2008년 5월 25일 일요일

10주차 과제

This week's topic was Surveillance.

Privacy: a definition

•1.
–a. the quality or state of being apart from company or observation
–b. SECLUSION: freedom from unauthorized intrusion
•2. archaic : a place of seclusion


Privacy: a culturally specific definition


•Does the U.S. Bill of Rights define an individual’s “right to privacy”?
•Not explicitly, but...
–inferrably: e.g., Amendment IV: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
–implicitly: e.g., Amendment IX: The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.


Monitoring on the web


•What does your web browser reveal about you?
•Standard HTTP headers:
–From: User’s email address
–User-Agent: User’s browser software
–Referer: Page user cam from by following a link
–Authorization: User name and password
–Client-IP: Clien’t IP address
–Cookie: Server-generated ID label

Cookies


•cookies are information that a web server stores on the machine running a web browser

–try clearing all of the cookies in your web browser and the visit web sites that you have been.


Types of data mining


•descriptive: compute a relatively concise, description of a large data set
•predictive: predict unknown values for a variable for one or more known variables


This week's lesson is about surveillance and information leverage. I also learned a cookie.
Cookies did not know what it is, even though I saw the word was heard. Also, data mining learned ..etc...


2008년 5월 19일 월요일

9주차 과제

Last time, I have not assignment. Very sorry.

At last time, I learned computer game.
•computer games: how do they work?
–how do they work “behind the screen”? i.e., how do they work from the perspective of an engineer?
•a simple example of pong
–how do they work “in front of the screen”? i.e., how do they work for the audience or participant?
•Sherry Turkle on computer games and processes of identification
•Henry Jenkins on computer games, gender and space


A definition of media studies

•media studies is the theory and practice of exploring how people and things are connected, reflected, extended, reconfigured, and separated by technologies and techniques
–media as mirrors
–media as machinations
–media as prostheses
•digital media studies is a kind of media studies that pays especial attention to the techniques and technologies of computers and computer networks .

At this lecture, I learned about cyborg and biopolitics.

•biopolitics: politics carried out through the means, the techniques and technologies of health and illness, statistics, the census, epidemiology and demography, the science of race, eugenics, population, abortion, genomics, and new reproductive technologies.
[see paul rabinow and nikolas rose, the essential foucault (2003)]
•biopolitics was a term coined by the philosopher Michel Foucault
•the categories of biopolitics might be called “natural” but are negotiated through science, culture and technology .

Definition of cyborg

“A cyborg is a cybernetic organism, a hybrid machine and organism, a creature of social reality as well as a creature of fiction. ... By the late twentieth century, our time, a mythic time, we are all chimeras, theorized and fabricated hybrids of machine and organism; in short, we are cyborgs.”

What’s a MUD

•MUD stands for multi-user domain
•MOO stands for MUD, object-oriented (referring to a particular way in which the MUD is programmed using an object-oriented language).

This week's lecture was carelessful.
Next time it hard to concentrate on classroom time listening.

2008년 5월 6일 화요일

7주차 과제

Computer-Aid
- The surveillance modelcf. Surveillance camera. It has positive side and also have negative side.Positive side : Camera decrease the crime rate because they watching by someone.Negative side : Camera infringe privacy!
- CSCW (Computer-Supported Cooperative Work)It is field of research and design.- CAD (Computer Aid Design)Computer work automatic! It decrease work time.You have to do just drawing. Computer is automatically assume the default value!- CAM (Computer Aid Manufacture)Explain not needed :)
We reall the key point this class : Technology embody social, political, cultural, economical, philosophical things.
- Every Architecture has purpose. (cf. In millitary, commander located deep side of building. And in professor room, professor didn't want interference by other and want more connectable to student. So, their room located by that reason.
- We saw game Second-Life. And we see architecture of cyberspace.- PanopticonDeveloped by Jeremy Bentham. Purpose prison. Every layer connected to cell and center tower can watch all cell.This algorithm also adapt hospital and factory.
This week's lecture is very difficult. The content is very difficult. By the way , more and more guess . I expect the next lecture.