2008년 6월 8일 일요일
last sum of the semester
countering the techniques and “technologies of power” that impose isolation, distraction and domination through surveillance, entertainment, and force.
examples of "electronic dusturbance"
-what is a software virus
a virus cannot infect other computers without assistance. It is propagated by vectors such as humans trading programs with their friends . The virus may do nothing but propagate itself and then allow the program to run normally.
. Many nasty viruses, written by particularly perversely minded crackers, do irreversible damage, like nuking all the user's files.
-what is a software "trojan horse"?
A program designed to break security or damage a system that is disguised as something else benign, such as a directory lister, archiver, a game, or a program to find and destroy viruses
-what is "worm"?
A program that propagates itself over a network, reproducing itself as it goes. Compare virus.
(Morris)
-what is a software "bomb"?
Code surreptitiously inserted in an application or OS that causes it to perform some destructive or security-compromising activity whenever specified conditions are met
-what is a "back door"?
A hole in the security of a system deliberately left in place by designers or maintainers.
often lurked in systems longer than anyone expected or planned, and a few have become widely known.
Robert Tappan Morris
-he is MIT professor. when 23,brought the internet to a virtual
stop in 1988 with a “worm.” his father was big man in country.
so it was more surprising occurence.
-End
2008년 5월 24일 토요일
10th sum
:the quality or state of being apart from company or observation.
this conception is close to surveillance.
as internet grows rapidly, privacy is threatend.
cookies
information that a web server stores on the machine running a
web browser
-try clearing all of the cookies in your web browser and the visit
web sites that you have been.
architectures of privacy
-from doors window&fences
-to wires, networks,data bases and search engines
data mining
dadta mining is an applied statistical technique.
The goal of any datamining exercise is the extraction of meaningful intelligence, or knowledge from the patterns that emerge within a database after it has been cleaned, sorted and processed.
data mining applications
data mining is used for
–market research and other commercial purposes
-science
-intelligence gathering
architectures and inefficiencies
sometimes inefficient architectures, inefficient technologies are good technologies because they allow for or facilitate resistance by the less powerful in the face of powerful individuals, corporations and governments.
2008년 5월 19일 월요일
9th sum
who/what is a cyborg
not just a robot is cyborg. we people wear a glasses(equipment->capability improving), take medicine(be in a good state).--> there's no things that perfectly natural ifself. it would be we are partialy part of it.
biopolitics
domography-population investigating statistology.
democartic, liberal politics
we says frequently "we are equal" but other hand "we are equal" is actually cannot be true word. the "cyborg manifesto"-Donna Haraway
the time snimation is a man-made man,cyborg era
the breakdown of three dichotomies
human/animal
machine/orgaism
physical/non-physical -biology
biology and the science and techonologies of communication and information.
2008년 5월 11일 일요일
8th sum
pain station, AI,l
what’s in a game engine?
- graphics,physics,ai
tomb raider game.pong game.myst game.
people are ludological. those game use AI & large stories,playing
system. so we entertain with lots of ways.it puts people into a highly focused, and highly charged state of mind. for many people, what is being pursued in the video game is not just a score, but an altered state.
end
7th sum
surveillance, charleychaplin moderntimes, industrealization,
massive organization system, panopticon(history of surveillance),
saltplantcorporation - hierarchical organization.
It was fun that in industry one guy(chaplin) is placed under strict surveillance on boss's screen.
Good of surveillance faculity- the dream of a transparent society, visible and legible in each of its parts, the dream of there no longer existing any zones of darkness, zones established by the privileges of royal power or the prerogatives of some corporation.”
Shortcoming of surveillance faculity- but they that can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.
end
2008년 4월 27일 일요일
6th sum
The erthwarm was like such a real life-thing :)
So the these class's key point is implications for the aesthetic, ethics and evaluation of human-computer interaction.
Alan Kay- HCI
funding
–Military: Navy, Air Force, ARPA, DARPA
–Universities: MIT, Stanford, CMU, UCGovernment: National Science Foundation 1950-now
Any way the following pointing dot film's were vey impressived,
I thought "Ah.. this is media" I've got more interested on this part.
end
2008년 4월 13일 일요일
5th sum
Alan Turing
-he is gay,mathematician,philosopher-Programming, neural nets, and artificial intelligence(AI),. -Introduced to German enigma chiper machine
Turing's "imitation game"
-The object of the game for the interrogator is to determine which of the other two is the man and which is the woman.”These questions replace our original question, ‘Can machines think?
artificial intelligence: a definition-AI
-is the science of making machines do things that would require intelligence as if done by humans” said Marvin minsky.there is movie story AI also. I watched it very impressive.
planning as a technical problem
-GPS is what is known in AI as a planner,it is a computer program for theorems proof, geometric problems.
a problem with ai planning
-frame problem (our physical symbol system broke the law of representation in a situation
story understanding as a plan recognition problem
- demo: micro-sam :Script application: computer understanding of newspaper stories
question answering as a problem
-A Computer Program for the Study of Natural Language
-Communication between Man and Machine,
- Communications of the Association for Computing Machinery