2008년 5월 25일 일요일

12th weeks's Summary

We learned about Donna Haraway's "cyborg manifesto" last week. Today, we learned history and surveillance, review of the capture model, definition of privacy and lessig on monitoring and search this week. Surveillance is close watch kept over someone or something. "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." And we learned, too. Surveillance model versus capture model → surveillance model is built upon visual metaphors and derives from historical experiences of secret police surveillance.
Then, let's know about privacy's definition. 1. the quality or state of beong apart from company or observation 2. seclusion : freedom from unauthorized intrusion 3. archaic : a place of seclusion
See Lawrence Lessig on the merits of inefficiency! - an inefficiency that makes it harder for these technologies to be misused. It is hard to argue that less is more. data mining systems are designed to facilitate the identification and classification of individuals into distinct groups or segments. profits. unacceptable social consequences.

Lessig on architecture of privacy : Life where less is monitored is a life more private and life where less can legally perhaps be searched is also a life more private. Also, let's see about cookies. Cookies are information that a web server stores on the machine running a web browser. Also, let's see about encyption. Encyption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

Goals of data mining - data mining efforts are directed toward the generation of reles for the classification of objects, discriminating or distinguishing between two related, but meaningfully distinct classes. Also, let's see about types of data mining. 1. descriptive : compute a relatively concise, description of a large data set. 2. predictive : predict unknown values for a variable for one or more known variables.

Technologies and architectures of privacy-technologies and architectures do not independently determine what is public and what is private technological determinism. Then, we will learn about authorship&ownership next week.
This week's lecture learned that we can adjacent life. It is interesting.

2008년 5월 18일 일요일

11th week's summary

We learned about humans this week's lecture. The lecture is philosophical and profound so, little hard. Then now, let's see and summarize about human subject.

First, 'media as extensions' is like our nervous system. That's why down information. And ratio of the senses->human's five senses : seeing, touching hearing, smelling, tasting. The, when it connects media, we can be lose a part of power because we are making new media. Let's see about another information. Radio changed the form of the news story as much as it altered the film image in the talkies.

Most people feels hard to write by hands. Computer can be prosthesis. Many people can't write something without computer. Because of media, we can be lose senses etc. Human cannot live without media technology. Today, media is more and more very important. Media technology cannot separate to human.

Let's see about 'medium as prosthesis'. -> we are radically altered by a medium.
continually, media technology can see that emphasized. Also, media studies is the theory and practice of exploring how people and things are connected, reflected, extented, reconfigured, and separated by technologies.

Also, let's know about cyborg. Cyborg is made the most logical. cyborg also must be like human. Most media technology imitate for alike human.

We cannot live without media. up informations see more closely. This week's lecture is more hard than other lectures. PPT is not upload, so, more hard. but, I tried hard. The lecture is hard bur, interesting.

2008년 5월 12일 월요일

10th week's summary

We learned 'computer games' last week. First of all, let's see about lecture's outline. 'computer : how do they work?' etc. what's in a game engine?-> graphics, physics... Then now, let's know about game "mod". Mod is modification(:fps, rpgs, real-time strategy games) Also, there are movies with game engines. For example, tum raider, computer space and utilities for creating films from a game engine....But there is a influence of game. It is video game : cheap-not expensive, rent.. then, let's see an example of programming. It is pong in flash, physics, software collections etc. human player : too hard. Also, games research and development are entertainment and making art.

Then, what makes a good game? play...story...realism..? Now, let's know about Ludology versus Narratology. "One of the reasons I think Myst was successful was that people are used to being entertained with stories. There're lots of ways to entertain, but the two primary ones are story-which is television and movies and books and all that-and the other is game play -blackjack and football and Parcheesi. There're other ones, but those are two we are very familiar with. I think the mass market audience is more familiar with story. The first campfire the guys on the hunt come back with a story to tell--that is something anybody can partake in."

Two issues to consider from film theory...One thing among two issues is identification. -how do people relate to the characters and action on the screen? etc. Two thing is space. -what is the space of cinema/games? what can the audience/player see or do there? -what can the designer or filmmaker do to increase, decrease, or change the space? let's see about more than identification. "When you play a video game you enter into the world of the programmers who made it. You have to do more than identify with a character on the screen."

Also, video games as "metaphysical machines", "perfect mirrors", "drugs", "contests" etc. Identification is known to psycho-analysis as the earliest expression of an emotional tie with another person.
Next time, we are going to learn about medium as prosthesis. This week's lecture is simple and interesting. It is not difficult. It also learned interesting story.

2008년 5월 5일 월요일

9th week's Summary

We learned about 'computer-aid' last week.
First, let's see about ethnomethodology. Ethnomethodologists assume that social order is illusory. Ethnomethodology: the study of how people make sense of the social world. And let's recall Johnstone's story generation game. 1. the story does not exist before the interaction; 2. if a story emerges, it emerges from the question and answer interaction.
Then, let's see about outline for last week now. 1. intro Modern Times by Charlie Chaplin 2. CSCW: computer-supported cooperative work 3. Winograd and Flores etc. and Keypoint is "Every digital media technology has an architecture using diagrams to compare physical architectures with digital architectures."

Then, what is the CSCW? Computer-supported cooperative work (CSCW) is a field of research and design. CSCW is considered to a part of a larger field known as CHI or HCI: human-computer interaction (HCI) design, evaluation, implementation, and study of interactive computing systems for human use. Also, Winograd and Flores present a methodology for CSCW analysis and design. This methodology is commonly known as the "language/action" perspective. They made "model of conversation." Conversations are sequences of actions because by saying things people are understood to be doing things.
This classroom's language/action perspective? 1. what is our network of recurrent (repeating) conversations? --->organization 2. what are our patterns of triggering and breakdown? --> linking t to t

Then, let's recall keypoint about last lectures.
Technologies embody social, political, cultural, economic and philosophical ideas and relationships. ..but why change them? the ethnomethodologist might be right, but why would government and industry pay for work like that described by Winograd and Flores.
Key point of last week's lecture is "Every digital media technology has an architecture that can be used to transform work, play and governance." and what is the architecture of cyberspace? consider the hardware and software that links together (or separates) groups of people.

Let's see about Agre's "surveillance model".
1.territorial metaphors as in the "invasion of private space"
2.centralized orchestration by means of a bureaucracy with a unified set of files
3.identification with the state and malevolent aims of a specifically political nature
*history of surveillance: the panopticon -> Panopticon developed by Jeremy Bentham in the 18th century for prison/similar designs adapted for hospitals and factories

Agre's "capture model" ->2. linguistic metaphors for human activities as simulating them to the constructs of computer system's representation languages
2. the assumption that the linguistic "parsing" of human activities involves active intervention and reorganization
*five stage cycle of grammars of action: 1. analysis 2.articulation 3.imposition
4. instrumentation 5. elaboration

Last week's lecture is very exciting and interesting. because Many player, photo etc. Next, expect.