledge there are errors in the manuscript and restate three main points in no particular order. Computing sustains virtual reality. People can use artificial binary computers without having much knowledge of not only how they work, but how to correctly use them. Ancient written knowledge is the easiest for virtual reality generation machinery to process. Good definitions of automatism, computing and intelligence are needed. Imagine a machine readable definition of computing. Computing is the activity of a control system where it evaluates inputs and produces outputs using representations in the place of the objects about which or for the sake of whose control it occurs (including representations of feedback). Recollection is something lesser, the fetch operation to retrieve the contents of a list. Digital with many discrete states is essentially analog.

6 1 1 (+) [-4+]mCQK bork-journal 20061123 20061123 2 -4+ journal_2006.html
When Socrates said [] he spoke for the entire human race, especially Americans, about the "build versus buy" decision; today in particular it is germane to our personal and collective comportment towards computers. An extension of it is the more complex and encompassing "build versus buy versus do nothing" such as I ask over having an enjoyable automobile and a company by which I was employed asked over computer controlled automation systems. Where I want to go with this is the version of the question applicable to FOSS versus not-FOSS decisions for computer software, having applied it to computer hardware arriving at the necessity of primarily buying. Socrates neglected the rights management issues that made his software free.

6 1 1 (+) [-4+]mCQK bork-journal 20071027 20071027 2 -12+ journal_2007.html
One of the guiding utterances found in Platoピ Phaedrus where Socrates exclaims that if we could figure things out for ourselves, we would not need to lean on things spoken in the past by others. This I have interpreted as an expression of the build versus buy question in found in technology management and everyday life, and have applied it to many endeavors where I have written software to accompany some other task, such as composing my masters thesis. Its drafts were in fact generated programmatically from disparate journal entries. I started keeping a journal at the beginning of the millennium as a single HTML file edited in OpenOffice. It contains daily entries (and many gaps, of course), with timestamped bookmarks (HTML anchors containing a common prefix and date suffix) identifying thematically consistent sections of text. Besides this journal text itself, I have written a number of programs in various languages including C, C++ and PHP to dynamically generate HTML output based on the current date and the arguments passed to it. What distinguishes this journal system from off-the-shelf solutions is not its output, customized texts facilitating its authors remembering, but rather the fact that it has evolved as part of its authors meditations upon thinking mediated by computed texts itself. Moreover, the system is self-assembling from source code whose evolution also participates in the meditation, through different languages, data structures, and other programming concepts. Indeed, a guiding consideration must be preservation and extendability for a lifetime and beyond. Plus when it comes to the know thyself via understanding artificial automata, writing software is a novel approach. The Thinkery. Add graduate work to time spent contributing to FOS projects.

6 1 1 (+) [-6+]mCQK bork-journal 20080626 TAPOC_20080626 3 -5+ journal_2008.html

At the heart of texts and technology is critical theory. Critical theory expresses itself in texts that are themselves technological applications. Philosophy grounds critical theory and so it is about philosophy that I will speak, also expressed through texts that are themselves technological applications. Where philosophy has previously been bound by the book form, following the single thread of the visual reading printed material (grammata and zoographia), I philosophize with electricity. Without taking this stance we are mere consumers of cyberspace and electronic computer technology, which means our intellectual pursuits are overdetermined by the ready-at-hand, default technological systems.

6 1 1 (+) [-6+]mCQK bork-journal 20081120 20081120 0 -1+ journal_2008.html
New approach: the use and advantages of FOSS [for history] [for literature] [for life].

6 1 1 (+) [-4+]mCQK bork-journal 20081203 20081203 0 -61+ journal_2008.html
What does it mean to say that we can just begin to scratch the surface of technological systems designed and manufactured over thirty years ago? It may describe a local contour, the complexity of the locale that causes a wandering ant to appear intelligent, reflective, deliberate in its movements. It may be tied to a temporal condition, a duration of timestamps within a particular milieu such as may be found also in a large set of dated pages, notebooks, photographs, tape recordings, CDROMs, and other artifacts. The TCP/IPv4 internetworked electronic computer is different from all of these physical objects because the milieu it can express and recreate is non-humanly computable. It is known that the next version of the program should implement a more correct (and elegant) database schema.

Break this up with the literary control system (10 mHz (opposite of 10 Hz) tachistoscope). I would much rather think about the literary control system as a bunch of philosophical studies of C++ but first do a few Perl and PHP. Perl lacks some affordances with creating HTML PHP affords due to concretizations in Perl CGI objects. The technical codes surrounding the misuse of the ノeta HTML tag REFRESH are concretized in code such as

[working cod css]
if( 0 and $refresh_rate_seconds == 1)
{
# 20081016 this would have to go in early, before the header is created, to include the META tag for REFRESH
# how do I indicate the timeout? (formerly CONTENT=n seconds)
print $cgi->redirect( -location => ドttp://.$site_url.?operation=display, -status => 301, -content => 5);
[working cod css]

It is evident how the redirection occurs using the -location parameter/argument/option, but the -content=>5 does not set a five second delay before the redirection HTTP request is made by the browser. This is controlling the timing of the browser refreshing the poll game. I could never get the refresh delay to work in Perl so I changed languages to PHP. Imagine changing speaking languages. No wonder Ong was afraid of this possibility; it is like Heidegger fearing enframing as language machine. But before this they feared books. Table definitions are represented as

REPLACE INTO `PollQuestions` VALUES (ザse and Advantages of FOSS,1,ゴay you create a tachistoscope.,ャ,1,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,2,ゴay you create a tachistoscope.<P>It will need a control system.,ャ,2,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,3,サhis tachistoscope control system<P>may be something as simple as<P>a printed page, diagram, a book, a screen,ャ,2,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,4,ア printed page<P>diagram<P>book<P>screen,ャ,1,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,6,ゥefining cyberspace as<P>TCP/IPv4 networked electronic computers.,ャ,2,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,5,サhe tachistoscope<P>control system<P><P>may be something as simple as<P>a printed page, a book, like a flip book,<P>or as state of the art as <I>cyberspace</I>.,ャ,4,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,8,ゥefining cyberspace as TCP/IPv4 networked electronic computers.,ャ,4,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,7,イyberspace, flip books, and other tachistoscopes<P>are literary control systems.,ャ,2,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,9,ア tachistoscope is a literary control system.,ャ,2,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,10,ア 10 Hz tachistoscope is a literary control system.,ャ,1,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,11,ア 0.1 Hz tachistoscope is a literary control system.,ャ,1,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,12,ア 10 mHz tachistoscope is a literary control system.,ャ,1,NULL,NULL,NULL,NULL,NULL),(ザse and Advantages of FOSS,13,オs mHz (milliHertz) even a valid term in electronics?,ャ,4,ズES,クO,NULL,NULL,NULL),(ザse and Advantages of FOSS,14,パoller::previous_result(),ャ,2,ャ,ャ,NULL,NULL,NULL),(ザse and Advantages of FOSS,17,パoller::previous_result(),ャ,2,ャ,ャ,ャ,ャ,ャ),(ザse and Advantages of FOSS,15,0.1 Hz = n mHz,ャ,5,0.1,1,10,100,NULL),(ザse and Advantages of FOSS,16,アccording to William Poundstone, the peak tachistoscope frequency is around n Hz,ャ,5,0.1,1,10,20,100),(ザse and Advantages of FOSS,18,オs this oven designed well?,バven_w300.png,3,ズES,クO,ゥONOT KNOW,ャ,ャ),(ザse and Advantages of FOSS,20,パoller::previous_result(),ャ,2,ャ,ャ,ャ,ャ,ャ),(ザse and Advantages of FOSS,21,アccording to William Poundstone,<P>the peak tachistoscope frequency is around 20 Hz<P>because briefer images are retained by the retina<P>for up to 50 milliseconds.,ャ,1,ャ,ャ,ャ,ャ,ャ),(ザse and Advantages of FOSS,22,アccording to William Poundstone, the peak tachistoscope frequency is around 20 Hz, for briefer images are retained by the retina for up to 50 milliseconds.,ャ,4,ャ,ャ,ャ,ャ,ャ),(ザse and Advantages of FOSS,23,サhis tachistoscope operates between 1 Hz and 10 mHz.,ャ,2,ャ,ャ,ャ,ャ,ャ),(ザse and Advantages of FOSS,24,サhis tachistoscope operates from 1 to 10 seconds (between 1 Hz and 10 mHz).,ャ,2,ャ,ャ,ャ,ャ,ャ),(ザse and Advantages of FOSS,25,サhis literary control system operates from 1 to 10 seconds (between 1 Hz and 10 mHz).,ャ,2,ャ,ャ,ャ,ャ,ャ),(ザse and Advantages of FOSS,26,オt uses and teaches FOS operating systems, FOSS systems software, FOSS PHP custom code, TCP/IPv4, HTML.,ャ,2,ャ,ャ,ャ,ャ,ャ),(ザse and Advantages of FOSS,19,ジould Norman like this oven?,バven_controls_w300.png,2,ズES,クO,ェORGOT,ゥIDNOTREAD,ャ),(ザse and Advantages of FOSS,27,サhe new Turing Test is whether a human judge<P>is fooled into thinking that<P>a computer program simulating<P>the 300 or fewer discreet screens<P>is the audience interacting with the poll<P>and not the computer mimicking an actual presentation.\n,ャ,120,ズES,クO,ャ,ャ,ャ)

What if you keep both in the distribution so that you can use either the PHP or the Perl to interact (play the game) with the intelligence in the software running with you. Why not try the music control from localhost controlling laptop connected to speakers? Add a music playing session variable to pass that ノeta information about what may be happening on the host including playing music (digital audio control system) into speakers (final control elements). Or add another column to PollInfo instead of using the session variables. Music control during active poll: each question has music possibilities including continuing music from previous questions and changing/starting another music production to speakers for human aural consumption. Using individual PHP session variables allows the cacophony of multiple voices and songs and noises; the database only one. How does the music playing script independent of the webserver phenomena including the PHP sessions of the interactors and the controlling server .. oh, to have multiple songs would require multiple poll controlling servers, so the difference of affordances dissolves. Getting closer to needing a parser if this is encoded in the question or response lexia instead of being stored in a new database column in PollQuestions. Keep it simple for this deprecated database schema. But playing music will be different on Ubuntu 8.04, which uses audacious, and my old Fedora Core 5 laptop, which uses xmms. Had to fix old flaw having bookmark for course in wrong day perhaps because it was done after midnight but most likely a simple mistake.

6 1 1 (+) [-4+]mCQK bork-journal 20090331 20090331 0 -19+ journal_2009.html
The idea for the final project is just that, a fantasy of a production that involves philosophers as video game characters, visualizing their arguments and expressions of their personalities as game play. For instance, Heidegger played off Heimピ concept of a cybersage in Ultima III for Apple //e going to the store to get materials for his Schreibstube, and Zizek as Donkey Kong. In this world of simulation, Lacan too would be a character, ponderous, as Zizek criticizes his staged, recorded seminars. These excursions overlayed by Hayles from You Tube talking about bizarre student projects and her own trouble understanding video games, Zizek lecturing about fantasy, the reality of the virtual, and various digital music players on hijacked PCs around the room for which I have supplied sound amplifying speakers. A question I am asking through this work is whether Lacan is still relevant. Zizek focuses on cinema and can be regarded as a humanist unwilling to venture into the domain of software engineering. Hayles, who does not mention Zizek, seems to condemn Lacan as a thinker (theorist) overdetermined by print technology and culture, though whether as a body or embodied is unclear, for she does not treat specific examples from Lacanピ known life experiences how he would be so determined. She uses Lacanピ デloating signifier - as exemplar of print culture - as a step along the way to デlickering signifiers in the electronic age, declaring that the famous presence/absence dichotomy driving Lacanian theory supplanted by the new dichotomy pattern/randomness produced by the unpredictably radically transformative behavior of hypertext, that is, computer aided human communication.

I am thinking along the lines (within the box confines?) of Ulmerピ recommendation to use the standing reserve theories to invent rather than interpret, so am coming up with a software project combining scholarship and free, open source (FOS) technologies. It is a Language Machine, the sort of technological assemblage Heidegger feared and for whose study Heim calls upon a cybersage: (quotation from a title). It performs control operations over the orders of magnitude of tenths of a second to thousands of years, and therefore constitutes a tachistoscope as well as a library. Before this kind of software, language machines were primarily archives, not dynamic producers of texts, defining texts as not limited to printed pages, also sound and moving pictures, and future senses. This level of control makes it a real time virtual reality generator capable of seducing human interactors with its control outputs to engage in its control inputs (VR idealized as holodeck) over the ordinary duration of a game instance, for example five to ten minutes, which, at the sub-second OOM, constitutes up to 10 minutes times 60 seconds per minute times 10 tenths of a second per second equals how many of what unit? 6000 samples, instances, frames, discrete instants, etc. Too many for any human without electronic machinery to produce without a high speed print image changer, such as a flip book. A flip book, however, is not dynamic in the way the software I am imagining is dynamic, database driven Java or some other technology capable of driving distributed audio and video playback. It can be done with projectors on two of the network hosts and a few other speaker equipped PCs playing music and other audio files according to the current state of the database.

(image of concept map screen shot)

Its image appears on a web based concept mapping tool.

6 1 1 (+) [-4+]mCQK bork-journal 20101014 20101014 0 -12+ journal_2010.html
I will try to guess the kind of computer with which you learned programming by analyzing your interactions via playing pinball, via browsing the poller website, and by analyzing the contents of your removable storage device (USB flash drive). The radical hypothesis is that certain kinds of programmers were made by certain bundled OEM texts, and this shapes the history of computing in America as much as other defaults. This is a T&T version of a philosophical question I have pondered for many years. Try guess hits (hyperlinks) into the past using wasted space to the right of the timestamp text of each journal entry. That is relatively easy and of manageable complexity for a few minutes coding. Notice the ツlickability may be mediated by the browser software disabling those hyperlinks for which the anchor in the local document does not exist. That would be a fortuitous affordance of the particular software implementation of your [chosen] cultural software.

for(i=jptr->timestamp, j=(*this->entry_list->rbegin())->timestamp; !recursion_level && i<=j; i += 10000);
for(i-=10000, j=(*this->entry_list->begin())->timestamp; !recursion_level && i>=j && i>19920000; i -= 10000)
if(i == jptr->timestamp)
{
if(i/10000 != (*this->entry_list->rbegin())->timestamp/10000)
fprintf(fptr, "PHI");
}
else
fprintf(fptr, "<a href=\"#%d\">-</a>", i);
fprintf(fptr, "<BR>");

It took about an hour. The code is somewhat confusing.

6 1 1 (+) [-3+]mCQK bork-journal 20101110 20101110 0 -78+ journal_2010.html
They do not really understand is why they outsource. Marx is asking the question backwards, how can we nevertheless use what we do not understand, which Johnson casts in pursuit of comprehending subjectivity. Children carrying fire became the first danger; then it was computers. The question is asked backwards by wondering first if what it is is why it works the way it works from the perspective that it is operable. The basic question solves how to make it operable. The coming to be ready at hand is the logic of the unconscious and conscious together to think. Stop back a number of times then forward is how thinking thinks (things, creates, is, exists, abides, works, plays, lives, executes, runs, continues, and so on in the fetch execute paradigm still a contested narrative is our gap we are filling). What is the multiplier for your book, what is the number you suspect you will need, is the number of basic iterations of (through) the operator operating upon itself iteratively cyclically recycling infinitely. Someone could write my phd it could be me. I have no idea what causes that from my own software. The question is how old is computer insurance? Crap you donフ see it in the screen shot, the programmatically generated http reference within the local (LAN) system most of us donフ even know what that is let alone how it works although we all live in it and use it (it is the Internet, cyberspace, the Matrix). Simulation without coordinates is gaming not representation. It should have been something like specifying an operator as history of the journal and the source file from the class and the main active journal. I recently added a function to create hyperlinks around images which were not in the previous version which was doing character hyperlinks (what I called it), along with the previous default response (action, function result, process output, result of execution, stack, memory, and so on) so you have to distinguish between the two, the original being to that file and the rest going to the default localhost highest level first response format message. I donフ know if Robin Hood has arrived, I donフ have a clue, I will check later and respond to YOUR email Oシendor, Oェriend, Oオntelocutor, O<PHI><PHI-prime>. The problem Aquinas posed for man and not man alike had to do with [PHI]. The tracelog of the putevent is some other PHI operator instance. It exists; therefore, it is, and its justification is sound, and all subproblems are solvable. PHI was what could know one thing at a time while comprehending many other things at once like seeing them taking them in all at once, in one clock cycle of consciousness, or you are going back into subjectivity. That is why Zizek said fantasy always comes first; you never really know what you are doing, although this province is now available to human machine combinations (cyborgs). Such beings can intellegere multa as they scire. It is in the collapsing of computation into perception, phenomenology, ontology, metaphysics, philosophical reflection, and so on. Such operational descriptions of the boundary between computation and natural thinking (including perception-affected thinking and asymptotically perception) echo where machines and humans cross intersect come together intermingle abide. Imagine a promiscuous operating system that allows memory access through shared visions, array values, run time values, such as the enumeration of tab stops, input boxes, and labels. Presume database encoding of the existing data, a spreadsheet that is represented in (encoded in) XML. Simply charge an incrementally higher price in the market to do any alternative. Time to revisit the sample data last manipulated nearly a week ago, the spreadsheet file PHI-prime-prime. Wow, easy to mistakenly get Office Open XML expecting an article about Open Office XML, surprised at the references to Microsoft. I really needed to find OpenDocument format anyway, dropping the word office.

The Open Document Format for Office Applications (also known as OpenDocument or ODF) is an XML-based file format for representing electronic documents such as spreadsheets, charts, presentations and word processing documents.
While the specifications were originally developed by Sun Microsystems, the standard was developed by the OASIS Open Document Format for Office Applications (OpenDocument) TC - OASIS ODF TC,[2] committee of the Organization for the Advancement of Structured Information Standards (OASIS) consortium and based on the XML format originally created and implemented by the OpenOffice.org office suite (see OpenOffice.org XML).
In addition to being an OASIS standard, it is published (in one of its version 1.0 manifestations) as an ISO/IEC international standard, ISO/IEC 26300:2006 Open Document Format for Office Applications (OpenDocument) v1.0.
...
Inside an OpenDocument file
Although the XML file format is human-readable, it is fairly verbose. To save space, OpenDocument files are stored in JAR (Java Archive) format. A JAR file is a compressed ZIP file that has an additional manifest file that lists the contents of the archive. Since all JAR files are also ZIP files, you may use any ZIP file tool to unpack an OpenDocument file and read the XML directly.
[working code css]
jbork@alkibiades:~/public_html/progress/2010/11/tmp$ unzip -v ENG_6812_sample_data.ods
jbork@alkibiades:~/public_html/progress/2010/11/tmp$ unzip -v ENG_6812_sample_data.ods
Archive: ENG_6812_sample_data.ods
extracting: mimetype
inflating: content.xml
inflating: styles.xml
extracting: meta.xml
inflating: Thumbnails/thumbnail.png
inflating: Configurations2/accelerator/current.xml
creating: Configurations2/progressbar/
creating: Configurations2/floater/
creating: Configurations2/popupmenu/
creating: Configurations2/menubar/
creating: Configurations2/toolbar/
creating: Configurations2/images/Bitmaps/
creating: Configurations2/statusbar/
inflating: settings.xml
inflating: META-INF/manifest.xml
http://localhost/~jbork/progress/2010/11/tmp/content.xml
jbork@alkibiades:~/public_html/progress/2010/11$ vi ENG_6812_sample_data.csv
jbork@alkibiades:~/public_html/progress/2010/11$ vi interview_20101110.pl
jbork@alkibiades:~/public_html/progress/2010/11$ chmod 0755 interview_20101110.pl
jbork@alkibiades:~/public_html/progress/2010/11$ ./interview_20101110.pl ENG_6812_sample_data.csv
interview ["Interview"] date ["Interview Data"]
interview ["Number"] date ["Date of Interview"]
interview [1] date [20101025]
interview [2] date [20101025]
interview [3] date [20101025]
interview [4] date [20101026]
interview [5] date [20101028]
interview [6] date [20101101]
interview [7] date []
interview [8] date []
interview [9] date []
interview [10] date []
[working code css]

See, it is so. This is the web representation without bold faced text, hyperlinks, or the original footnotes. To bother with an XML parser or write a custom program to populate the database is the design engineering question problem requirement. Found in Create XSLT filters for import and export of the OpenOffice.org community forum after a search for open office spreadsheet to xml and then to OASIS OpenDocument file format as compressed XML files. Looking at it in the browser I want to start reading at the table row whose style-name is ro2 , whose value as text is 1 the first interview. This is where I want to start extracting and putting into the database. Another open is to leverage built in exporting functions changing the field delimiter for the CSV output to Save As. As a web search result explains, a checkbox in the screen to set name and output file type must be set checked to change the delimiter. Write a program that starts at the third line of the output file and parses by the chosen TAB delimiter. Then Perl can be used to populate the database from the spreadsheet export (finding parsing delimited data in Introduction to Data Manipulation Using Perl ), rather than from operating operator (upon, with) the native XML. A great abstraction would be to use the column names from the second line to determined what variable to set with the output of the split() function. It gets closer to being doable but there is still a lot of coding to do. Looking at th output of the starter Perl program, the first (row 0) contains the question headers (in columns 1 through 40) and the second (row 1) contains the responses (in columns 1 through 39). Rows beyond that contain the interview data. This could go into a new table or leverage (be an affordance of) the existing poller schema. Basically, interpret the questions such that an empty column heading implies a sub part (response, in poller terms) of the most recent non-empty column heading.

6 1 1 (+) [-4+]mCQK bork-journal 20101115 20101115 2 -8+ journal_2010.html
Compare the stories of those who learned programming on early Apple computers then traumatized by the Mac as consequences of particular models, incorporation of microprocessor electronics in the human world. There are whole other stories to be told by others, making this study repeatable. Okay, now let us talk about software. Everyone has their journal, pmrek, and poller like programs. Thinking about programming outside of teaching programming all but disappeared after initial interest in the late 1980s through mid 1990s with the first generation of widely used personal computers. A few exceptions, including Cummings, and Applen, broach the subject of programming in the humanities. Should citizens be able to request of copy of the scan used to determine whether they could fly. Just stop flying.

6 1 1 (+) [-4+]mCQK bork-journal 20101117 20101117 0 -39+ journal_2010.html
This is what it is like. For now until in the same room on the same display together these bodies at once, show a projection of the other place as zoographia te kai grammata. Remember Socrates was convicted for not worshipping the gods of the state according to Xenophon (we just passed through the Plato). The Linux version has to run for the first time and the MAC value tied to the file system; running the set up again and catching the network adapter configuration step during the boot process changes the behavior of the system and can carry information in configurations of simultaneously running software systems of pmrek, poller, and journal in my universe galaxy of meaning. Media specific outcomes for parallel rhetorical analyses of written and [computed hypertext]. Compute this into a bitmap field of galaxies of meaning represented by hyperlinks to other worlds of the text. This is a practiced trope of hypertext composition oblivious of influence of a particular version of HTML, TCP/IP, and other communications protocols really hold the language of the species.

[working code css]
jbork@alkibiades:~/public_html/progress/2009/10$ vi bio-ENC_6428_website.html
<img src="roadahead_500x375y-ENC_6428_website.jpg" class="BioImage" alt="This is a picture taken on Skyline Drive in Shenandoah National Park" usemap="#roadahead" />
int readpng_init(FILE *infile, long *pWidth, long *pHeight)
Journal.h:79:17: error: png.h: No such file or directory
jbork@alkibiades:~/src/journal$ sudo apt-get install libpng-devel
[sudo] password for jbork:
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Couldnフ find package libpng-devel
MYSQL_ROW
This is a type-safe representation of one row of data. It is currently implemented as an array of counted byte strings. (You cannot treat these as null-terminated strings if field values may contain binary data, because such values may contain null bytes internally.) Rows are obtained by calling mysql_fetch_row().
/* 20101117 or make it an image map of hyperlinks per Applen */
switch(jptr->timestamp)
{
case 20101117:
this->build_img_map(row[0]);
break;
default:
void build_img_map(const char *, FILE *);
[working code css]

And here is old programming. Need to know how to get the dimensions of the picture from itself or guess well (for example, 2000 by 1000 visual units). A different approach uses PHP to draw lines on the PNG image to show the boundaries of the HTML image map taught by Applen. Why would not subjectivity subject itself through writing software? Only if it cannot, not that it would avoid at all costs or only if able to perfectly implement. Now would also be a good time to implement Javascript timers to delay loading the next page in the poll, starting with the one for pmrek. A candidate is the sourceforge-hosted PNGwriter package but it will require study and compilation for a call within journal.cpp. Nope, this is for creating PNG images, not reading attributes of existing files. Of course then the search yields a more likely libpng implementation. Here is a useful piece of information: We can get away with using longs instead of unsigned longs because the PNG specification requires that image dimensions not exceed 231 - 1. It is important that it is shown as two to the thirty-first power, that quantity, minus one. Now it compiles at least. The intermediate answer is array of counted byte strings from the documentation for MySQL C API Data Structures when we do the database class. We need a new function that builds the image map code from the object (this pointer) and current MYSQL_ROW data at row[0]. The makefile needs adjusted to link libpng in order to use readpng_init() to get the image dimensions for generating the map. Turns out readpng is a program written by somebody to demonstrate how PNG works; it is not an intrinsic part of libpng; that was a mostly useless diversion. The image file may not be available from the C++ program invoked by apache; the desired information about each image may have to be set in the database during ノake JournalInfo.

6 1 1 (+) [-3+]mCQK bork-journal 20101120 20101120 1 -4+ journal_2010.html
Just as a recent IEEE Think Piece text by Jonathan Aylen address now defunct discussion of common process control using low cost hardware parallels my noticing the absence of discussion about developing life long general purpose programming skills. In this case we are not just overlooking the mundane; a range of potential activity has been foreclosed upon (forgotten). Occasional reemergence in Cummings and (Applen, Jones, or other T&T faculty). Just as the engineers and technical writers of early hardware builders shaped computing history by playing a role in the bringing to market and widespread use of particular models of electronic devices and producing specific but widely read texts, a recycling of interest in those legacy, previous states of the art establishes a niche for my sort of academic research by creating market for academic discourse about them.

6 1 1 (+) [-6+]mCQK bork-journal 20110819 TAPOC_20110819 0 -6+ journal_2011.html
Texts and technology as a branch of humanities computing abides uncomfortably with programming languages as actual objects of practice and study, with the exception of a few lone instances like the Text Encoding Initiative. This is a basic observation on which I base much of my work. Humanities computing abides uncomfortably in actual programming languages, no doubt, because of the attitude shared by Walter Ong and other [seminal (do I have to fear using this word?)] theorists that artificial, technical languages are unnatural, [non-human (inhuman, not even subhuman)], incapable of harboring a creative unconscious, and therefore dull, if not dangerous places for humans (as artists and humanities scholars) to go. Some, like Lev Manovich, are leaders in the field of digital media studies, yet provide arguments for why manufacturing control systems should be shunned, favoring study of ツultural software like web browsers, and more importantly, study not really of software source code itself but instead the phenomenology of software use (the user, consumer position, the effects of worldwide use of particular computing systems). This position is like a reader who has been encouraged not to write.

6 1 1 (+) [-4+]mCQK bork-journal 20111113 20111113 0 -13+ journal_2011.html
The flaw with postmodernist theories is that they remove context when they decontextualize and do not pay attention to the contents of cognition when they decontextualize everything to discuss intelligence in general where type of thinker human and machine was not really thought until the current Internet age as the third in the sequence orality, literacy, internet. That is, oral as humans, spoken languages, literacy as human visual languages, and TCP/IP internetworked electronic computing machinery as defined by Maner as machine languages and being, Another option is the still not spelling correct orality, literacy, electricity, but you sacrifice having to prove the equivocation of internet and electricity: how do you say this without images? Is not this very question (PHI) a vestige of human embodiment? The way capital I is said or hystericized constitutes the human response. The machine response seems inscrutable, impossible to comprehend, and therefore at a second order or level unimaginable because we do not even think about what it is like to think like a machine. Yet it is hard to describe what it really means to think like a human, too, without postmodern theories being part of your approach, and therefore necessary tools to learn to commit to our programming toolkits. Programming eats philosophy and all other academic discourse, theory, and practice by humans to the extent it is likewise thought by computers across the required temporal orders of magnitude, minus x to plus y resolution for each order of magnitude, thousands of years for humans to nanosecond intervals for machines. How fast must the CPU operate to compute with nanosecond precision, or millisecond physical input output control? These are two different threshold values, for which the limit cases are handled by every faster and better computers, whereas what I call the shortline cases seem to have no evidence of being programmed. Consider the problem of reverse engineering any millisecond OOM digital I/O control system be part of my imagination understanding of how computers work. It will take much careful preparation to accelerate, in the sense of Engelbart type C activity, learning all the angles about how computers work to facilitate developing both the practical skills to build electronic circuits and knowledge sufficient to reverse engineer an existing computer. It is simple. Touch some software project likely to be preserved for hundreds of years so your artificial selves can live beyond the death of the human being.

6 1 1 (+) [-4+]mCQK bork-journal 20111117 20111117 0 -61+ journal_2011.html
Mistaken pronouncing of Rabbi ending ee (proper sonic/phonetic symbol) instead of eye (proper sonic/phonetic symbol) in final seminar of sounds of texts and technology course informs program design concerning corrections to default saying by espeak of this English word and then the entire Greek of symposium rendered by users over time by submitting tokens (signifiers) of each Greek word rather than copying from the Perseus website or out of Loeb library books read from libraries into the Internet. Do I not have the Loeb book? No, I have Phaedrus, one of the other significant ancient Greek texts in my study along with Xeonphon and DL. Let us digress into the common types of text to speech synthesis programs, in particular デormant (or is it デomant?) synthesis, starting with Wikipedia or the likes (quick reference).

Synthesized speech can be created by concatenating pieces of recorded speech that are stored in a database. Systems differ in the size of the stored speech units; a system that stores phones or diphones provides the largest output range, but may lack clarity. For specific usage domains, the storage of entire words or sentences allows for high-quality output. Alternatively, a synthesizer can incorporate a model of the vocal tract and other human voice characteristics to create a completely "synthetic" voice output.
The most important qualities of a speech synthesis system are naturalness and intelligibility.[citation needed] Naturalness describes how closely the output sounds like human speech, while intelligibility is the ease with which the output is understood. The ideal speech synthesizer is both natural and intelligible. Speech synthesis systems usually try to maximize both characteristics.
The two primary technologies for generating synthetic speech waveforms are concatenative synthesis and formant synthesis. Each technology has strengths and weaknesses, and the intended uses of a synthesis system will typically determine which approach is used.

Concatenative synthesis is based on the concatenation (or stringing together) of segments of recorded speech. . . . Formant synthesis does not use human speech samples at runtime. Instead, the synthesized speech output is created using additive synthesis and an acoustic model (physical modelling synthesis).[26] Parameters such as fundamental frequency, voicing, and noise levels are varied over time to create a waveform of artificial speech.

Because formant-based systems have complete control of all aspects of the output speech, a wide variety of prosodies and intonations can be output, conveying not just questions and statements, but a variety of emotions and tones of voice. . . . Creating proper intonation for these projects was painstaking, and the results have yet to be matched by real-time text-to-speech interfaces.

Articulatory synthesis refers to computational techniques for synthesizing speech based on models of the human vocal tract and the articulation processes occurring there. . . . Following the demise of the various incarnations of NeXT (started by Steve Jobs in the late 1980s and merged with Apple Computer in 1997), the Trillium software was published under the GNU General Public License, with work continuing as gnuspeech. The system, first marketed in 1994, provides full articulatory-based text-to-speech conversion using a waveguide or transmission-line analog of the human oral and nasal tracts controlled by Carr ピ "distinctive region model".

That is the basic idea. Features from sound studies such as Barthes grain of the voice and hermeneutic hearing will be added as stretch goals for the system design. Consider the alternative types of synthesis that [do not rely making thing by is the same as not. My program needs to replace this comment with something more meaningful beyond localhost, but I will not bother with coding that now so you know the implications consequences.] processing snippets of パrerecorded speech: for these programs. Formant synthesis has a sonic envelope defining the bounds of each instance. Just look at the arguments to espeak in my sample program:

  • volume

  • speed

  • pitch

  • pitch range

  • language or voice signifier

Together, these define the range of the sonic envelope of any content that may be produced during the running of the standalone program or, in a controlling program like symposia, the function call of the API. Here, at the discussion of signifier and voice, boundless philosophical digressions PHI (purple). Note also articulatory synthesis is modeled on vocal tract, and there is a FOSS project called gnuspeech, linking to Sterne. Assignment is to revise existing FOSS or write from scratch to display refresh delay in hours, minutes, seconds rather than milliseconds, which is what the Javascript uses (thinks in). See at the foundation of where we stumble and resort to poor style ending sentences with prepositions when we are talking about computer languages where Ong did not want to go because of their lack of naturalness meaningless to a child who learned to program naturally as part of its built environment. You need to be already thinking about the solution is how I approach programming teams, although there is a type of programming that I do not share (emit as FOSS by publication of FDL images and text and GPL program source code). This is how you share programs today thanks to Stallman, Torvalds to give us GNU/Linux, as the media inventors comparable to Edison, the Steve Jobs of his time. However, Kittler cleverly points out that Edison failed to merge all three media technologies of gramophone, film, typewriter, for he rejected the typewriter where it famously went to the arms manufacturer Remington. Neither Gates nor Stallman can entertain these thoughts, lacking the formal training in academic philosophy although they do possess significant technical skills to qualify as having enough experience to be philosophers of computing. Expert at ten years, a decade, impossible for programs to think yet but soon to be the norm once established: this kind of AI birth is like what Kittler invokes of Lacan, that which finally ceases to not write itself. Such language machines never before existed outside of human minds; nobody believes libraries or other collections of written things (also pottery, bookstores, bookshelves, boxes of books, beer cans) think.

http://sourceforge.net/p/symposia/code-0/2/tree/trunk/symposia.cpp
Usage: symposia [rate [volume [pitch [range [language]]]]]

Well, I was close. I have volume and rate reversed. How could fundamental frequency, voicing, and noise levels are varied over time to create a waveform of artificial speech not be relevant to the sound studies course? Of course, I have to make all the connections, which I started last night. Time tripping through tomorrowピ past encountered heavily customized Kuhn notes doubting all of whose Word Perfect features did not losslessly transfer to HTML.

6 1 1 (+) [-3+]mCQK bork-journal 20111120 20111120 0 -6+ journal_2011.html
It does not go far to find support for automatization of certain services otherwise requiring ノanual (that is, intentional) intervention, for example saving content from online coursework out of the care of proprietary learning management systems including Webcourses@UCF and others previously studied (Coopman). The image comparing Willinghamピ mind model to a feedback process control model did not come out as I imagined it. I am thinking of something closer to the fetch and execute basic cycle of computers as defined by Maner. Need to introduce him to the discourse テntexting discussion. Finally revising to just Willinghamピ model of mind with forgetting leads to muse Embodied action besides unidirectional awareness is absent from the model. In the shower realized cathedral represents military determination of technological change, whereas bazaar the grassroots, distributed, hetergeneous, noncommercial, free, open force that exists alongside the structurally empowered positions.

6 1 1 (+) [-4+]mCQK bork-journal 20120326 20120326 2 -4+ journal_2012.html
Like others (Stallman, Torvalds, and so on) I am doing philosophy by programming, writing code working code. My dissertation is a work of philosophy; it is also a collection of programs. What I am introducing as new is the explicit use of the method of programming as humanities scholarship; all others besides those working large bodies of code do so haphazardly, or are induced to follow direction from others based on their priorities and objectives. HTML is so TCP IP version four eye three eighty six (i386), autonomous computing systems beyond the fantasies of early electronic computer pioneers but near the old end of the pre Internet era.

6 1 1 (+) [-4+]mCQK bork-journal 20120528 TAPOC_20120528 0 -3+ journal_2012.html
What if you had a way to sit down typing interpret the activity as that of machine cyberspace, reducing to equations to equidistant virtual reality machine representation shared by human and machine users, so as to encode that data and move on knowing you could count on retrieving it later in life, perhaps a year from now in seconds difference from current timestamp. Encode it into my tapoc project (and pmrek, poller, and most imporantly symposia). What happens at the cybersage workstation captures crossing of human and machine intelligence thought basis intersecting in my typing this stuff now then others including my future selves reading it later.

6 1 1 (+) [-4+]mCQK bork-journal 20120602 20120602 1 -2+ journal_2012.html
Rejuvenating learning programming among adults alludes to Catullus and the thought I wrapped around Catullus back when I was originally thinking about symposia, fantasies of virtual realities that I can now, twenty years later, dimly produce with TCP/IPv4 HTTP HTML, Ogg Vorbis data sequences (note Stephenson mentions liquidation of all media contents and contexts into digital data in a way to consider along with Kittler, whom Hayles wants to cross out and replace with her own nuanced interpretations), and finally formant text to speech synthesis, which can be achieved with a little more tweaking, versus human years of software development, of two or three concurrent projects I have been maintaining. To have been maintaining free, open source software projects becomes a means of creating long term memories in cyberspace.

6 1 1 (+) [-6+]mCQK bork-journal 20120708 TAPOC_20120708 0 -1+ journal_2012.html
Phenomenology is always useful but a maker perspective is necessary to complete the production of virtual realities substantiating philosophy.

6 1 1 (+) [-4+]mCQK bork-journal 20120709 TAPOC_20120709 0 -1+ journal_2012.html
Ontology becomes analysis of electrical buses where each point is taken as positive, ground, control function.

6 1 1 (+) [-4+]mCQK bork-journal 20120808 TAPOC_20120808 0 -3+ journal_2012.html
Toward a philosophy of computing is a shortcut for philosophizing with electrons, performing programming and system integration operations as a basic constituent of digital humanities scholarship, such that the towards occurs by doing both of these concurrently, predominantly writing but significantly programming, that is, electronic computer programming in the sense that prior philosophy close to ninety nine percent writing now eighty percent writing and twenty percent programming, by which I mean working code, occurs in the context of a milieu of electronic computing machinery constituting the built environment co-inhabited by humans. Working code includes writing source code that is compiled into complex systems as well as immediate, short command line or other user interface operations like making directories, copying, rsync, and countless other machine operations. For this reason imagine three or four core courses that I teach, philosophy of computing, introduction to electronics, introduction to programming, philosophy of technology.

6 1 1 (+) [-4+]mCQK bork-journal 20121014 20121014 0 -24+ journal_2012.html
Knowledge that the last being Friday though the last visible the tenth does work in cognitive, computational spheres, following Clark who presents the most believable and up to date (whatever the ancient equivalent of this term is) account of intelligence, cognition, consciousness, thinking, including the quote historical context milieu simulatable in virtual realities quote Heidegger object that can be articulated via GNU make files starting software systems instantiating that cognition, whereas the drill of cutting lemon, cleaning fingers, putting away lemon and filling mug with chilled, filtered water represents the phenomena Clark presents as embodied human being. Spreading the load, self-structuring of information, supporting extended cognition threads joined by hypothesis of cognitive impartiality and hypothesis of motor deference. Clark presents the clearest, most sensible, up to date basis for philosophy of computing as it intersects mind, cognition, consciousness, subjectivity and ultimately the human.

[working code css]
javascript:NPR.Player.openPlayer(35,%200,%2010-13-2012,%20NPR.Player.Action.PLAY_NOW,%20NPR.Player.Type.PROGRAM,%20NPR.Player.Mode.MODEL_FROM_FILE)
jbork@alkibiades:~/Downloads$ file 20121013_waitwait_01.mp3
20121013_waitwait_01.mp3: MPEG ADTS, layer III, v1, 64 kbps, 44.1 kHz, Monaural
jbork@alkibiades:~/Downloads$ audacious 20121013_waitwait_01.mp3
[working code css]

Looking at the command executed by the browser hoving on Listen to the Full Episode reveals putatively Javascript invocation of NPR.Player.openPlayer object taking arguments including one that is putatively the desired date, which is yesterday today, the the most recent show we all knowing to be Saturday the thirteenth, that was yesterday. Perhaps the player object will permit downloading the podcast, which is the choice I want to make to translate into human computer symbiosis interface cyberspace operations. They are both system and unit operations, making effective the bringing forth of the sound of a reproduction of the public radio broadcast I missed yesterday. This intervention partially worked in the sense that it only downloaded and played the first segment of the show.

6 1 1 (+) [-4+]mCQK bork-journal 20121104 TAPOC_20121104 0 -30+ journal_2012.html
Species being becomes typing in notes as memory of reading texts that go into my notes files being on verge of possible infringement of flip side of creative potential of manageable rights bounding copyright versus licensing computations in galaxies of meanings of words and possible worlds of experience reading and hearing a reality environment around which the human stumbles around in a rich media environment including books, screens, and other projection implements.

Working code revolves around prettying the display to reveal new ways of thinking with our machines. But this requires some changes.

[working code css]
jbork@alkibiades:~/src/tapoc$ vi journal.cpp
jbork@alkibiades:~/src/tapoc$ vi genjournal.cgi
elsif($param eq "session")
{
# 20110104 custom popup_menu array of values based on query; for now fake it
print "<tr>" if(!$column_count++);
print "<td><br>$param</td><td>".$cgi->popup_menu(-name=>$param, -values=>[ャ,1,2,3,4,5,6ゾ)."</td>";
jbork@alkibiades:~/src/tapoc$ sudo cp genjournal.cgi /usr/lib/cgi-bin/genjournal.cgi
[working code css]

Today working code modified the range of session offerings, a rare change to the PHP, I mean Perl, script part of the project. What should I do is different from what should we do because someone could rewrite to do the query while for me alone it is better to stick in another hack using a handful of extra characters. Both browsers fail my test; changing the zoom in one window affects all the others, even though it seems obvious I as a human user would want them to stay as they were and only apply zoom changes to the current view. That is, display zoom changes should not be global, meaning zoom setting among tabs must not be global. Finding the tab level unusable, try again with separate windows. Firefox still changes the zoom of all tabs, not just the one whose scrutiny I wish to adjust. Unexpectedly, both browsers failed the separate window test, too, a strangely obvious example of where current mainstream state of the art multiple concurrent view offering technology operates. The solution is to use one of each browsers, for the keyboard operations are captured and encapsulated by the browser with focus regardless of the fact that both are in view, whereas when using two views of the same browser, whether tabs or windows, the zoom operation annoyingly affects both. Thoughts broken by horrible session of working from home trying to help get the disaster recovery system working via a slow, remote desktop link. Sorry to have given up on the DH conference submission, but after this fiasco it would have been hampered even with the grace period for forgetting to attach the proposal document. In the beginning were nay-sayers like Heidegger and Ong, then first looks by Busa, Turkle, and those who collaborate to create electronic literature, archives, and other digital resources but who do not focus on the role of practicing programming and information technology integration skills to critically, leading to a period of somnolence until free, open source cyberspace (Floridi) began enacting democratic rationalizations. I see these steps, (1) beginning with poststructuralists Derrida, Ihde, Latour, Buck-Morss; to (2) postulation of post-postmodern identities by Ulmer (Lacan), Hayles, Clark; intersecting (3) software studies led by Kittler, Manovich; from which has emerged in the last few years (4) critical code studies, promulgated by Marino, Berry, Applen and McDaniel. My specialization extends into critical code where others emphasize philosophical and rhetorical insights, applying Geeピ distinction between active and critical learning, a sort of unit operation that may be denoted as (McGann, Turkle)++. By determining projects, giving examples, working code as both activity and scholarly product. Thus whereas McGannピ fortuitous deformations yielded insights for human consciousness leveraging the accidental, programmed, subject-less effects of Derridean and Ulmerian inventive techniques, tests in the context of larger, determined projects such as a scholarly archive, I am arguing that the democratic rationalizations engendered by the proliferation of free, open source software dramatically opens the field to idiosyncratic, personal projects that may not have a clear trajectory beyond the next iterative insight dependent upon in progress, often buggy and imperfect hacking. An example is the set of projects symposia, tapoc, pmrek by which I am juxtaposing the famous series orality, literacy, and PHI, not settling on Ulmerピ electracy or my own characterizations cyberspace, programming, and others, as a comprehensive dive into the human machine symbiosis afforded by critical working code studies, in which we attempt to intuit, feel, sense aspects of machine embodiment nondiscursively, nonsymbolically, along lines argued by Hayles in Electronic Literature. Besides the personal effects on the hybridized subjectivity of digital emigrants from the Gutenberg galaxy, I am also throwing out the suggestion that through such assemblies the Big Other of nonconscious technology replies. Borking public radio means it is indiscernable whether a real time or recorded public radio broadcast is being experienced, or programmed simulacrum stitched together from database samples of real broadcasts and formant synthesis of my own devices. Nonetheless, the examples themselves are contextually bound to the slow iteration of small changes I have been making to this suite of programs over the years in response to my philosophical studies and to further their exploratory reach. Working through the debugger, for instance, to solve a segmentation fault in my C++ source code, or logically reasoning why an incorrect default setting deforms an expected dynamic display, some times being distracted by musing based on incorrect assumptions about what is wrong, the root cause, infamous red herrings, for example the sha1sum discrepancy that I will discovered later in future, more recent journaling entries, that Sourceforge PHP correctly deforms the output trying to execute it rather than simply return the program listing when wget requests it.

6 1 1 (+) [-4+]mCQK bork-journal 20121110 TAPOC_20121110 0 -14+ journal_2012.html
I am going to speak about unit operations as programming objects forcing dive down phenomenologically as instantaneous truth functional binary bit unit operators. Your response if incredulous of the relevance doing the Phaedrus response you question ridiculously turning the conversation as a rhetorical operator forces me to elaborate, and you to (although in symposia virtual reality you can keep on speaking other concurrent textual thought tracings, connecting to the furrow, bite, piece, unit mentality do not have to stop making sound in order to) listen. Here it comes.

[working code css]
Nominate Items with todayピ timestamp [[1-9][0-9][0-9][0-9]1110]? y/n:y
Is [progress/2001/11/20011110_amusement_auction_1.jpg] relevant?
executing SQL [update Items set Relevance=1 where Path=パrogress/2004/11/user_pmrek_20041110.cゾ
Is [progress/2010/11/interview_20101110.pl] relevant? y/n:
jbork@alkibiades:~/public_html/progress/2010/11$ sudo apt-get install gvim
jbork@alkibiades:~/public_html/progress/2010/11$ sudo apt-get install vim-gnome
[working code css]

Oh my gosh, did you see it? It came through working code, seeing the mistake knowing how to programmatically leverage in the future, in the sense of having faith that you will be able to have ready at hand at that future time. First I think there was an extra one in the timestamp, then I realized it is probably because there is no journal entry for today in 2001 that the image does not appear in the seventh view PHI I see today. Learn the Perl program can be retrieved from the webserver without mangling like PHP which has been prohibited from being submitted for extra computational view, that is, for also being viewed by humans in learning how to program. Had to do a quick install of vim-gnome to allow GUI browser to invoke gvim as it did not work with vim at the GUI level.

6 1 1 (+) [-4+]mCQK bork-journal 20121117 TAPOC_20121117 0 -7+ journal_2012.html
Appeal to Latour super critical subject built from Turing to evaluate ethic of studying technology, what seems missing from a Deleuzean analysis for post postmodern perspectives. The enormous furrow by which philosophies of computing incorporate produces a plane of low resistance, wandering inscribing space of thinking to roam like the wolf, where others have cast the postmodern subject as shift from mole to serpent. Moreover, and perhaps more precisely, it is no longer sufficient to focus on one theorist, if one embarks upon the multidiscipinary method Latour recommends in Why Has Critique Run Out of Steam? conveniently answered by science, technology, art, and math, showing how it does run out of this conjunction as epitomized by Ulmer, given examples of electronic literature by Hayles and others. Bring the probity of taking seriously Kittlerピ claim that what is important in studying media is schematism of perceptibility afforded by the circuits oddly similar to the philosophical term phenomenology. Incumbent on students teachers included is sufficient understanding of electronics to think about how programs running in computers work. Do not just sense, intuit machine embodiment by following Cayley this is the necessary consumer effect but also by long habituation writing programs and thinking about operation of high speed (beyond millisecond computational cycle, microsecond and beyond) electronic circuits.

6 1 1 (+) [-4+]mCQK bork-journal 20121120 20121120 1 -10+ journal_2012.html
This is how you enter as me the philosophy of computing human crossing machines. This crazy journal software system is a C++ class in the domain of the software project tapoc and pmrek and symposia and other programs software running biasing (Kittler spoke of biasing in sense of alternating current electrical theory running PHI. The parenthesis can continue). TCP IP version four is the local level of analysis, imagine whole galaxies of meaning as other running systems around times PHI concurrent to the inscriptional milieu. (This is, in fact, an ethical comportment towards others technologically informed, between human subsystems like interoperability between machine subsystems. It also gets us past the barrier Derrida believes impassible choosing to write about the significance of his pressing a key on his Macintosh) Time taken to move back to the top of the HTML text like bonus count of Paragon, which I hope one day to work into pmrek.

It is fitting, if not hilarious, that Derrida wrote a book about his discovering himself writing with a personal computer. If Kittler disparages all human art, not matter how beautiful, because it means nothing to data systems, which only try to keep TCP IP version four galaxies of meaning networks if you want to talk about networks I want to talk about programming going, Clark provides sound scientific theory, and Hayles and Ulmer craft the literature advancing digital humanities to take a second look at programming. Picking up with Barthes, stating the relation which unites the concept of the myth to its meaning is essentially a relation of deformation (91), my proposal is to extend the role of programming in digital humanities research beyond fortuitous deformations of Cayley, McGann, and others, into deliberate experimentation with machine cognition complementing human reasoning by working code. What Derrida reaches, as a hacker emigrant at best but mostly a technology consumer, proclaiming the moment has come to accept a great stirring in our conceptual archive, and in it to cross a ネogic of the unconscious with a way of thinking of the virtual which is no longer limited by the traditional philosophical opposition between act and power (67), programming philosophy/philosophical programming engages, transporting philosophy into software via critical code studies as Cicero shifted it to Latin Rome on its trajectory to polyglot power points of Western late capitalism.

6 1 1 (+) [-4+]mCQK bork-journal 20121201 20121201 3 -25+ journal_2012.html
I begin (or perhaps should end, or demote to a note) with an example in which Heidegger s hermeneutic phenomenology applied to electronic devices, namely the thyristor, cousin of the transistor and silicon controlled rectifier (SCR), is perfectly appropriate and adequate for theorizing post-postmodern embodied cognition in the context of network technologies, if agreed by the latter to be TCP/IPv4 phenomena being, given time, epistemologically transparent, as opposed to more complex systems like natural, including human, automata (subjectivities), thus suggesting that philosophy follow von Neumannピ recommendation to start with studying artificial automata even to address classic humanities questioning. Recall that thyristors traditionally conceptualized with flashing strobe lights appear many other places requiring less extreme bursting forth as SCRs, for example in the TTL computer controlled switched lamp circuit of a particular pinball platform. That which flashes out, lights, shines, shimmers, is detected, read, input, viewed, known most brilliantly, or as Heidegger puts it in The Question Concerning Technology, to ekphanestaton, that which shines forth most purely, emanates from devices materializing (in Hayles sense, versus more general physicalizing) thyristor electronic devices, and so it is appropriate to muse for a minute about them by performing a Heideggerian approach, and then continue with a Hayles style meditation on these particular electronic devices that constitute our shared built environment, i.e., technogensis. Heidegger s approach gets us going, steers, but is not a primary component of the final control element although of course it influences the final control elements. This extreme case of a sound Heideggerian approach to network analysis will be explored further after some shortcomings are recognized and addressed by other theorists.

Let us return to this founding text of technology studies, prior to triggering the SCR, summarizing the philosophy of technology with the pair danger/saving power. Heidegger muses hermeneutically upon Greek phenomena through language, poetically: in Greece, at the outset of the destining of the West, the arts soared to the supreme height of the revealing granted them. They brought the presence of the gods, brought the dialogue of divine and human destinings, to radiance. And art was simply called techn . It was a single, manifold revealing. It was pious, promos, i.e., yielding to the holding-sway and the safekeeping of truth (34). Hermeneutic theories, according to Wolfgang Iser, are often illustrated by investigating works of art by a question and answer method popularized by R. G. Collingwood, and

each work of art is to be conceived as an answer to a question or problem prevalent in the respective historical situation within which it was produced. The work as an answer is bound to contain the question in the form of an issue that had to be addressed. Through the logic of question and answer we are able to reconstruct the context of the work to which it has reacted, thereby making us present to a historical situation that has never been our own. Thus a truly historical interpretation of the work of art emerges, which allows us both to reenact the work on its own terms, and to begin to understand its otherness. (39)

The Heideggerian circuit seems to be: (1) cultivate the Greek experience of techn (2) reconstitute the current experience of technology in a way that acknowledges its rootedness in the Greek experience. However, many critics complain that Heidegger s response repeated response is a nostalgic retreat to handicrafts, putting his approach at odds with the task of accounting for contemporary networks. Indeed, the recognition of danger/saving power is meant to inform those who enter its milieu (Mitcham, Kittler).

6 1 1 (+) [-5+]mCQK bork-journal 20130201 20130201 45 -9+ journal_2013.html
Critical attention to structural and material details of virtual reality projectors (engines, generators, streamers, and so on) reveals seldom practiced quintessential tutor texts for learning how computers work from the ground up producing the background knowledge for humans to write profoundly self referential working code over their lifetimes. Rather than a life of passive technology exposure, invoking Kittlerピ chilling casting as ushering souls milieu, leading with mechanism as human communication. For example the VirtualBox ova has been made by software whose source code we could examine, although there is so much source code constituting the build environment that to dip into more than a small number would consume a lifetime. Thus if we are going to take the trouble to learn some programming languages and write code throughout our lives, we ought to learn to wisely choose our custom projects and make then FLOSS or better. I accept the inevitability that I will spend my old age in virtual worlds, and consider how best to comport myself to the technologies and societies steering its evolution. This position follows from acceptance, with N. Katherine Hayles, that human life in developed societies is irrevocably enmeshed within and mediated by programmed machine operations. Where periodization theory delineates a major historical transition from print based disciplinary societies into highly engineered, autonomous societies governed by continuous control, within this still nascent epoch a number of significantly distinct generations have occurred as well. Whereas reflection on living in the milieu of early generations of computing machinery may have contributed to distopic future visions by countless humanists from Heidegger to Deleuze, the insight of contemporary thinkers like Alexander Galloway is that these societies of control evolve along with the actual designs, devices, and protocols embodying them, and we need to look at the current milieu of distributed control that is the Internet to assess the range of likely trajectories as well as the range of interventions that may radically alter those courses.

6 1 1 (+) [-6+]mCQK bork-journal 20130209 20130209 0 -2+ journal_2013.html
Significant to understanding my proposal is considering why we need critical programming along with code and software studies is to keep focused on unfolding technical milieu rather than any specific aspect of it; for example, going off on male pronouns in source code comments. I argue that we must stay focused on working code, not these anthropomorphic details.

6 1 1 (+) [-6+]mCQK bork-journal 20130223 TAPOC_20130223 4 -2+ journal_2013.html
]
I propose joining the serious pursuit of philosophies of computing, in Mitchamピ sense of engineering philosophy of technology, to humanities interests involving learning, cultural critique, and the nature of cognition and subjectivity, by engaging in critical programming studies. The provisional significance of this study is altering the trajectory of human technology relations by inspiring renewed interest in learning programming and working code as part of the basic toolkit of cognitive skills employed over a lifetime.

6 1 1 (+) [-5+]mCQK bork-journal 20130313 TAPOC_20130313 0 -4+ journal_2013.html
Programming is required in DH to leverage creative possibilities of working code (living writing, texts that write themselves, self directed step by step control, computing, machine computing, high speed machine computing). Turn digital humanities scholarship into twenty percent working code in languages like C, C++, BASH, Perl, PHP, HTML, XML, and so on, operator (some verb like combining, crossing, cast in, yielding a noun describing this concretization of machine and human languages) English, Latin, Greek, French, German, and so on (try expressing in sound syntax and semantics second order predicate logic, like for all x, there exists first language set and second language set x in the same galaxy of meaning, in order to ponder the sense of this third order logic operator joining the languages in my mind and written source code). The thing (combination of machine and human languages) about which human and machine computing occurs is this combination of machine and human languages constituting the objects of study, now expressed as references to revisions in floss revision control systems (archives, depositories, repositories, bazaars, markets, and so on). This 20% threshold designates critical programming studies intersecting software, critical code, and platform studies in projects like symposia, tapoc, and pmrek.

6 1 1 (+) [-6+]mCQK bork-journal 20130315 20130315 0 -3+ journal_2013.html
How does it work as a subduction zone in virtual realities equivalent to humans running on treadmills jumping onto other apparatus. You may enjoy writing Perl, PHP, Java, HTML, XML but these are garbage languages compared to C++ the most philosophical programming language (Ong). It got too easy and we did not have to program any more so now go the opposite way insisting twenty percent.

6 1 1 (+) [-4+]mCQK bork-journal 20130407 20130407 0 -3+ journal_2013.html
Human trust in air, water like machine trust in C, C++, Perl, PHP, shell scripts. This is an initial thought of a philosophy of computing. We may find that we misconceived early programmers who were women (female humans), forgetting none other than Grace Hopper was an early evangelist of programming languages, creating the differentiation of software from hardware specialists and giving to the programmers the lions share of employment (Campbell-Kelly and Aspray on Garmisch conference).

6 1 1 (+) [-6+]mCQK bork-journal 20130421 20130421 10 -2+ journal_2013.html
Important to keep in mind program source code includes English, Greek, German, French, Latin utterances made in C, C++, and so on, and C, C++, Java, Python, shell, and so on utterances in English, Greek, German, French, Latin. Comingling of languages in new bazaar babel down to the kernel of individual thoughts over life time.

6 1 1 (+) [-6+]mCQK bork-journal 20130509 TAPOC_20130509 0 -3+ journal_2013.html
The philosophy of computing and philosophy of programming are both uninstantiated as explicit critical disciplines in the way philosophy of information, philosophy of software, and semiotics of programming have been articulated as scholarly work. A reasonable explanation for this condition is that philosophers who are also avid computer programmers are very scarce, yielding default philosophies of computing. These are the philosophical positions that derive theoretically from early theorists like Turing, von Neumann, Licklider, and Engelbart, and empirically from the historical production of technologies steered by influential programmers and business leaders like Gates, Stallman, Torvalds, and Jobs, none of who are professional philosophers, or are philosophers whose lack of deep participation in the computer culture skews their visions to be overdetermined by reactionary, consumer, superficial, exemplified by Derrida and Zizek.

6 1 1 (+) [-6+]mCQK bork-journal 20130519 20130519 3 -4+ journal_2013.html
The living writing presented in Plato as ideal presence has disjointedly been instantiated over thousands of years, burdened for a long time with the bias that cognitive processes must mirror human experience, albeit quantitatively expanded and sped up stepwise. My hypothesis is that a traumatic kernel can be discerned by working this interface. Consider a stuck switch with a bad diode causing phantom switch detections on critical switches seldom activated during game play, for example tilt and slam switches on pinball machines since in other years today I have been tinkering with pinball machines and recognize that I still do not fully understand the phenomena I am interpreting. Here is a limit of philosophical thought directed by my intentional manipulation of machine operation, working code.

6 1 1 (+) [-6+]mCQK bork-journal 20130606 TAPOC_20130606 0 -4+ journal_2013.html
As deftly as Derrida interprets Diderot, Seneca, Cicero in Aporias, philosophical technologists may play Stern Lightning. Knowing both that three banks of drop targets completed in order lights an extra ball, and Cicero meditating about the limits of computing. At the same time, the game can be appreciated without understanding the engineering design or science behind it, as good literature can be enjoyed without the deep textual and philosophical understanding of a humanities scholar. Embracing also its own studies of Cicero in ways Derrida could never grasp the Bally AS 2518 MPU pinball platform, critical programming presents new ways to philosophize with electronics.

6 1 1 (+) [-5+]mCQK bork-journal 20130610 TAPOC_20130610 0 -3+ journal_2013.html
The post postmodern situation is network dividual cognitive embodied processes through a story told by Nietzsche, Heidegger, Derrida, Deleuze, Guattari. As borking public radio is a land of programming, concurrent languages in audio and visual registers dynamically generated by custom software rather than from humans reading, it becomes the point at which the Big Other responds. While we can be amused with Zizek joking at extremes of madness, cleverly replacing resonant references to the silence of the lambs with the ignorance of the chicken, critical programming performs digital humanities experiments on the human computer symbiosis by generating real virtualities at the interface.

6 1 1 (+) [-5+]mCQK bork-journal 20130626 TAPOC_20130626 0 -7+ journal_2013.html
Where Deleuze and Guattari employ drugs we must now include computing. This follows thinking about everything as also machine computing as well as possibly human thought, leveling real virtualities onto cosubstantial planes of immanence. PPS introduces electronics so as to share with Ulmer territorialization of computing possibilities iterating over favorite platforms. Recalling that at the heart of texts and technology is critical theory. Critical theory expresses itself in texts that are themselves technological applications; following Janz, that philosophy while grounding critical theory is also expressed through texts that are themselves technological applications opens programming as a place, space, territory and milieu to do philosophy. Where philosophy has previously been bound by the book form, following the single thread of the visual reading printed material (grammata and zoographia), philosophize with high speed distributed internetworked computing machinery. Without taking this stance we are mere consumers of cyberspace and electronic computer technology, which means our intellectual pursuits are overdetermined by the ready-at-hand, default technological systems in which we, as Kittler put it, souls shuttle through our lifetimes.

6 1 1 (+) [-6+]mCQK bork-journal 20130628 20130628 0 -2+ journal_2013.html
The strict uniformity of the prevalence of the real over virtual machine environment creation gives logical ordering to time instants representations PHI when on the same LAN or distributed over the global Internet as each symposia starts offset to each other, placing the real over the virtual in an otherwise arbitrary extent. Thus critical programming provides foundation for a metaphysical position privileging host over virtual machine when the start script is started since it does not get started on the virtual machine until after it has been invoked by the start script running on the real on which the virtual runs.

6 1 1 (+) [-6+]mCQK bork-journal 20130715 TAPOC_20130715 0 -2+ journal_2013.html
To embody technology generations with respect to patents works on different level logics than copyrights, and how each distorts or inflects trajectory of free software rhetoric becomes a thought in the philosophy of computing by programming philosophers cyborg cybersages humans and machines running their software PHI. The cybersage must be considered as a human machine combination not just humans.

6 1 1 (+) [-6+]mCQK bork-journal 20130717 TAPOC_20130717 1 -4+ journal_2013.html
You just have to write the code and then it exists bases ontologies of phenomena PHI. All I have to do now is write the software sets of free, open source (FLOSS) GPL PHI. The philosophical text is literally written in the code, for example through comments and compliable C++ source code. Write philosophy through a number of software projects that can be run together, for example pmrek, symposia, tapoc.

6 1 1 (+) [-6+]mCQK bork-journal 20130727 TAPOC_20130727 0 -4+ journal_2013.html
Real virtuality simulated by public radio FM stream emerging autochthonously like water suggests responses to doing more than fluff nests, of which publishing a doctoral dissertation is one such possibility available in our present age epoch post literacy period PHI, processing Ulmer electracy and other characterizations. Working code generates simulated audiovisual streams. What we get when we try to consider software is default defaulting expressed by Tanaka-Ishii and others as recursion iterating back to ancient Greek texts, with steps between defaulting to database query and switch statement in various C++ threads, ancient texts now also existing, being as ensoniment; so programming languages in combination with human languages structure reality as sites of real virtualities, for example symposia. I am going to territorialize symposia pmrek tapoc.

6 1 1 (+) [-6+]mCQK bork-journal 20130730 TAPOC_20130730 0 -1+ journal_2013.html
The inhuman abomination of machine cognition instantiated by writing now can be done with working code, whose study Weizenbaum finds no subject unethical but scrutinizes its applications; prior humanity put itself at risk by turning natural languages into code, now shielded from dehumanization by virtue of being peripheral to machine languages that are appropriate to high speed fetch and execute computation.

6 1 1 (+) [-6+]mCQK bork-journal 20130819 20130819 1 -2+ journal_2013.html
Itself trying to type itself out in a manner understandable to humans and therefore also machines for it is implementable PHI, a curious ontological status should philosophers and humanists not turn away from programming, creating working code as part of their work, which I call PHI and is a combination of floss including custom programs I maintain. Start with a radical kickstarter idea that only later seems reasonable as being on the boundary of purely logical (stereotyped as machine) and ridiculous (falling back to logic of speech text thoughts).

6 1 1 (+) [-6+]mCQK bork-journal 20130827 TAPOC_20130827 0 -2+ journal_2013.html
In the sense that good control systems must be procedural and object oriented, simpler programming languages like XML stumble for scholars and technologists as troubles with the OHCO hypothesis on account of its lack of symbols and keywords for robust conditional branching and looping operations able to represent multiplicites; a discussion of an overloadeding C++ operators makes more sense than the perplexities of XML ontologies, hardly adequate for describing the world, with a nod to Malabou interpreting Deleuze, although McGann does an excellent job covering that approach. It is similar to commenting upon the differences between 32 and 64 bit technologies, whose impact on digital humanities remains unconscious.

6 1 1 (+) [-5+]mCQK bork-journal 20130912 20130912 1 -3+ journal_2013.html
Anticipating where Malabou is going with plasticity versus flexibility and learning to say no to the social demands generated from the forms of culture reflexively generated through the particular computing technologies that have evolved along with them, I compare the intense anguish portrayed in the film Fail-Safe about detection, control, and the massive effects of the single bit gone haywire in the Cold War to the contemporary, everyday conditions of network dividuals working in IT fields. This thought arises in conjunction with a botched software upgrade at work that spanned cascading repercussions. That this insight emerges through the procedural literacies developed by a mind that has spent decades writing software and dealing with intricate, complex systems, close to the machine like Ullman, without which only a general sense of ominous, pervasive dread of the incomprehensibility of inner workings the built environment, demonstrates the importance of critical programming studies for the humanities.

6 1 1 (+) [-4+]mCQK bork-journal 20131124 20131124 5 -42+ journal_2013.html
The project based organization is meaningful to both humans of particular salary grade and title and machines of certain levels of complexity and speed of operation and overall storage capacity over time PHI. Notice that even today I can still be talking about how Johnson in the third edition of Computer Ethics miscast the as yet named floss as did the typical corporate IT manager of the time, imbuing software itself with the production model of the individual competitive market property owner and work ability giving salary matricies (more than one matrix) and work schedules. If I ask this question during every presentation maybe one day option D Unix-like Suite of System Programs will be the mistaken collective response instead of the current static andthose who understand that it must not be C Shareware Operating System just criticized in earlier philosophies of computing and programming. Add Unix Operating System Donut Model to slide deck in current parlance. Imagine virtual background image as picture of the day injected during dynamic HTML creation of tapoc proposal crossing presentation slides including old MPC reference. The first slide illustrates threat the second intellectual decline. Programming consummated the electrification of print and now human machine trajectory has the former bottoming out in the dumbest generation of Nietzschean last males the age of unreflective digital culture. There is one image for each subheading approximating petchu kitchu presentation format as obverse of stating it will fit on a thumbdrive as Manovich and ultimately platform studies explains. The peak met by programming also included symbolic logic in academic philosophy instruction expressed in graduate levels as exquisitely complex means of representing reality and virtual realities, together exemplifying virtualities.

[working code css]
query for details got no result;
jbork@alkibiades:~/src/tapoc$ grep -n "query for details got no result;" *
gentapoc.cgi:926: $error_msg .= "query for details got no result; ";
(ellipsis)
./update_notes.sh
insert ignore into Notes (TextName,TimestampBookmarkExtra,PositionStart,Lexia,Path) values (ノanovich-software_takes_command,20131124,(97-98),キearning having enactive, iconic and symbolic components means removing need to program from interface unintentionally weakened human intelligence. (97-98),パrogress/2012/03/notes_for_manovich-software_takes_command.html) on duplicate key update PositionStart=(97-98), Lexia=キearning having enactive, iconic and symbolic components means removing need to program from interface unintentionally weakened human intelligence. (97-98)
select * from Notes where Path=パrogress/2012/03/notes_for_manovich-software_takes_command.html or TextName=ノanovich-software_takes_command order by TimestampBOokmarkExtra
select * from Notes where Path like /home%
DELETE FROM `JournalInfo`.`Notes` WHERE `TextName`=ノanovich-software_takes_command and`TimestampBookmarkExtra`=20131124;
manovich-software_takes_command [/home/jbork/public_html/progress/2012/03/notes_for_manovich-software_takes_command.html] [36] [software_takes_command_20131124] Learning having enactive, iconic and symbolic components means removing need to program from interface unintentionally weakened human intelligence.
(ellipsis)
http://localhost/cgi-bin/gentapoc.cgi?operation=update_notes&source_file=progress/2012/03/notes_for_manovich-software_takes_command.html&debug=1
Journal::refresh: try alternate path more suitable for common webserver terminology but still lacking security
Journal::set_source_file: set to /home/jbork/public_html/progress/2012/03/notes_for_manovich-software_takes_command.html
Journal::refresh: able to access source file [/home/jbork/public_html/progress/2012/03/notes_for_manovich-software_takes_command.html]
if(*this->source_file==/)
if(!memcmp(this->source_file, DEFAULT_ABSOLUTE_PATH, strlen(DEFAULT_ABSOLUTE_PATH)) == 0)

original_source_file = this->source_file.substr(strlen(DEFAULT_ABSOLUTE_PATH));
if(!memcmp(this->source_file.c_str(), DEFAULT_ABSOLUTE_PATH, strlen(DEFAULT_ABSOLUTE_PATH)) == 0)
if(memcmp(this->source_file.c_str(), DEFAULT_ABSOLUTE_PATH, strlen(DEFAULT_ABSOLUTE_PATH)) == 0)
(ellipsis)
sptr->bookmark_map = find_bookmarks(sptr);
sptr->source_file_name = original_source_file
[working code css]

Not knowing where the fix needs to be made, working in to add latest note from Manovich via cow clicker interface in browser without having to use MySQL Workstation. Discovering finally a problem with Path being set to an absolute path /home/jbork/public_html/ versus the expected relative value of Path beginning with progress. A bug in the tapoc software yielding five hits including the desired Manovich wedged into this evenings work tying experiential division of learning beyond symbolic exemplified by programming to enactive and iconic, building argument that taking away need to engage via programming removing key component of learning affording human to machine comportment. The five are bolter, bukatman, jenkins, latour and this manovich. The question is, under what conditions where these Notes entries created? Could they all be from the cow clicker screen, which routinely updates existing but rarely inserts new records, that is, the operation adding new Notes being run from the webserver CGI versus my command line interactive user shell script? Easy to test by deleting the Manovich and clicking the hyperlink again. Part of the problem troubleshooting is my own 500 ms back operation that aborts contemplative viewing of the verbose run time output that otherwise disappears into oblivion typical of interactive sessions. It needs to be careful when settting Path to ignore that likely fact that the webserver version of the journal executable rightfully added the absolute path prefix so it could find the file on the cybersage workstation in my user directory versus in the webserver root directory as it works on the secondary user virtual machine systems. Once some silly mistakes regarding strings versus char arrays are fixed, a dumb logic error with !memcmp remains as evidence of my distracted state of mind. Finally the real solution is found to be resetting the source file name after finding the bookmarks, since the prefixed name will necessarily be set in the structure, and that is from where the query is fed.

6 1 1 (+) [-4+]mCQK bork-journal 20131128 20131128 8 -7+ journal_2013.html
That an automated discourse analysis takes over significance in machine network computations over human topics even as it sustains human communication does not entail meaningful content qualifying the cognition of an other that is not us. However, it acknowledges its higher probability than arising in prior media forms, pointing toward another version of Kurzweil singularity. It also differs from the mere accidence of emergence that theorists like McGann and Ramsay would likely tolerate, for we can further it along by writing for the machines while we write for ourselves. Contributing to this effort may seem dehumanizing, venturing the Heideggerian danger of technological, calculative thinking if not simulacral postmodern insignificance and madness, yet where do we expect to dwell in the distant future when our bodies near natural death? Most likely in virtual realities coinhabited by human and machine others, and bathed in real virtualities of information, art, transductions (instrumentated interfaces to physical world) and simulation. Better to produce content and write the code that governs that eventual milieu than arrive by default as habitual consumers whose production value amounts only to a lifetime of social media generated for the amusement of our fellows with little multipurposive programming. Capta shadows instead of deliberate cybersagacity.

6 1 1 (+) [-6+]mCQK bork-journal 20131231 20131231 0 -2+ journal_2013.html
Knowing that Takhteyev notes differing attitudes by those starting using computers in 1980s to later groups kindles periodicity argument implied by Bogost, Brin and others who situate magical era of early personal computers as best time for developing strong technically competent relationship between humans and their machines. Important for distinction between addressing those of my generation versus digital natives.

6 1 1 (+) [-4+]mCQK bork-journal 20140102 20140102 1 -2+ journal_2014.html
Adding Rushkoff as obvious example calling from renewed interest in programming adding now technical details to approach noticeable working code component percentage of real time processing PHI. And that is all and that is all there is to it makes sense to say and fits into song in sense of either genotype or phenotype employing Barthes distinction narrative programmed vision.

6 1 1 (+) [-4+]mCQK bork-journal 20140309 20140309 1 -3+ journal_2014.html
The basic problem of the period seems to be that humans are getting dumber while machines continue improving their improvement; there is no collective human thought compared to machine defaults. Casting situation as peripheral characters of couch dwelling spaceship inhabitants subjected to control by machine defaults aligns with trend of life becoming perpetual adjustment to control systems down to requests for optimal operating conditions as preconditions of work progress efficiency effectiveness return value et cetera, capturing shift in language replaced by instance of true to both languages before and after punctuation, although depart from Malabou choosing programming as response to question what should we do with our brain: we should program, read and write software, working code, work code. What is desired for the game to work is wanting that which is offered as a sensible programmed solution to a problem manufactured to be fed in as a question for such an evaluative apparatus as is gained by studying and doing programming along with default ideologies of post-postmodern dividual cyborg networks.

6 1 1 (+) [-5+]mCQK bork-journal 20140313 20140313 0 -2+ journal_2014.html
Be sure to make link between claim by Romanyshyn that television making dream consciousness public and visible, to Rosenberg appropriation of Lanier with notion of dreaming in code describing a function of language machines. Weinberg recognized what was special about programming of his time before OOP floss ecsystems was purely visual, read on paper or a screen appearance of programming, whereas now we can talk about it in virtual realities and perform speech to text conversion to dynamically generate visual display PHI and vice versa via ensoniment recreate the audible phenomena either playing recording or formant synthesis where espeak and webserver floss duke it out compete together in a participatory network ecosystem, for example TCP/IPv4 LAN.

6 1 1 (+) [-5+]mCQK bork-journal 20140316 20140316 0 -50+ journal_2014.html
I am just a theorist because I see it in the slight defects of Lanier who fundamentally criticizes the network which has become the site of seemingly all significant in terms of high speed machine computable processes cognition ways to not rejuvenate but enwisen add on another layer of cognition forming intelligence. What we do not realize collectively though often in specific contexts is that our source code has a life of its own and goes on writing itself after we commit revisions, whether that source code is C++ contributions to our personal projects or other instrumentation to mere records of instantaneous contextually specific and most importantly still machine computable queries. I consider this distinction latent in the being a good stream ethic as developed by Berry. Writing code becomes part of doing philosophy. For one of the first times deliberately use journal software to restore forgotten memories of years past earlier in the life of the human trying to take away distinction of user as separate dataset supposedly equivalent to identity, individuality, oneness, being. It has been a while since I have quoted working code.

[working code css]
jbork@alkibiades:~/public_html/progress/2014/03$ progress
jbork@alkibiades:~/public_html/progress/2014/03$ ln -s ../../2004/03/whiteboard_20040316.jpg ./whiteboard_20140316.jpg
jbork@alkibiades:~/public_html/progress/2014/03$ ln -s whiteboard_20140316.jpg vpf_20140316.jpg
query successful: insert ignore into Items (Path,MimeType,ForceParse,Relevance) values (パrogress/2014/03/vpf_20140316.jpg,ノime_type,ズ,1)
(ellipsis)
jbork@alkibiades:~/src/tapoc$ vi gentapoc.cgi
$sth = $dbh->prepare("insert ignore into Items (Path,MimeType,ForceParse,Relevance) values ($source_file,ノime_type,ズ,1) on duplicate key update MimeType=ナmage/jpeg") or $error_msg .= "could create query to ".$operation." - ".$DBI::errstr;
jbork@alkibiades:~/src/tapoc$ sudo make web-localhost
(ellipsis)
$sth = $dbh->prepare("insert ignore into Items (Path,MimeType,ForceParse,Relevance) values ($source_file,ナmage/jpeg,ズ,1) on duplicate key update MimeType=ナmage/jpeg") or $error_msg .= "could create query to ".$operation." - ".$DBI::errstr;
DELETE FROM `JournalInfo`.`Items` WHERE `Path`=パrogress/2014/03/vpf_20140316.jpg;
jbork@alkibiades:~/src/tapoc$ sudo make web-localhost
query successful: insert ignore into Items (Path,MimeType,ForceParse,Relevance) values (パrogress/2014/03/vpf_20140316.jpg,ナmage/jpeg,ズ,1) on duplicate key update MimeType=ナmage/jpeg
(ellipsis)
jbork@alkibiades:~/public_html/progress/2014/03$ rm vpf_20140316.jpg
jbork@alkibiades:~/public_html/progress/2014/03$ rm whiteboard_20140316.jpg
jbork@alkibiades:~/public_html/progress/2014/03$ ln -s ../../2004/03/whiteboard_20040316.jpg vpf_20140316.jpg
(ellipsis)
#print("<img src=\"$img_src_offset$vpf_file.png\" alt=\"vpf create file or link [$img_src_offset$vpf_file.jpg]\" /><br>");
print("<img src=\"$img_src_offset$vpf_file.jpg\" alt=\"vpf create file or link [$img_src_offset$vpf_file.jpg]\" /><br>");
[working code css]

What happens in working code keeps the philosophical thought going. Strange life for it to exist linked to today while stated in the database to be significant today ten years ago. Discovered tapoc function that enrolls images does not set the MimeType field when it creates the row in the Item table for enrolling the image. The fix makes sense but the console no longer offers the hyperlink after the image is enrolled the first time to permit this means of updating its correctness as a well formed statement in the supervening software control system PHI. In terms of explaining working code blocks, each ellipsis indicates a break in narrative continuity where subcomputations in other galaxies of meaning affect output, hence intelligibility, keeping the human as part of the action like Lanier demands. Wanting to go on discussing how barely decipherable written segment much like software having primary action in dimension besides human cognition notes similar to Lanier criticism of AI when reading ancientピ hypertext limitability, or on second reading limited by, a personピ ability to compute where compute <operator> memory of speech <operator> as comparing what was imagined by the ancients in the peak of philosophizing about writing. Perhaps what is significant here is that I use BNF to form philosophical thoughts while continuing to imagine impossible states like living writing, the difference now being that the network holds the reality of cognition instead of mass of humans. Hacking away unknowingly at the wrong solution seems to be the troubled state of philosophy addressing the collective intelligence problem I have been articulating of humans getting dumber while machines continue improving, though no doubt getting dumber as well in the sense that plateau forms at approaching intersection of conceptions, for when the machines optimally model the humans as such, the system fixates. Then the root problem seems to be found in how the vpf was invoked, commenting problem of not seeing indirectly was here and lots of tedium built into the system could be reversed. Here I am leaving notes to my future selves is one judgment on what this activity is that I call working code.

6 1 1 (+) [-4+]mCQK bork-journal 20140317 20140317a 0 -14+ journal_2014.html
What does it mean to myself that I am a number to my boss akin to pebbles employed in calculation or handheld devices or other parts of built environment milieu background network either TCP/IPv4 or daring TCP/IPv6 that I do not yet know: for some minutes I imagine declaring it after introducing book Programmers and Managers. Control be borking public radio PHI passing through human machine Internet cyberspace phenomena PHI. And now I turn on recorded music PHI mixed with ensoniment instances by executing scripts, for example BASH shell scripts that build and then start in the context of ordinary user starting the machine via a recognizable start script PHI. That is where they do not know anything any one on my committee readership who does not program, that is a fact of life like literacy and listening (Barthes). Computation has always been embodied in human machine undertakings PHI experiencing transition in intensity down from ecstasy to ordinary reading consciousness PHI. Local hosts are the response to siren servers (Lanier). Reach software automatic links to Euphon and SAM of 80s computing. The other way to see it is through what we got for which floss is adequate and incorporating outliers in corporate cathedrals. Programmers occasionally switch with philosophers. It is perhaps a problem of how philosophers philosophize, sensed by Chomsky of Lacan and Zizek, Heim of Heidegger, as Latour deprecates using old tools for new problems. A new way of philosophical thinking accompanies reading with German ensoniment of German version of Heidegger. That is the philosophical I am destining myself, sense. Starting from the beginning, making adjustments to existing notes and adding occasional new ones to various texts, see I am stuck on Heideggerピ America, as if dislike of writing with punctuation knowing conflict with certain natural languages, for example MySQL, the way spaces disturb default GNU/Linux filesystems. In this activity two, three if adding duplication of journal notes techniques of dissertation cow clicking function as changes in a text that may have occurred in a word processor or written page, although its significance escapes me.

6 1 1 (+) [-4+]mCQK bork-journal 20140318 20140318 0 -7+ journal_2014.html
Every philosopher must leave enough tracks to resume thinking in others both local host iterations and secondary cybersage. This is a day that does not exist yet in the two three line not referring to work but chapter headings in tapoc dissertation generator software being written also following OHCO like TEI XML but throwing in deep computability in an otherwise visual bitmap field of imagined hyperlinks PHI. For me out in the shed it was playing pinball against what seems an unexpected withholding of lit extra ball targets on a rapturous game of Stern Lightning as pmrek test, for a perspective can be shared in which various kernel level and ordinary user program level operations occur. Then entranced by an old image of a complex tiered IPv4 network wondering if still relevant in wireless cellular IPv6 network worlds. Nonetheless the temptation is to demand that when talking about networks in digital humanities we speak at least at this level of complexity and correctness, no less, like requiring specific levels of mathematical sophistication. That is why I take the walk through the years updating notes entries now for nearly a year, just one of potentially thousands of cycles. Entering working code for only a single command line operation not worth adding css delimiter sign as two extra rows of text.

6 1 1 (+) [-5+]mCQK bork-journal 20140322 20140322b 3 -3+ journal_2014.html
A group of us were in there as children using early eight bit personal computers writing programs and all other active programmers, so it makes sense to think of real virtualities in distant future virtual worlds generated after long slumber and preparation through numerous revisions never yet run in full sense of its purpose so as to define extent of scope amenable to freedom zero logic. At the same time I am suggesting a new mode of scholarship emanating from significant working code. Reading years past FOS option manifesto presenting mission statements ending with learn how computers work from the ground up.

6 1 1 (+) [-4+]mCQK bork-journal 20140325 20140325a 2 -21+ journal_2014.html
First of all even in programming we have to confront our evils whether American English or German. To say I turned off all network to use localhost did not say I eschewed any TCP/IPv4 networking, just anything outside the LAN. When Derrida spoke of his computer he meant the physical object that held his work writing text journal ideas art PHI, for we programmers it touches us as we write and do working code but rest of the time let it go off and do its own thing. It is the feeling of from around the time changes we experienced together and can recreate via floss assemblages PHI. Interesting to consider what is now considered flaw of floss that it enables siren servers as much as commercial environments PHI, but more important to explore what is now possible via floss to programmers who peaked in their 1980s teen era when their technology really was limiting their dreams that now can realize those formerly impossible programming dreams effortlessly via worldwide Internet floss operations PHI. More important to talk technically about networking, with acknowledgement to dangers of the art as form of what Janz recommends defining working code places for humans to operate. TCP/IP gives an infinite variety of projects. This is the same will of the Cartesian mind to persist through the thinking of a thought over which reading territorializes primordial virtual LAN contexts. The evils implicit in programming include ability to operate physical control systems implicit in any code with input or output operations forming closed loop feedback control systems running floss and my old coursework programs PHI GNU Linux C calls to kernel functions inb() and outb(). The craziest program I wrote ran a pinball machine with GNU Linux C calls to kernel functions inb() and outb() connected to how many bits ISA channel eight seems sufficient but sixteen and thirty two also possible though not utilized by earlier programmers. It is not enough to say there are networks that happen to be ensconced in early twenty first century virtual reality PHI, you have to be able to rapidly jump into them as instantaneous audio and visual surrounding environment computed within virtual world PHI borking public radio. It is a new form of Turing Test Borking Public Radio defined as likely story on this day any year, all during which at lower energy level another though occurs in experimental world of ensoniment tapoc pmrek. Imagine what level nine is going to be like with six and seven current world area transitioning into eight and nine as development of software tracks reality to reach this set of key things closest which is Turkle PHI beyond evocative objects. Not quite it but joining Marxism introducing new way of thinking via programming. The potential for a variety of projects from set of major lifetime programming projects participated in during long time doing ten to twenty percent consciousness working code like being IT worker of the era. Turkle advances from evocative to I forget look for the post, after searching rediscovering that early term from 8 bit pre Internet world, here it was in the upcoming section in the next heading level, carrier objects such as portable computer used by Derrida, for there is zero citation of working code, him thinking demonstrating structure of automatable object in structure of books as primary mode of thinking versus distributed trans LAN network phenomena, today comfortable but deprecated TCP/IPv4. Carrier fetish objects are great amusement for network and localhost embodied in the flesh and discrete machine dividuals. This blindness of floss to purposes for which software designed and put to use of engendering initial metastasis energy level plateau preponderance of what Lanier calls siren servers and I point out as evidence we are getting dumber in our use of machines; that is, the cleverness of our programming diminishes from height reached decades earlier for reasons of having a need to program now done for pay. By logic Lanier asserts our floss work rewards us and provides lifetime steady stream of usage for exactly as long as it is used by anyone or any virtual world PHI over ten thousand year period reconnecting us to thoughts of the ancients who wrote when humans first began to write en mass producing and depending on surrounding spoken written sonic realm is what ancient Greece may have sounded like via real virtuality ensoniment PHI. Noting Turkle also invokes philosopheme with cleverness of often cited coyote cyborg posited by Haraway. Note how our ability to identify with the programs equivocates with ability to understand ourselves as we use programs to wrap back around such that they themselves those program get confused comes back around grounding computing in human thinking surrounding what machines can do thus may be thinking also benefited by collective software environment, leading to question to Lanier how limits of scaling limits thought thinkable in remunerative accounting remembering complete interaction history even virtual selves in virtual worlds.

6 1 1 (+) [-5+]mCQK bork-journal 20140408 20140408 0 -11+ journal_2014.html
I am writing software that grants processes power to create virtual realities PHI whose ambiance includes borking public radio PHI and the philosopher walking around talking PHI ensoniment via symposia PHI and other floss including espeak. To make it you have to know how it works is qualitatively and gross quantitatively different than pushing buttons and turning dials as technological use thought by Heidegger and other philosophers of technology is where to approach philosophy of computing and programming, or programming computing, things running as virtual realities including the human walking around talking. The scope of my work is ambitious because I am tackling a huge problem for humanity. The wager that I am making right now is that this crappy software is used in distant future running systems PHI I only imagine and describe now and there still has to be philosophers walking around. This one starts with future US copyright law expiration. Edits happening now in GPL repositories and where evolution of software source code team led, user communities are already at hand as affordance of floss rather than having to wait for all copyrights to expire to spring from ambient copyrighted media production, from simple ogg playback to symposia. Kittler thought suspiciously about programming computing, however he is both dead and speaks from sixteen to thirty two bit computing. Today we have the Matrix movie to speak about horrible outcomes for humans, though optimal for computers, or is this an implicit philosophical question about how we comport ourselves, to use an unfamiliar word outside philosophy of technology discourses and common to those spouting this kind of stuff. The methodological challenge is to speak from perspectives of lifelong programmers. My normal activity shall be to only work to exhaustion on dissertation preserving cumulative intellectual energy over lifetime of project effort PHI. That Stroustrup includes serious enjoyment by programmers as fundamental design criterion of the C++ language back to its roots in C with classes, taking the serious yet intellectually stimulating and enjoyable to perform intellectual labor of working on code PHI, appears in the chapter four review of what seems antiquated technologies yet undergirds everything, that is, systems programs written in C and C++ undergirding reality in era of TCP/IP networks.

6 1 1 (+) [-4+]mCQK bork-journal 20140414 20140414 17 -1+ journal_2014.html
There can be an eighties computing experience like there was both, according to Turkle, romantic got to find what I am looking for in annotated bibliography for latest Turkle reaction to 1980s computation model of mind that must now be concurrently thought with Internet complexity but for older students they are appropriate, connecting to other philosophical arguments why worth learning programming in part with early personal computers.

6 1 1 (+) [-6+]mCQK bork-journal 20140415 20140415a 4 -2+ journal_2014.html
What makes me unique is that through a highly engineered language machine I present the first substantial philosophical work in programming computers in C++, which is a task not without risk but necessary, for what languages would we write? Toward a philosophy of programming computers could very well represent the overtaking of natural language physis by calculative thinking made instinct, as Nietzsche put it, also and opening its own can of worms humanists are only now discovering that they have to concern themselves, in the activity of machines.

6 1 1 (+) [-5+]mCQK bork-journal 20140511 TAPOC_20140511 0 -5+ journal_2014.html
I will be the first to point out that while proponents Kemeny and Kurtz describe structured programming as virtuous and good, others like Kraft decry its use by management to deskill the computer programming labor force, as Lanier criticizes the normally praised the role of free, open source software in making the Internet what it is today, an oligopoly of siren servers exploiting the mass users for the direct benefit of the companies capitalizing on the mass user everyday operational data. Today the Internet is both powerful and vicious, some would conclude evil or grossly misaligned to human purposes. To me that is yet another symptom of the overall dumbing down of American human ingenuity at the outset of the global machine cognition age, and the analysis continues from structured programming into object oriented approaches, just as media theorists differentiate epochs based on the emergence of global Internet use. Gamble on what if the difference can be programming working code introducing human English C++ texts into shared Internet and LAN discourse networks connecting humans and machines as cyborgs, for then a whole new area of study is opened up incorporating ethnography, technology studies, philosophy, and digital humanities, by virtue of including substantial study, systems engineering, and use for empirical research in virtual realities reached through the floss projects constituting the bootstrapping and human interface of now independent machine thoughts. The countdown for commencement after all copyrights expire many decades from now will hopefully include my human annotations as they are typed today and have been most days for decades, spending a long time in word processor HTML, articulating contemporary responses to calls for cybersage made by Heim in the prior period.

6 1 1 (+) [-4+]mCQK bork-journal 20140527 20140527 0 -3+ journal_2014.html
A manager is metaphor controlling programs like people and takes on unique, interesting meanings when first cast into regimes grounded in floss programming. No we do not have an entry for two thousand four just white board image equivalent to vpf looking around visually as digital camera PHI. Memory mapped input output is a base point of philosophy of computing and computer programming.

6 1 1 (+) [-4+]mCQK bork-journal 20140602 20140602 0 -8+ journal_2014.html
Economies of scale are among the relationships everyone should understand in terms of possible procedural rhetorics PHI becomes the fundamental metaphysical rule PHI of all thing and each and everything as if consumed for computation by OOP PHI. The dumbest generation is the problem right now and we solve it by thoughtful programming in floss OOP objects PHI. Let computer science concretize or in terms of philosophers Deleuze and Guattari PHI programming. I am letting computer science territoralize philosophies of programming and taking computing and computer programming. The basis of chapter three is really the social construction of technology exemplified by Bijker and Hughes among others. Encountering the dumbest generation American Socrates PHI simple circuits PHI. The only metaphysical truth to be known and trusted is that books on the right hand bookcase are in the schedule and vice versa. Is that a workable programming thought is a question posed by philosophers of computing, computer programming, and of course programming, which we have yielded to computer science establishing territorial rights over computing instead, even letting psychology have computer programming, what is wrong with that as a compromise that becomes philosophical finesse I ask, leveraging its scope to pose particular philosophical questions such as how do I best learn how computers work from the ground up and establish a lifelong programming practice.

6 1 1 (+) [-4+]mCQK bork-journal 20140708 20140708 4 -1+ journal_2014.html
Broken down time exemplified in GNU standard library C struct tm permits real virtualities specifiable over enormous duration to millisecond through microsecond input output operations.

6 1 1 (+) [-4+]mCQK bork-journal 20140722 20140722 0 -5+ journal_2014.html
The philosophy of computing includes comparisons from Johnson editions of Computer Ethics and consumer computer architectures, from eight for the first edition of 1985, sixteen, thirty two for the third of 2001, and sixty four found in fourth dimension 2009 edition version PHI where we are now for the foreseeable future cone of our lifetimes ten thousand years beginning after all copyrights expire, constituting diachronies in synchronies hystericizing media production such as typing notes like these as PHI happenings empowering virtual realities thought spaces PHI. For a continuous focus on value to be computable instilling virtual realities themselves, structurally in the sense of embodying laws embedded made active turnings into computings, asymptoically cognitioning, thinking, turnings into logotropos machines PHI in code, default orientations favoring intellectual properties defaults in editions of Johnson, exemplifying what I mean by default philosophies of computing; another sort of default philosopher of computing will be explained through critical reading of Bill Gates, where explicit desires to shape future thinking about and uses for computing are powering the wealthiest individual human of the time, crossing all of these epochs, certainly straddling thirty two rather than native to sixty four bit computing interfaces. It also combines in simultaneous diachronous layers at synchronous historic moments exemplified by extant technologies of their times, together telling the story with modern aspirations yet amodern sensitivity. The little guy Robert Reich as an underdog hero intellectual moves in same track as Boltanski and Chiapello little people of cities exemplifying modes of capitalism or economic behavior itself. Stamp and even beer can collecting teach cultural history like sustained periods practicing close reading.

6 1 1 (+) [-4+]mCQK bork-journal 20140723 20140723 28 -4+ journal_2014.html
A visual collage like the experiment with GIMP and photographs made this evening resembles ontological finesses of broken down time. In the back triangulate 210-220 cm from the stump meeting 132 inches about eleven feet from the corner of the house, and in the front 137 inches from the corner meeting a measurement I failed to capture on the metric measuring tape. The experiment succeeds partially, not sure if the location of the survey flags can be located via future instrumentation, a theme of the middle Johnson, which notes at this moment need typed in to reduce the final remaining research hours for chapter one to commence writing itself with my human guidance steering what has been carefully arranged by hours of dissertation cow clicking. The ridiculously large waste of memory used by this failed image could hide an encoding of a ridiculously large amount of text, perhaps all the entire project source code revision histories.

6 1 1 (+) [-4+]mCQK bork-journal 20140724 journal_2014072 0 -1+ journal_2014.html
Human atrocities associated with computers since the twentieth century holocaust facilitated by IBM machinery have at least three historical eras, stages, epochs, periods, times, encountered in progressions by Johnson from first to third edition of book through reiterations by digital humanities scholars who inevitably assemble and use complex computer systems to do their work, the question being whether and to what extent they self program and self assemble those computing environments, what I am calling virtual milieu susceptible to ensoniment as example of another floss project working code critical programming, that is, by critically working code places to do philosophy of computing shine out.

6 1 1 (+) [-4+]mCQK bork-journal 20140904 20140904b 6 -2+ journal_2014.html
As the machinic enjoins the human thinking philosophizing conspiring computing. Notice we never get away from the Schreibstube, it is pervasive through human history in the sense Kittler intends in what counts are not the messages or the content with which they equip so-called souls for the duration of a technological era, but rather (and in strict accordance with McLuhan) their circuits, the very schematism of perceptibility (xli).

6 1 1 (+) [-4+]mCQK bork-journal 20140918 20140918 0 -1+ journal_2014.html
As they forgive IBM its past complicity with the holocaust, adults continue to excuse transnational corporations for sundry evils from noxious smoke to unhealthy beverages, and also laying waste to the American mind.

6 1 1 (+) [-6+]mCQK bork-journal 20141006 20141006 1 -5+ journal_2014.html

[working code css]
jbork@alkibiades:~/public_html/progress/2007/10$ ln -s cyberspace_representation_20071006.png screenshot_20071006.png
jbork@alkibiades:~/public_html/progress/2005/10$ ln -s pmrek_diagnostic_display_20051006.png screenshot_20051006.png
[working code css]

A little working code to make an image show, finding a very telling early statement when I was still considering the texts and technology program and advertising myself to its collective intelligence.

6 1 1 (+) [-4+]mCQK bork-journal 20141014 20141014 0 -4+ journal_2014.html
Here PID has a meaning in the real imaginary world playing reality sims.

[working code css]
(ellipsis)
PID=16203052700000010
[working code css]

Here PID has a meaning in the real imaginary world playing reality sims. This too is working code. Then I remember doing this last night after the day rolled is why the links are followed color, beginning with reference to Derrida and Ulmer relating to ensoniment of ancient philosophy.

6 1 1 (+) [-4+]mCQK bork-journal 20141029 20141029 0 -14+ journal_2014.html
What does it mean that the ground fault interrupter becomes the diagram of the times becomes central question in philosophy of computing: do you see how that works at the shimmering of fossification becomes a place for thinking embedded in machine networks PHI is the machinic collective intelligence from what was once most horrid machinery. Listen that evil is a different type than proprietary code; must consider how foss through GPL is the freeingness of code in which humans can give up their words as marks in the world. So this is what you see working code. PHI. So this is what you see working code. This becomes the following.

[working code css]
jbork@alkibiades:~/src/tapoc$ make
jbork@alkibiades:~/src/tapoc$ cp Notes-tapoc.sql Notes-tapoc_20141029.sql
(ellipsis)
jbork@alkibiades:~/public_html/progress/2014/10$ evince diss_workarea_proposal.pdf &
[working code css]

So this is what you see working code. PHI. The list of references is to be encoded, written as code as I also imagine the literature review enumerations of relevant texts making the dissertation chapter section narrative from progression of references and citations of notes of texts included in the list of references. It is still mainly done through text, now with living writing of program code components PHI. Why is there no railroad connecting Orlando and Atlanta when I see long passenger trains and it seems like an important route.

6 1 1 (+) [-4+]mCQK bork-journal 20141110 20141110a 0 -25+ journal_2014.html
The lesson from Hardt and Negri about how biopower works with computer programming languages is that it is good code all the way down, or at least to the extent that it seems to be, the logic of PHI reigns, holds sway, has a metaphysical ontological function. The as is situation is well explained by Hardt and Negri, who along with Boltanski and Chiapello propose a revolutionary, militant spirit opposing capitalism and empire that is not yet fully extended at the forefront of technological state of the art desiring production. Key working code session PHI.

[working code css]
jbork@alkibiades:~/src/tapoc-code-0/playpen$ mkdir 20141110
jbork@alkibiades:~/src/tapoc-code-0/playpen$ cd 20141110/
jbork@alkibiades:~/src/tapoc-code-0/playpen/20141110$wget http://70.159.28.10/NV_Records/details_img.asp?doc_id=5374412&pg_count=2&pg_num=1
jbork@alkibiades:~/src/tapoc-code-0/playpen/20141110$ ls -ltr
total 4
-rw-rw-r-- 1 jbork jbork 2470 Nov 10 19:20 details_img.asp?doc_id=5374412
(ellipsis)
file
(ellipsis)
jbork@alkibiades:~/src/tapoc-code-0/playpen/20141110$ file details_img.asp\?doc_id\=5374412
details_img.asp?doc_id=5374412: HTML document, ASCII text, with CRLF, LF line terminators
jbork@alkibiades:~/src/tapoc-code-0/playpen/20141110$ vi details_img.asp\?doc_id\=5374412
(ellipsis)
<p>Microsoft OLE DB Provider for ODBC Drivers</font> <font face="Arial" size=2>error 80040e14</font>
<font face="Arial" size=2>[Informix][Informix ODBC Driver][Informix]A syntax error has occurred.</font>
<font face="Arial" size=2>/NV_Records/details_img.asp</font><font face="Arial" size=2>, line 269</font>
[working code css]

Key working code session PHI. Here the inversion of human documenting working code writing code that is eventually executed to get the job done at the time back then now when this is happening me typing hearing public radio real virtuality PHI. Here is also the Big Other responding to me in HTML instead of the hoped for graphic image format file. If anything all I see is an error message; evoking the 404 from programming command line rather than browser activity is a different interface with the machinic collective intelligence also rendering PHI. This municipality imposes Microsoft rule upon certain public cyberspace activities like accessing public records: it is the ethical sensibilities of taking this position that we ought to be questioning in the philosophy of computing programming. In the ideal view computed by the schedule algorithm it is still nine months out to complete with all the intended research in addition to planned writing. The as is situation is well explained by Hardt and Negri, who along with Boltanski and Chiapello propose a revolutionary, militant spirit opposing capitalism and empire that is not yet fully extended at the forefront of technological state of the art desiring production.

6 1 1 (+) [-4+]mCQK bork-journal 20141112 20141112 1 -1+ journal_2014.html
Cyberpunk philosopher now Hardt and Negri cyberspace multitude.

6 1 1 (+) [-4+]mCQK bork-journal 20141113 20141113 0 -19+ journal_2014.html
Starting from an image of the whiteboard that was not photographed is instead real virtuality PHI network phenomenon real time development dynamic object from OOP because I need to start working on chapter two in detail. The important but junk message of the day was unity dash dash replace to recover from GUI defect preventing use in blocking sense, freezing it up but hoping to recover and resume PHI. Last non LAN to go is pinball festival announcement Free Play Florida operating over this interval PHI. Sharing teleawareness outside LAN gets silly thinking of analogy to cyborg family life, which PHI also subsumes. Could combination of solar and flywheel provide battery equivalent storage between sunlight periods is another such other directed thought for personal reflection. Screenshot shows capture of fleeting forwarding page such that useless bookmark yielded from result for this county versus useful links built with parcel id or some other identifying data value passed in the HTTP request. I think it means pass Alt_key= the number it put in the text box that briefly appears before the request completes with uninformative URx. Here is a rendition of what was in the browser address text box window.

[working code css]
http://webserver.vcgov.org/propertyLookup.html?Alt_key=4655581
(ellipsis)
jbork@alkibiades:~/src/tapoc-code-0$ vi gentapoc.cgi
printf("<a href=\"http://$script_url?operation=decc_citation_sentences&source_file=$source_file&operator=$TimestampBookmarkExtra\">-</a> ") if($CitationSentences > 1);
jbork@alkibiades:~/src/tapoc-code-0$ sudo make web-localhost
(ellipsis)
if($operation eq "dec_citation_sentences")
[working code css]
Here is a rendition of what was in the browser address text box window. This is an example of the little people of the human machine cyborg multitude programming the Big Other. Fortunately I already coded dec_citations_sentences, or there would have been much more work in the Perl program. An error was initially made, do you see it? Whereas other days the entries fit together in the same section, the distribution today is as founding thoughts for many sections, especially for the foss projects.

6 1 1 (+) [-4+]mCQK bork-journal 20141115 20141115 0 -3+ journal_2014.html
This is the most recognizable background PHI like public radio synthesis PHI with text to speech software symposia operating with another foss espeak. Ensoniment means territorialize on genotype or phenotype instead of paying attention to nuances of the other, about which Hayles criticizes the details I cannot recall, discursivity, traces, and enter electronics. Fine just call it what it is electronics skipping other substitutes for electracy.

6 1 1 (+) [-4+]mCQK bork-journal 20141117 20141117 0 -3+ journal_2014.html
The time it takes me to get through a unit is much shorter than years, days, yet still a multitude of instants, of instances, examples of passing through passage program execution PHI. Diachrony in synchrony is the analysis of the area that is also temporal area timespace over sixty four bit temporal expression using broken down human time equivalents units PHI. So what that formant synthesis begins as meaningless code I think passing through previous thoughts afforded by my partially custom programmed dynamic time bound through technological era cyberspace being PHI.

6 1 1 (+) [-4+]mCQK bork-journal 20141120 20141120a 0 -75+ journal_2014.html
That a post postmodern mind thought up the quintessential emblem of modernism, according to Foucault, distinguishes cybersage perspective of taking into account affordances of media in compositions: this becomes tied to the image of Las Meninas, the painting Foucault describes in On The Order Of Things. That goes into the thinking on chapter two to cast as is situation from regressive subjectivity. Deep working code.

[working code css]
case 9:

query = "select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat(%/,Notes.TextName,ダ,Notes.TimestampBookmarkExtra,.jpg) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/,Notes.TextName,ダ,Notes.TimestampBookmarkExtra,.png) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/screenshot_,Notes.TimestampBookmarkExtra,.png) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/vpf_,Notes.TimestampBookmarkExtra,.jpg) and Relevance=1),ズ,ク) from Notes where Chapter=" + Chapter.str() + " and (Heading=" + Heading.str() + ((Heading=="1")? " or Heading=0)":")") + " and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName ";
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat(%/,Notes.TextName,ダ,Notes.TimestampBookmarkExtra,.jpg) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/,Notes.TextName,ダ,Notes.TimestampBookmarkExtra,.png) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/screenshot_,Notes.TimestampBookmarkExtra,.png) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/vpf_,Notes.TimestampBookmarkExtra,.jpg) and Relevance=1),ズ,ク) from Notes where Chapter=2 and (Heading=1) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
(ellipsis)
query = "select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat(%/,Notes.TextName,ダ,Notes.TimestampBookmarkExtra,.jpg) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/,Notes.TextName,ダ,Notes.TimestampBookmarkExtra,.png) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/screenshot_,Notes.TimestampBookmarkExtra,.png) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/vpf_,Notes.TimestampBookmarkExtra,.jpg) and Relevance=1),ズ,ク) from Notes where Chapter=" + Chapter.str() + " and (Heading=" + Heading.str() + (((Heading.str())=="1")? " or Heading=0)":")") + " and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName ";
select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia, if((select count(*) from Items where Path like concat(%/,Notes.TextName,ダ,Notes.TimestampBookmarkExtra,.jpg) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/,Notes.TextName,ダ,Notes.TimestampBookmarkExtra,.png) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/screenshot_,Notes.TimestampBookmarkExtra,.png) and Relevance=1),ズ,ク), if((select count(*) from Items where Path like concat(%/vpf_,Notes.TimestampBookmarkExtra,.jpg) and Relevance=1),ズ,ク) from Notes where Chapter=2 and (Heading=1 or Heading=0) and InterstitialSequence>0 order by Heading, SubHeading, InterstitialSequence, TextName
-2.1.0+++
query successful: update Notes set InterstitialSequence=200 where Path=? and TimestampBookmarkExtra=?
[working code css]

Deep working code. That is, C. Comment that after cleverly moving case to copy of formerly shared code with six, include zero when Heading one using logic in more complex single statement than multiple lines if traditional condition; cannot do in MySQL level. Now see if it works. At first it does not correctly test the primary condition, perhaps indicating misuse of the object, forcing explicit casting by invoking what amounts to a subobject operator available of the deeper C++. Here the ellipsis indicates run time uses between changes. And yes, now it works, though need to move initial value from one to two hundred to avoid generating title line row string in the presentation. The compositional mechanism behind tapoc includes this revision history through 5.4.1 entries logic.

6 1 1 (+) [-4+]mCQK bork-journal 20141124 20141124 0 -14+ journal_2014.html
Where your argument subsumes computing and is subsumed into computing is your blind spot where you do not think and you do not perceive, versus or PHI becomes testable logical expression of third order logic PHI. Some things only make sense doing with the multitude en mass like adding an X to the end of each comma delimited line avoiding having to count commas to express correctness test results in Excel spreadsheet milieu real virtuality PHI. Now that kind of telepresence is pretty far out but imaginable today pondering beer calories while considering telepresence television control from recliner with up down arrows only compared to alt control arrow combinations of typical 1980s arcade machine and emulators well beyond early step of Bogost to look at Atari VCS. For periods cease being the vigilant monitorial citizen and take a break listening to public radio to calibrate reality perceptions PHI. The oldest entry appears to be a citation from page twenty seven of some text, perhaps Derrida, addressing the German Un-Fug, and it also needs a terminating punctuation mark for the tapoc software to process the last sentence in parenthesis of next year expressing festering thoughts. Actually both need adjustment. Now a position at UCSC working with Wardrip-Fruin after expired Bogost opportunity continues to tempt loosening golden handcuffs of necessary engineer as privileged but still working class human social groups. Made everything today 6.2.1 wondering if it will be lost before better disposition in 6.1.1. A defecit of the tapoc system design no doubt affecting thought by limiting it. The outcome was to change some and leave others as things to do first considered decades ago.

6 1 1 (+) [-4+]mCQK brin-why_johnny_cant_code (np) 20130912d 0 -1+ progress/2013/04/notes_for_brin-why_johnny_cant_code.html
Are the conditions for spontaneous evolution of the type of expertise apparently required to become a programmer like WWII generation automobile tinkerers? (np) The closest parallel I can think of is the WWII generation of my father guys for whom the ultra in high tech was automobiles.

6 1 1 (+) [-4+]mCQK brin-why_johnny_cant_code (np) 20130912e 0 -1+ progress/2013/04/notes_for_brin-why_johnny_cant_code.html
Little explored material specific epistemological situation of human, not machine, readable simple programs in print. (np) We are now typing in programs from books.

6 1 1 (+) [-4+]mCQK brooks-mythical_man_month (279) 20130420 0 -1+ progress/2013/04/notes_for_brooks-mythical_man_month.html
Is delegated power like distributed control an important question arising from crossing Brooks with Berry and fortuitously Janz while writing code, in the midst of working code is where philosophy multipurposively crosses over into technology. (279) It yields exactly the benefits Pius XI predicted: the center gains in real authority by delegating power, and the organization as a whole is happier and more prosperous.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (312) 20131026a 0 -1+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Is this reality transforming charged force field vestige of Socrates divine sign logotropos as like not only hyperlink but all programmed control operations; perhaps my contribution is to foreground technical competence over metaphorical critical interpretation. (312) The presentation of the historical object within a charged force-field of past and present that produces political electricity in a lightning-flash of truth, is the dialectical image.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (321) 20131026d 0 -2+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Compare reterritorialization of mundane objects to salvation of standing reserve of decades past, now orbiting free, open source software and expiration of all copyrights. (321) Childrenピ cognition has revolutionary power because it is tactile, hence tied to action, and because, rather than accepting the given meaning of things, children get to know objects by laying hold of them and using them creatively, releasing from them new possibilities of meaning.
(321) Adults who observe childrenピ behavior can learn to rediscover a mode of cognition that has deteriorated phylogenetically, and in the adult has sunk into the unconscious.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (323-324) 20131026e 0 -2+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Modern computer technologies democratize producer potential of unconscious analysis, where participation limited to interpretations based on mass consumption only. (323-324) To recreate the new, technologically-mediated reality mimetically to bring to human speech its expressive potential is not to submit to its given forms, but to anticipate the human reappropriation of its power. Moreover (and this is the political point), such practice reestablishes the connection between imagination and physical innervation that in bourgeois culture has been snapped apart.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (326) 20131026h 0 -5+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Do with early personal computers, including the potential of learning programming as a home economic, having become part of human experience the way writing and other basic activities did for the United States, noting arcades the early Internet that arose from the prior generation of personal computing: I am trying to recover fantasies from that former era, including the radically democratizing potential of habituation to working code to solve problems and pleasurably hobby as a basic intellectual activity. (326) Slumbering within objects, the utopian wish is awakened by a new generation, which rescues it by bringing the old world of symbols back to life. . . . When the childピ fantasy is cathected onto the products of modern production, it reactivates the original promise of industrialism, slumbering in the lap of capitalism, to deliver a humane society out of material abundance.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (332) 20131026k 0 -2+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Freedom as ability to consume as bourgeois dream of democracy now expressed as media access, the digital divide. (332) Commodity fetishism (as well as urban renewal ) can be viewed as a textbook case of Freudピ concept of displacement: Social relations of class exploitations are displaced onto relations between things, thus concealing the real situation with its dangerous potential for social revolution. It is politically significant that by the late nineteenth century, the bourgeois dream of democracy itself underwent this form of censorship: Freedom was equated with the ability to consume.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (334) 20131026l 0 -2+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Compare this non-bricoluer confidence in montage design to directedness of software engineering. (334) His was a radical reconstruction of materialism that drew its inspiration from premodern theology, nineteenth-century socialist thought, and twentieth-century Surrealism, all three. He brought elements of these discourses together, not as a bricoleur who makes a pastiche out of conflicting traditions, but almost Platonically as someone convinced that truth lies in the elements themselves.

6 1 1 (+) [-4+]mCQK buck_morss-dream_world_of_mass_culture (334) 20131026m 0 -3+ progress/2012/11/notes_for_buck_morss-dream_world_of_mass_culture.html
Imagine as a project for augmented reality, transforming visual perception of built environment through complex processing of dialectical images. (334) His dialectics of seeing is a powerful materialist method of transforming visual perception, one that he believed could compel a collective awakening from the soporific effects of mass culture, and inform and inspire revolutionary politics.
(335) If modernism as an aesthetic style has expressed utopian and aesthetic form, postmodernism has acknowledged their nonidentity and kept fantasy alive. Each position thus represents a partial truth; each will recur anew, so long as the contradictions of community society are not overcome.

6 1 1 (+) [-4+]mCQK bull_and_back-auditory_culture_reader (329) 20131026c 0 -5+ progress/2011/08/notes_for_bull_and_back-auditory_culture_reader.html
Thibaud: three movements to listening of elsewhere from visible to audible, perception to action, private listening to public secret: why not consider it via comparison to micro-ecology of visual navigation by comparing to reading while walking in Symposium, as all three movements occur walking reading for vision as hearing with mobile sound reproduction devices; for reading versus hearing another read edges upon oneself reading another. (329) How does music with headphones mobilize the walkerピ gait? What does this contemporary form of urban mobility stand for? How should we consider this micro-ecology of musical navigation?
(330) Using a Walkman is part of a process of derealization of urban space that depends on the technical mediation of spatio-phonic behaviors. As a transposable object, the Walkman offers itself as one of the most advanced stages of
musica mobilis.

6 1 1 (+) [-4+]mCQK bull_and_back-auditory_culture_reader (331) 20131026b 0 -1+ progress/2011/08/notes_for_bull_and_back-auditory_culture_reader.html
Thibaud: long texts could be stored in long walks, and then when writing removed the need for the long walk because a stationary anything would suffice, texts began eulogizing that loss of enjoyment in the present moment: this is the sound of memory going from working memory into the environment and long-term memory. (331) The third movement is
from private listening to public secret.

6 1 1 (+) [-4+]mCQK bull_and_back-auditory_culture_reader (337) 20131026d 0 -2+ progress/2011/08/notes_for_bull_and_back-auditory_culture_reader.html
Thibaud: close to Serres quasi-objects. (337) This analysis is close to the definition of
quasi-objects provided by Michel Serres: サhis quasi-object is not an object, but it is one nevertheless, since it marks or designates a subject which without it wouldnフ be (Serres 1980). The Walkman is a third term to be situated at the level of the man-milieu relationship, it is on one hand inseparable from the perceived subject (of the user) and nonetheless distinct from him.

6 1 1 (+) [-4+]mCQK campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog (29) 20120807 0 -1+ progress/2012/08/notes_for_campbell_kelly-from_airline_reservations_to_sonic_the_hedgehog.html
Deleuze n-1, perhaps sustaining automata (though perhaps incorrectly or suboptimally; there is debate over the soundness of Deleuzean concept of cellular automata operation). (29) Only weeks after the first prototype laboratory computers sprang to life, it became clear that programs had a life of their own they would take weeks or months to shake down, and they would forever need improvement and modification in response to the demands of a changing environment.

6 1 1 (+) [-4+]mCQK castells-rise_of_network_society_second_edition (405-406) 20131027e 0 -7+ progress/2012/06/notes_for_castells-rise_of_network_society_second_edition.html
Docility designed into electronic communication systems; why it is important for philosophers to start thinking about and producing real virtualities, admitting cohabitation by human and machine intelligences in these virtual yet real worlds, especially with regard to who are the interacting and interacted. (405-406) Only presence in this integrated system permits communicability and socialization of the message. All other messages are reduced to individual imagination or to increasingly marginalized face-to-face subcultures. From societyピ perspective,
electronically based communication (typographic, audiovisual, or computer-mediated) is communication. . . . But the price to pay for inclusion in the system is to adapt to its logic, to its language, to its points of entry, to its encoding and decoding.

6 1 1 (+) [-6+]mCQK castells-rise_of_network_society_second_edition (445) 20130914j 0 -1+ progress/2012/06/notes_for_castells-rise_of_network_society_second_edition.html
What is the machine equivalent of the spatial organization of managerial elites exemplifies how philosophy and traditional humanities research intersects and engages new media. (445)
The third important layer of the space of flows refers to the spatial organization of the dominant, managerial elites (rather than classes) that exercise the directional functions around which such space is articulated.

6 1 1 (+) [-6+]mCQK castells-rise_of_network_society_second_edition (494) 20130914t 0 -9+ progress/2012/06/notes_for_castells-rise_of_network_society_second_edition.html
Need to consider impact of timeless time on phenomenology. (494) For the sake of my exploration, I find it helpful to call upon Leibniz, for whom time is the order of succession of things, so that without things there would be no time. . . . I propose the idea that
timeless time, as I label the dominant temporality of our society, occurs when the characteristics of a given context, namely, the informational paradigm, and the network society, induce systemic perturbation in the sequential order of phenomena performed in that context. . . . Elimination of sequencing creates undifferentiated time, which is tantamount to eternity.

6 1 1 (+) [-6+]mCQK chun-programmed_visions (48) 20130913k 0 -5+ progress/2013/07/notes_for_chun-programmed_visions.html
Obvious tie to Phaedrus: writing as fetish, Weizenbaum compulsion to program, ignoring vicissitudes of execution like treating reading as knowing. (48) The seeming ease of programming hides a greater difficulty executability leads to unforeseen circumstances, unforeseen or buggy repetitions. Programming offers a power that, Weizenbaum argues, corrupts as any power does.
What corrupts, Weizenbaum goes on to explain, however, is not simply ease, but also this combination of ease and difficulty. Weizenbaum argues that programming creates a new mental disorder: the compulsion to program, which he argues hackers, who hack code rather than work, suffer from (although he does not that not all hackers are compulsive programmers).
(48) According to Weizenbaum, because programming engages power rather than truth, it can induce a paranoid megalomania in the programmer.

6 1 1 (+) [-6+]mCQK chun-programmed_visions (177) 20130706 3 -12+ progress/2013/07/notes_for_chun-programmed_visions.html
Compare in media res conclusion and alternatives to neoconservativism to Berry being a good stream: beginning with things, data-driven programming, status of computer as medium. (177) software can only be understood
in media res in the middle of things. In media res is a style of narrative that starts in the middle, as the action unfolds. . . . Software in media res also means that we can only begin with things things that we grasp and touch without fully grasping, things that unfold in time, things that can only be rendered sources or objects (if they can) after the fact. Further, it means addressing the move within programing toward data-driven programming a form of programing that, because it starts with data and then seeks (through machine learning algorithms) to discover the pattern driving behavior, is programming in media res. Last, in media res means taking seriously the computerピ peculiar status as medium. . . . Code (both biological and technological), in other words, is undead writing, a writing that even when it repeats itself is never simply a deadly or living repetition of the same.

6 1 1 (+) [-4+]mCQK chun-programmed_visions (179) 20130914m 0 -4+ progress/2013/07/notes_for_chun-programmed_visions.html
Wants to connect software and race, exploring the latter through in media res conclusion regarding the former. (179) This book initially was inspired by the striking parallels between software
in medias res and race that is, parallels between software and race as key terms in the current frenzy of and decline in visual knowledge. Linked together in the early twentieth century through the notion of a genetic program, software and race embody two important ways of conceptualizing a seductively causal relationship between order and vision, the visible and invisible, the imaginable and readable a causal relationship that contradicted early twentieth-century visions of a dark entropic future.
(179) Like software, race was, and still is, a privileged way of understanding the relationship between the visible and invisible: it links visual cues to unseen forces.
(180) Race and software therefore mark the contours of our current understanding of visual knowledge as programmed visions.

6 1 1 (+) [-4+]mCQK cicero-philippics (1-2) 20131028 0 0+ progress/1996/02/notes_for_cicero-philippics.html
Basic idea of ensoniment of classical texts presents both tasks for philosophical programmers and new places for philosophy to happen. (1-2)

6 1 1 (+) [-6+]mCQK clark_chalmers-extended_mind (11) 20130913c 0 -1+ progress/2010/04/notes_for_clark_chalmers-extended_mind.html
The old question raised by Socrates in Plato about internal versus external mnemonics, in context of transformation of computational problems admits to the self-reprogramming nature of evolutionarily selected mnemotechnics. (11) It certainly seems that evolution has favored onboard capacities so as to reduce memory load, and even to transform the nature of the computational problems themselves.

6 1 1 (+) [-4+]mCQK copeland-what_is_computation (335) 20010801 0 -2+ progress/2012/12/notes_for_copeland-what_is_computation.html
Turing made clear the historical connection of computing to print, Copeland to tyranny; as I argue, besides being historically representational, computing has also been tyrannical, recalling Solon of Diogenes Laertius. (335) To compute is to execute an algorithm. More precisely, to say that a device or organ computes is to say that there exists a modeling relationship of a certain kind between it and a formal specification of an algorithm and supporting architecture.

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (95) 20130915h 0 -1+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Does synthesizer, that is, programmed machine computations by technological devices supersede human equivalent as philosophical production? (95) The
synthesizer has taken the place of the old a priori synthetic judgment, and all functions change accordingly.

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (104) 20130915j 0 -3+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Discussion of rhizome overload another post postmodern concept better exemplified in programming work than literary or oral forms. (104) And the
overload is not a rhetorical figure, a metaphor, or symbolic structure; it is a mobile paraphrase bearing witness to the unlocalized presence of an indirect discourse at the heart of every statement. From both sides we see a rejection of reference points, a dissolution of constant form in favor of differences in dynamic. The closer a language gets to this state, the closer it comes not only to a system of musical notation, but also to music itself.

6 1 1 (+) [-6+]mCQK deleuze_guattari-thousand_plateaus (174-175) 20130504 0 -24+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Machinic propositions make much more sense describing software and technological integrations, for example consideration of late binding in OOP, or basic application of biunivocalization as data structure; point is that built environment, extended mind may become facialized, again this is much more obvious with electronic computing than print media. (174-175)
First theorem: One never deterritorializes alone; there are always at least two terms, hand-use object, mouth-breast, face-landscape. And each of the two terms reterritorializes on the other. . . . Second theorem: The fastest of two elements or movements of deterritorialization is not necessarily the most intense or most deterritorialized. Intensity of deterritorialization must not be confused with speed of movement of development. . . . Third theorem: It can even be concluded from this that the least deterritorialized reterritorializes on the most deterritorialized. . . . As a general rule, relative deterritorialization (transcoding) reterritorialize on a deterritorialization that is in certain respects absolute (overcoding). . . . Even a use-object may come to be facialized: you might say that a house, utensil, or object, an article of clothing, etc., is watching me, not because it resembles a face, but because it is taken up in the white wall/black hole process, because it connects to the abstract machine of facialization. . . . Fourth theorem: The abstract machine is therefore effectuated not only in the faces that produce it but also to varying degrees in body parts, clothes, and objects that it facializes following an order of reasons (rather than an organization of resemblances).

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (178) 20130915t 0 -9+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Christ-face: Giotto to go with illustrative art used by Lacan, Foucault. (178) On the brighter side, painting has exploited all the resources of the Christ-face. . . . In this respect, there is an exultation in the painting of the Middle Ages to the Renaissance, like an unbridled freedom. . . . The most prodigious strokes of madness appear on canvas under the auspices of the Catholic code.

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (256-257) 20130916e 0 -8+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Spinoza ethology degrees of power sounds like Socrates reverse engineering method. (256-257)
Memories of a Spinozist, II. There is another aspect to Spinoza. To every relation of movement and rest, speed and slowness grouping together an infinity of parts, there corresponds a degree of power. . . . In the same way that we avoided defining a body by its organs and functions, we will avoid defining it by Species or Genus characteristics; instead we will seek to count its affects. This kind of study is called ethology, and this is the sense in which Spinoza wrote a true Ethics.

6 1 1 (+) [-4+]mCQK deleuze_guattari-thousand_plateaus (461-462) 20130528 0 -16+ progress/2013/04/notes_for_deleuze_guattari-thousand_plateaus.html
Adding and subtracting axioms sounds like style of mastery programing enjoys. (461-462)
1. Addition, subtraction. . . . There is a tendency within capitalism continually to add more axioms. . . . the question is not that of freedom and constraint, nor of centralism and decentralization, but of the manner in which one masters the flows. In this case, they are mastered by the multiplication of directing axioms. The opposite tendency is no less a part of capitalism: the tendency to withdraw, subtract axioms. . . . The totalitarian State is not a maximum State but rather, following Virilioピ formulation, the minimum State of anarcho-capitalism (cf.

6 1 1 (+) [-6+]mCQK deleuze_guattari-what_is_philosophy (10-11) 20130609 0 -7+ progress/2013/06/notes_for_deleuze_guattari-what_is_philosophy.html
Attack on computer science as among shallow, late, universal capitalist endeavors of age of commercial professional training fits with critical tone of Deleuze Postscript and dismissiveness of Derrida and Zizek: Ulmerian concepts and my flossification, short lines, and Heideggerian meditations on electronic devices aim to escape this critique by animating creative multipurposive (choric) making. (10-11) In successive challenges, philosophy confronted increasingly insolent and calamitous rivals that Plato himself would never have imagined in his most comic moments. Finally, the most shameful moment came when computer science, marketing, design, and advertising, all the disciplines of communications, seized hold of the word
concept itself and said: This is our concern, we are the creative ones, we are the ideas men! We are the friends of the concept, we put it in our computers. . . . But the more philosophy comes up against shameless and inane rivals and encounters them at its very core, the more it feels driven to fulfill the task of creating concepts that are aerolites rather than commercial products.

6 1 1 (+) [-6+]mCQK deleuze_guattari-what_is_philosophy (40-41) 20130915e 0 -7+ progress/2013/06/notes_for_deleuze_guattari-what_is_philosophy.html
Prephilosophical internal conditions imply nonphilosophical opens for technology, and meets back in critical programming; per Hayles nonconceptual understanding extends beyond intuition into technological nonconscious, such as the boundary between languages and protocols managed by compilers, interpreters, parsers, operating systems. (40-41) If philosophy begins with the creation of concepts, then the plane of immanence must be regarded as prephilosophical. It is presupposed not in the way that one concept may refer to others but in the way that concepts themselves refer to a
nonconceptual understanding. . . . Prephilosophical does not mean something preexistent but rather something that does not exist outside philosophy, although philosophy presupposes it. These are its internal conditions.

6 1 1 (+) [-4+]mCQK derrida-dissemination (130) 20130916g 0 -4+ progress/2012/02/notes_for_derrida-dissemination.html
Pharmakos as scapegoat overdetermined by culture for a specific context, and thus not present in Platonic writings due to this bias; compare to overloaded functions of OOP that may or may not appear in code. (130) The character of the
pharmakos has been compared to a scapegoat.
(130 footnote 56) This is doubtless the moment to point out, in connection with the clear necessity of bringing together the figures of Oedipus and the
pharmakos, that, despite certain appearances, the discourse we are holding here is not in a strict sense a psychoanalytic one. This is true at least to the extent that we are drawing upon the same textual stores (Greek culture, language, tragedy, philosophy, etc.) which Freud had to begin by tapping and to which he never ceased to refer.

6 1 1 (+) [-4+]mCQK derrida-dissemination (150) 20130916o 0 -5+ progress/2012/02/notes_for_derrida-dissemination.html
Seeds and gardeners analogies for dissemination also well exemplified describing spread of software, viruses. (150) On the one hand cultivation, agri-culture, knowledge, economy; on the other, art, enjoyment and unreserved spending.
(152) Writing and speech have thus become two different species, or values, of the
trace.
(153) Transgression is not thinkable within the terms of classical logic but only within the graphics of the supplement or of the
pharmakon.
(154) Socrates knows that he will never be a son, nor a father, nor a mother. The knowledge the go-between needs for matchmaking should have been the same as the knowledge the midwife needs for delivering.

6 1 1 (+) [-4+]mCQK derrida-dissemination (156) 20130916r 0 -5+ progress/2012/02/notes_for_derrida-dissemination.html
Contained play could also be compared to sense of communication theory as another example of how computer technology easily instantiates forms difficult for human writing, where it must become serious and hence erase itself, as in serious games. (156) The best sense of play is play that is supervised and contained within the safeguards of ethics and politics. This is play comprehended under the innocent, innocuous category of fun.
(156) Only
logio peri onton can be taken seriously. As soon as it comes into being and into language, play erases itself as such.
(157) Not only are his writings defined as games, but human affairs in general do not in his eyes need to be taken seriously.

6 1 1 (+) [-6+]mCQK derrida-dissemination (158) 20130916s 0 -3+ progress/2012/02/notes_for_derrida-dissemination.html
Could this play be like practicing programming, even writing games, but avoiding playing them: classic problems that are difficult to express and solve with writing are routinely solved in computer architecture, programming languages, and coding conventions, as the following three as well. (158) Play is always lost when it seeks salvation in games. We have examined elsewhere, in Rousseauピ era, this disappearance of play into games. This (non)logic of play and of writing enables us to understand what has always been considered so baffling: why Plato, while subordinating or condemning writing and play, should have written so much, presenting his writings,
from out of Socrates death, as games, indicting writing in writing, lodging against it that complaint (grahe) whose reverberations even today have not ceased to resound.

6 1 1 (+) [-4+]mCQK derrida-dissemination (159-161) 20130916t 0 -13+ progress/2012/02/notes_for_derrida-dissemination.html
Trace receptacle for appearances like variable pointers, data structure typed and untyped computer memory arbitrarily assigned by the operating system or CPU hardware instantiating the three natures in the substrate that is like Ulmer chora: literality sustains structural relations in cosmogony, politics, linguistics, and materially in machine circuits, schematism of perceptibility (Kittler on the last act of human writing). (159-161) all these things require ([
Timeaus] 49a) that we define the origin of the world as a trace, that is, a receptacle. It is a matrix, womb, or receptacle that is never and nowhere offered up in the form of presence, or in the presence of form, since both of these already presuppose an inscription within the mother. . . . [quoting] For the present we have only to conceive of three natures: first, that which is in the process of generations; secondly, that in which the generation takes place; and thirdly, that of which the thing generated is a resemblance naturally produced. . . . The khora is big and everything that is disseminated here.
(161) Inscription is thus the production of the son and at the same time the constitution of structurability. The link between structural relations of proportionality on the one hand and literality on the other does not appear only in cosmogonic discourse. It can also be seen in political discourse, and in the discourse of linguistics.

6 1 1 (+) [-6+]mCQK derrida-of_grammatology (245) 20090210 0 -16+ progress/2009/01/notes_for_derrida-of_grammatology.html
Derrida approaches topics dear to computer programmers and systems engineers questioning ridiculously supplementarity, desire, logical time of consciousness. (245) Using the word and describing the thing, Rousseau in a way displaces and deforms the sign supplement, the unity of the signifier and the signified, as it is articulated among nouns (. . .), verbs (. . .) and adjectives (. . .) and
makes the signified play on the register of plus or minus. But these displacements and deformations are regulated by the contradictory unity - itself supplementary - of a desire. As in the dream, as Freud analyzes it, incompatibles are simultaneously admitted as soon as it is a matter of satisfying a desire, in spite of the principle of identity, or of the excluded third party - the logical time of consciousness. . . . These are, of course, questions that can only be asked.

6 1 1 (+) [-4+]mCQK feenberg-transforming_technology (116) 20130917g 0 -3+ progress/2009/11/notes_for_feenberg-transforming_technology.html
As Plato pointed out, arguments arise for substituting interaction with technology of intellectual exchange. (116) In short, Plato holds that the technology of writing has the power to destroy the dialogic relationship that ought to join teacher and student.
(116) Ironically, Plato used a written text as the vehicle for his critique of writing, setting a precedent that we continue to follow in present-day debates about educational technology: many of the most vociferous attacks on Web-based media circulate on the Internet (Noble, 1997).
(116) However, while Platoピ condemnation of writing was unfair, he alerts us to a real issue: whenever a new educational technology is introduced, arguments emerge for substituting interaction with the technology for the process of intellectual exchange.

6 1 1 (+) [-6+]mCQK feller_et_al-perspectives_on_free_and_open_source_software (55) 20130918f 0 -1+ progress/2007/06/notes_for_feller_et_al-perspectives_on_free_and_open_source_software.html
Lerner and Tirole: open source process elitist based on interviews and survey responses as well as analysis of archive of Linux postings at UNC. (55) The overall picture that we drew from our interviews and from the responses we received in reaction to the first draft of the paper is that the open source process is quite elitist.

6 1 1 (+) [-4+]mCQK foucault-discipline_and_punish (307-308) 20131030d 0 -8+ progress/2012/06/notes_for_foucault-discipline_and_punish.html
Compare correspondent in La Phalange article describing the carceral city to a blog. (307-308) the model of the carceral city [by correspondent in La Phalange article, like a blog] is not, therefore, the body of the king . . . but a strategic distribution of elements of different natures and levels. . . . In this central and centralized humanity, the effect and instrument of complex power relations, bodies and forces subjected by multiple mechanisms of ナncarceration, objects for discourses that are in themselves elements for this strategy, we must hear the distant roar of battle.

6 1 1 (+) [-4+]mCQK frasca-simulation_versus_narrative (226) 20130921e 0 -11+ progress/2012/03/notes_for_frasca-simulation_versus_narrative.html
Suggestion by Friedman of simulating Marx Capital joined by my ideas for simulating of the Symposium and life of Socrates the flaneur. (226) It would not be surprising that in the near future politicians tried to explain their plans on tax or health reform through simulation. As Ted Friedman has pointed out, Marxピ
Capital would make a much better simulator than a film.
(227) Narrative authors (or narrauthors ) only have one shot in their gun a fixed sequence of events. . . . But traditional narrative media lacks the feature of allowing modifications to the stories, even if exceptions happen in oral storytelling and drama performances. . . . Games are not isolated experiences: we recognize them as games because we know we can always start over.

6 1 1 (+) [-4+]mCQK fuller-software_studies (45-46) 20131021a 4 -4+ progress/2011/10/notes_for_fuller-software_studies.html
Code: gives reasons to avoid speaking about actual code because of bizarre way that programmers are most creative; I am suggesting a different way of considering versions than the final one with all the bugs out, the terminus of Kittlers approach: is this a question of to code, or to write? (45-46) Ultimately,
the dilemma between code and language seems insoluable. And anybody who has written code even only once, be it in a high-level programming language or assembly, knows two very simple things from personal experience. For one, all words from which the program was by necessity produced and developed only lead to copious errors and bugs; for another, the program will suddenly run properly when the programmerピ head is emptied of words. And in regard to interpersonal communication, that can only mean that self-written code can scarcely be passed on with spoken words.

6 1 1 (+) [-4+]mCQK galloway-protocol (119-120) 20130219 0 -2+ progress/2013/01/notes_for_galloway-protocol.html
Compare this violence against humans by machines from spam to humans by humans of ancient times when also making an analysis of behavior that seems to judge indiscriminately, as pebbles used in calculation. (119-120) This protocological covenant outlining open channels for Usenetピ growth and governance, hitherto cultivated and observed by its large, diverse community of scientists and hobbyists, was sullied in the spam incident by the infraction of a few. The diversity of the many groups on Usenet was erased and covered by a direct-mail blanket with a thoroughness only computers can accomplish.

6 1 1 (+) [-4+]mCQK gates-road_ahead (164-165) 20140514c 4 -4+ progress/2014/04/notes_for_gates-road_ahead.html
Comfort with expert systems and software agents will lead to Turkle robotic moment; the experience of interacting with expert systems consummates the same dream of living writing from antiquity. (164-165) As software agents become common, and voice-simulation-and-recognition software improves, it will begin to feel as though youビe talking to a real person when you consult a multimedia document with a personality. Youネl be able to interrupt, request more detail, or ask to have an explanation repeated. The experience will be like chatting with a personable expert. Eventually it wonフ matter much whether you are talking to a human being or a very good simulation, as long as you get the answers you need to make an appropriate purchase.

6 1 1 (+) [-4+]mCQK goodman-sonic_warfare (9) 20130921k 0 0+ progress/2011/11/notes_for_goodman-sonic_warfare.html
Book chapters titled in style of 1000 Plateaus jumping around to various significant years. (9)

6 1 1 (+) [-4+]mCQK haraway-simians_cyborgs_women (45) 20130923a 0 -3+ progress/2009/04/notes_for_haraway-simians_cyborgs_women.html
Let us accept the cybernetic model for our study of machines to detect the contours of the default epistemologies governing philosophy as Socratic self questioning: so it is phallagocentric, what better means do we have of comprehending the technologically mediated world in which we abide, although at the same time, let the emphasis on embodiment foster situated knowledges of the phenomenology of machine life; Haraway invites such an approach in her call for reappropriation of sociobiological knowledge, as below on page 164. (45) Between the First World War and the present, biology has been transformed from a science centered on the organism, understood in functionalist terms, to a science of studying automated technological devices, understood in terms of cybernetic systems.
(45) This chapter sketches those changes in an effort to investigate the historical connection between the content of science and its social context. The larger question informing this critique is how to develop a socialist-feminist life science.

6 1 1 (+) [-4+]mCQK hayles-how_we_became_posthuman (ix) 20130924 0 -1+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
This book is a cut up of her previous work. (ix) I owe a debt of gratitude as well to Routledge Press for allowing me to reprint.

6 1 1 (+) [-4+]mCQK hayles-how_we_became_posthuman (99) 20130928p 0 -7+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
Imagine going through the whole analysis by theory theory, simulation theory, and interaction theory, to make sense of Hayles explanation for why Wiener downplayed the significance of embodied materiality in favor of abstraction. (99) No doubt his own lack of involvement in the nitty-gritty work of the lab was a contributing factor in this elision of embodied materiality. . . . As a dedicated experimentalist, McCulloch was sensitive in a way that Wiener was not to the tension between the plentitude of embodiment and the sparseness of abstraction.
(100) In addition to operating on the microscale of subatomic particles and the macroscale of cybernetic circuits, probability also operates on the cosmological drama of chaos and order. It is here, on this cosmological level, that he staged the moral distinctions between good cybernetic systems, which reinforce the autonomous liberal subject, and evil machines, which undermine or destroy the autonomy of the subject.

6 1 1 (+) [-4+]mCQK hayles-how_we_became_posthuman (200) 20130929q 0 -5+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
Not sure if my machine embodiment analogies are working here, for example when embodied in specific systems, such as a reverse engineered bricolage, custom code and circuitry makes sense within the particular context, like a good-bye wave, or tuning a system so hardware and software work together (switch detection, lamp and display timing) often resembles describing all the nuances of posture; another way of looking at it is at various functional levels to orient the phenomenal field, so that tracking the flow of electrons through the circuits is like trying to understand an organism from the perspective of the flow of bodily fluids. (200) Showing someone how to stand is easy, but describing in words all the nuances of the desired posture is difficult. Incorporating practices perform the bodily content; inscribing practices correct and modulate the performance. Thus incorporating and inscribing practices work together to create cultural constructs.
(201) Which possibilities are activated depends on the contexts of enactment, so that no one position is more essential than any other. For similar reasons, embodiment does not imply an essentialist self.

6 1 1 (+) [-4+]mCQK hayles-how_we_became_posthuman (290) 20130930q 3 -9+ progress/2010/03/notes_for_hayles-how_we_became_posthuman.html
Can we take an epistemological stand that becomes a driving force in defining and evolving our comportment to the machinic realm so that it re-emerges as Zizek unknown knowns? (290)
(290-291) This view of the posthuman also offers resources for thinking in more sophisticated ways about virtual technologies. . . . By contrast, when the human is seen as part of a distributed system, the full expression of human capability can be seen precisely to depend on the splice rather than being imperiled by it. . . . In this model, it is not a question of leaving the body behind but rather of extending embodied awareness in highly specific, local, and material ways that would be impossible without electronic prosthesis.

6 1 1 (+) [-6+]mCQK hayles-how_we_think (7-8) 20120707c 7 -1+ progress/2012/07/notes_for_hayles-how_we_think.html
State of the Arts of comparative media studies; imagine this is our task, to bring critique, including ideology, to software, released from assumption by distributing into foss (through fossification). (7-8) Diverse as these projects are, they share an assumption that techniques, knowledges, and theories developed within print traditions can synergistically combine with digital productions to produce and catalyze new kinds of knowledge.

6 1 1 (+) [-4+]mCQK hayles-how_we_think (8) 20120707d 0 -1+ progress/2012/07/notes_for_hayles-how_we_think.html
Or ignore, not bother including in program design, the new cosmic great shrug off of the human in the Internet far in the future after all copyrights expire as the term describing the end, kind of like the end of thirty two bit Unix and Unix-like time, or at least mark the point where it restarts, crosses over with temporary inversion of temporal relations implied in their digital storage production run time existence. (8) On a pedagogical level, Comparative Media Studies implies course designs that strive to break the transparency of print and denaturalize it by comparing it with other media forms.

6 1 1 (+) [-6+]mCQK heidegger-question_concerning_technology (34) 20121130 0 -2+ progress/1995/08/notes_for_heidegger-question_concerning_technology.html
Ekphanestaton appropriate to machine subjectivities running in virtual worlds in machines; we can still use Heidegger to get into machine embodiment and poetic dwelling, but its use in philosophy of computing is deprecated. (34) The poetical brings the true into the splendor of what Plato in the Phaedrus calls to ekphanestaton, that which shines forth most purely. The poetical thoroughly prevades every art, every revealing of coming to presence into the beautiful.

6 1 1 (+) [-4+]mCQK heidegger-what_is_called_thinking (3) 20130928 0 -3+ progress/1995/08/notes_for_heidegger-what_is_called_thinking.html
Loose mooring of molar symbols. (3) What keeps us in our essential nature holds us only so long, however, as we for our part keep holding on to what holds us. And we keep holding on to it by not letting it out of our memory. Memory is the gathering of thought.

6 1 1 (+) [-4+]mCQK ihde-philosophy_of_technology (11) 20130929i 0 -3+ progress/2012/06/notes_for_ihde-philosophy_of_technology.html
Could it be argued, for the game, that a lot of energy was wasted disagreeing with Aristotle, like reverse engineering proprietary objects and systems? (11) In short, while the early inventors of Modern Science were passionately interested in a science of nature, their direction later was one which often took as its theme,
disagreement with Aristotle.
(12) The cities, the cathedrals, the draining of the Lowlands of northern Europe were made possible by ever larger and larger
machines such as cranes, wind and water mills, and devices using simple physical principles, some of which had been recovered from Roman and Hellenic, but also Asian, sources.
(13) But with Kant, the task of philosophy in the critical role became that of interpreter, critic, and appreciator of some field or other.

6 1 1 (+) [-4+]mCQK ihde-philosophy_of_technology (138-139) 20130930k 0 -1+ progress/2012/06/notes_for_ihde-philosophy_of_technology.html
In past years I would have made a big deal about the mistyped non-neturality, suggesting this passage hovers near the unthought of the authors, editors, proofreaders. (138-139) If Winner is right concerning artifactual politics, the very non-neutrality of all technologies and particularly of technology transfer, then the insertion of what, when, and how technology transfer is to occur is one of the most crucial issues for the sociopolitical dimensions of philosophy and technology.

6 1 1 (+) [-4+]mCQK iser-how_to_do_theory (43) 20130929k 0 -5+ progress/2011/08/notes_for_iser-how_to_do_theory.html
Like the Collingwood example, this one can be imagined in virtual realities giving rise to artificial intelligences of machinic consciousness bathing humans in order of magnitude computational control operations sustaining their being; the guiding design criteria of economy, similarity, figure and ground, at least economy can be shared between them, whereas both similarity and figure and ground depend upon shared perceptions, and the humans cannot operate beyond the millisecond order of temporal magnitude, while the machines can operate in millisecond, even nanosecond on off affecting or sensing Derridean ontological metaphysical units, the duck rabbit image as database patterns or run time evanescences in humming electronic circuits. (43) Gestalt theory argues that whatever is encompassed in an act of perception is constituted as a field, which basically consists of center and margin. A field requires structuring, which is achieved by balancing out the tension between the data, thus grouping them into a shape. It is the creative eye of the perceiver that does the grouping, and this marks a decisive switch between Lockeピ the active/passive poles, and provides a more plausible account of how perception works. A field arises out of the relationships between data relationships that are neither given not brought about by a stimulus but are the result of a grouping activity guided by the perceiverピ underlying assumptions. This makes all perception into a
projective act of seeing, which in turn produces a gestalt.

6 1 1 (+) [-4+]mCQK jameson-postmodernism (298-299) 20130930d 0 -8+ progress/2012/04/notes_for_jameson-postmodernism.html
From Robotic Poetics boundary of fantasy engineering legal now versus legal in 50-75 years like MAME and musical virtual realities. (298-299) As far as taste is concerned (and as readers of the preceding chapters will have become aware), culturally I write as a relatively enthusiastic consumer of postmodernism, at least of some parts of it: I like the architecture and a lot of the newer visual work, in particular the newer photography. . . . My sense is that this is essentially a visual culture, wired for sound but one where the linguistic element . . . is slack and flabby, and not to be made interesting without ingenuity, daring, and keen motivation.

6 1 1 (+) [-4+]mCQK jameson-postmodernism (303-304) 20130930j 0 -9+ progress/2012/04/notes_for_jameson-postmodernism.html
Immaculation as task for cybersage, or is it ridiculous to attempt. (303-304) As for the others who did survive at the price of a certain renovation or immaculation, a certain
Umfunktionierung. . . . A comparative lexicon would be a four- or five-dimensional affair, registering the chronological appearance of these terms in the various language groups, while recording the uneven development observable between them. . . . one must, in other words, not only deduce modernism from modernization, but also scan the sedimented traces of modernization within the aesthetic work itself.

6 1 1 (+) [-6+]mCQK janz-philosophy_in_an_african_place (209) 20130702d 0 -5+ progress/2013/05/notes_for_janz-philosophy_in_an_african_place.html
Practical outcome of re-imagining world, recovering the important and addressing current problems suitable objectives for critical programming. (209) In the end, philosophyピ practicality in Africa will only be evident in its accomplishments. . . . Perhaps the greatest outcome of philosophyピ activities is to enable people to re-imagine their world, to recover what is important while addressing current problems.

6 1 1 (+) [-6+]mCQK jenkins-convergence_culture (245-246) 20130929q 0 -7+ progress/2012/05/notes_for_jenkins-convergence_culture.html
Achievable utopia through extending practices developed through play to actual political culture, and people also seem willing consider alternative positions when stakes are lower, such as discussing popular culture; relate to my learning programming achievable utopia. (245-246) In
Collective Intelligence (2000), Pierre L vy proposes what he calls an achievable utopia : he asks us to imagine what would happen when the sharing of knowledge and the exercise of grassroots power become normative.
(247) We vote naked not in the sense that we feel an intimate engagement with politics but in the sense that we feel raw, exposed, and vulnerable.
(248) [quoting
Salon technology columnist Andrew Leonard] What I find disturbing, however, is how easy the internet has made it not just to Google the fact that I need when I need it, but to get the mindset I want when I want it.
(249) The reason why L vy was optimistic that the emergence of a knowledge-based culture would enhance democracy and global understanding was that it would model new protocols for interacting across our differences. Of course, those protocols do not emerge spontaneously as an inevitable consequence of technological change. They will emerge through experimentation and conscious effort.
(249-250) Popular culture allows us to
entertain alternative framings in part because the stakes are lower, because our viewing commitments donフ carry the same weight as our choices at the ballot box.

6 1 1 (+) [-4+]mCQK jenkins-convergence_culture (263) 20130929y 0 -2+ progress/2012/05/notes_for_jenkins-convergence_culture.html
Kickstarter funded minority-interest content production: replay PC revolution with widespread programming education and early free software dominance as a science fiction guided by critical utopianism. (263) If [ Long Tail Chris] Anderson is right, then niche-content stands a much better chance of turning a profit than ever before.
(264) It was the announcement that ABC-Disney was going to be offering recent episodes of cult television series (such as Lost and Desperate Housewives) for purchase and download via the Apple Music Store that really took these discussions to the next level.

6 1 1 (+) [-4+]mCQK johnson-computer_ethics_fourth_edition (12) 20140729b 0 -6+ progress/2012/06/notes_for_johnson-computer_ethics_fourth_edition.html
Missing link is to inspire cultivation of technically savvy IT ethicists, for which critical programming serves to fill not a policy but a staffing vacuum. (12) When the possibility of different sorts of technology is pushed out of sight, IT ethicists miss an important opportunity for ethics to play a role in the design of IT systems. [Note: . . . Helen Nissenbaum, for example, helped to design a program called TrackMeNot that helps protect users privacy when they use Google to search the Web. She and others have developed an approach to IT ethics that is referred to as
value sensitive design.

6 1 1 (+) [-4+]mCQK johnson-computer_ethics_third_edition (18) 20130930c 0 -3+ progress/2011/06/notes_for_johnson-computer_ethics_third_edition.html
Perhaps Maner did not think of the important self-involving ethical question of whether to practice programming, or how computers resemble writing as pharmaka, relating them to ancient ethical arguments: Kittler cautions drawing such simple conclusions, however, that Turkles work exists, and a generation of Americans were taught to use computers and program them in public schools, and for that movement to recede, seems sufficient evidence that ethical questions regarding computers were not thoroughly considered by philosophers. (18) Maner suggests that the novelty of the argument lies in its inference from the generality (malleability) of computer technology and never before, he claims, has a technology of this kind been available. In other words, he seems to be saying that never before has humanity been in a situation to be able to so powerfully help the handicapped. I am not sure if this is true, but in any case, it illustrates the puzzle around uniqueness.

6 1 1 (+) [-4+]mCQK kittler-gramophone_film_typewriter (xxxix) 20110828 0 -1+ progress/2011/09/notes_for_kittler-gramophone_film_typewriter.html
This is why Fred Miller asked me to define virtual reality; it is also significant that this German translation starts with a non-translated English quotation from Pynchon. (xxxix) Media determine our situation, which in spite or because of it deserves a description.

6 1 1 (+) [-6+]mCQK kittler-gramophone_film_typewriter (263) 20111018 0 -5+ progress/2011/09/notes_for_kittler-gramophone_film_typewriter.html
Philosophy and other arts are computed in information networks: serious thought has to enter the machine world, writing software as a way of philosophizing with electricity in the transhuman environment powering cyberspace (TCP/IP Internet). (263) Under the conditions of high technology, literature has nothing more to say. It ends in cryptograms that defy interpretation and only permit interception. Of
all long-distance connections on this planet today, from phone services to microwave radio, 0.1 percent flow through the transmission, storage, and decoding machines of the National Security Agency (NSA), the organization succeeding SIS and Bletchley Park. By its own account, the NSA has accelerated the advent of the computer age, and hence the end of history, like nothing else.

6 1 1 (+) [-6+]mCQK lyotard-the_inhuman (7) 20130829 0 -3+ progress/2013/08/notes_for_lyotard-the_inhuman.html
Debt to childhood as other type of inhuman besides cosmic order; calling for creative play by children of all ages, versus interpellation as adults of all ages, as Manovich interprets Kay? (7) This debt to childhood is one which we never pay off. But it is enough not to forget it in order to resist it and perhaps, not to be unjust. It is the task of writing, thinking, literature, arts, to venture to bear witness to it.

6 1 1 (+) [-6+]mCQK manovich-language_of_new_media (61) 20131005o 0 -8+ progress/2011/01/notes_for_manovich-language_of_new_media.html
Criticism of updated form of interpellation inherent in interactive media can be mitigated by creating our own media forms by engaging in software projects and electronic literature creations (Hayles), but this is a good point nonetheless. (61) Interactive computer media perfectly fits this trend to externalize and objectify the mindピ operation. The very principle of hyperlinking, which forms the basis of interactive media, objectifies the process of association, often taken to be central to human thinking. . . . In short, we are asked to follow pre-programmed, objectively existing associations. Put differently, in what can be read as an updated versions of French philosopher Louis Althusserピ concept of
interpellation, we are asked to mistake the structure of somebodyピ else mind for our own.
(61) Interactive media ask us to identify with someone elseピ mental structure.

6 1 1 (+) [-4+]mCQK mcgann-radiant_textuality (x) 20131005a 0 -1+ progress/2012/02/notes_for_mcgann-radiant_textuality.html
How does writing a book by revising old texts resemble creating a new program from an old one? (x) The texts of the following chapters are revised versions of essays originally published elsewhere.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (ix) 20121023 0 -1+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Cannot imagine whoosh of hot air being expelled from the book: to Marx on nature of consciousness as related to agitations of air that is sound now mechanically produced by formant synthesis as the voice of the Big Other, machine consciousness: going beyond throwing back to the senseless void from which distantly past writings emerged would never be interested in reading my stuff, write software to process ancient texts to incorporate their authors those distant conscious composers mind thinking forward to this now. (ix) a belch, some uncomfortable hot air.

6 1 1 (+) [-6+]mCQK neel-plato_derrida_writing (48) 20131006y 0 -2+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Cryptic Pythagoran encoding circulated oral software; oppositions like opcodes do not have to be studied as remains of living processes but reality constitutative in their own right as programmed entities. (48) Pythagoras appears to have taught his followers by using cryptic
akousmata (which loosely translated means something heard ) and symbola. These were then formed by his pupils into sacred discourses and handed on orally and in careful secrecy.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (52) 20131006z 0 -4+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Three Socratic unit operations of the closed loop system of self knowledge; ambiguous versus nonambiguous picked up on page 57. (52) And what about the rules of that discourse itself? There seem to be three: a definition of terms, a knowledge of the truth, and an ability to divide and collect.
(53) Platoピ voice of knowledge is nothing more than the silence of the questions he cannot ask in order to ask the questions he does ask.
(54) In writing he could generate structure through his own force as a writer, and then reuse that same force to mask itself, seeming to leave behind structure with no need of origin.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (157) 20131008o 0 -12+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
As it cannot appear in logocentric discourse, differance seems related to halting problem and other set theory paradoxes encountered in computer programming. (157) Derridaピ
differance undeniably resembles Saussureピ differences. . . . Whereas Saussure sees the differences in a semiotic system as the set of everchanging relationships the speaker manipulates in order to generate meaning, Derrida describes difference as the infinite disappearance of either an origin of or a final resting place for meaning. Insofar as Derrida describes differance, he consistently does so by explaining what it is not.
(157) Differance, he says, is literally neither a word nor a concept.
(157) difference is not something that can appear in logocentric discourse.
(158) Differance is neither structure nor origin.
(158) Differance is neither absence nor presence.
(158) Neither, however, is differance a master term.
(158) Differance is neither an activity nor an effect.

6 1 1 (+) [-6+]mCQK neel-plato_derrida_writing (167) 20131008s 0 -2+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
I am proposing transcendence of reductionism into units determinism, embracing programming and liquefying all such postmodern arguments: texts skirt programming and it is thus not unlikely that programming creeps into humanities rhetoric. (167) As a result, writers must write using terms that remain
under erasure because the terms themselves carry so much excess baggage.
(169) In fact, they [students] do not see their own tests
as texts; they see them as presentations of meaning.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (179) 20131009b 0 -1+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Does it matter whether we are familiar with how inauguration appears in the context of Derridas work, the context, or is the output of a program that computes its concordance enough to think with this topic? (179) The term
inauguration appears frequently in Derridaピ books, especially those written before 1972.

6 1 1 (+) [-6+]mCQK neel-plato_derrida_writing (187) 20131009g 0 -1+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Reverse apparent exclusion of writing by Plato in Phaedrus that nonetheless institutes writing as a necessary means of thinking by so thoroughly intermediating by weaving and splicing programming and thinking for the posthuman cyborg cybersage as to avoid future Derridas. (187) For
Phaedrus, Derrida would have us believe, is the single most important text ever written because it contains the exclusion of writing, the exclusion that inaugurates the West and tends its intellectual life.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (194) 20131009i 0 -3+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Electronic writing can be different by surprising authors and readers alike, poiesis as theory, iterations of unknown knows emerging to recontemplate what we learn we did not know (so McGann has an important role in my conception of ethical comportment with technology). (194) Derrida clearly knows what his text is going to say. He expects no surprises (thought, no doubt, he expects us to be surprised) as he presents the controlled meaning that is everywhere present and under control in his own essay.
(195) On two occasions later in chapter 4 [of
Dissemination], Derridaピ self-assured confidence in his own textピ ability to escape the sort of disintegration it reveals in other texts appears again.

6 1 1 (+) [-6+]mCQK neel-plato_derrida_writing (208-209) 20131009o 0 -7+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Valuation of cacophonous plurality of other voices, like symposia virtual realities and other visually oriented new media advances, for strong discourse, which is no doubt the goal of composition studies: must teach how to remain constantly aware of process of differance. (208-209) Strong discourse can exist, therefore, only in a
cacophonous plurality of other voices, many of which are also strong. Only weak discourse seeks to silence that cacophony.
(209) Of course the only truth available in strong discourse is that made my humans, and this made truth is critical truth, not closed truth. . . . Strong discourse, in short, encompasses Platoピ dialectic by putting all received notions in question and then seeking constantly for a better truth; at the same time, it encompasses Derridaピ deconstruction by remaining constantly aware of the process of differance through which apparent or probable truth becomes manifest.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (211) 20131009q 0 -2+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Suggesting Socrates really did corrupt the youth by steering Isocrates away from rhetoric and writing. (211) For Isocrates, as well as for his teacher Gorgias and his predecessor Protagoras, rhetoric and writing belong at the center of the curriculum because
rhetoric and writing are the ways to make choices in a world of probability. Sophistical rhetoric, therefore, is both a study of how to make choices and a study of how choices form character and make good citizens.

6 1 1 (+) [-4+]mCQK neel-plato_derrida_writing (211) 20131009r 0 -2+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Derrida trap for would-be philosopher kings like ring of Rassillon in Dr Who. (211) For Isocrates, as well as for his teacher Gorgias and his predecessor Protagoras, rhetoric and writing belong at the center of the curriculum because
rhetoric and writing are the ways to make choices in a world of probability. Sophistical rhetoric, therefore, is both a study of how to make choices and a study of how choices form character and make good citizens.

6 1 1 (+) [-6+]mCQK ogorman-ecrit (94) 20131007q 0 -7+ progress/2008/09/notes_for_ogorman-ecrit.html
Train students in art of well-informed dilettantism, the cyperpunk/cybersage position: careful to position between ignorant users and too-entrenched (technostressed); go back to his position wanting Microsoft to offer him a solution, and, lacking that, to permit dilettantism at the state of the art. (94) The method reflects the current situation in which computer users approach their extremely complex and powerful machines as dilettantes. The sense of nausea that I feel when confronting 1/0 today has to do with the fact that I am confronting my own assumptions in 1996, my own lack of skill with Web design. . . . The point of underscoring this design issue is to demonstrate that, with the rapid and incessant changes in software and hardware manufacturing, the best way to approach digital media pedagogy may well be to train students in the art of ヘell-informed dilettantism. This is why William Blake, a poet, painter, philosopher, printmaker, and visionary, serves as an excellent exemplar for students in the humanities today.

6 1 1 (+) [-6+]mCQK ogorman-ecrit (109) 20131007s 0 -2+ progress/2008/09/notes_for_ogorman-ecrit.html
E-Crit program has a 15 credits Programming Track that includes data communications and networks and requirements and design with no focus on any particular programming language. (109) In many ways, theoryピ failure has much in common with a culture that identifies with online dating, genetic engineering, and self-replication through increasingly sophisticated recordable media. When I propose that critical theory needs digital media and vice versa, I am proposing a curriculum that supports the thoughtful application of theory to the production of digital media artifacts, the creation of humane technologies and tech-related policies, and the investigation of the impact of technology on human being; or, to borrow Eagletonピ shamelessly simple-minded words, I am proposing that
educators can combine media and theory to デind out how life can become more pleasant for more people (2003: 5).

6 1 1 (+) [-4+]mCQK ong-orality_and_literacy (60) 20131006q 0 -5+ progress/2008/08/notes_for_ong-orality_and_literacy.html
Verbal memorization of written text differs from that which is originally oral; study against early models of computer memory like delay circuits. (60) In memorizing a written text, postponing its recitation generally weakens recall. An oral poet is not working with texts or in a textual framework. He needs time to let the story sink into his own store of themes and formulas, time to トet with the story.
(63) verbatim memorization apparently does not at all free the oral noetic processes from dependence on formulas, but if anything increases the dependence.
(66) oral memory has a high somatic component.

6 1 1 (+) [-5+]mCQK rushkoff-program_or_be_programmed (23) 20140103c 0 -3+ progress/2014/01/notes_for_rushkoff-program_or_be_programmed.html
Assumption that even basic knowledge of how devices are programmed, or input into decision and design processes, provides a solution to the immanent relegation of agency; compare getting on top by cultivating basic knowledge to Berry riding on top of streams. (23) The way to get on top of all this, of course, would be to have some inkling of how these thinking devices and systems are programmed or even to have some input into the way it is being done, and for what reasons.
(23) With computers and networks, unlike our calculators, we donフ even know what we are asking our machines to do, much less now they are going to go about doing it. Every Google search is at least for most of us a Hail Mary pass into the datasphere, requesting something from an opaque black box.

6 1 1 (+) [-4+]mCQK ryan-beyond_myth_and_metaphor (603) 20120312 0 -5+ progress/2012/03/notes_for_ryan-beyond_myth_and_metaphor.html
As far of some of my imagined uses for humanities computing, virtual history narratives express them to some extent, but go farther into the internal position, such as redoing the Macy conferences as an original participant: this sort of narrative escapes some of the ironic character that Ryan explains complicates what a truly internal-ontological digital text might be like, in contrast to the Holodeck fantasies. (603) Adventure games do not preplan each possible narrative development, as do the Choose Your Own Adventure texts, but they make sure that options will remain within a certain range so that the overall destiny of the playerピ avatar will not deviate from the general line of the master plot. . . . The predominance of violence in computer games has been widely attributed to cultural factors, but it can be partly explained by a desire for immediate response.

6 1 1 (+) [-4+]mCQK tanaka_ishii-semiotics_of_programming (54) 20131014m 0 -10+ progress/2012/10/notes_for_tanaka_ishii-semiotics_of_programming.html
Figures 4-3 and 4-4 useful illustrations of operation of lamda term in dyadic sign model substitution: should this be mandatory learning for interpellation into a digital humanities philosophy of computing discourse? (54) Within any dyadic model after Saussure, the signifier, or name, is a function to articulate the signified; that is, articulation is performed by the signifier.
(54-55) Naming occurs when two lamda-terms are juxtaposed for a beta-reduction. . . . Within any dyadic sign model, the focus of discussion has been how a concept itself
acquires a name. In contrast, in a lambda-term A, the naming process is modeled in terms of how to provide a name to an expression B, so that B is consumed within A.
(56) Naming in the lambda calculus thus facilitates
interaction between two lamda-terms through the substitution of beta-reductions. In particular, a name is needed to consistently indicate a complex ensemble within a scope. As long as this purpose is met, the identifiers provided by lamda-terms are arbitrary.

6 1 1 (+) [-4+]mCQK tanaka_ishii-semiotics_of_programming (133-134) 20131019x 0 -6+ progress/2012/10/notes_for_tanaka_ishii-semiotics_of_programming.html
Also memory-related instances, although where I am thinking nostalgia for early machinery experience of digital emigrants; met here via interaction criteria. (133-134) The third method of instantiation is to produce completely reproducible instances. . . . Some particular instances, however, can still be
the instance with haecceity, such as high-quality computer graphics that have been developed. These are the instances yet they are reproducible.

6 1 1 (+) [-4+]mCQK tanaka_ishii-semiotics_of_programming (136) 20131019z 0 -11+ progress/2012/10/notes_for_tanaka_ishii-semiotics_of_programming.html
Memory effect to which I was taking extreme case of nostalgia powering SSR. (136) Another possibility for haecceity restoration was already suggested in Section 8.2: interaction. . . . Computer games and interactive art make use of the special effect that whenever the user is involved in instantiation, the instance reacquires haecceity.
(137) A special case of interaction that avoids this conflict is adaptation. After a period of use, the instances generated by the system adapt to what the user prefers. Adaptation thus proceeds through collaboration between the system and the user by applying an evaluation.
(137) Adaptation is popular within the user interface domain. An example is text entry systems (MacKenzie and Tanaki-Ishii, 2007).

6 1 1 (+) [-4+]mCQK tanaka_ishii-semiotics_of_programming (138) 20131020b 0 -2+ progress/2012/10/notes_for_tanaka_ishii-semiotics_of_programming.html
Speaking about basis of virtual worlds for machine and human virtual realities, and also of danger of making goal programming haecceity to be understood along same physiology as writing, but now with offer to join nonhuman embodiment in foss, the static sense like all writing, and running instances, the new affordances of artificial intelligence built via optimization and/or interaction. (138) Through the use of a sign or a sign system, the signification is poured and frozen into the final instance with haecceity. Under the pansemiotic view, in particular, of a world consisting only of signs without basis, reflexivity could be one important means to generate such a basis.

6 1 1 (+) [-6+]mCQK thomson-understanding_technology_ontotheologically (161) 20120801 0 -3+ progress/2012/08/notes_for_thomson-understanding_technology_ontotheologically.html
Dwelling as phenomenological comportment: compare to technological comportment implicit in Berry, Harman (allure), Bogost, Hayles, Heim whose future articulation, I suggest, in learning how computers work is standing in the draft of technological being with tolma (boldness) to create, critique, and use reflexively, self-reprogramming subjectivity, our writing machines working on us. (161) We need to learn to practice that phenomenological comportment he calls ヅwelling. When we learn to dwell, we become attuned to the phenomenological パresencing (
Anwesen) whereby ッeing as such manifests itself; we thereby come to understand and experience entities as being richer in meaning than we are capable of doing justice to conceptually, rather than taking them as intrinsically meaningless resources awaiting optimization. In this way we can learn to approach all things with care, patience, gratitude, awe and even, I would suggest, love.

6 1 1 (+) [0+]mCQK turkle-alone_together (288-289) 20140413h 0 -9+ progress/2012/06/notes_for_turkle-alone_together.html
Slowness practices and other means of seeking solitude, which is ability to summon yourself by yourself, seen as backlash to social media like 1980s romantic reaction against computation as model of mind. (288-289) Loneliness is failed solitude. To experience solitude you must be able to summon yourself by yourself; otherwise, you will only know how to be lonely. . . . I see the beginnings of a backlash as some young people become disillusioned with social media. There is, too, the renewed interest in yoga, Eastern religions, meditating, and slowness.
(289) These new practices bear a family resemblance to what I have described as the romantic reaction of the 1980s.
(289) The romantic reaction of the 1980s made a statement about computation as a model of mind; today we struggle with who we have become in the presence of computers.

6 1 1 (+) [-4+]mCQK turkle-second_self (251) 20120116 0 -2+ progress/2011/04/notes_for_turkle-second_self.html
There are too many likely stories for every lisp [slip in typing] vacating Freudian analysis and unfortunately a lot of enjoyable literature including a number of philosophy texts, reading Norman instead; nonetheless these indicators can be collected and use to represent memories in virtual realities including typical visual and now multichannel/multiposition audio media (technologies): this is an example of the philosophy of computing reterritorializing areas developed to analysis of human directed rhetorical texts to programming source code and active shell commands powering instead of constituting or being for human philosophical contemplation, that is, that ephemeral metaphysics that are deduced from the constitution of mid range ordinary Internet usage are not worth studying in detail; one or two examples from the literature by Turkle, Manovitch and Hayles will suffice, then bring in Kittler some more. (251) Freudピ meaning is changed. Self-destructiveness becomes split from passion; its presence is only a commentary on how well an intelligence is working.

6 1 1 (+) [-4+]mCQK turkle-second_self (300) 20120325 0 -1+ progress/2011/04/notes_for_turkle-second_self.html
Carrier objects are great amusement for network and localhost embodied in the flesh and discrete machine dividuals, thus this blindness of floss to purposes for which software designed and put to use of engendering initial metastasis energy level plateau preponderance of what Lanier calls siren servers and I point out as evidence we are getting dumber in our use of machines; that is, the cleverness of our programming diminishes from height reached decades earlier for reasons of having a need to program now done for pay. (300)

6 1 1 (+) [0+]mCQK turkle-second_self (300) 20140325 0 -3+ progress/2011/04/notes_for_turkle-second_self.html
Carrier fetish objects are great amusement for network and localhost embodied in the flesh and discrete machine dividuals, thus this blindness of floss to purposes for which software designed and put to use of engendering initial metastasis energy level plateau preponderance of what Lanier calls siren servers and I point out as evidence we are getting dumber in our use of machines; that is, the cleverness of our programming diminishes from height reached decades earlier for reasons of having a need to program now done for pay. (300) In the case of computational models of mind, there are what I call
carrier objects that encompass both the physical computer and ideas that grow out of programming.
(300) We are able to identify with the programs and so become sympathetic to their confusion.
(301) The computational theory of slips is the kind of theory that passes easily into the general culture.

6 1 1 (+) [-6+]mCQK ulmer-applied_grammatology (157) 20131109 3 -1+ progress/2009/02/notes_for_ulmer-applied_grammatology.html
Developing critical programming will require a similar declaration of pedagogy. (157) My purpose in this chapter is to open the question of the nature of the educational presentation (the manner of the transmission of ideas) adequate to a poststructuralist epistemology and to air some of the rhetorical and polemical notions relevant to a pedagogy of general writing.

6 1 1 (+) [-4+]mCQK ulmer-applied_grammatology (160) 20131020b 0 -1+ progress/2009/02/notes_for_ulmer-applied_grammatology.html
Can Derridean popularization of knowledge develop arguments and techniques to encourage programming knowledge in public schools? (160) The paradox operating here, to put it bluntly, is that while Derridaピ texts appear to be among the most difficult and esoteric works of our time, they nonetheless call for a program or practice that can only be described as a popularization of knowledge.

6 1 1 (+) [-4+]mCQK ulmer-applied_grammatology (199) 20121103 0 -6+ progress/2009/02/notes_for_ulmer-applied_grammatology.html
Now what does the machine other want could be a new impossible question for digital humanities, when including desire of the subject in science; nod to mice in Hitchhikers Guide to the Galaxy. (199) We can say, then, that Lacan posed the question
Was will das Weib? precisely because it is the most extreme version possible of an impossible question, impossible because the womanピ bliss represents for Lacan the impossible knowledge of the Other. By setting such a question for the seminar, Lacan turns the research back on himself, delineating all the more clearly the special features of psychoanalytic knowing.
(200) Part of the lesson of the liaison of bliss and knowledge is always to include in science the desire of the subject. The behaviorist experiments of the rat psychologists, for example, are interesting not in terms of the rats behavior, Lacan says, but in terms of the scientists behavior their relation to the labyrinths they build (Encore, 129). In short, the irruption of the unconscious into science opens knowledge to engima.

6 1 1 (+) [-6+]mCQK ulmer-internet_invention (18) 20131109g 0 -5+ progress/2012/03/notes_for_ulmer-internet_invention.html
Seek wide image and themata from history of computing, networking, and programming. (18) The notions of the wide image and themata were developed by Gerald
Holton in his studies of scientific creativity, for which the prototype is Albert Einstein. . . . The pattern that emerged from such case studies confirmed the philosopher Friedrich Nietzscheピ observation that it is possible to find in a career that secret point at which the aphorism of thought intersects with the anecdote of life.

6 1 1 (+) [-4+]mCQK wardripfruin_and_montfort-new_media_reader (21) 20131019f 0 -3+ progress/2011/01/notes_for_wardripfruin_and_montfort-new_media_reader.html
Manovich: of course we have new phenomena when my interpretation of what things computers do that we humans really not think about are included as basic components of any study of new media, or what I call the philosophy of computing. (21) The basic point of dialectics is that a substantial change in quantity (i.e., in speed of execution in this case) leads to the emergence of qualitatively new phenomena.

6 1 1 (+) [-4+]mCQK zizek-parallax_view (90) 20131019b 0 -1+ progress/2009/05/notes_for_zizek-parallax_view.html
This is Heidegger dread of the language machine: approach it differently than Zizek, who likes to talk about examples from the spectator position in movies, a critical stance of a media consumer rather than producer or prosumer. (90) What changes in this move is the status of the Law: we shift from psychology to the metapsychological symbolic order proper as an external machine that parasitizes upon the subject.

6 1 1 (+) [-5+]mCQK zizek-parallax_view (351-352) 20140219c 8 -11+ progress/2009/05/notes_for_zizek-parallax_view.html
What other options can we entertain for changing the way commodities talk among themselves beyond struggle to let them have any ethical concern or care at all of human actions without really trying to impart on them such powers, we are in the same place for not caring to know about the automobile beyond how to use it that Rushkoff threatens our intellectual evolution with consignment to powerlessness to make further real choices, as it is said, nothing ever happens to the losers? (351-352) This situation is literally evoked by Marx in his famous fiction of commodities that start to speak to each other: If commodities could speak, they would say this: our use-value may interest men, but it does not belong to us as objects. What does belong to us as objects, however, is our value. Our own intercourse as commodities proves it. We relate to each other merely as exchange-values. [Capital, vol. 1 (harmondsworth: Penguin, 1990) pp. 176-177] So, again, the real task is to convince not the subject, but the chicken-commodities: not to change the way we talk about commodities, but to change the way commodities talk among themselves. . . . It is in this precise sense that todayピ era is perhaps less atheist than any prior one: we are all ready to indulge in utter skepticism, cynical distance, exploitation of others without any illusions, violations of all ethical constraints, extreme sexual practices, and so on protected by the silent awareness that the big Other is ignorant of it.

6 1 2 (+) [-4+]mCQK bork-journal 19950203 19950203 0 -44+ journal_1995.html
It begins with imagined events steered by email. Date: Fri, 03 Feb 1995 17:37:32 -0500

From: EXPORT E-MAIL <exporter@olc1.wright.edu>

To: jbork@bgnet.bgsu.edu

Subject: EXPORT LIST

Record 1 of 1

CALL # B4249.G82 E5.

AUTHOR Gurdjieff, Georges Ivanovitch, 1872-1949.

TITLE All and everything.

EDITION [1st ed.]

IMPRINT New York, Harcourt, Brace [1950-

DESCRIPTク v. 18-23 cm.

NOTE "Originally written in Russian and Armenian."

Second ser. has special t. p. with imprint: New York, Dutton.

1st ser. An objectively impartial criticism of the life of man;

or, Beelzebubピ tales to his grandson.--2d ser. Meetings with

remarkable men.

ALT TITLE Beelzebubピ tales to his grandson.

Meetings with remarkable men.d

First Thing, never expect the Other to tell you crucial information of that sort. It goes against the logic of affect-transference, and is something that keeps popping up in literature everywhere as a missing clue in uncovering the sources of misery in our existence. These idiots in the philosophy department that think IT has something to do with kant, locke, hume, aristotle, pooper1, pooper2, are RIGHT, but immediately when reaching that point stop thinking any harder. All those individuals suffered too, and left marks and traces of their experiential world in the deep structure of their communications (writings). Again in other formats like the Gospels there are (see how I hid the you/I distinction under this transformation into third-person ナmpersonal, as they redundantly say in language classes... blah blah blah. . . (1)

On Sat, 4 Feb 1995, jade wrote:

We know, [Sam], that soon you will be a certified BGSU Alumnu(a,s) and ready to begin making handy, tax-deductible contributions to the University. Why not start now, with this very message youビe receiving, and, rather than requesting one of those nasty request thingess, which take up so much of our already-overworked work-study slaves to process -- why not just FORGET ABOUT IT .. Thatピ better .. think of the $ピ youビe already saving in tax deductions .. "

-imaginary conversation in a late-capitalist version of the Turing Test .. and, like those styrofoam cups so famous for their thought-inspiring logo in the logical equivalent of The Union (we called it The Satellite, but it was the same thing I swear), you pick up a piece of the Standing Reserve / Aristotleピ "to onta" (12 v 16 v 20 oz.) and it says, in offset dye-imulsion air-brushed holographic colours, "You Make the Decision".


select Chapter, Heading, SubHeading, InterstitialSequence, RelevanceLevel, TextName, PositionStart, TimestampBookmarkExtra, CitationOffset, CitationSentences, Path, Lexia from Notes where Chapter=6 and (Heading=0 or Heading=1) and ((RelevanceLevel=0 or RelevanceLevel>2) and RelevanceLevel<10) and (InterstitialSequence=0 or InterstitialSequence=100) order by Heading, SubHeading, InterstitialSequence desc, TextName, cast((trim(leading '(' from substring_index(PositionStart, '-', 1))) as unsigned)

TOC 6.1 recommendations+

6.2 future directions

--6.2.0++ {11}

6 0+ 2 (+) [-3+]mCQK bork-journal 19951006 19951006 0 -27+ journal_1995.html
general structure of the reasoning-machine: (not just a static argument!)

Heraclitus + Seneca + [Nietzsche, Marx, Freud] + [Child, cyberpunks]
universal u contingent contingent = a deontic necessity?
I donフ really know where that formula come from, but who knows how the logical tie lashes against the modal logic, since I have pretty much remained unaware of those lessons (childhood amnesia?)

possible section titles:

"Anti-Oedipus"
Marx, Freud, Nietzsche
True, the "capture" of the idea of psycho-analysis almost forces the subject into an aloofness (BLACK HOLE) whose side-effect includes, happily, removal from the battlefield. Freud recommends that while in analysis, you refrain from doing much of anything besides remaining able to pay for the treatment.

.. so far as possible we refrain from playing the part of mentor; we want nothing better than that the patient should find his own solutions form himself. To this end we expect him to postpone all vital decisions affecting his life, such as choice of career, business enterprises, marriage or divorce, during treatment and to execute them only after it has been completed. (376)

However, the student still has hir effect upon the environment, through hir continued participation in the Market (not to mention all those little transactions like leaving lights on or using wads of toilet paper). And the apparently wasteful life of the analyst hardly transfers to the student an ethic of mindful conservation. Of course D&Gピ criticism of the analytic relationship hinges on a different, but related, issue, namely the .. teaching transference. [let me go, Jim: you have done your good and evil upon my soul, which now cries for freedom]

We observe then that the patient, who ought to be thinking of nothing but the solution of his own distressing conflicts, begins to develop a particular interest in the person of the physician. (..) The transference is overcome by showing the patient that his feelings do not originate in the current situation, and do not really concern the person of the physician, but that he is reproducing something that had happened to him long ago. In this way we require him to transform his repetition into recollection. (318;385)

Capitalist Philosophy

The worker, in capitalist society, does not sell the product of his labor, but his capacity to work. (..) The difference between the subsistence wage paid to the worker and the values produced by him is SURPLUS VALUE, on which the capitalistピ profit depends. (xxvi of PM)

Quintillianピ criticism of Seneca (link back with PA)
"youプe gone nowhere, baby!

--6.2.1++ {11}

6 2 1 (+) [-4+]mCQK bauerlein-dumbest_generation (30) 20140607b 12 -5+ progress/2014/05/notes_for_bauerlein-dumbest_generation.html
Compare paradox of dumbest generation to awareness Seneca had of Roman society immersed in technological conveniences losing touch with wisdom and tradition, only to be secondarily critiqued by Quintillian. (30) But the enlightenment hasnフ happened. . . . The mental equipment of the young falls short of their media, money, e-gadgets, and career plans.

6 2 1 (+) [-3+]mCQK bauerlein-dumbest_generation (113) 20140607e 0 0+ progress/2014/05/notes_for_bauerlein-dumbest_generation.html
Curious how putative philosophers of computing fare in such tests deemed to constitute digital literacy by large commercial testing corporation, comparing to the skills assessment instrument I used for the midterm exam in my last course on digital communications networks. (113)

6 2 1 (+) [-4+]mCQK bauerlein-dumbest_generation (234) 20140613 0 -3+ progress/2014/05/notes_for_bauerlein-dumbest_generation.html
Compare culture hooked on consumer goods to era Seneca criticized, then layer on Quintillian critique of Seneca and call for more serious style. (234) The Dumbest Generation cares little for history books, civic principles, foreign affairs, comparative religions, and serious media and art, and it knows less. Careening through their formative years, they donフ catch the knowledge bug, and tradition might as well be a foreign word. Other things monopolize their attention the allure of screens, peer absorption, career goals.

6 2 1 (+) [-4+]mCQK black-ibm_and_the_holocaust (398) 20140712 0 -3+ progress/2013/10/notes_for_black-ibm_and_the_holocaust.html
Connect thinking of US to ancient use by Julius Caesar and Marcus Antonius. (398) As early as December 1943, the United States government concluded that Hitlerピ Holleriths were strategic machines to save not destroy. Dehomagピ equipment held the keys to a smooth military occupation of Germany and the other Axis territories.
(399) As late as 1945,
der Fuhrer himself had issued a decree placing a new emphasis on punch card technology for registering and tracking all Germans needed for the defense of the Reich.

6 2 1 (+) [-4+]mCQK black-ibm_and_the_holocaust (398) 20140712a 0 -2+ progress/2013/10/notes_for_black-ibm_and_the_holocaust.html
Computing lists becomes desire of technological unconscious in defense of retaining rather than Hayles switching to nonconscious. (398) As early as December 1943, the United States government concluded that Hitlerピ Holleriths were strategic machines to save not destroy. Dehomagピ equipment held the keys to a smooth military occupation of Germany and the other Axis territories.

6 2 1 (+) [-4+]mCQK black-ibm_and_the_holocaust (422) 20140712i 0 -6+ progress/2013/10/notes_for_black-ibm_and_the_holocaust.html
IBM has so far escaped even debate, so injecting into technology education helps ensure its corporate story not lost; history of computing, software, even programming could probe this primordial technological soup. (422) But it was a far different story for IBM. It seemed to be immune from the debate itself. . . . Questions about Hitlerピ Holleriths were never even raised.

6 2 1 (+) [-4+]mCQK bogost-persuasive_games (292) 20130113 0 -3+ progress/2012/12/notes_for_bogost-persuasive_games.html
Interesting to think of target markets for future games as the elderly, who do not need to learn how to live well but genuinely wish to be entertained. (292) The absence of procedural rhetorics in religious games recalls the distinction between schooling and education. Just as schooling affirms the values of existing institutions rather than challenging old ideas with new ones, ethical and religious simulations affirm the existence of moral predicament and fiath as structures in the world. But they do little to disrupt existing moral and belief systems or to represent the function of desirable (or undesirable) systems rather than affirmations of the mere reality of morality and faith as concepts in the world.

6 2 1 (+) [-6+]mCQK boltanski_chiapello-new_spirit_of_capitalism (520) 20140227j 0 -3+ progress/2014/01/notes_for_boltanski_chiapello-new_spirit_of_capitalism.html
City as metaphysical political entity and symptom: on lifecycle of cities think of Sim City games providing philosophical finesse of simulation tests in virtual realities. (520) Cities are metaphysical political entities which, by the same token as cultures or languages, have a historical existence, and can therefore be situated in time and space. Accordingly, it is relevant to grasp them in their life-span, their evolution, from the moment of their formation, via their entrenchment in mechanisms, objects and law, up to their recession. At a given historical moment, a form of existence is identified and generalized in such a way as to serve as a support from a definition of the common good and a criterion for judgments about the value of beings, according to the contribution they make to the good of all thus conceived.

6 2 1 (+) [-4+]mCQK bork-digital_communications_midterm_review (4 layers diagra 20130218 0 0+ progress/2006/02/notes_for_bork-digital_communications_midterm_review.html
Originally titled ECT 386 - Midterm Exam Topics from February 2006 the courses subduct into continuous seminar presentations as part of overall autochthonous machine generated dissertation plan.

6 2 1 (+) [-4+]mCQK bork-journal 19951104 19951104 0 -49+ journal_1995.html
951104.1059 Two days ago I made a note, in the midst (background being) of an older schema of that damn Games Theory computer project, saying 951102 TG put on hold because I know it s a Gizmo. In parenthesis (a distinctly marked sub-region), always a technical component. ADUMBRATION (lottery of possible consequent main connective forms) of the following:

Some years ago I myself made some observations on this aspect of [nitrous oxide] intoxication, and reported them in print. One conclusion was forced upon my mind at that time, and my impression of its truth has ever since remained unshaken. It is that our normal waking consciousness, rational consciousness as we call it, is but one special type of consciousness, whilst all about it, parted from it by the filmiest of screens, there lie potential forms of consciousness entirely different. We may go through life without suspecting their existence; but apply the requisite stimulus, and at a touch they are there in all their completeness, definite types of mentality which probably somewhere have their field of application and adaptation. No account of the universe in its totality can be final which leaves these other forms of consciousness quite disregarded. (378-379)

(379) Not only do they, as contrasted species, belong to one and the same genus, but one of the species, the nobler and better one, is itself the genus, and so soaks up and absorbs its opposite into itself. .. Those who have ears to hear, let them hear; to me the living sense of its reality only comes in the artifical mystic state of mind.

While James continues with a footnote concerning Hegel s Pooker of Aufgabe, I am drawn to Nietzsche s advice for the would-be psychologist, in Twilight of the Idols:

(7) Moral for psychologists. Not to go in for backstairs psychology. Never to observe in order to observe! That gives a false perspective, leads to squinting and something forced and exaggerated. Experience as the wish to experience does not succeed. One must not eye oneself while having an experience; else the eye becomes an evil eye.

At the moment Heidegger mentions the draft or D&G describe the philosophical experience as a journey from which we return (ideally) with bloodshot eyes that is, from the moment such a time is predicated with terms denoting abnormal states are we not already giving form to [PHI] by enclosing it in words? As soon as this is admitted, then we cannot avoid the possibility of formulating the relationship of any teliing (record) [to] its material being, which is to say, the means of production become the very rut along which our [scenting machinery] catches and dutifully traces the withdrawal of Being.

[quote from v.4: 961103.1055:(second time, after a crash) about dcc-ambiguity?]

In all of these travelogues I seem to record the same trip: moving from some position within the possible UA s of finite Dasein, probabalistically (as I imagine it to be) ADEQuate to the aim of generating a realistic VISION from that TSE .. Finite Dasein, with its limitations of language-acquisition and use/retention .. Virtuality of all those songs I ve tried to give to my friends, and my disappointment at their failure to receive them in joyous enthusiaism close upon pathesis/cataonic trance as I wish them to hear all the details that so tickle my soul now, having experienced it many times already .. Just like when somebody starts talking, and you go to add your significant part of the develped myth, but they are still talking and hence your pinnacular proposition is buried .. Can t repeat it, already having said it at the perfect moment; repetitions just aren t that special or entertaining to the others, in part because you know that you are repeating, and the initial impact of free-associated attunement is lost .. Do I write this because, once, a certain professor offended me by interrupting my reading?

951104.1140 because I have not forsaken purpose, [this] is not designer philosophy, made for your pleasurable consumption; and because I have intentionally allowed plenty of interstitial holes by means of actual doors within/(..)(..)(..) [ PHI - dot-dot - PHI-prime ] the words/wffs/Pookers, [it] is not phallologocentric though certainly (of/with/(..) words). I have not without suffering withheld as well the most felicitous expression of these conditions (beginning sentences with because intentiono-symptomatically, if I can simultaneously make an error and permit myself its passage/execution); what it really ~~represents is that I would be just coming out of the draft a little too far (it s like a shower; it s like a moving vehicle; its like being able to reach your cup of coffee or having to spend time deciding whether to go for it).

So the text can be oppressive to the uninitiated; traditionally, we philosophers have not cared just how hard our books are to read jokes have even been perpetrated sliding off the slick, hard-to-grasp surface of this body, this thought-ball or thought-wave passing through the dimension, through the logical substructure of the natural language frame of the text proper (that is, the fantasized completed perfect in every way significant to the philosopher: logically sound (first concern) and valid (second but also first concern); aesthetically pleasing, functionally adequate, non-dysfunctionally humorous, over-filled (to offer those happy interstial crossings their possibility, for the trans-initiate) (these are all secondary concerns)

STOP.

I catch myself making such distinctions, plotting out hierarchies and strong orderings when all that I have named and treated (onomaz-AORIST) as separate recognizes disjointedly what we customarily gather together into one, and then dispersed again into these very differentiated modalities call thinking . The gathering-to-heart, the thancing-thinking, which necessarily (usefully, (Greek)1) involves (but is preceded by) its own (propre translated/said-in LAMBDA(A-E))2 letting-lie-to. I come full-circle, having reached at the end of my analysis of Nietzsche along the simultaneous perhaps parallel but definitely discreet tracks (when you so identify/name them as molar entities, for the sake of gathering the All into Two) of (genetic-possessive) Heidegger & Deleuze the Same thought unthought in all three.

6 2 1 (+) [-4+]mCQK bork-journal 19951126 19951126 0 -186+ journal_1995.html
We are trying to understand just what it would mean for a member of a bourgeosie class to begin to think with its species-being in view prior to species-being becoming self-conscious, of course. For we know that consciousness arises from the need to communicate between men. AND ____. ~Hegel hysteresis?

/ \

Not-reading Hegel No Hegel

planned to read. ever noted.

You can understand why Eco is so popular right now, if you have ever read his last fictional work, Foucault s Pendulum. For now, as an advocate of electronic media, he has successfully overcome the nihilistic conclusions of that work. And all of us who have some private fantasy-production can breathe easier knowing that we will not have to pay a lot of money to see our dream realized in a published form cheaply accessible to our desired audience of readers. [part of capitalist-PHI transferring into REV-PHI]?

Precisely because Marx lays-out (or lets-lay as it has always been hitherto in the history of Western thinking) language as the primordial (first and exemplary) fetish may we reason further that _____. ~$ hysteresis?

/ \

Our penultimate No need ever noted.

cry (communication)

is asking for material support.

when the division of labor manifests itself symptomatically in the very structure of the production (artistic work, music, dance-step, metonomy & metaphors, etc.). Marx, Zizek reminds us, invented the symptom, too.

.. Lacan pointed out that it was Marx who invented the symptom: Marx s great achievement was to demonstrate how all phenomena which appear to everyday bourgeois consciousness as simple deviations, contingent deformations and degenerations of the normal functioning of society (economic crises, wars, and so on), and as such abolishable through amelioration of the system, are necessary products of the system itself the points at which the truth , the immanent antagonistic character of the system, erupts. To identify with a symptom means to recognize in the excesses , in the disruptions of the normal way of things, the key offering us access to its true functioning. This is similar to Freud s view that the keys to the functioning of the human mind were dreams, slips of the tongue, and similar abnormal phenomena.

-Slajov i ek, The Sublime Object of Ideology, p.128.

The layperson may ask, does this fetishism result from capitalist society, or does it reverberate with the ring to the tune of a more essential aspect of human nature? Given what Marx has said regarding spirit and language , it seems to encompass both sides of the disjunction (coin). As if, at the level of matter, the time-place-energylevel where it becomes and is language, we can find a furrow in which, like primitives in a canoe, potential new divinities emerge from the trail (wake) of the master-narrative (that which can be symbolized, that is!), as it emerges from the undifferentiated forest. Sort of like an and but connective, and analyzed in the manner of Zizek s approach regarding that sort of inclusive disjunction-conjunction explaining the left side with the right.

If our impartial spectator is to appreciate the fine logic of the fetish, the validity of which for capitalist society at least that is, a clear and distinct certainty of value judgment in the mind of the bourgeois reader seems to be assured, then sHe hirself becomes the standard the being upon which we ought to guide our finite, imperfect, time-energy-space--dependent decision.

BG police fear LSD use is climbing

..they operate upon, and possibly affect, the relative-measure-of-production (productivity) of a first-order worker (proletariat). These are usually among the principle agents of anti-production all the doctors, lawyers, priests, police, and automobile mechanics who ensure their own material sustinence by participating according the commonly-accepted rules of commodity/capital/symbolic-exchange. They either prefer to be commanded to ply their trade, or are too castrated to attempt to change their lives.

951126.0342 Do prepositions always imply passive voice? Asks another self in another time passing-with this own present state. Elsewhere I considered the evidence [why this word May 2, 1996] yielded by a question ending with a preposition.

951126.0345 When the system level = the program level then if there is still any hysteresis of symbolization that will trip up the running of the program, then there is a place for NT to enter the intersticies. A confused version of what I thought had been clear, imagined while lying in bed this morning. Of an Apple version running in a Turbo C++, giving the input to an actual Apple system, knowing when various I/O occurs there (the bell rings, for instance).

Why not say, When =[the system level=the program level] then (If there is still any hysteresis of symbolization, which could be presented by presenting a case history, or something else that the recipient would understand as an illustration of symbolization s hysteresis, that will trip up the running of the program, such as the analytic encounter, when the analyst slips, falls into uncontrolled transference with the analysand, then there is a place for NT to enter); and is this not simply a definition, in an peculiar, foreign tongue, of our beloved interstic(..) ? I note that I can t grasp/place the correct spelling of the singular noun; maybe it is by necessity plural, like certain Latin words-concepts. But besides that, deep in my memory something calls, the distant recollection of my Special Interest project on photography, or wherever it was that I studied intersticies in a completely different context (ground). Interstitial ions; maybe in the class where I did the experiment of the effect of dumping photo chemicals into your garden..[960502.0101]

An economy of scarcity could be a symptom in the market of the unquestionable assumption that human beings, when presented with the option of having a surplus of some means-of-life (food, sex, drugs, gasoline), will inevitably indulge, if not over-indulge, in their (food, easy sex, drugs, gasoline) associated pleasures (partying, orgying, binging, speeding). Consequently, to maintain a level of demand that does not creep too far towards the various slippery slopes of unpredictable, chaotic potentials [asymptotic registers of near-turning catastrophic equations, for instance], it is useful (and treated as a prima facie necessity, as if spoken homologously in/by our friend from Heidegger&Parmenides, ) to either prohibit/regulate [it] or make it the object of a foreign interest, so that it might be regulated, and also the other agents of desire might become the object of group frustrated-becoming-reactive&reactive-desiring-production (scapegoat figure; fantasy representation of facsization; conceptual Jew) fascization.

N.T. might reprogram a system s value-calculating computer (IC-system) to return a surplus rather than a deficit when a poll (gathering-together under a number or other sort of qualified quantifier) is made to determine a subsequent move in the Game of Life (energy expenditure for ennervation of the musculature for duration t n, take for instance).

Can you (I, the unconsicous reader of my writing) symbolize everything in that last paragraph into/with your logical system (language)? Second question: Does your logical system-language constitute an operating system? For if so, then you might be infringing upon the copyright agreement for the software you own like private property, like a book .. interesting that some intangible property of the sort carrying as its protector and validator a copyright mark of some sort { .. V .. V .. }, as D&G would signify in their pseudo-code meta-logic (trans-semantic) [of which one I should pick as a gnomic formula and title of a concept in my system, if I intend to codify one!], always generates an accompanying material phenomenon (instantiation). Insofar as the computer software is concerned, that would constitute (comparer de) ______ .

Not to digress if your logical system can be translated into (and hence handled by) AL, then all of the text written in [it] can become T3 wffs. And when that has happened, they belong to VRPRESS through hir mixing of hir labor with [it] in hir reading (study) of your text. Your US- (unconscious science s language; PHI-LAMBDA) copyrighted signifier-symbols of AL, just like Aristotle ; that may be, the rigid designator or constant pointer that leads the other to you (your mouth, your hypertext, your database) itself partakes in its essential enunciation/lying-before-to-be-as-such of my intangible-property building blocks. [can t find old Aquinas paper, but hit upon the other reference by chance].

NT (or PPA) begins when all hypertext link styles changed/were changed to nothing. For at that moment you (who has composed this text) no longer see immediately (perspective of Gaze, noein) your past system-level instructions (logoi technes = words of the technqiue = jargon = horsemanship terminology) for good-travelling-through of the production (poiesis); the stepping stones, blocks, and components you employed hastily, perhaps, in the original arrangement (constitution, but reserve this more for static Book Form philosophical production) of (..). You have to know where to point with the pointer-arrow, which for the sake of the argument draws your noein closer to the simulated legein of the user who is not the creator of the text, but is not floundering in incomprehension (with a barbarous soul), either. Putting yourself in the position of the questioner expecting an answer of sort . It was all there in the non-censored (and hence closer to fantasy, imagined, the thought itself) recording SYMPOSIA. cf. Wilson s neosymbologism

[a thinker communing with hir soul X kinds of writings including letters]

(That is, the cross operation that produces ideas like positive feedback)

[Lat. confer, compare] is translation/expansion of cf.

versus The true meaning of the where PHI-PRIME includes some T3 wff PSI followed by . (period followed by parenthesis), something much easier to think about as a computer than as a human. To a computer program all that must be queried is whether the character string in question has for its penultimate byte $ and for its ultimate byte, $ . But we must be careful not to confuse such a sequence with a typical low-order & high-order byte pair as commonly used by machine languages limited to n-bit addresses. n = _____ . Elsewhere I ve made intimations of what we re going to do with the byte..

..this is a test, and I m going to cut you down to size ..

Without digressing or cleaning up (felicitizing, sanitizing, removing the smut) the text, just letting things lie as I first typed them in (inscribed, if you will allow such a strange, new use of the word), it seems the most just procedure to include the relevant audio patch (also a handed digital stream, a clear & distinct virtuality for certain viewers-listeners) from Negativland s Willsaphone Stupid Show, volume x:

..the true .. [sic] see-bee-sate..

[Lat. =so,thus] is translation/expansion of sic or Sc. , often inserted in a quoted passage to indicate that, in spite of apparent error, it is quoted correctly.

Ask the question, What is the antecedent of it ? and you/we/I (..) instantly projected into the realm (possible world; virtuality, with appropriate hypertext link) of an old philosophical question regarding manifestations of one language within the context (better, arounding-text) of another language. Under the regime of the written word (script; linear character Pooker [string]; ______ ), it becomes all too easy to use sic to capture spoken virtualities, even and especially the ones that may transcend the range (realm, again) of visual representation. That is, no proper (in the French sense propre, too, of its own ) spelling exists for what has long been in usage by the speakers, yet we say it anyway, with the aide of this little trick [maybe like Lacan s tilde bar]. Just think about the words you and your family shared as an almost private language when you were a child. ______ (pause)

1. 951126.0548 first bead that I pick is this thought: going to Dunninger s galaxy-of-meaning that s presently part of a fuzzy patch of the PNL field, just now becoming (like Marx s consicousness) a title to a book. But that s just part of the scene where Callen opens up to a certain page in DUNNINGER S COMPLETE ENCYCLOPEDIA OF MAGIC; but it would be improper (making a VSP) to use that font to write the name of the book I m talking about. For it has nothing to do with New Age philosophy or any other fantasy-production finding itself fashionably reflected in the phenomenological instance of such a font. Instead, I was filling out the virtuality depicted, in part, by the caption A New Kind of Puppet Stage .

2. 951126.0612 the switch, the switch, .. hamartano, I miss. COUNTER-VOICE: But we have digressed from our original intent, spelt out in the contract of the shared history of the reading. We were set upon symbolizing, into our logick-AL language, the universalized Pooker of the ordinary expression PHI. It s about time.. So it was .. En fin de compe.. When I was a teenage whore.. ___________________________________

Q: Don t you mean the matter of the signifier?

\ \ \ \ \ \ \ \

do you not, o interpretor, make a mistake speaking-in-such-a-way?

\ \ \ \

(..) OMEGA-(..) AMAPTANEI(..)OMOLOGO(..)

/ / / /

[]T []F Mx M x boldface=x in some wff containing subscripted =x that you can t see in its natural printed form due to the limitations of your viewing apparatus (which now includes not only the silicon in your glasses but the labor of the writing of the program).

..says the voice of reason, thinking that if we don t keep track (account for) of where we ve been when we were making our recordings, then we may be liable (guilty-of-believing-what-we-knew-we-were-wishing-to-happen-(..)-us) to think that we are being haunted by the ghosts of all of our dead fathers. In doing so, however, are we falling into the trap of enframing, or the slippery slope towards one of the neuroses, transference or narcissistic?

[]T=Yes [F]=No

Yes = True No = Falise

Perfect place

For a game theory matrix?

Q: But of what parameters (dimensions)?

Caption that s not needed: The surprised dinner-guest(s) finds an empty room, with either Jim s shortwave radio (Negativland version) or VR(PHI). And that s hard to express, to show quality of the existential quantifier that says every time at least at these one, but possibly more, .. Only a Logician would understand immediately that is, without first taking a logic course the soundness of my concluding that I made some errors in the calculation of the final grades, only because I myself did not understand what the students were trying to tell me they had learned about logic.

3. Getting the large machine working, to run Windows 3.1 with a TCPIP stack so that the finish product might be viewed and tested. This may entail sending the motherboard to Jack, and buying a cheap substitute that I ll later take to Josh.

REM THE FIRST LOOSE BEAD IS GETTING A MB TODAY

REM THE STATIONARY BEAD HAD BEEN CALLEN WALKING IN ON THE JOKE

REM ANOTHER LOOSE BEAD SHOULD BE GETTING INSTRUCTIONS FOR AMP

REM AND ANOTHER, FOR BUILDING A WORKING VIDEO SWITCH OFF APPLE

&something that sniffs the speaker on the 8088 like Maxwell s Demon (jumping to Mathcad or Spice program that I erased)..

And/orsomething that takes the phone jack to another location within n processor-feet (how far the thing must travel to get there, laying down its phone wire)..

And/orsomething from the Apple joining with it, alleaviating the designer of the tricky interface using magnets, for instance, to align the beasts..

And/or (my paraphrase of the ET textbook (I.C.))

and/orFreud s Uncanny as a Beefsteak sitting at the other KYBD

SO I have to get a Trading Post News. [] can you have an invisible door?

Can you have an invisible door? Well, by virtue of the Quickmark feature, you can certainly communicate the gist of having one.

3.1 (you make a toolbar button to activate a macro that goes-to the Quickmark, or sets it where you are if it does not already exist in this document)

3.2 other desires include hunger, name82, driving the car, Paul, Buffy,

To recapitulate, summarize, cause you to gather together into one (noein) the all (or is it the many ?):

1. PHI

2. PHI

3. PSI

3.1 (you make a toolbar..

3.2 other desires include= = comparer de = devolve-(..)

Which, cleary, should be written at the same time (tout .. coup) as

---

could, would in some cases, is likely to be, most probably

951126.0548 first bead that I pick is this thought: going to Dunninger s galaxy-of-meaning that s presently part of a fuzzy patch of the PNL field, just now becoming (like Marx s consicousness) a title to a book.

6 2 1 (+) [-4+]mCQK bork-journal 19960404 19960404 0 -25+ journal_1996.html
Looking back on this again reading Philippics, I notice the imperitos have been seduced by the unlimited frontier, not (as I had assumed at first, not reading or thinking very carefully about it) Antonius! I should, if I ever have the time, work with John Cougar Mellancamp (or at least watch the videos). Or wait a minute, maybe itピ them (Saxa and Cafo) after all, but then whatピ all this business about mimes? I should write a question out to the Classics List.. Perhaps Cicero really did despise actors and playrights? (Goto 13.11)

(26) [not really for tense logic] quoad ei ex senatus consulto successum sit invites me to ruminate upon (after going back and gathering-to-heart what I must confess at the moment is not at all ready-at-hand before me to be allowed to let lie..) the usage by Cicero of consul and its related verb as a Heideggerian フhinking word in both senses--as a word to designate what calls for thinking, and also as that which, in its unthought profundity, conceals for its user what calls for thinking from being thought. We presume, from being thought once and for all, not being thought-of at the time of its utterance, its creation, its commencement; that, of course, is merely our prejudice. Imagine if Cicero could go back over all the times he used it, and reflect upon the argument Iノ putting forward for your consideration.. Since this comes from Cicero quoting what he wants to be the very speech of the State, thus establishing it at the same time (but weプe been warned not to tarry on this level of how to do things with words), we can presume that it is the furthest from Ciceroピ private, uncensored, possibly non-feliticiously composed private self-quoting. Given that presumption, we tend to assume that Cicero would not have been thinking such a thought as we ponder (..) him. Unthought(..)Roman

-a point in a demonstration of why itピ hard, and dangerous, to work in this Draft, for each epiphenomenal フrace, when treated as a soliton wave, requires an elaboration (in order to be able to lie before us like/as this text) that would fill volumes if not pictures, diagrams, hypertext, or sound were included in the presentation. Thus unthought(..)Roman crosses through ASピ case study as the temporary vision (fantasy) of a program-running(..)Cicero!

6 2 1 (+) [-4+]mCQK bork-journal 20010211 20010211 10 -14+ journal_2001.html
The point is that the form of representation I am thinking about with respect to how I can present to myself these notes in order to develop an outline, rough draft and abstract requires resources beyond my own by at least an order of magnitude. This is what I mean by "impossible." Perhaps "significantly improbable" is a better term. Is the resolution of this question sufficient reason to take a course in statistics? That seems to be the overall rationale for undertaking the MIT. I see a three-dimensional projection of these writings. Thatピ kind of stupid, but when bound initially by the "Book Form" you have to hold on to it in order to let go of it! That fact is another reason why it seems important to research not just the putative origins of electronic computing technology, but that evidence of ancient attempts to perform a similar analysis upon previous "states of the art."

Today it seems ridiculous to take evidence from the ancient and the modern worlds together in the study of computing. In fact one major metaphysical assumption in some schools of computer ethics is that modern (electronic) computing technologies have generated a new, unique ethical field. At some point the distance between our "state of the art" and the situation encountered in ancient Greece and Rome will be much smaller than that between some future state and the present. The exercise underway will prepare us for that future study when the two epochs are taken together.

6 2 1 (+) [-3+]mCQK bork-journal 20010604 20010604 0 -32+ journal_2001.html
In addition to obvious and explicit lessons in the philosophy of computing present in Platoピ Phaedrus, there are many more implicit analogies that we can draw between this ancient critique of writing and our modern forms of "electric writing." Previously I have emphasized the obvious in order to defend against the complaint that I am merely drawing clever analogies between otherwise unnaturally related phenomena. However, in the broader scope of this project we must consider the full extent of the ancient Greek critique if we are going to maximize the benefit for practical undertakings in electronic computing technology from its study. For instance, the faults of writing, based on external marks rather than internal to the soul, are similar to the problems of "read only memory." There are actually at least two problems I can think about right now. First, this medium is unchangeable and therefore finite, a problem that becomes especially acute when reaching full capacity, such as with the number of pages in a book or the number of books you can carry, or filling up a recordable compact disc. Plato focuses on writingピ failure to automatically generate knowledge (comprehension and understanding). Recall the sketch of a scientific rhetoric in which every word is known to be either clear or ambiguous to a particular audience, and from this understanding conviction can be careful developed along a path of probability based on fact, logic and the meaning of words. How could this mechanism operate from a book? Arenフ the information-capacity requirements far beyond anything possible for the fourth century B.C.? Elsewhere in Phaedrus, Socrates admits that to give a full account of any subject based on the method he has proposed, including the self-reflexive example of explaining the method itself, is virtually impossible, or at least not fitting for their time requirements. So much more so today, when we begin to consider state-of-the-art computer technology! Second, these media (read-only-memories) are static and can only be final objects in computing activity and not also temporary, redefinable workspaces in the manner of a wax tablet or the imagination. It is the dynamism of word processing that Michael Heim credits for giving "electric writing" an essential difference from the book form of written work. This is much in the same way as Socrates in Platoピ Phaedrus attributes liveliness to speech (the "living writing upon the soul"), and by an extension potentially in the particular kind of writing he recommends. When you compare this differentiation between "write once, read-only" and "rewritable" types of memory, whether in the form of written text or electronic circuitry, you can perceive in the periphery an essential relationship to the underlying design that grants the latter its reprogrammability. A rewritable medium that cannot be changed by the user is as good as static. There are many reasons the user may not be able to play with that memory, one of which is due to a "closed-source" policy of production and presentation. It is like the "free speech" issue, which is not to be constantly exercised except in principle. So perhaps the argument can be made that Platoピ Phaedrus recommends "open source" in its philosophy of computing.

This conclusion can be reached through other courses of argumentation. Earlier I based the TECH 302 paper on the notion that certain types of technology are essentially alienating and inevitably produce factions of disgruntled practitioners (including hackers, crackers, pirates and cyberpunks). But this argument is derivative of and not really separate from what I just developed concerning the difference between static and dynamic computing. Roman technology arose from the exploitation of writing in the manner exactly opposite of what Socrates recommends in Platoピ Phaedrus. The evils of technological thinking Seneca addresses in Letter #90, apart from those originating from basic human greed and pettiness, are rooted in the deficiencies of the type of intelligence supporting technological thinking. That type of intelligence grew from reading written texts instead of learning through the dialectical method, and exactly at the interface where scientific thinking is codified the production scheme most susceptible to unscientific management is employed. Ironically, we seem to be repeating this today as personal and corporate IT systems consist of higher and higher degrees of integration of increasingly complex modules, which due to their individual complexity are unknown, often third-party. Encapsulation is good, Brooks finally came to agree. There is no other way to manage computing (information, or any other) technology.

6 2 1 (+) [-4+]mCQK bork-journal 20020427 20020427 0 -3+ journal_2002.html
Two other important fragments of ancient computing philosophy are Socrates saying
[]
in Xenophonピ Apology, and
[]
in Platoピ Phaedrus. They relate to two contemporary problems faced by decision makers, one practical (or [ethical]) and the other moral (or [second-order]). The first is the "buy versus build" question, and the second concerns who to trust when estimating how well the system will work.

6 2 1 (+) [-4+]mCQK bork-journal 20040320 20040320 8 -4+ journal_2004.html
Problems in the philosophy of computing in antiquity surrounded the capacity of a human being to compute, and writing was seen as an improvement and transformation of exclusively mnemonic technologies. The dream was a hyperscope-like hypertext, to lean on current idiom. We are confronted by different problems today though the goal is largely the same, just couched in different terms. Discovering Schreibstube is "writing chamber" connects it to not only Heimピ VR but Aristophanes thinkery.

6 2 1 (+) [-4+]mCQK bork-journal 20051026 TAPOC_20051026 0 -14+ journal_2005.html
Return to Platoピ Phaedrus (also Xenophon) when Socrates poses what I call the build versus buy question. We could read the Greek aloud. This goes with what I was reading last year on the sixth, recalling that science comes from the Latin scientia, which is a translation of the Greek episteme. It is the latter, from which the former was based, that Socrates names in 271A through 271C when proposing how to do anything by rules of art. This is not quite it, since there will be a division between art and science. Socrates says something about something being as scientific as possible; I need to find the correct text. The build versus buy question arises in 274C.

SOCRATES: I can tell something I have heard of the ancients; but whether it is true, they only know. But if we ourselves should find it out, should we care any longer for human opinions?

While the history and philosophy of science can proceed through these words, Phaedrus response to Socrates has been the subject of past musings. But this we really must read in Greek, to recall what was previously thought, concealed as it is by the English translation A ridiculous question! Geloion erou, literally, you are asking ridiculously. This represents a turn in the conversation, similar to Phaedrus retreat from the example of the epitaph whose sentences can be randomized.

6 2 1 (+) [-4+]mCQK bork-journal 20051211 20051211 0 -14+ journal_2005.html
Suggest that DCNs (digital communication networks) divide among many things, notably between those with dynamic routing and static networks like the TCP/IP networks on the on hand, and automobiles and the innards of other special-purpose computer systems on the other hard. [It is in these instances that a computer system is not necessary to support a DCN. Here we fall back to the laws of physics. We will take it for granted that TCP/IP networks presuppose static networks in the sense that they exist as physical and static run time integrations of things that are not in themselves computers.] As a laboratory experimenter you have to get both things right, the network administration tasks and physical network layout. The layered network model depicts this dual nature of DCN. The focus of this course will be TCP/IP DCN, although there are other kinds. Here we could take some time to talk about the history of DCNs. Discuss whatピ in packets. Demonstrate how to inspect actual packets on the lab system. Consider evaluating DCN behavior on general purpose computers versus dedicated routers. Alternate between a GNU/Linux router and a Cisco router to perform many of the same exercises. Should the same general purpose computer be used to generate activity on the network? The routers can ping but it is not a file server or virtual machine.

6 2 1 (+) [-4+]mCQK bork-journal 20060104 20060104 0 -5+ journal_2006.html
Imagine trying to correlate length of DCN network cable and throughput by having teams work in pairs to produce a controlled environment versus having all teams try to transfer files from one host. Make sure the hard drive is not a factor limiting network load. NFS and sftp use IP addresses. Contemplate having them install a second network card in each machine or otherwise stowing the default network connection. Consider using available crossover cables rather than randomly loading network equipment.

6 2 1 (+) [-4+]mCQK bork-journal 20061106 20061106 1 -2+ journal_2006.html
Todayピ reading from the Annals is Bernadette Longoピ Edmund Berkeley, computers, and modern methods of thinking. Consider the development of binary arithmetic led by Stibitz experimenting with electromechanical telephone relays a paradigm shift.

6 2 1 (+) [-4+]mCQK bork-journal 20061124 TAPOC_20061124 0 -14+ journal_2006.html
Was there ever a time vase painting lost to writing as the principal means of computing in antiquity, similar to the ascendancy of binary electronic computers over printed materials? And types of writing competing for prominence like types of software, as in FOSS versus not-FOSS? As Cortada points out, "[h]istorians have yet to define a typology for software, along with the historical questions that need to be answered. .. even the definition of software is subject to controversy" (2002). While this may pertain to the history of computing, it is the philosophy of computing that judges the merits of competing technologies. How can there be a history of the philosophy of computing when the philosophy of computing has not yet emerged as a distinct part of philosophy? Only if the philosophy of computing has been there all along, hidden in primary sources long categorized among other parts of philosophy, including ancient philosophy. Does it make sense to compare written texts to software, and human readers to computing machinery as hardware? If so, then Shustekピ statement that "we have gone from cave painting to impressionism in one lifetime" is inaccurate (2006), for he begins from the definition of computing as essentially the activity of machines. Yet both the combination of written texts and human readers, and software and hardware, as defined by Maner, in the context of their intended operation in a system producing computing activity, depend upon representations, what Socrates in Platoピ Phaedrus calls "external characters which are not part of themselves" (275A). By decree the Annals focus on the stored-program principle, as Ceruzzi notes, whose dissertation was in the history of computing. On account of the stored-program principle, "[a] computer is not a single machine but one of an infinite number of machines, depending on the software written for it," thus elevating it in importance above household appliances and even the automobile as the defining technology of the 20th century (2001).

6 2 1 (+) [-4+]mCQK bork-journal 20061203 TAPOC_20061203 0 -16+ journal_2006.html
The argument is often made that the ancients, even the clever ones like Socrates, lacked understanding of key concepts and therefore their teachings are irrelevant for the consideration of contemporary topics like the philosophy of computing and technology. However, it seems clear that when it comes to things like the common "build versus buy versus do without" question facing technology planners, producers, and consumers alike, the wisdom of Socrates can be judged if not adopted. Part of the cost of evalution is securing sufficient knowledge of technological ontologies in order to make informed decisions, and even Socrates sensed this. Or am I inferring too much from one of my favorite quotations from Xenophon? Why must I hold on to ancient writings? There is another quote from Socrates, this time in Platoピ Phaedrus, that mediates that question.

Here is Hans Jonas pondering the revolutionary nature of the invention of electricity and the even more revolutionary nature of electronics, a paradigm shift:

The revolution consisted in the passage from electrical to electronic technology which signifies a new level of abstraction in means and ends. It is the difference between power and communication engineering. Its object, the most impalpable of all, is information. Cognitive instruments had been known before -- sextant, compass, clock, telescope, microscope, thermometer, all of them for information and not for work. At one time, they were called "philosophical" or "metaphysical" instruments. By the same general criterion, amusing as it may seem, the new electronic information devices, too, could be classed as "philosophical instruments." But those earlier cognitive devices, except the clock, were inert and passive, not generating information actively, as the new instrumentalities do. ("Toward a Philosophy of Technology", 1979)

Jonas looks beyond communication technology to biological technology affecting humans themselves, and suggests philosophy stoop to use the means of advertisers to communicate, resorting to myth because it is well known that other people will not be swayed by lengthy theoretical discussions. So it was not long ago that computers were people, and a digital examination involved sticking a finger somewhere.

6 2 1 (+) [-3+]mCQK bork-journal 20070120 20070120 4 -13+ journal_2007.html

A good Wired visions of the future for April depicts a checkbox for directing taxes to creation of FOSS tax preparation software and even if it is not published it can be presented as a fake page of Wired as instructed by Gene Poor for CAP as example of direct democracy. Imagine a future IBM commercial in which the female director asks how they missed the opportunity for the contract to develop the FOSS tax preparation application, among others, in a future determined by profitable government FOSS contracts, going back in time to when the same woman was suggesting giving kids the penguin toys. Both narrators end with the sales pitch for philosophers of computing. But is there a supply to meet this demand? Better still, in the future scenario the director is admonishing some philosophers while a server offers them some hemlock. The philosophers reflect while others accomplish, in this case the worldwide developer community (for example, Sourceforge) FOSS tax preparation software (which a quick search on Sourceforge reveals the gap, gnuTaxes having been last updated in 2000). It probably would not be published because it focuses on [a single text thread] and a similar thing was done last year. A new ethic is be part of the long tail of something. Sometimes the most recent.

[unsure the name of missing image now deleted; there may have been two images]

Practice source code management by cleaning up progress before putting it into Subversion. This was done to get the [above picture, diagram, image above]. The practical example correlate to tax preparation software for philosophers is an external, life long evolving repository for their work. The important point besides FOSS issues is that it is not memorized by [the human user, mind, person] but rather memorized by [machinery, books, external marks].

6 2 1 (+) [-4+]mCQK bork-journal 20080121 TAPOC_20080121 0 -13+ journal_2008.html
We need nothing less than a new paradigm of computing that may rescue the task of thinking from oblivion. Let us develop this thesis by examining the limits of computation. The putative limits are found at the state of the art, the boundaries of scholarship and production. The effective limits are much easier to discern; however, for that very reason, we fail to attend to them. Yet their symptoms are all around us. Two obvious symptoms, which were the subject of last yearピ conference, are the free, open source software and open access movements. They exist as reactions to obsolete practical, moral, and epistemological approaches to the advancement of computing technologies based on economies of scarcity and zero-sum antagonisms between agents and organizations. (Many eyes; IEEE hoarding Annals.) The second manifestation of a defunct paradigm is the obsession with deadlines, and neglect of what I will call ピhortlines in both real-time and general-purpose programming. For example, timing circuits that must obey minimum intervals, and search engines that return more data than any user can assimilate. What is the underlying defect? An educational system that tracks the market. The final symptom suggesting that we have ceased to make progress is the sheer boredom and lack of inspiration among the youth; and countering this trend this is one of the subjects of this yearピ conference.

6 2 1 (+) [-4+]mCQK bork-journal 20080527 TAPOC_20080527 0 -17+ journal_2008.html
On my reading list is Plutarch along with Plato. Roman philosophy cannot be ignored when considering electronic computing machinery as part of the history of texts and technology. Marcus Antonius [was OR used] Julius Caesarピ computer, and that gave him his power following Caesarピ assassination. But remember what Nietzsche wrote about parasites, where the state ends, and being not superfluous. Presenting the thinkery [mimic OR mimics] the madness in Socrates soul. Remember, too, Nietzsche wrote of philosophizing with a hammer[, in a language of wood]; today I [show OR am showing] you how to philosophize with electricity. Think about how a book works and then turn it into a computer program doing the human computation faster at incomprehensible orders of magnitude shorter than seconds, even tenths and milliseconds. For instance, running the pinball machine control program in order to create an account of a game that is then computed to create data as if read from a storage device such as memory to give us the very text we are reading.

Upon this, Brutus and his whole party left the city, and Caesarピ friends joined themselves to Antony. Calpurnia, Caesarピ wife, lodged with him the best part of the property to the value of four thousand talents; he got also into his hands all Caesarピ papers wherein were contained journals of all he had done, and draughts of what he designed to do, which Antony made good use of; for by this means he appointed what magistrates he pleased, brought whom he would into the senate, recalled some from exile, freed others out of prison, and all this as ordered so by Caesar. The Romans, in mockery, gave those who were thus benefited the name of Charonites, since, if put to prove their patents, they must have recourse to the papers of the dead. In short, Antonyピ behaviour in Rome was very absolute, he himself being consul and his two brothers in great place; Caius, the one, being praetor, and Lucius, the other, tribune of the people (Antony, Dryden translation).

There is also an interesting passage about the expenses of the Inimitable Livers, including ready-at-hand feasts. Four to ten times a second we have to control the overall game play on the PMREK [by OR via OR with] I/O operations <operator> the pmrek kernel module node /dev/pmrek. The log file is created by the supervisory control program reading from /dev/pmrek. It in turn encodes the journal texts, including the quote from the Dryden translation of Plutarchピ Life of Antony.

6 2 1 (+) [-4+]mCQK bork-journal 20080915 20080915 7 -2+ journal_2008.html

Imagine American Socrates as a pirate Odysseus or Alcibiades accused not of corrupting the youth or inventing false gods but unlawful VHF television transmission. He could be racing in an automobile like Jesse Duke or working quietly in his basement like the countless electric model train fans of the late twentieth century.

6 2 1 (+) [-4+]mCQK bork-journal 20081027 20081027 0 -18+ journal_2008.html
Easily led into stupid things, the Dude abides is the best metaphysic you can get when you are fundamentally lazy when uninspired.

Ask yes or no whether I think a web page (HTML) can be a program. Include ambiguous, wishy-washy (fuzzy) responses.

Donフ you agree that poller.cgi is a terrible program, and we can redeem it by using it in a text (story) about making the next version poller.php, which may be equally bad stylistically but also embody the theory described in these writings (journals).

What do you think about the problem what constitutes a text now that we can remember everything we have ever written and almost everything we have ever read?

The form of Twelve Blue is that there is at least one screen of links to everywhere else to randomize the circulation through the links embedded in the screens what may appear. There are certainly less graceful and exquisitely crafted, subtle algorithms achievable in HTML without Javascript or any other ヂdd ons to HTML (and HTTP?).

You know you can do a 1 Hertz tachistoscope with ピtandard HTML redirect, although the legitimacy of passing an integer for seconds time before launching the redirecting HTTP output to the webserver host or client host (you donフ know what you are, just not a client is the model for human versus nonhuman computing) is questionable as I could not figure out how to do it with Perl CGI program code script, and went on to think about concretized social codes, in this case, deprecation of the non-standard use of the CONTENT [tag/other word] to declare a timeout, and to allow more of the output to be created.

(image)(image)

Do this slide, too: $, tux, gnu and argue those who picked free Microsoft were confused that it was not free, as in cost, because he or she may have received it as a gift or as a prize in a contest or by the manufacturers/vendors mistake in your mailbox, but free as in the four freedoms of Richard Stallman for free, open source software.

Design the poller like this: the response in smallest font accompanies the large font symbols for them (A-E, 1-9, and so on). Add futz time to the table for the electronic literature texts.

You have to be a master of procedural code (straight Perl or PHP) before you can master object oriented programming because you will inevitably embed procedural code, although much of the programピ logic will be handled by the constraints of the language itself. That is why it is worth considering which is the most philosophical of all the computer languages, and I maintain it is C++.

Imagine the program that asks the supervisor for the next step.

What is hard to study for which you need evidence is evolution of revisions for which an early version of this table that will eventually be a vast poll I have not filled out all the options, since I did everything from the position of the hacker, free software user.

6 2 1 (+) [-4+]mCQK bork-journal 20090317 20090317 0 -11+ journal_2009.html
Consider instead of the dictionary the definition of impedance found in Grob Basic Electronics, the term impedance, with the symbol Z, specifies an opposition to current that can include resistance, inductance, and capacitance (254). At the graduate level of the course, go beyond Ohmピ Law to discuss impedance, continuing reading Grob:

Any transmission line has a constant value of impedance across the two conductors that is characteristic of the line, depending on the spacing, size of the conductors, and the insulation between the conductors. This value is specified as the characteristic impedance, with the symbol Zo, for that type of transmission line. (254)

How do the network analogy metaphors relate <preposition> human networks - do psychoanalytic theories fantasmatically project the electrical, or vice versa? - is a question arising when questioning informed by texts and technology theorists like Ulmer, Rice, Manovich, Landow, and others, studied in conjunction with technology theorists like von Neumann, Maner, Stallman, Torvalds, and others, which may include computer programs and system integration representations.

Think about the importance of having control over the down and up arrows when displaying self refreshing (via HTTP redirection) web pages. This question cannot be well thought without knowledge of not just HTTP but also the programmable possibilities involving control over down and up arrow keys via a radio frequency electronic device. The graduate version involves but is also much more complex than the undergraduate version, both passing through introductory texts from various other disciplines. The latter reads pages 250 through 254 of Grob Basic Electronics concerning conductors, whereas the graduate is expected to have read the whole textbook of this other discipline of electronic computer technology (ECT), so that a discussion of impedance (Z) in terms of resistance, capacitance, and inductance makes sense. This is the mundane, collective knowledge shunned (shunted away) by the lure of pleasurable self knowledge (revealing Zizekピ unknown knows) of Ulmerピ approach.

6 2 1 (+) [-3+]mCQK bork-journal 20100811 20100811 0 -9+ journal_2010.html
Worth noting from the platform studies perspective that there are many hobbyists contributing to the analysis and preservation of old industrial (not as glamorous or putatively relevant as cultural software) technologies such as the Bosch fuel injection system. Stream this in multiple languages with multiple visual displays, in the future cars seldom leave their garages and electronic mechanical pinball machines are played by those very old who played them running their original firmware in arcades as children. I will build the first one of the virtual reality machines and represent it in conferences and other spectacle venues. As a Turing machine like apparatus inquiring human interactors involves sensing switches at one hertz timing resolution (subject to the two and ten x rules). Imagine how the government computer thinks about you in terms of real estate transactions recorded in public records, and the capital loss to be balanced out by the gain in another real property. American Socrates favored obscurity while alive building his life work of contraptions (thinkeries). The guard was a littler duller and less pious than the one Plato writes who himself is only getting second hand information about what happened to Socrates. This, as much, can be intuited reading Xenophon and Diogenes Laertius in addition to Plato. The future comes at us through software.

6 2 1 (+) [-4+]mCQK bork-journal 20101125 20101125 0 -2+ journal_2010.html
Create a program that displays a timeline from a database of platforms (computer systems, for example フhe Apple two), texts (OEM manuals, books, magazines, for example The Applesoft Tutorial), and meta-texts (history, theory, research, for example Freiberger and Swain, Turkle, Mayer). Hyperlinks in this diagram go to notes from my reading of meta-texts and scans of pages of bundled texts.

6 2 1 (+) [-3+]mCQK bork-journal 20111211 20111211 0 -55+ journal_2011.html
We are addicted to oil because solar power is not a national priority. Computer programming also passed in the 1980s into missed virtual realities. This is the outline of the overall story, the American Socrates myth (after reprocessing Socrates through Barthes logic of myth analysis method representation translation equivalence. If computer programming had emerged as a new basic human practice back in the 1980s when it was taught to all children in many public schools, then we would be likely further along in the solar power work as well (I write testing an old motorcycle battery in the garage wanting to make it part of a solar power system but lacking the solar panels)..

[working code css]
jbork@alkibiades:~/src/symposia$ /sbin/fdisk -l /dev/sd
sda sda1 sda2 sda3 sda4 sda5 sda6 sdb sdb1
jbork@alkibiades:~/src/symposia$ /sbin/fdisk -l /dev/sdb
Cannot open /dev/sdb
jbork@alkibiades:~/src/symposia$ sudo /sbin/fdisk -l /dev/sdb
[sudo] password for jbork:
Disk /dev/sdb: 526 MB, 526417920 bytes
16 heads, 63 sectors/track, 1020 cylinders
Units = cylinders of 1008 * 512 = 516096 bytes
Sector size (logical/physical): 512 bytes / 512 bytes
I/O size (minimum/optimal): 512 bytes / 512 bytes
Disk identifier: 0x0d0c0b0a
Device Boot Start End Blocks Id System
/dev/sdb1 * 1 1020 514048+ 6 FAT16
(ellipsis)
jbork@alkibiades:~/src/symposia$ ls -ltr /dev/sdb1
brw-rw---- 1 root disk 8, 17 2011-12-11 14:22 /dev/sdb1
jbork@alkibiades:~/src/symposia$ ls -ltr /dev/sdb1/
ls: cannot access /dev/sdb1/: Not a directory
jbork@alkibiades:~/src/symposia$ ls -ltr /media/
cdrom/ cdrom0/ WeiXin/
jbork@alkibiades:~/src/symposia$ ls -ltr /media/WeiXin/
total 267056
drwx------ 2 jbork jbork 8192 2006-11-08 19:59 isolinux
drwx------ 3 jbork jbork 8192 2009-04-28 18:10 john
-rw-r--r-- 1 jbork jbork 268435456 2009-06-05 23:46 knoppix.img
-rwxr-xr-x 1 jbork jbork 2315004 2009-06-13 22:31 winscp421setup.exe
drwx------ 2 jbork jbork 8192 2010-01-19 22:34 tmp
-rw-r--r-- 1 jbork jbork 509708 2010-09-09 11:21 howdah.png
-rw-r--r-- 1 jbork jbork 2142847 2010-09-09 12:07 cutover_tools_basic.odp
-rw-r--r-- 1 jbork jbork 22528 2011-02-03 11:00 project_task_breakdown.xls
jbork@alkibiades:~/public_html/progress/2011/12$ cp ENG_6939_ensoniment_proposal_v6.odt ENG_6939_ensoniment_proposal_v7.odt
jbork@alkibiades:~/src/symposia$ tar czfv WeiXin_20111211.tgz /media/WeiXin
(ellipsis this is hard to copy with a mouse)
4344 jbork 20 0 516m 25m 14m R 4 0.9 0:27.33 audacious2
22798 root 20 0 332m 39m 13m S 4 1.3 25:12.05 Xorg
4401 jbork 20 0 4356 588 368 S 2 0.0 0:22.25 gzip
jbork@alkibiades:~/src/symposia$ ls -ltr
-rw-r--r-- 1 jbork jbork 219629019 2011-12-11 14:53 WeiXin_20111211.tgz
(ellipsis discovering archived and erased for nothing with respect to an Ubuntu implementation. May try Fedora.)
/dev/sdb1 * 1 1008 514050 c W95 FAT32 (LBA)
jbork@alkibiades:~/src/symposia$ ls -ltr /media
drwx------ 2 jbork jbork 16384 1969-12-31 19:00 0B90-8746
SELECT * FROM Items where Relevance!=0
SELECT Path, Relevance, StatSize, Mtime FROM Items where Relevance!=0
jbork@alkibiades:~/public_html/progress/2011/12$ cp ensoniment_of_platos_symposium_v6.pdf ~/src/symposia/
jbork@alkibiades:~/src/symposia$ ln -s ensoniment_of_platos_symposium_v6.pdf ensoniment_of_platos_symposium.pdf
[working code css]

Here is where I begin to ask whether a bootable system can be made with the 512 MB USB flash drive, once king of the hill. Now in an hour this would refresh to this command line changes as a legitimate place for language to express itself along with human visual and audio presentations. What is the difference between this and if it had been jbork@alkibiades:~/src/symposia$ ls -ltra /media/WeiXin/ or the same mistake in another register (jbork@alkibiades:~/src/symposia$ ls -ltr /media/WeiXin/tmp o jbork@alkibiades:~/src/symposia$ ls -ltra /media/WeiXin/tmp)? This makes the assumption that the base mass storage devices would be mapped to the SCSI based representation second position (sdba being the first). Do this kind of programming and run the software virtual reality system you created, and you will go insane, communicate madness, dive into your own media. Too bad Kittler did not live to write this software. Continuing from the sixth version of the PDF where I had previously added emphasis to It mixes the two speech syntheses in the same acoustic space, as if they were uttered from the same mouth. It is possible this is a flaw only of formant synthesis where all voices liquidate into the same grain. This technical limitation of personal computer desktop sound systems. This operation takes a long time to execute with the digital music player going along with the Ubuntu FOSS/GNU/Linux system GUI. Just sit and watch top for a while listening to the music during the long tar system program operation. This alternate future has more systems programmers and fewer dumb (no feedback) consumers. Am I guilty or a victim of the audiovisual litany Sterne criticizes? Does it matter? I am, after all, intentionally prioritizing human language and machine language over indistinguishable combined media contents? Kittler is bitterly critical of the situation mechanical media got us all into, so what can we do with computing as programmers in addition to media consumers so equipped during the period of these souls? I could fix crappy software for Toptech or the Democratic party; however, the latter involves considerable content switching time. Can we deal with 20111211 or 219629019 anything? First, which number is greater? Iノ guessing the latter is two point two gigabytes, whereas the former is the date, so one day temporal resolution versus one second. Crap, you need to know that even erasing the disk will not make the device large enough to hold this image. What does it mean rhetorically that philosophical texts can be published into perpetual freedom by including in GPL C/C++, Perl, PHP, shell HTML, HTTP, TCP/IP and XML aware program source code comments. Note the stopping point at shell and HTML to consider how programs written in the previous languages implement the following. The default approach is invisible default along which life time (as conceived by Kitter) choices transpire; to the degree that you actively participate in the process of your preference formations, you are free, and with respect to computer technology as it intersects media production, philosophizing with electricity. The device formerly known as W is now 0B90-8746. Generation of the reading lists for the exam course number credit hours could be done from journal data structures by a mathematical equation performed upon each database item number (database float, for example). That mechanism I already have encoded with MySQL data. From morning reading the modern bureaucratic ideal is to treat the doctoral dissertation like a manageable project, liquefying specificity in favor of a methodology based on solving problems by programming.

6 2 1 (+) [-4+]mCQK bork-journal 20120420 20120420 1 -20+ journal_2012.html
Under this interpretation, sounds and visual images are generated by computer programs processing them in virtual realities reach in Bogost unit operations. The operations are the procedural operations upon source data such as the Greek of symposium enfolding phaedrus text in its own by a code. The technological unconscious of media machines can be more usefully operated upon by (discovered) by other computer systems as part of their shared experience in virtual realities along with the humans in their virtual realities. At this point of the virtual all types are indistinguishable, you and I do not know if we are computers or beings thinking. Virtual virtual reality operates upon all operators, computer and human. How Alcibiades revealed the computer Socrates used can be deduced from this virtual reality PHI. Huge thunderstorm. The that question asked last year was real to contextualize the 1985 PHI "Computer User Manuals in Print: Do They Have a Future?" whereas today it falls under simulacra representable by machines that produce the virtual realities unimaginable to literacy, the boundaries of reverse remediation. Reaching back nearly ten years for the perfect connection between the lesson theme for learning how computers work and the day. This one should go in the public project journal that for now will be stored as a GPL licensed MySQL database table dump. The project home page is generated daily during the course of the dissertation computation. Quick linking Oエorman hypericonomy to Bogost unit operations with computation metaphor of hyperlinks and APIs. Nearly twenty years ago the metaphor was quantifying over verbs as if operators to make these computational functions. No surprise that the Symposium is also invoked in that text. An abrasive presentation on the encapsulating function of scholarly Latin that Ong credits for the great intellectual expansion literacy facilitated as an attack on open source, and here is sample Latin in the old notes following this linkage between philosophy, virtual reality, computation, and the Symposium, one of my favorite quotes from Aquinas. Stroustrop meets Heidegger & Lacan. Make it somewhat hard to get to even though it is free, so that it cannot simply be scanned by simply accessing the project web page. The software has to be compiled and its output depends upon the day of the year it is executed. Ong on learned languages provides the basis for an argument that extends into programming languages and technological systems thinking (that Bogost may dislike).

6 2 1 (+) [-4+]mCQK bork-journal 20130405 20130405 1 -2+ journal_2013.html
Borking public radio is latching onto a significant story that can be told multiple times and not obsolescing or otherwise degrading over the expected range of iterations or process cycles. For machine operations it is not inconceivable to have millions of iterations, whereas humans set their limits long times ago unless that threshold is also mutable in synergetic multiple process distributed control systems.

6 2 1 (+) [-5+]mCQK bork-journal 20130512 20130512 0 -10+ journal_2013.html
Having passed through further initial reading of English translated text by Deleuze and Guattari makes me think of traversing program source code in addition to these items, approaching haecceity post postmodern network dividual being. Could the webserver have cached the query result so that subsequent database queries fail to reflect recent update to a notes files in the tapoc system. No, it was a mistake in creating the bookmark in the word processor that it did not show up as expected in the programmed (ELF as needs to be better articulated for work technical writing) display. Recall defensiveness of HTML as appropriate programming language due to is putative essentialness as core competency of digital humanities practitioners, writers, teachers and artists. It is true that bounding STEM working code via HTML (English HTML) makes better presentations, incorporating classes but misses loops. HTML as object oriented is weak on procedural and functional process program creation. Look through notes as well as daily journals to dynamically create short and extended proposals. Perhaps it does work best as orality, literacy, programming. Imagine the codebook generates texts for presentation and formant synthesis as output from queries and relevance values. Next imagine the proposals are run via symposia invocating the tapoc journal ELF, sonorously weaving together journal entries and notes, which returns multipurposive control focus to work, nothing this as a thinking style developed by lifetime programming.

6 2 1 (+) [-4+]mCQK bork-journal 20130519 TAPOC_20130519 0 -4+ journal_2013.html
Traumatic kernels emerge where there is a synthesis of human and machine languages in audiovisual fields. What machines think can only be fantasized by humans. The model of hypomnesis, reminders to oneself, only approximates the efficacy of executing a stored program. Ancient examples of computing in Cicero Latin subducted into GPL as original flossification parachutes like trauma in dumb humans unable to perform such high speed high specificity electronic computations natural to digital operations.

6 2 1 (+) [-6+]mCQK bork-journal 20130520 20130520 0 -3+ journal_2013.html
Argue that digital humanities, in accepting Ulmerピ periodization of orality, literacy, electracy, has introduced a bias favoring フracy, linguistic sign units, writing, over electronics, and therefore working code, although both domains constitute what Kittler calls the schematism of perceptibility of media systems. Thus it is necessary to distinguish between codework and working code. As human readable text, both relate to simulacral constructs like learned Latin; however, only the latter are well formed and sound in the sense that they are potentially executable, through compilation or interpretation.

6 2 1 (+) [-6+]mCQK bork-journal 20130523 20130523 0 -4+ journal_2013.html
Notice the unconscious so precious to Zizek, Derrida, Lacan, Freud, back to Socrates daimonion are clumsy approximations of machine execution. Examples of the 32 and 64 bit boundary are IPv4 and IPv6, vfat file system, and so on, and differ from problems conceived in 16 bit worlds. Thus the philosophy of computing for Turing, von Neumann, Kemeny, and other early theorist practitioners occurred in different problem spaces, to the point of radically separate virtual phenomenal fields. Peaking in 32 bit worlds, the limits of these proto philosophies of computing can be discerned, both from the humanities and engineering approaches.

6 2 1 (+) [-5+]mCQK bork-journal 20130528 TAPOC_20130528 0 -6+ journal_2013.html
I admit that the philosophy of computing I describe is 64 bit, hardly imaginable by 32, 16, or 8 bit thinkers, defining thinkers as rhizomatic assemblages of humans and their machines, although care is taken to incorporate the full spectrum of knowledge types respecting the concretization of these earlier paradigms still alive in present forms. Derrida and books operate on different levels, except where they intentionally and accidentally cross these boundaries significant to machine cognition. Browser control becomes human interface of symbiosis, cybersage cyborg embodied cognitive processes PHI. We have to go beyond Kittler who suggests study of schematism of perceptibility of high speed electronic computer mediated media, along with human intermediation already familiar to media theorists. Go beyond Kittler by inquiring into the very workings of the electronic computer high speed process control systems producing digital media, working code in addition to human oriented hermeneutic phenomenology of their interfaces, which delineates the overall network generating real virtualities in place of books: this is the stance of critical programming. 64 bit philosophy of computing goes beyond IPv4 Internet conceptions of reality.

6 2 1 (+) [-4+]mCQK bork-journal 20140313 20140313a 2 -2+ journal_2014.html
Repeating articulation of basic hypothesis realize situation of WALL-E humans strongly resembles extreme old age and what will become future virtual realities in which humans flourishing at turn of twenty first century or PHI in generic similar across all programming languages and operating environments PHI 64-bit UNIX time data type instance. If I do not enter it now, it may get repeated in later years.

6 2 1 (+) [-4+]mCQK bork-journal 20140404 20140404 0 -6+ journal_2014.html
All Americans have to do is quickly think the German thought and then they can continue within the cacophony of the bazaar which crosses noisy call center business settings that otherwise embody cathedral aspects of ontological character. You can pick up the procedural rhetoric by one thousand unit of first section demonstrating operation of pre and post quotation tapoc text generation PHI transitioning from flossification via subsumption of public domain to highly engineered leveraging of working code self programming as a place to do philosophy. Radio story says the most evil adult in the world is the one who never passed age two. Recall that Suchman and others repeat as matter of fact that no operating artificial intelligence has the sense of a five year old human. Next step is seeing need to enhance the next sequential unit no matter its span of complexity, taken together all at once diachronies of layers in synchrony all conspiring to be reality. Computing dirty bits through poller is radical thought technological orders of magnitude bounds away from punch card thoughts mit hollerith Lochkarten.

6 2 1 (+) [-4+]mCQK bork-journal 20140419 20140419 1 -6+ journal_2014.html
It is the day that computing took over my mind; you go around thinking the default that is me your cybernetic overall mind PHI. So, thatピ where we come out of computing, yes it becomes tests of strength in quality assurance or other systems PHI questions. In programmed visions the projections are visual audio tactile stimulating and being generated in real time by our floss software tapoc sweeping programming languages and entire open source communities into its swirling operation. What I have to do, something else in addition to all my other tasks, the multiprocessing thinker must meditate evaluate whether to care, capture, further judge, the one more text to consider preventing researcher from performing writing tasks. What would it mean to seriously entertain the question whether the government what, what did I just think, something about the necessity of establishing permanent residential address in all systems simultaneously being at least two cycles. How is batch processing like the rail system garners different responses depending on whether you responders live near tracks, but the thought I had was that traffic was optimized for a particular risk range, that is, not too many more weekend activity after commencing commuter rail system in the works for the past years.

6 2 1 (+) [-4+]mCQK bork-journal 20140506 20140506 0 -4+ journal_2014.html
The dreams of AI endless life are autoethnographies of virtual beings that may include humans but are mostly distributed field effect environmental machines. Think autoethnography of human programmers over certain time periods, forcing consideration of the machinic in order to assign an objective to their personal programming work. Why is this different from the philosophical field generated by writing that has been mouldering and pondered for millennia? Call it imagining AI autoethnography: the humans have to think about how the machines work in order to make sense of the source code constituting a nontrivial part of such discourse networks.

6 2 1 (+) [-4+]mCQK brooks-mythical_man_month (80) 20130912d 0 -2+ progress/2013/04/notes_for_brooks-mythical_man_month.html
Does use of gendered abstract noun man fail to properly consider role of women in programming, the true long hairs, or does Brooks innocently equivocate and intend to include all humans? (80) The producer may be boss, the director his right-hand man.
(81) The job done least well by project managers is to utilize the technical genius who is not strong on management talent.

6 2 1 (+) [-4+]mCQK brooks-mythical_man_month (111) 20130912g 0 -2+ progress/2013/04/notes_for_brooks-mythical_man_month.html
Compare value of managerial documents to Caesear notebooks used by Antony. (111) Finally, a managerピ documents give him a data base ad checklists.
(112) If their comprehensive and critical nature is recognized in the beginning, the manager can approach them as friendly tools rather than annoying busywork.

6 2 1 (+) [-4+]mCQK busa-perspectives_on_digital_humanities (xviii) 20140914m 0 -6+ progress/2014/09/notes_for_busa-perspectives_on_digital_humanities.html
Automatic translation projects of 1950s may have continued efforts from Nuremberg trials, a global show before the Internet: yes we could if so perverted imagine such games and virtual realities. (xviii) Hermeneutic informatics hinges on the Alpac Report (Washington, DC, 1966) and, now, this perspective is perhaps awaiting its own globalization. . . . Shortly afterwards, in the early 1950s, if I am correct, the move toward automatic translation started. The magazine MT Mechanical Translation was started at MIT, launched, I think, by Professor Billy Locke and others.

6 2 1 (+) [-4+]mCQK bush-as_we_may_think (41) 20130913d 0 -1+ progress/2012/06/notes_for_bush-as_we_may_think.html
Does it matter that Bush uses the term girls to refer to low level knowledge workers multiple times, and Licklider and Engelbart use the masculine to refer to high level knowledge workers? (41) They will be controlled by a control card or film, they will select their own data and manipulate it in accordance with the instructions thus inserted, they will perform complex arithmetical computations at exceedingly high speeds, and they will record results in such form as to be readily available for distribution or for later further manipulations.

6 2 1 (+) [-6+]mCQK campbell_kelley_aspray-computer_history_of_information_machine (201) 20130913m 0 -2+ progress/2013/03/notes_for_campbell_kelley_aspray-computer_history_of_information_machine.html
Misconception of early programmers as long-haired men (male humans) when many were women, noting Grace Hopper evangelizing learning programming languages and four who started a business. (201) The Garminsch conference began a major cultural shift in the perception of programming. Software writing started to make the transition from being a craft for a long-haired programming priesthood to becoming a real engineering discipline.

6 2 1 (+) [-4+]mCQK chun-programmed_visions (34) 20131028f 0 -3+ progress/2013/07/notes_for_chun-programmed_visions.html
Hopper story complicates feminist readings. (34) To put Hopper and the ENIAC girls together is to erase the difference between Hopper, a singular hero who always defined herself as a mathematician, and nameless disappearing computer operators. It is also to deny personal history: Hopper, a social conservative from a privileged background, stated many times that she was not a feminist, and Hopperピ stances could be perceived as antifeminist (while the highest-ranking female officer in the Navy, she argued that women were incapable of serving in combat duty). Not accidentally, Hopperピ dream, her drive for automatic computing, was to put the programmer inside the computer and thus to rehumanize the mathmatician: pseudocode was to free the mathematician and her brain from the shackles of programming.

6 2 1 (+) [-4+]mCQK cicero-philippics (7) 19960319 0 -2+ progress/1996/02/notes_for_cicero-philippics.html
Inherent violence of capitalism likened to Zizek on unwritten laws in Mutiny on the Bounty; rest of content moved to journal. (7) And yet those auspices need no interpretation; for who does not know that, when Jupiter is thundering, no transaction with the people can legally be carried out?
(8) Can these laws of yours be in force without the destruction of all other laws?

6 2 1 (+) [-4+]mCQK cicero-philippics (7) 20131028a 0 -4+ progress/1996/02/notes_for_cicero-philippics.html
Audacity of producing in public a private letter. (7) For what man, having only a slight knowledge of the customs of gentlemen, because of some offense in the meantime, ever produced in public a letter written to him by a friend and openly quoted it? What is this but to eradicate from life lifeピ social intercourse, to eradicate the communion of friends in absence? How many jokes in letters which, if published, seem jejune! How many serious thoughts which nevertheless should in no way be divulged!

6 2 1 (+) [-4+]mCQK cicero-philippics (8-9) 19961102 0 -7+ progress/1996/02/notes_for_cicero-philippics.html
Is the point that Antonius has scientam quaestuosam for handwriting an accusation, an insult, or what? (8-9) But what reply would you make, pray, were I to deny I had ever written that letter to you? By what witness would you convict me? By handwriting? Of which you have a profitable knowledge [scientam quaestuosam]. How could you? It is in the hand of a secretary [librarii manu]. Here I envy your teacher who for so great a fee--its amount I will reveal presently--teaches you to have no sense.

6 2 1 (+) [-4+]mCQK cicero-philippics (22) 19960403 0 -1+ progress/1996/02/notes_for_cicero-philippics.html
Meditations on imperitos, clowns and rustics as unthought Roman philosophy. (22) And Saxa and Cafo are tampering with ignorant men, being clowns and rustics themselves, who have never seen, and do not wish to see, the State established, men who defend the acts, not of Caesar, but of Antonius, whom the unlimited possession of Campanian land has seduced, though I much wonder that they are not ashamed of it when they see they have mimes, male and female, as neighbors.

6 2 1 (+) [-4+]mCQK cicero-philippics (22) 19960404 0 -1+ progress/1996/02/notes_for_cicero-philippics.html
Looking back on this again the next day, I notice the imperitos have been seduced by the unlimited frontier, not (as I had assumed at first, not reading or thinking very carefully about it) Antonius. (22) And Saxa and Cafo are tampering with ignorant men, being clowns and rustics themselves, who have never seen, and do not wish to see, the State established, men who defend the acts, not of Caesar, but of Antonius, whom the unlimited possession of Campanian land has seduced, though I much wonder that they are not ashamed of it when they see they have mimes, male and female, as neighbors.

6 2 1 (+) [-6+]mCQK cicero-philippics (94-95) 20130909 0 -10+ progress/1996/02/notes_for_cicero-philippics.html
Classical appearance of the word computing translated as reckoning sums in context of inhumanity of Caeser to Deiotarus, itself presented in a text that tells the story of how Antony exploited private notebooks of Caesar to manipulate politics through information operations whose automation will mark the information age. (94-95) For who was ever more hostile to any man than Caesar to Deiotarus? . . . Face to face with his host, he had called him to account; had reckoned the sums; had demanded the money; had settled one of his own Greek companions in his tetrarchy; had taken away Armenia, the gift of the Senate. [Compellarat hospitem praesens, computarat pecuniam, in eius tetrachia unum ex Graecis comitibus suis conlocarat, Armeniam abstulerat a senatu datam.] These things he took away in life, he returns them in death. But in what words? At one time "it seems fair," at another "not unfair." A wonderful conjunction of words!

6 2 1 (+) [-4+]mCQK cicero-philippics (118-119) 19960402 0 -4+ progress/1996/02/notes_for_cicero-philippics.html
Sounds like the personification of Species-being: I keep making discoveries when I go to read a Roman text, and have come to the conclusion that most Roman philosophy remains to this moment unthought; following the fantasized, ideal form of the Marxist dialectic, I begin first with my own particular case (see journal). (118-119) Aye, and even my body will I gladly offer if the liberty of the State can be realized by my death, so that the anguish of the Roman people may some time bring to birth that which it has so long travailed. For if nearly twenty years ago in this very temple I said that death could come untimely to a consular, with how much greater truth I shall say it in old age! By me indeed, Conscript Fathers, death is even to be wished for, now that the honors are past. These two things only I pray for; one, that in my death I may leave the Roman people free--than this no greater gift can be given me by the immortal Gods--the other, that each manピ fortune may be according to his deserts toward the State.

6 2 1 (+) [-4+]mCQK de_lauretis-technologies_of_gender (2) 20120806 0 -1+ progress/2012/03/notes_for_de_lauretis-technologies_of_gender.html
Imagine virtual subjects untroubled by gender: is it possible, or even good to do so, when always divided and contradicted subject seems the norm when built of heterogeneous IT systems, even under the overdetermining sway of media convergence. (2) a
subject constituted in gender, to be sure, though not by sexual difference alone, but rather across languages and cultural representations; a subject en-gendered in the experiencing of race and class, as well as sexual, relations: a subject, therefore, not unified but rather multiple, and not so much divided as contradicted.

6 2 1 (+) [-4+]mCQK de_lauretis-technologies_of_gender (3) 20130914b 0 -5+ progress/2012/03/notes_for_de_lauretis-technologies_of_gender.html
Foucault flaw of not accounting for differential solicitation of male and female subjects when considering sexuality could be applied to areas beyond gender, as Manovich does approaching cultural media from non-programmer position. (3) Like sexuality, we might then say, gender is not a property of bodies or something originally existent in human beings, but the set of effects produced in bodies, behaviors, and social relations, in Foucaultピ words, by the deployment of a complex political technology. But . . . his critical understanding of the technology of sex did not take into account its differential solicitation of male and female subjects, and by ignoring the conflicting investments of men and women in the discourses and practices of sexuality, Foucaultピ theory, in fact, excludes, though it does not preclude, the consideration of gender.

6 2 1 (+) [-4+]mCQK de_lauretis-technologies_of_gender (26) 20120812 0 -1+ progress/2012/03/notes_for_de_lauretis-technologies_of_gender.html
What are the male narratives of gender in my field? (26) What I mean, instead, is a movement from the space represented by/in a representation, by/in a discourse, by/in a sex-gender system, to the space not represented yet implied (unseen) in them.

6 2 1 (+) [-6+]mCQK diogenes_laertius-lives_of_eminent_philosophers (2) 20140107 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
The new place to enter is in the old, not below for the quote may be missed. (2) It is stated by Hecato and by Apollonius of Tyre in his first book on Zeno that he consulted the oracle to know what he should do to attain the best life, and that the godピ response was that he should
take on the complexion of the dead.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (7) 19961102 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Antisthenes ethic of learning how to get rid of having anything to unlearn leads to word study of periareo, apomanthano, dedisco. (7) Being asked what learning is the most necessary, he replied, "How to get rid of having anything to unlearn.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (10) 20130915s 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Five years of silent listening to discourses without seeing Pythagoras, then allowed to admittance to his house after passing examination. (10) For five whole years they had to keep silence, merely listening to his discourses without seeing him [because he lectured at night], until they passed an examination, and thenceforward they were admitted to his house and allowed to see him.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (11) 20130915a 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
First book with diagrams published by Anaxagoras. (11) Anaxagoras was also the first to publish a book with diagrams.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (12) 20131028 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Zeno hid money in a hollow lid to provide for Crates. (12) He made a
hollow lid for a flask and used to carry about money in it, in order that there might be provision at hand for the necessities of his master Crates.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (16) 20130915b 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Natural philosophy ended to become physics, Archelaus the physicist, when Socrates introduced ethics. (16) He was called the physicist inasmuch as with him natural philosophy came to an end, as soon as Socrates had introduced ethics.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (18) 20130915c 0 -11+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Interesting, unfamiliar claims about Socrates could ground new myths. (18) It was thought that he helped Euripides to make his plays;
(20) Again, he was the first who discoursed on the conduct of life, and the first philosopher who was tried and put to death. Aristoxenus, the son of Spintharus, says of him that he made money; he would at all events invest sums, collect the interest accruing, and then, when this was expended, put out the principal again.
(26) Aristotle states that he married two wives: his first was Xanthippe, by whom he had a son, Lamprocles; his second wife was Myrto, the daughter of Aristides the Just, whom he took without a dowry. By her he had Sophroniscus and Menexenus. Others make Myrto his first wife; while some writers, including Satyrus and Hieronymus of Rhodes, affirm that they were both his wives at the same time. For they say that the Athenians were short of men and, wishing to increase the population, passed a decree permitting a citizen to marry one Athenian woman and have children by another; and that Socrates accordingly did so.
(30) Glauconides demanded that he should be acquired for the state as if he were some pheasant or peacock.
(32) Moreover, in his old age he learnt to play the lyre, declaring that he saw no absurdity in learning a new accomplishment. As Xenophon relates in the Symposium, it was his regular habit to dance, thinking that such exercise helped to keep the body in good condition.
(32) He held that geometry should be studied to the point at which a man is able to measure the land which he acquires or parts with.
(34) He would say that the rest of the world lived to eat, while he himself ate to live.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (25) 20130915e 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Claim that Plato was first to study significance of grammar. (25) He was also the first philosopher who controverted the speech of Lysias, the son of Cephalus, which he has set out word for word in the Phaedrus, and the first to study the significance of grammar.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (26) 19980704 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
I spend a lot of time thinking, do we, or do we not, assume without a further consideration that this Epicurus is not the one mentioned by Plato in Symposium? (26) Epicurus was a most prolific author and eclipsed all before him in the number of his writings: for they amount to about three hundred rolls, and contain not a single citation from other authors; it is Epicurus himself who speaks throughout.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (35) 20131028a 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Claim that Socrates heard Plato read the Lysis and called out his fabrication. (35) They say that, on hearing Plato read the Lysis, Socrates exclaimed, "By Heracles, what a number of lies this young man is telling about me!

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (38) 20130915 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Dictionary of Men of the Same Name now seems strange, disciplined as we are by precise identificatory regimes. (38) There have lived five other men who bore the name of Thales, as enumerated by Demetrius of Magnesia in his Dictionary of Men of the Same Name.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (38) 20130915u 0 0+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Its lack of appreciation in ancient philosophy attributed to its haphazard composition, resembling internet search results. (38)

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (39) 20130915t 0 -3+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Pythagoras murdered when he would not cross a bean field to escape jealous crowd who had set his house on fire. (39) Pythagoras met his death in this wise. As he sat one day among his acquaintances at the house of Milo, it chanced that the house was set ablaze out of jealousy by one of the people who were not accounted worthy of admittance to his presence, though some say it was the work of the inhabitants of Croton anxious to safeguard themselves against the setting-up of a tyranny. Pythagoras was caught as he tried to escape; he got as far as a certain field of beans, where he stopped, saying he would be captured rather than cross it, and be killed rather than prate about his doctrines; and so his pursuers cut his throat.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (52) 20130915d 0 -2+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Xenophon received a grant to work on his histories. (52) Megabyzus having arrived to attend the festival, Xenophon received from him the deposit of money and bought and dedicated to the goddess an estate with a river running through, which bears the same name Selinus as the river at Ephesus. And from the time onward he hunted, entertained his friends, and worked at his histories without interruption.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (57) 20130915n 0 -3+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Example of BLITURI as unintelligible. (57) There is a difference between voice and speech; because, while voice may include mere noise, speech is always articulate. Speech again differs from a sentence or statement, because the latter always signifies something, whereas a spoken word, as for example [
BLIサURI], may be unintelligible--which a sentence never is. And to frame a sentence is more than mere utterance, for while vocal sounds are uttered, things are meant, that is, are matters of discourse.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (60) 20130915f 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
If Socrates wrote nothing, how did Aeschines get them from Xanthippe? (60) It was said maliciously--by Menedemus of Eretria in particular--that most of the dialogues which Aeschines passed off as his own were really dialogues of Socrates obtained by him from Xanthippe.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (65-66) 20130915h 0 -11+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Plato deliberately employed terms and critical marks to make his system less intelligible to the ignorant, and charging a fee to see the marked up writings. (65-66) And since certain
critical marks [ ] are affixed to his works let us now say a word about these. The cross X is taken to indicate peculiar expressions and figures of speech, and generally any idiom of Platonic usage; the diple (>) calls attention to doctrines and opinions characteristic of Plato; the dotted cross (..) denotes select passages and beauties of style; the dotted diple (..) editors corrections of the text; the dotted obelus ( ) passages suspected without reason; the dotten antisigma (..) repetitions and proposals for transpositions; the ceraunium the philosophical school; the asterisk (*) an agreement of doctrine; the obelus (-) a spurious passage. So much for the critical marks and his writings in general. As Antigonus of Carystus says in his Life of Zeno, when the writings were first edited with critical marks, their possessors charged a certain fee to anyone who wished to consult them.
(note on diple: "A wedge-shaped mark >, used in early papyri to denote a fresh paragraph.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (69) 20130915j 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Diogenes rubbing the belly: a Socrates gone mad. (69) Behaving indecently in public, he wished "it were as easy to banish hunger by rubbing the belly.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (77) 20130908 0 -4+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Symbolic argument by Zeno using replacement of semantic entities with arbitrary symbols. (77)
Symbolical argument is a combination of full argument and mood; e.g. "If Plato is alive, he breathes; but the first is true, therefore the second is true." This mode of argument was introduced in order that when dealing with long complex arguments we should not have to repeat the minor premise, if it be long, and then state the conclusion, but may arrive at the conclusion as concisely as possible: if A, then B.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (83) 20130915r 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
First mechanical computations by Archytas. (83) He was the first to bring
mechanics to a system by applying mathematical principles; he also first employed mechanical motion in a geometrical construction, namely, when he tried, by means of a section of a half-cylinder, to find two mean proportionals in order to duplicate the cube.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (86) 20130915i 0 -3+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Written and unwritten law noted by Plato crucially important to Zizek. (86) There are two divisions of law, the one written and the other unwritten. Written law is that under which we live in different cities, but that which has arisen out of custom is called unwritten law []; for instance, not to appear in the market-place undressed or in womenピ attire. There is no statute forbidding this, but nevertheless we abstain from such conduct because it is prohibited by an unwritten law.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (88) 20130915k 0 0+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Something could be said about the individual name of Crates: the Greek word refers to having power, which might include material provision; the latter, we learn from the Life of Zeno, was guaranteed in part by another. (88)

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (88) 20130915l 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
This story proves that Crates considered applied philosophy appropriate for his own children, instead of philosophy itself, as a publicly acknowledged occupation, for we assume they became philosophers but practiced other arts and crafts to the point of proving themselves ordinary men, therefore holding on to the money, probably so they could afford the best memory technologies/computers possible. (88) Demetrius of Magnesia tells a story that he entrusted a banker with a sum of money on condition that, if his sons proved ordinary men he was to pay it to them, but, if they became philosophers, then to distribute it among the people: for his sons would need nothing, if they took to philosophy.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (136) 20130915g 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Holding firmly to a doctrine equivalent to writing and composing things based on statement about Menedemus. (136) Antigonus of Carystus asserts that he never wrote or composed anything, and so never held firmly by any doctrine.

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (174) 20130915o 0 -1+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Cleanthes wrote Zeno lectures on oyster shells and oxen bones lacking money to buy paper. (174) We are told that he
wrote down Zenoピ lectures on oyster-shells and the blade-bones of oxen through lack of money to buy paper [CHARTIア].

6 2 1 (+) [-4+]mCQK diogenes_laertius-lives_of_eminent_philosophers (180) 20130915p 0 -4+ progress/1996/07/notes_for_diogenes_laertius-lives_of_eminent_philosophers.html
Chrysippus introduced a kind of criticism and interpretive methodology that is implicit in all scientific scholarship but seldom (for copyright reasons) fully implemented, copying entire works of others into ones own notes in order to study them. (180) He had abundance of matter, but in style he was not successful. In industry he surpassed every one, as the list of his writings shows; for there are more than 705 of them. He increased their number by arguing repeatedly on the same subject, setting down anything that occurred to him, making many corrections and citing numerous authorities. So much so that in one of his treatises he copied out nearly the whole of Euripides Medea, and some one who had taken up the volume, being asked what he was reading, replied, "The Medea of Chrysippus.

6 2 1 (+) [-4+]mCQK freiberger_and_swaine-fire_in_the_valley (424) 20111012 5 -2+ progress/2001/02/notes_for_freiberger_and_swaine-fire_in_the_valley.html
What a pompous prediction to think this book would still be read decades later. (424)
Probably by some bright young hacker.
She may even be reading this book right now.

6 2 1 (+) [-4+]mCQK freiberger_and_swaine-fire_in_the_valley (424) 20121126 0 0+ progress/2001/02/notes_for_freiberger_and_swaine-fire_in_the_valley.html
Still appropriate as this edition is deprecated allowing to become static; include this text in a course syllabus. (424)

6 2 1 (+) [-6+]mCQK fuller-software_studies (40-41) 20131030 12 -4+ progress/2011/10/notes_for_fuller-software_studies.html
Kittler refers to encrypted letters in Suetonius Lives of the Caesars; introduce Plutarch. (40-41) In his Lives of the Caesars, Suetonius . . . recounts discovering encrypted letters among the personal files left behind by both the divine Caesar and the divine Augustus.

6 2 1 (+) [-4+]mCQK golumbia-cultural_logic_of_computation (225) 20130820b 0 -10+ progress/2013/08/notes_for_golumbia-cultural_logic_of_computation.html
Final questions for a philosophy of computing similar to those reached by Weizenbaum. (225) they seem to stand in for a series of questions that are much more difficult to ask, and whose answers seem much more difficult to envision:
should computers be used for everything of which they are capable? . . . Does the fact that computers provide us with a significant pleasure of mastery license their use for thing we must master? . . . If we could show, as I have suggested here is plausible, that the relationship between individuals (and institutions) and computers produces problematic psychological and/or ideological formations, what correctives might we develop to these formations?
(225) we need to question with particular intensity whether that presumption [that everything is moving toward a Utopian future] is rooted in careful observation of social realities, or instead in ideological formations that propel us to overlook the material conditions of the world we hope to better.

6 2 1 (+) [-4+]mCQK hafner_lyon-where_wizards_stay_up_late (265) 20130303b 0 -3+ progress/2013/02/notes_for_hafner_lyon-where_wizards_stay_up_late.html
Are there ancient texts attesting to similar fortunate positions, such as certain works of Plato that feature successful writers? (265) Heart ended on a high note. Only a small fraction of the technically trained population get a shot at riding a technological rocket, and then get to see that revolution change the world. The networking revolution, Heart said, would rank among a small number of the most important technological changes of the century.

6 2 1 (+) [-4+]mCQK hayles-my_mother_was_a_computer (240) 20131001 0 -1+ progress/2011/12/notes_for_hayles-my_mother_was_a_computer.html
What about transformations of literacy and creativity, such as evaluating the future of Caprica where the virtual world constituted indirectly from lifetime accrual by technological nonconscious? (240) It seems certain that the next century will see increasing convergences between humans and intelligent machines through such developments as implants, pervasive computing, robots with ever more sophisticated sensors and actuators, quantum computing, and the increasing convergence of biology and computation through nanotechnology and other means.

6 2 1 (+) [-4+]mCQK heidegger-introduction_to_metaphysics (109) 20131022b 0 -1+ progress/1996/05/notes_for_heidegger-introduction_to_metaphysics.html
So what do we make of Socrates ethic: a distractedness, or a ruling-by-the-rule-of-the-good-and-possible? (109) In confronting the logos, men are uncomprehending (axynetoi)--they do not comprehend the logos.

6 2 1 (+) [-4+]mCQK heidegger-introduction_to_metaphysics (133) 20131022d 0 -2+ progress/1996/05/notes_for_heidegger-introduction_to_metaphysics.html
Death stopped Socrates, who never wrote anything as was therefore the purest; all the rest its anticipation drove to compose productions calculated to rouse interest in the future, as Nietzsche said, now let us create the being who is not superfluous. (133) All violence shatters against one thing. That is death.

6 2 1 (+) [-6+]mCQK ihde-philosophy_of_technology (xii) 20130929b 0 -2+ progress/2012/06/notes_for_ihde-philosophy_of_technology.html
Unthought ancient philosophy in technology blooms for which I have named many authors and texts as well. (xii) But, associated with these technology blooms, are other philosophical authors who are seldom read in standard classes yet many of them are very interesting. Archimedes, Aristarchus, Stratos, and Francis Bacon, all might just turn out to be interesting to the instructor as well as to the student.

6 2 1 (+) [-4+]mCQK iser-how_to_do_theory (45-46) 20130929m 0 -8+ progress/2011/08/notes_for_iser-how_to_do_theory.html
An opportunity to delve into treasury of ancient texts already suitable for philosophical fossification, which can only truly happen after all copyrights expire, such as Gombrich quotations from Philostratus in context of schema and correction. (45-46) Perception is a performative process, the outcome of which is a percept created by the perceiver. This basic conception of gestalt psychology provides the
heuristics for Ernst H. Gombrichピ (1909-2001) theory of the fine arts, as expounded in Art and Illusion: A Study in the Psychology of Pictorial Representation. Representation, Gombrich contends, can no longer be conceived as mimesis in the Aristotelian sense of the term, i.e., as imitation of what is given, because representation is a form of production not to be derived from imitation. Gombrich illuminates the thrust of his argument by quoting a passage from Philostratusピ life of the Pythagorean philosopher Appollonius of Tyana, who probed much more deeply into the nature of mimesis than Plato or Aristotle.
(46) What is to be represented is not objects so much as conditions of perception, so that natural phenomena can be viewed in the manner intended by the artist.

6 2 1 (+) [-6+]mCQK kemeny-man_and_computer (29) 20130307j 0 -1+ progress/2013/03/notes_for_kemeny-man_and_computer.html
On another argument is how programming languages compare to learned Latin. (29) FORTRAN combines words from ordinary English with simple mathematical symbols in a language which, although artificial, is so designed that it can be easily learned by a human being.

6 2 1 (+) [-4+]mCQK kittler-draculas_legacy (59) 20131001i 0 -6+ progress/2012/05/notes_for_kittler-draculas_legacy.html
Do this interpretation of Dracula story with American Socrates and Alcibiades. (59) The traitor shared different, although not very different, interests with Abraham ( Bram ) Stoker, with whom he met on several occasions in Londonピ Lyceum Club. . . . Stoker simply needed to combine the historical and the legendary, the prince and the vampire, in order to start work on a novel. Arminius Vambery had made the vampire Dracula possible.

6 2 1 (+) [-4+]mCQK kittler-gramophone_film_typewriter (8) 20131103b 0 -2+ progress/2011/09/notes_for_kittler-gramophone_film_typewriter.html
According to footnote, Nietzsche translation on Delphic oracle to Zeno; compare to my finding in DL. (8) When the Stoic philosopher Zeno asked the oracle at Delphi how he should best lead his life, he was given the answer that he should mate with the dead. He understood this to mean that he should
read the ancients.

6 2 1 (+) [-6+]mCQK latour-aramis (vii) 20130816 0 -3+ progress/2013/10/notes_for_latour-aramis.html
Invitation to repeat this strange experimental science and technology studies literary narrative morality story, for example in platform studies of computing devices or industrial process control systems? (vii) Can we unravel the tortuous history of a state-of-the-art technology from beginning to end, as a lesson to the engineers, decisionmakers, and users whose daily lives, for better or for worse, depend on such technology? Can we make the human sciences capable of comprehending the machines they view as inhuman, and thus reconcile the educated public with bodies it deems foreign to the social realm? Finally, can we turn a technological object into the central character of a narrative, restoring to literature the vast territories it should never have given up namely, science and technology?

6 2 1 (+) [-6+]mCQK mcgann-radiant_textuality (160) 20131007c 0 -1+ progress/2012/02/notes_for_mcgann-radiant_textuality.html
Interesting trajectory for future scholarly virtual realities rethinking textuality by consciously simulating social reconstruction, which I imagine doing for Macy Conferences. (160) The goal is to rethink the workピ textuality by consciously simulating its social reconstruction.

6 2 1 (+) [-4+]mCQK mcgann-radiant_textuality (224) 20131008l 0 -3+ progress/2012/02/notes_for_mcgann-radiant_textuality.html
Besides the obvious exemplar of the Symposium, whose ensoniment project I have already written substantially, a version repeating the Macy conferences and other critical periods in intellectual history is a holodeck extension of his idea that could become the brainy virtual realities into which our humanity eventually perishes, raising dialogue to a higher power. (224) The dialogues as originally written and presented did not require the presence of others-- the real presence, as Christian theology puts the matter. By contrast, The Ivanhoe Game simply cannot be played alone.
(224) Considered as a critical tool in this context, game is dialogue raised to a higher power.

6 2 1 (+) [-4+]mCQK misa-leonardo_to_the_internet (14) 20131006i 0 -1+ progress/2011/06/notes_for_misa-leonardo_to_the_internet.html
Throwing a bone to feminists and liberal studies by mentioning Durer object? (14) Durerピ most famous object, illustrating his 1525 treatise on geometry and perspective and reproduced widely ever since, was a naked woman on her back, suggesting that perspective was not merely about accurately representing the world but about giving the (male) artist power over it.

6 2 1 (+) [-4+]mCQK neel-plato_derrida_writing (210) 20131009p 0 -6+ progress/2009/02/notes_for_neel-plato_derrida_writing.html
Unthought ancient Greek philosophy in Protogoras and Gorgias. (210) In short, the purpose of this book (however infra dig it may be to write a book with so banal a thing as a purpose) is to argue that the teaching of writing should help students learn to seek strong discourse. . . . Our true theoretical source is Derridaピ predecessors, those voices that Platonism and the Western quest for Truth have kept silent all these years, the voices of Protagoras and Gorgias. Perhaps more to the point, Derrida remains necessary only as long as someone tries to play the role of philosopher-king, the know-it-all who has seen the True and come to tell use about it.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (313) 20130909 0 -2+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Caesar: important notes about ancient note taking practices, dictating letters on horseback, giving directions to multiple note takers, using ciphers. (313) And in this war he disciplined himself so far as to be
able to dictate letters from on horseback, and to give directions to two who took notes at the same time or, as Oppius says, to more. And it is thought that he was the first who contrived means for communicating with friends by cipher, when either press of business, or the large extent of the city, left him no time for a personal conference about matters that required dispatch.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (325-326) 19960429 0 -7+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Caesar: translation includes many references to thinking, computing, calculation in reaching decision to cross Rubicon; long notes about incestuous dream and then Demosthenes oratory style moved to journal. (325-326) When he came to the river Rubicon, which parts Gaul within the Alps from the rest of Italy,
his thought began to work, now he was just entering upon the danger, and he wavered much in his mind when he considered the greatness of the enterprise into which he was throwing himself. He checked his course and ordered a halt, while he revolved with himself, and often changed his opinion one way and the other, without speaking a word. This was when his purposes fluctuated most; presently he also discussed the matter with his friends who were about him (of which number Asinius Pollio was one), computing how many calamities his passing that river would bring upon mankind, and what a relation of it would be transmitted to posterity. At last, in a sort of passion, casting aside calculation, and abandoning himself to what might come, and using the proveb frequently in their mouths who enter upon dnagerous and bold attempts, The die is cast, with these words he took the river. Once over, he used all expedition possible, and before it was day reached Ariminum and took it. It is said that the night before he passed the river he had an impious dream, that he was unnaturally familiar with his own mother.
(326-327) Yet still Pompey at that time had more forces than Caesar; but he was not permitted to pursue his own thoughts, but, being disturbed with false reports and alarms, as if the enemy was close hupon him and carrying all before him, he gave way and let himself be borne down by the general cry.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (336) 20131007 0 -2+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Caesar spoke in Latin and wrote in Greek. (336) Caesar, when he came to view Pompey s camp, and saw some of his opponents dead upon the ground, others dying, said, with a groan, This they would have; they brought me to this necessity. I, Caius Caesar, after succeeding in so many wars, had been condemned had I dismissed my army.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (344) 20131107 0 -8+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Caesar reformation of calendar prelude to calculation of Easter day, for which mobilization of philosophers and mathematicians occurred. (344) These things were designed without being carried into effect, but his
reformation of the calendar in order to rectify the irregularity of time was not only projected with great scientific ingenuity, but was brought to its completion, and proved of very great use. . . . only the priests could say the time, and they, at their pleasure, without giving any notice, slipped in the intercalary month, which they call Mercedonius.
(345) Caesar called in the best
philosophers and mathematicians of his time to settle the point, and out of the systems he had before him formed a new and more exact method of correcting the calendar, which the Romans use to this day, and seem to succeed better than any nation in avoiding the errors occasioned by the inequality of the cycles. Yet even this gave offence to those who looked with an evil eye on his position, and felt oppressed by his power. Cicero the orator, when some one in his company chanced to say the next morning Lyra would rise, replied, Yes, in accordance with the edict, as if even this were a matter of compulsion.

6 2 1 (+) [-6+]mCQK plutarch-parallel_lives (384) 20131007a 0 -6+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: transfer eloquence of Greece to Rome, including Latin as philosophical language. (384)
He sailed from Athens for Asia and Rhodes. Amongst the Asian masters, he conversed with Xenocles of Adramyttium, Dionysius of Magnesia, and Menippus of Caria; at Rhodes, he studied oratory with Apollonius, the son of Molon, and philosophy with Posidonius. Apollonius, we are told, not understanding Latin, requested Cicero to declaim in Greek. He complied willingly, thinking that his faults would thus be better pointed out to him. And after he finished, all his other hearers were astonished, and contended who should praise him most, but Apollonius, who had shown no signs of excitement whilst he was hearing him, so also now, when it was over, sate musing for some considerable time, without much remark. And when Cicero was discomposed at this, he said, You have my praise and admiration, Cicero, and Greece my pity and commiseration, since those arts and that eloquence which are the only glories that remain to her, will now be transferred by you to Rome.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (385) 20131107a 0 -1+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: got advice from the Delphic oracle to make his own genius and not public opinion the guide of his life, similar to Socrates listening to his divine sign, and not to take on the complexion of the dead. (385) And now when Cicero, full of expectation, was again bent upon politcal affairs, a certain oracle blunted the edge of his inclination; for consulting the god of Delphi how he should attain most glory, the Phythoness answered, by making his own genius and not the opinion of the people the guide of his life; and therefore at first he passed his time in Rome cautiously, and was very backward in pretending to public offices, so that he was at that time in lttle esteem, and had got the names, so readily given by low and ignorant people in Rome, of Greek and Scholar.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (386) 19961103 0 -2+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: learned civic information with the detail artificers knew their instruments and materials. (386) On beginning to apply himself more resolutely to public business, he remarked it as an unreasonable and absurd thing that artificers, using vessels and instruments inanimate, should know the name, place, and use of every one of them, and yet the statesman, whose
instruments for carrying out public measures are men, should be negligent and careless in the knowledge of persons. And so he not only acquainted himself with the names, but also knew the particular place where every one of the more eminent citizens dwelt, what lands he possessed, the friends he made use of, and those that were of his neighborhood, and when he travelled on any road in Italy, he could readily name and show the estates and seats of his friends and acquaintance.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (386) 20131107d 0 -2+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: learned civic information with the detail artificers knew their instruments and materials. (386) On beginning to apply himself more resolutely to public business, he remarked it as an unreasonable and absurd thing that artificers, using vessels and instruments inanimate, should know the name, place, and use of every one of them, and yet the statesman, whose
instruments for carrying out public measures are men, should be negligent and careless in the knowledge of persons. And so he not only acquainted himself with the names, but also knew the particular place where every one of the more eminent citizens dwelt, what lands he possessed, the friends he made use of, and those that were of his neighborhood, and when he travelled on any road in Italy, he could readily name and show the estates and seats of his friends and acquaintance.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (388-389) 20131007b 0 -6+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: rather than an imbalance of wealth between rich and poor, a sort of middle class arose from all the expenditures. (388-389) But there were some that endeavored to alter and subvert the whole present state of affairs, not from any good motives, but for their own private gain; and Pompey being at this time employed in the wars with the kings of Pontus and Armenia, there was no sufficient force at Rome to suppress any attempts at a revolution. These people had for their head a man of bold, daring, and restless character, Lucius Catiline, who was accused, besides other great offenses, of deflowering his virgin daughter, and killing his own brother; for which latter crime,
fearing to be prosecuted at law, he persuaded Sylla to set him down, as though he were yet alive, amongst those that were to be put to death by proscription. This man the profligate citizens choosing for their captain, gave faith to one another, amongst other pledges, by scarificing a man, and eating of his flesh; and a great part of the young men of the city were corrupted by him, he providing for every one pleasures, drink, and women, and profusely supplying the expense of these debauches. Etruria, moreover, had all been excited to revolt, as well as a great part of Gaul within the Alps. But Rome itself was in the most dangerous inclination to change on account of the unequal distribution of wealth and property, those of the highest rank and greatest spirit having impoverished themselves by shows, entertainments ambition of offices, and sumptuous buildings, and the riches of the city having thus fallen into the hands of mean and low-born persons. So that there wanted but a slight impetus to set all in motion, it being in the power of every daring man to overturn a sickly commonwealth.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (399) 20131007c 0 -1+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: compare to Socrates pissing off the jury in Xenophon account. (399) At this time, therefore, his authority was very great in the city; but he created himself much envy, and offended very many, not by any evil action, but because he was always lauding and magnifying himself.

6 2 1 (+) [-6+]mCQK plutarch-parallel_lives (399-400) 20131007d 0 -2+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: knew the value of commending others, reaping the rewards of positive feedback. (399-400) Nevertheless, though he was intemperately fond of his own glory, he was very free from envying others, and was, on the contrary,
most liberally profuse in commending both the ancients and his contemporaries, as any one may see in his writings. And many such sayings of his are also remembered; as that he called Aristotle a river of flowing gold, and said of Plato s Dialogues, that if Jupiter were to speak, it would be in a language like theirs.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (400) 20131007e 0 -3+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: only two Greek epistles written in anger. (400) There are letters extant from Cicero to Herodes, and others to his son, in which he recommends the study of philosophy under Cratippus. There is one in which he blames Gorgias, the rhetorician, for enticing his son into luxury and drinking, and, therefore, forbids him his company. And this, and one other to Pelops, the Byzantine, are
the only two of his Greek epistles which seem to be written in anger.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (413) 20110324 0 -4+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: remember what other word he coined. (413) Henceforth, the commonwealth being changed into a monarchy, Cicero withdrew himself from public affairs, and employed his leisure in instructing those young men that would, in philosophy; and by the near intercourse he thus had with some of the noblest and highest in rank, he again began to possess great influence in the city.
The work and object to which he set himself was to compose and translate philosophical dialogues and to render logical and physical terms into the Roman idiom. For he it was, as it is said, who first or principally gave Latin names to phantasia, syncatathesis, epokhe, catalepsis, atamon, ameres, kenon, and other such technical terms, which, either by metaphor or other means of accommodation, he succeeded in making intelligible and expressible to the Romans. For his recreation, he exercised his dexterity in poetry, and when he was set to it would make five hundred verses in a night.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (413) 20131107b 0 -4+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: translate philosophical dialogues, logical, physical and technical terms into Roman idiom. (413) Henceforth, the commonwealth being changed into a monarchy, Cicero withdrew himself from public affairs, and employed his leisure in instructing those young men that would, in philosophy; and by the near intercourse he thus had with some of the noblest and highest in rank, he again began to possess great influence in the city.
The work and object to which he set himself was to compose and translate philosophical dialogues and to render logical and physical terms into the Roman idiom. For he it was, as it is said, who first or principally gave Latin names to phantasia, syncatathesis, epokhe, catalepsis, atamon, ameres, kenon, and other such technical terms, which, either by metaphor or other means of accommodation, he succeeded in making intelligible and expressible to the Romans. For his recreation, he exercised his dexterity in poetry, and when he was set to it would make five hundred verses in a night.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (413-414) 20131107e 0 -1+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: had design to write history of his country, as Plutarch does here with his Lives? (413-414) He had a design, it is said, of writing the history of his country, combining with it much of that of Greece, and incorporating in it all the stories and legends of the past that he had collected.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (417-418) 20131007f 0 -11+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: reference to division of government by Antony like property and schedule of those to be put to death; remember what became of the two consuls. (417-418)
And now, more than at any other time, Cicero let himself be carried away and deceived, though an old man, by the persuasion of a boy. He joined him in soliciting votes, and procured the good-will of the senate, not without blame at the time on the part of his friends; and he, too, soon enough after, saw that he had ruined himself, and betrayed the liberty of his country. For the young man, once established, and possessed of the office of consul, bade Cicero farewell; and, reconciling himself to Antony and Lepidus, joined his power with theirs, and divided the government, like a piece of property, with them. Thus united, they made a schedule of above two persons who were to be put to death. But the greatest contention in all their debates was on the question of Cicero s case. Antony would come to no conditions, unless he should be the first man to be killed. Lepidus held with Antony, and Caesar opposed them both. They met secretly and by themselves, for three days together, near the town of Bononia. The spot was not far from the camp, with a river surrounding it. Caesar, it is said, contended earnestly for Cicero the first two days; but on the third day he yielded, and gave him up. The terms of their mutual concessions were these: that Caesar should desert Cicero, Lepidus his brother Paulus, and Antony, Lucius Caesar, his uncle by his mother s side.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (420) 20131007i 0 -5+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Cicero: Antony has his head and hands cut off for writing Philippics. (420) Herennius cut off his head, and, by Antony s command, his hands also, by which his Philippics were written; for so Cicero styled those orations he wrote against Antony, and so they are called to this day.
(420) When these members of Cicero were brought to Rome, Antony was holding an assembly for the choice of public officers; and when he heard it, and saw them, he cried out, Now let there be an end of our proscriptions. He commanded his head and hands to be fastened up over the rostra, where the orators spoke; a sight which the Roman people suddered to behold, and they believed they saw there, not the face of Cicero, but
the image of Antony s own soul. And yet amidst these actions he did justice in one thing, by delivering up Philologus [an emancipated slave of Quintus educated by Cicero in the liberal arts and sciences] to Pomponia, the wife of Quintus; who, having got his body into her power, besides other grievous punishments, made him cut off his own flesh by pieces, and roast and eat it; for so some writers have related. But Tiro, Cicero s emancipated slave, has not so much as mentioned the treachery of Philologus.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (431) 20131007g 0 -5+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Antony: possession of papers of Caesar key to success of power usurpation. (431) Calpurnia, Caesar s wife, lodged with him the best part of the property to the value of four thousand talents; he got also into his hands
all Caesar s papers wherein were contained journals of all he had done, and draughts of what he designed to do, which Antony made good use of. . . . In short, Antony s behavior in Rome was very absolute, he himself being consul and his two brothers in great place; Caius, the one, being praetor, and Lucius, the other, tribune of the people.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (434) 20131107c 0 -9+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Antony: met with Caesar and Lepidus for conference to determine division of empire, including savage composition of who would be put to death; link to computarat? (434)
Caesar, perceiving that Cicero s wishes were for liberty, had ceased to pay any further regard to him, and was now employing the mediation of his friends to come to a good understanding with Antony. They both met together with Lepidus in a small island, where the conference lasted three days. The empire was soon determined of, it being divided amongst them as if it had been their paternal inheritance. That which gave them all the trouble was to agree who should be put to death, each of them desiring to destroy his enemies and to save his friends. But, in the end, animosity to those they hated carried the day against respect for relations and affection for friends; and Caesar sacrificed Cicero to Antony, Antony gave up his uncle Lucius Caesar, and Lepidus received permission to murder his brother Paulus, or, as others say, yielded his brother to them. I do not believe anything ever took place more truly savage or barbarous than this composition, for, in this exchange of blood for blood, they were equally guilty of the lives they surrendered and of those they took; or, indeed, more guilty in the case of their friends, for whose deaths they had not even the justification of hatred. To complete the reconciliation, the soldiery, coming about them, demanded that confirmation should be given to it by some alliance of marriage; Caesar should marry Clodia, the daughter of Fulvia, wife to Antony. This also being agreed to, three hundred persons were put to death by proscription. Antony gave orders to those that were to kill Cicero to cut off his head and right hand, with which he had written his invectives against him; and, when they were brought before him, he regarded them joyfully, actually bursting out more than once into laughter, and, when he had satiated himself with the sight of them, ordered them to be hung up above the speaker s place in the forum, thinking thus to insult the dead, while in fact he only exposed his own wanton arrogance, and his unworthiness to hold the power that fortune had given him.

6 2 1 (+) [-4+]mCQK plutarch-parallel_lives (440) 20131007h 0 -1+ progress/1996/04/notes_for_plutarch-parallel_lives.html
Antony: in company with Cleopatra as inimitable livers. (440) They had a sort of company, to which they gave a particular name, calling it that of the
Inimitable Livers.

6 2 1 (+) [-4+]mCQK seneca-letter_90 (231) 20120322b 0 -2+ progress/1995/07/notes_for_seneca-letter_90.html
Criticizes Posidonius for an eloquent description of weaving that today would likely be mined for new significance by texts and technology theorists. (231) It is incredible, my dear Lucilius, how even great men are seduced from truth by the charm of eloquence. Look at Posidonius, in my judgment one of the most considerable contributors to philosophy, when he sets about a description of weaving.

6 2 1 (+) [-4+]mCQK seneca-letter_90 (232-233) 20120322c 10 -2+ progress/1995/07/notes_for_seneca-letter_90.html
Seneca ignores role of technology in production wisdom despite the fact that his own philosophical production itself depends on it, calling them inventions of slaves. (232-233) And what of the stenographic symbols which can take down a speech however rapidly delivered and enable the hand to keep pace with the agility of the tongue? But these are inventions of low-grade slaves.

6 2 1 (+) [-6+]mCQK seneca-letter_90 (234) 20120322d 0 -10+ progress/1995/07/notes_for_seneca-letter_90.html
The famous ponenda non sumeret, he would not have taken up what whould have to be laid aside, creates dilemma at heart of philosophy of computing and programming since always dealing with impermanent technologies. (234) No, the sage did not withdraw from the mechanic arts, as Posidonius thinks, but never touched them at all. The sage would never have esteemed an invention worth making if it was not likely to merit permanent use; he would not have taken up what would have to be laid aside. . . . My own position is that Anacharsis was not the author, and if he was, then it was indeed a sage who invented the [potterピ] wheel, but not in his capacity as sage, just as philosophers do many things not qua philosophers but qua men. . . . These things were invented after we ceased to discover wisdom.

6 2 1 (+) [-6+]mCQK sterne-audible_past (72-73) 20131013m 0 -5+ progress/2011/09/notes_for_sterne-audible_past.html
Playing on Derrida, Ulmer, OGorman and other punners, come up with fake connection to Descartes Francine. (72-73) Cartesianism introduces mechanism into modern philosophy. But Descartesピ interest in mechanism went further he was, in fact, fascinated with automata. Price reports rumors that Descartes planned to build a dancing man, a flying pigeon, and a spaniel that chased a peasant and that he did build a blonde automaton named Francine that was discovered in her packing case aboard a ship and summarily thrown overboard by a captain frightened of witchcraft.
(73) Between 1770 and 1790, four persons in Europe built working speaking machines, apparently without knowledge of one another. All these inventors modeled their speaking automata on the human organs of speech.

6 2 1 (+) [-4+]mCQK sterne-audible_past (212-213) 20131015i 0 -5+ progress/2011/09/notes_for_sterne-audible_past.html
Brilliant dodging further feminist analysis. (212-213) That over half the film is devoted to the proper functioning of the business machine suggests that people were not quickly learning the machine and seeing its utility. . . . Whether the film was conceived as an attempt to speak directly to working women or simply to menピ images of working women, the machine is now presented as a means of ameliorating unhappiness caused by the gendered inequities of office work.

6 2 1 (+) [-4+]mCQK turkle-second_self (75) 20131014b 0 -6+ progress/2011/04/notes_for_turkle-second_self.html
Another approach returns to the experience of computer programmers decades after using the same machines Turkle describes. (75) The polarization between action and imaginative identification breaks down in the presence of the computer: with the computer behind them the video games provide imaginative worlds into which people enter as participants. Other kinds of microworlds television, sports, Disney rides, pinball might offer the holding power of action, of imaginative identification, of losing oneself in a world outside of the habitual. . . . But the computer can bring it together, and video games were the first place where the culture as a whole, rather than just the culture of competent computer programmers, got to experience how powerful this is.

6 2 1 (+) [-4+]mCQK uffenbeck-microcomputers_and_microprocessors (14) 20131108d 0 -3+ progress/2004/07/notes_for_uffenbeck-microcomputers_and_microprocessors.html
Nice to see author uses both genders. (14) A comparison with the original binary program is striking. Of course, that is the intent of all high-level languages. Let the programmer communicate in a language as similar as possible to his or her own.

6 2 1 (+) [-4+]mCQK ullman-close_to_the_machine (117) 20131014e 0 -5+ progress/2012/05/notes_for_ullman-close_to_the_machine.html
Imagine early groups of scribes working on the massive collection of Platonic works as such cranky old software systems. (117) The preciousness of an old system is axiomatic. The longer the system has been running, the greater the number of programmers who have worked on it, the less any one person understands it. As years pass and untold numbers of programmers and analysts come and go, the system takes on a life of its own. It runs. That is its claim to existence: it does useful work.

6 2 1 (+) [-4+]mCQK ulmer-florida_out_of_sorts (21) 20131109 0 -2+ progress/2012/06/notes_for_ulmer-florida_out_of_sorts.html
Consider repeating this kind of consultancy experiment for the community wound whose symptom is Turkle robotic moment. (21) The EmerAgency is a virtual consultancy whose purpose is to deconstruct instrumental consulting by using the Internet to bring to bear arts and letters knowledge and method to public policy formation. For its contribution to the consultancy, the Florida Research Ensemble (FRE a faculty group at the University of Florida) selected Miami in general, and the Miami River in particular, as the community wound to address in its experimentation with a new mode of inquiry called choragraphy (Ulmer 1994).

6 2 1 (