http://map.jodi.org/ - Jodi's personal map of the Web
http://asdfg.jodi.org/-------------------------------/-------------------------------/-------------------------------/-----------------------402vm981/vb909c.html
http://geogeo.jodi.org/-/index.html
<< preface
it is also meant to be an additional resource of information and recommended reading for my students of the prehystories of new media class that i teach at the school of the art institute of chicago in fall 2008.
the focus is on the time period from the beginning of the 20th century up to today.
>> search this blog
2008-07-13
>> jodi.org
Gepostet von Nina Wenhart ... hh:mm 6:18 PM 0 replies tags - artists, code art, netart
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget | I'm reading: >> jodi.org ~ |
>> Golan Levin, "AxisApplet", 2002
written for CODeDOC + also published on its website
http://www.whitney.org/arport/commissions/codedoc/Levin/index.html
http://www.whitney.org/arport/commissions/codedoc/Levin/axis.html
/*
AxisApplet by Golan Levin
http://www.flong.com/
15 August 2002.
-------------------------
"An Axis can't have more than three countries," explained Iraqi President
Saddam Hussein. "This is not my rule, it's tradition. In World War II you
had Germany, Italy, and Japan in the evil Axis. So you can only have three.
And a secret handshake. Ours is wicked cool."[1]
President Bush's recent assertion that North Korea, Iraq and Iran form an
"Axis of Evil"[2] was more than a calculated political act -- it was also
an imaginatively formal, geometric one, which had the effect of erecting a
monumental, virtual, globe-spanning triangle.
Axis is an online tool intended to broaden opportunities for similar kinds
of Axis creation. It allows its participant to connect any three points in
space [countries] into a new Axis of his or her own design. With the help
of multidimensional statistical metrics culled from international public
databases[3], the commonalities amongst the user's choices are revealed.
In this manner, Axis presents an inversion of Bush's praxis, obtaining
lexico-political meaning from the formal act of spatial selection.
-------------------------
References:
[1] "Angered by Snubbing, Libya, China, Syria Form 'Axis of Just as Evil'".
SatireWire, 1/30/2002. http://www.satirewire.com/news/jan02/axis.shtml
[2] "In Speech, Bush Calls Iraq, Iran and North Korea 'Axis of Evil'".
State of the Union Address, 1/29/2002.
[3] The databases referenced in this project are listed at the
end of this document.
-------------------------
Acknowledgements:
Thanks to Christiane Paul and the Whitney Museum for initiating and
sponsoring Axis. Andrea Boykowycz generously researched and prepared the
database materials for this project. Additional thanks to Tanya Bezreh
and Zachary Lieberman for enjoyable brainstorming. The map used in Axis
was created with Tony Steinke's excellent online MapMaker.
-------------------------
Caveats:
For practical reasons of display, some countries whose areas are less than
50000 square km do not appear in Axis. The boundaries and names shown and
the designations used in Axis do not imply the expression of any opinion
whatsoever on the part of the author or publisher concerning the legal
status of any country or territory of its authorities, or concerning the
delimitation of its frontiers or boundaries.
Although we have tried our best to document all possible Axes, our data
indicates that not all threesomes of countries have yet completed their
Axis registration form. Thus only approximately half of the 6 million
possible Axes are displayable at this time.
*/
import java.awt.*;
import java.applet.*;
import java.awt.image.*;
public class AxisApplet extends Applet implements Runnable {
//-----------------
// Declaration of variables.
// See end of document for inlined database.
Thread appletThread = null;
boolean stopThreadP = false;
int csrX, csrY;
int iter = 0;
FontMetrics fm,fa;
String axisStr = "";
String ctryStr = "";
String liteStr = "";
String axisStr2= "";
char iCh[] = new char[3];
boolean doText = true;
Font axisFont = new Font("Arial", Font.PLAIN, 11);
Font ctryFont = new Font("Helvetica", Font.BOLD, 14);
Font liteFont = new Font("Arial", Font.BOLD, 12);
Color colb = new Color(102,102,102);
Color col1 = new Color(72,72,72);
Color col2 = new Color(60,60,60);
Color colu;
final int FF = 255;
final int BASE = 72;
final int PDEC = 8;
final int MIN_SLEEP = 11;
final int MAX_PLAY_TIME = 19;
final int NCOL = 256;
final int NBIT = 8;
final int IW = 919;
final int IH = 476;
final int IY = 64;
final int APP_W = 919;
final int APP_H = IH+IY;
final int NPELS = IW*IH;
final int AXI_W = APP_W*2/3;
final int GC_FREQ = 120;
Image displayArea, srcImg, dstImg;
MediaTracker tracker;
PixelGrabber grabber;
MemoryImageSource mis;
IndexColorModel pal;
boolean loadedSrc = false;
boolean filtered = false;
byte srcArray[];
int csrIndex = 0;
byte palr[]; byte palg[]; byte palb[];
byte curr[]; byte curg[]; byte curb[];
int whichSel[];
int highlites[];
int curCtryID;
int bx,by,bw,bh;
float bxf,byf,bxa,bxb,bya,byb;
//-----------------
// Initialization of variables.
public void init(){
resize (APP_W, APP_H);
displayArea = createImage (APP_W, APP_H);
srcImg = createImage (APP_W, APP_H);
dstImg = createImage (APP_W, APP_H);
srcArray = new byte[APP_W*APP_H];
tracker = new MediaTracker(this);
prepareImaging("world.gif");
fm = this.getFontMetrics(liteFont);
fa = this.getFontMetrics(axisFont);
curCtryID = 0;
whichSel = new int[3];
highlites = new int[nCountries];
for (int i=0; i<3; i++){ whichSel[i]=-1;}
for (int i=0; i
bxf=APP_W/2; byf=APP_H/2;
bxa=0.36f; bxb=1.0f-bxa;
bya=0.29f; byb=1.0f-bya;
bh=20;
}
//-----------------
// Generic threaded Applet plumbing.
public void start(){
stopThreadP = false;
requestFocus();
if (appletThread == null){
appletThread = new Thread (this);
appletThread.start();
}
}
public void stop(){
stopThreadP = true;
if (appletThread != null){
appletThread.stop();
appletThread = null;
}
}
public void destroy(){;}
public void update(Graphics g) { paint(g);}
public void update(){ paint(this.getGraphics());}
public void run(){
while (appletThread != null) {
long then = System.currentTimeMillis();
compute();
update();
try{ if (!stopThreadP) {
try {Thread.sleep(MIN_SLEEP);}
catch(InterruptedException e){}
long now = System.currentTimeMillis();
int napTime = (int) (MAX_PLAY_TIME - (now-then));
if (napTime > 0) {
try { Thread.sleep(napTime);}
catch (InterruptedException e) {}
}
} else {
if (appletThread != null) {
appletThread.stop();
appletThread = null;
break;
}
}
} catch (Exception e) { break;}
}
}
//-----------------
// Imaging and palette plumbing.
void prepareImaging(String imageName) {
// load in the background image
boolean allLoaded = false;
if (!allLoaded) {
srcImg = getImage (getDocumentBase(),imageName);
tracker.addImage (srcImg, 0);
try { tracker.waitForAll(); allLoaded = !tracker.isErrorAny();
} catch (InterruptedException e){};
if(!allLoaded){stop();}
}
// store the image's pixel values for later testing
grabber = new PixelGrabber(srcImg,0,0,APP_W,APP_H,false);
try { grabber.grabPixels(); }
catch (InterruptedException e){;}
if ((grabber.status() & ImageObserver.ABORT)!=0){;}
srcArray = (byte[])(grabber.getPixels());
loadedSrc = true;
grabber = null;
// construct an interpolated color palette
palr = new byte[NCOL]; palg = new byte[NCOL]; palb = new byte[NCOL];
curr = new byte[NCOL]; curg = new byte[NCOL]; curb = new byte[NCOL];
for (int i=0; i
float fi = (float)i/(float)(NCOL-1);
curr[i] = curg[i] = curb[i] = (byte)0;
palr[i]=(byte)(BASE+40.0*Math.pow(fi,9.0));
palg[i]=(byte)(BASE+80.0*Math.pow(fi,6.0));
palb[i]=(byte)(BASE+120.0*Math.pow(fi,3.0));
}
// create a new image which uses the palette
colu = new Color(FF&palr[NCOL-1],FF&palg[NCOL-1],FF&palb[NCOL-1]);
pal = new IndexColorModel(NBIT,NCOL,curr,curg,curb);
mis = new MemoryImageSource(IW,IH,pal,srcArray,0,IW);
mis.setAnimated(false);
dstImg = createImage(mis);
}
//------------------
// Central computation method.
synchronized void compute(){
if (loadedSrc){
highlightCountryAtCursor(csrX, csrY);
// Update the current palette
for (int i=0; i
int vali = highlites[i] = Math.max(0, highlites[i]-PDEC);
curr[i]=palr[vali]; curg[i]=palg[vali]; curb[i]=palb[vali];
}
// Flash the selected countries
int which, nSelected = 0;
for (int i=0; i<3; i++){
which = whichSel[i];
if ((which >= 0)&&(which
curr[which]=curg[which]=(byte)FF;
curb[which]=0;
nSelected++;
}
}
// Construct the displayed texts:
// Fetch and assemble the list of countries
ctryStr = "";
nSelectedCountries = nSelected;
if (nSelected > 0){
long comProp1 = Long.MAX_VALUE;
long comProp2 = Long.MAX_VALUE;
for (int i=(nSelected-1);i>=0;i--){
which = whichSel[i];
if ((which>=0)&&(which
ctryStr += countryNames[which]+((i>0)?", ":" : ");
comProp1 &= countryProp1[which];
comProp2 &= countryProp2[which];
iCh[i]=countryNames[which].charAt(0);
}
}
// Assemble the axis string
if(doText){
// intersect the properties
int nCommonProp1 = 0;
int nCommonProp2 = 0;
for (int b=0;b<63;b++){ if(((comProp1>>>b)&1)>0){nCommonProp1++;}}
for (int b=0;b
int nProps = nCommonProp1+nCommonProp2;
// Use various grammatical rules to make something sensible
axisStr2 = axisStr = "";
if (nSelected == 3){
boolean initial=((iCh[0]==iCh[1])&&(iCh[1]==iCh[2]));
if (nProps>0){
axisStr="Axis of ";
int prop=0;
long common;
int bit,strw;
boolean wordy=false;
for (int b=0;b
common = (b<63)?comProp1:comProp2;
bit = (b<63)?b:(b-63);
if (((common>>>bit)&1)>0){
String pnb=propNames[b];
if((nProps==1)&&(propAdjs[b]>0)){
axisStr+="the "+pnb;
if(initial){axisStr+=letStr+iCh[0];}
axisStr+=".";
} else {
strw=fa.stringWidth(axisStr+pnb);
if((++prop)
if(wordy||(strw>AXI_W)){
axisStr2+=pnb;
if(propVerbs[b]>0){axisStr2+="ing";}
axisStr2+=(nProps>2)?", ":" ";
wordy=true;
} else {
axisStr+=pnb;
if(propVerbs[b]>0){axisStr+="ing";}
axisStr+=(nProps>2)?", ":" ";
}
} else {
if(wordy||(strw>AXI_W)){
axisStr2+=pnb;
axisStr2+=(propVerbs[b]>0)?"ers":" countries";
if(initial){axisStr2+=letStr+iCh[0];}
axisStr2+=".";
wordy=true;
} else {
axisStr+=pnb;
axisStr+=(propVerbs[b]>0)?"ers":" countries";
if(initial){axisStr+=letStr+iCh[0];}
axisStr+=".";
}
}
}
}
}
} else {
if(initial){axisStr="Axis of countries"+letStr+iCh[0]+".";}
else{axisStr="These countries have not yet registered their Axis.";}
}
}
}
doText=false;
}
// Construct the floating indicator box
bw = Math.max(fm.stringWidth(liteStr)+12,24);
bx = (int)Math.round(bxf=bxa*bxf+bxb*((csrX>(bw+20))?(csrX-bw-20):(csrX+20)));
by = (int)Math.round(byf=bya*byf+byb*(csrY-bh/2));
// Update the world
pal = null; pal = new IndexColorModel(NBIT,NCOL,curr,curg,curb);
mis = null; mis = new MemoryImageSource(IW,IH,pal,srcArray,0,IW);
mis.setAnimated(false);
dstImg.flush();
dstImg = null;
dstImg = createImage(mis);
if(((++iter)%GC_FREQ)==0){System.gc();}
filtered = true;
}
}
//-----------------
// User interaction methods.
public boolean mouseDown (Event evt, int x, int y){
csrX = x; csrY = y; selectCountryAtCursor(x,y); return true;}
public boolean mouseMove (Event evt, int x, int y){
csrX = x; csrY = y; highlightCountryAtCursor(x,y); return true;}
public boolean mouseDrag (Event evt, int x, int y){
csrX = x; csrY = y; highlightCountryAtCursor(x,y); return true;}
void selectCountryAtCursor(int x, int y){
if ((x>=0)&&(x
(y>=IY)&&(y
csrIndex = (y-IY)*IW + x;
if ((csrIndex < NPELS)&&(csrIndex>=0)){
int ctryID = 0xFF & srcArray[csrIndex];
if ((ctryID >=0) && (ctryID < nCountries)){
if ((ctryID!=whichSel[0])&&
(ctryID!=whichSel[1])&&
(ctryID!=whichSel[2])){
whichSel[2]=whichSel[1];
whichSel[1]=whichSel[0];
whichSel[0]=(curCtryID = ctryID);
}
} else {
ctryStr = axisStr2 = axisStr = liteStr = "";
if (whichSel[0]>-1){highlites[whichSel[0]]=FF;}
if (whichSel[1]>-1){highlites[whichSel[1]]=FF;}
if (whichSel[2]>-1){highlites[whichSel[2]]=FF;}
whichSel[0]=whichSel[1]=whichSel[2]=-1;
}
}
}
}
void highlightCountryAtCursor(int x, int y){
doText=true;
csrIndex = -1;
if ((x>=0)&&(x
(y>=IY)&&(y
csrIndex = (y-IY)*IW + x;
if ((csrIndex < NPELS)&&(csrIndex>=0)){
int ctryID = 0xFF & srcArray[csrIndex];
if ((ctryID >=0) && (ctryID < nCountries)){
highlites[curCtryID=ctryID] = FF;
liteStr = ""+countryNames[curCtryID];
} else {
liteStr="";
}
}
}
}
//-----------------
// Double-buffered rendering; the main drawing method
public synchronized void paint(Graphics g) {
try {
// Get a nice fresh rectangle
Graphics gr = displayArea.getGraphics();
gr.setColor(colb);
gr.fillRect(0,0, APP_W, IY);
gr.setColor(Color.black);
if (filtered){ gr.drawImage(dstImg, 0,IY,this);}
else { gr.fillRect(0,0, APP_W, APP_H);}
gr.drawRect(0,IY-1, IW-1, IH);
// Draw the list of countries
gr.setFont(ctryFont);
gr.setColor(col2);
gr.drawString(ctryStr, 11, 22);
gr.setColor((nSelectedCountries==3)?Color.yellow:Color.gray);
gr.drawString(ctryStr, 10, 21);
// Draw the axis string
gr.setFont(axisFont);
gr.setColor(col2);
gr.drawString(axisStr, 11, 38);
gr.drawString(axisStr2,11, 54);
gr.setColor(Color.yellow);
gr.drawString(axisStr, 10, 37);
gr.drawString(axisStr2,10, 53);
// Draw the floating indicator box
if ((liteStr!="")&&(csrY>=IY)){
gr.setColor(colb);
gr.fillRect(bx,by,bw,bh);
gr.setColor(Color.black);
gr.drawRect(bx,by,bw,bh);
if ((whichSel[0]==curCtryID)||
(whichSel[1]==curCtryID)||
(whichSel[2]==curCtryID)){
gr.setColor(Color.yellow);
} else { gr.setColor(colu);}
gr.setFont(liteFont);
gr.drawString(liteStr,bx+6,by+bh-5);
}
// Swap the buffers and blit to screen
g.drawImage(displayArea, 0, 0, this);
gr.dispose();
}
catch (NullPointerException e) {
System.out.println("Error: " + e.getMessage());
}
}
//-----------------
// The database tables of countries and their properties.
static final String countryNames[] = {
"United States of America","Canada","Mexico","Guatemala","Cuba","Haiti","Dominican Republic","Belize",
"Honduras","Nicaragua","Costa Rica","Panama","Colombia","Venezuela","Guyana","Suriname",
"French Guyana","Ecuador","Peru","Bolivia","Chile","Argentina","Uruguay","Andorra",
"Paraguay","Brazil","Morocco","Armenia","Mauritania","Senegal","Gambia","Guinea-Bissau",
"Guinea","Sierra Leone","Liberia","Cote d'Ivoire","Ghana","Togo","Benin","Nigeria",
"Cameroon","Equatorial Guinea","Gabon","Republic of the Congo",
"Democratic Republic of Congo","Angola","Namibia","South Africa",
"Mozambique","Tanzania","Kenya","Somalia","Ethiopia","Sudan","Egypt","Libya",
"Tunisia","Algeria","Mali","Burkina Faso","Niger","Chad","Central African Republic","Uganda",
"Rwanda","Burundi","Zambia","Malawi","Zimbabwe","Botswana","Swaziland","Lesotho",
"Madagascar","Greece","Albania","Yugoslavia","Italy","Spain","Portugal","France",
"United Kingdom","Ireland","Azerbaijan","Belgium","Netherlands","Denmark","Germany","Switzerland",
"Austria","Hungary","Czech Republic","Poland","Sweden","Norway","Finland","Romania",
"Bulgaria","Turkey","Syria","Israel","Jordan","Iraq","Bahrain","Kuwait",
"Saudi Arabia","Belarus","Yemen","Oman","United Arab Emirates","Iran","Afghanistan","Pakistan",
"India","Sri Lanka","Nepal","Bosnia and Herzegovina","Bhutan","Bangladesh","Croatia","Cyprus",
"Burma","Thailand","Laos","Cambodia","Vietnam","Off-By-One Error","Malaysia","Singapore",
"Indonesia","Djibouti","Brunei","El Salvador","Hong Kong","Eritrea","Estonia","Philippines",
"Georgia","Papua New Guinea","Australia","Gibraltar","New Zealand","China","North Korea","South Korea",
"Mongolia","Japan","Russia","Greenland","Iceland","Kazakhstan","Kyrgyzstan","Latvia",
"Lebanon","Liechtenstein","Lithuania","Luxembourg","Macedonia","Moldova",
"Monaco","Qatar","Slovak Republic","Slovenia","Taiwan","Tajikistan","Turkmenistan",
"Ukraine","Uzbekistan","Antigua and Barbuda","Bahamas","Barbados","Bermuda","Cape Verde",
"Dominica","Grenada","Guadeloupe","Guam","Jamaica","Malta","Mauritius","New Caledonia","Palau",
"Puerto Rico","Reunion","Seychelles","Trinidad and Tobago"
};
static final String letStr = " whose names start with the letter ";
// The set of properties a country can have.
static final String propNames[] = {
"itsy-bitsy","small","huge","densely-populated",
"sparsely-populated","long and skinny","peninsular","island-dwell",
"landlocked","rainy","arid","cloudy",
"earthquake-prone","officially polylingual","officially Anglophone","Portuguese-speak",
"politically or territorially dependent","largely illiterate","heavily-indebted and poor","monarchic",
"dictatorially autocratic","communist","Slavic","predominantly Muslim",
"predominantly Catholic","predominantly Orthodox","predominantly Buddhist","Scandinavian",
"Baltic","Mediterranean","South Asian","Southeast Asian",
"Sub-Saharan African","Southern African","South American","Central American",
"South Pacific","East Asian","Middle Eastern","Central European",
"North African","Balkan","former Soviet","China-neighboring",
"camel-driv","tiger-roamed","pachyderm-keep","Olympic badminton medal winn",
"oil-produc","vodka-export","nuclear-powered","juvenile-offender execut",
"tourism-dependent","Olympic judo Silver medal winn","violence-ravaged","pepper-produc",
"cricket-play","oil-guzzl","cannabis-cultivat","bug-eat",
"least corrupt","insufficiently-reproducing","fermented mare's milk drink","orange-white-and-green flag-wav",
"US visa-waiver pilot-program participat","US bullet-buy","ancient pyramid-maintain","hydroelectric",
"border-disput","AIDS crisis-stricken","perceived as egregiously corrupt","undersexed",
"heavily landmined","person-traffick","shark-infested","Simpsons' travel destination",
"former French colony","comparatively depressed","comparatively happy","former Ottoman",
"former Sassanid","former Habsburg","former Roman","frequently lightning-struck",
"Australopithecus fossil-hous","population-skyrocket","EU","UN Security Council Permanent Member",
"G7","Fishery Committee for the Eastern Central Atlantic member"
};
int nSelectedCountries = 0;
static final int nCountries = countryNames.length;
static final int nProperties = propNames.length;
static final int nProperties2 = nProperties-63;
// Codes for the syntactic combination of properties:
// which properties are verbs, adjectives, etc.
static final int propVerbs[] = {
0,0,0,0, 0,0,0,1, 0,0,0,0, 0,0,0,1,
0,0,0,0, 0,0,0,0, 0,0,0,0, 0,0,0,0,
0,0,0,0, 0,0,0,0, 0,0,0,0, 1,0,1,1,
1,1,0,1, 0,1,0,1, 1,1,1,1, 0,0,1,1,
1,1,1,0, 1,0,0,0, 0,1,0,0, 0,0,0,0,
0,0,0,0, 1,1,0,0, 0,0,0,0, 0,1};
static final int propAdjs[] = {
1,1,1,1, 1,1,0,0, 1,1,1,1, 1,1,1,0,
1,1,1,0, 0,0,0,0, 0,0,0,0, 0,0,0,0,
0,0,0,0, 0,0,0,0, 0,0,0,0, 0,1,0,0,
0,0,0,0, 0,0,0,0, 0,0,0,0, 1,1,0,0,
0,0,0,0, 0,0,0,1, 1,0,1,0, 0,1,1,0,
0,0,0,1, 0,0,0,0, 0,0,0,0, 0,0};
// Binary property subscriptions, per country,
// represented compactly as decimal Longs.
// We have more property descriptors than bits in a Long,
// so we split the property annotations across two arrays.
static final long countryProp1[] = {
481603685151961092L,1668302186964082692L,907193884314963968L,869476237435731968L,
9288674250326176L,4503599644160128L,4785074620858496L,293296960109035522L,
864691162831917056L,576460786680205568L,292734010155602432L,4785108980597248L,
883549969091400192L,576742244476780544L,864691145635282944L,576742244460003344L,
288230393348424192L,576742244476787200L,576742244476792832L,576742244477042944L,
576742244476784672L,74027936071553024L,17196646400L,148618787720012033L,
882705544161263872L,875668669743530500L,329062940018218016L,2613798624001265920L,
18691706455056L,288318341385691648L,4521191822213666L,18084767254086144L,
18084767262318592L,18084771557294592L,18084767253938688L,288582219872862208L,
288582224167845888L,70373039415328L,281479272071200L,110690038886457344L,
576812600320614912L,351848033681410L,576812600319279104L,576812600319549440L,
883057374981791744L,594827003124023296L,648606315861525520L,938789424664174592L,
882775904299024384L,648588719380758528L,941604170136576000L,18102359448380416L,
18103458951753984L,18384933937742848L,49840037998629888L,300167220691984L,
40832563865977856L,54343362748093440L,89060450510080L,70373039546624L,
89060450641152L,18103458951603456L,576531125342839040L,666603117890257152L,
18084771566215426L,18014402821497090L,576531129637814528L,576531129637822720L,
666603122184962304L,576531129637560592L,70377334661378L,4503608217854210L,
869194736672710784L,185492010222751808L,283674008358912L,2342718430223798272L,
266556803498651712L,195625109368086528L,149463212650172416L,231653906386518016L,
1235956622737041536L,217017207060719744L,306548239878849536L,155092712184883202L,
1407093408577103872L,1369938711785515008L,227150855961313280L,1307451266821005568L,
5348574330093824L,2352849880096964864L,2307813883810676992L,9852173961658368L,
1299007017654421504L,1297881117747587168L,1298725542677194752L,2343842131103191040L,
2352851529385381888L,36310272540938304L,299342585922560L,99660009356420098L,
5084416653657088L,299342050239488L,4802666799039627L,299067171667970L,
146666329939117056L,2594922208379797760L,2551141862999040L,299342049575936L,
72356936087502848L,2551141862740992L,4917948385283028224L,75743158097572864L,
938850989799141376L,94645960986067072L,364905920100573472L,18016597536944128L,
114350350663938L,72444623213166600L,22801672157802496L,22517998707290242L,
18410225985131008L,869581758390599680L,292848327205323552L,869300283413889024L,
576856578706377248L,0L,649046114070692352L,1225260575836102793L,
905751292838679168L,18691706065922L,281477133131779L,288793360481652738L,
76569989758402561L,18033090207170560L,2306691832458772480L,288511853292712064L,
2599425808002985984L,653303491812946560L,1946417124859724948L,76561193682157569L,
1374442379997638784L,614723894391083012L,325592883920896L,767160186463850560L,
4621282555981725968L,767582398996545664L,2605099288006494212L,75920L,
1302103242397718672L,4900774013648769280L,4900211063703732480L,2306410357482061824L,
18032266118702082L,4503599644672257L,2307818282138206208L,1153484454577578241L,
36030996079972610L,288797724185198848L,4503600181542921L,299342049576002L,
1970874613760256L,1128098951081984L,145522700465475720L,4918225462213214464L,
4611989483645043712L,2596048108286640128L,4621559632854254848L,4503599627911297L,
4785074604097664L,581245826907521161L,76561193665380481L,45185L,
2594073385382199425L,2598576985010094209L,4503599644213377L,4503599644237953L,
869757678035943554L,4503600181043337L,869194736672456841L,68736319616L,
4503601774878849L,4785074620948608L,8606777473L,4503599644172417L,
3175882179406217345L
};
static final long countryProp2[] = {
117479460L,33558580L,268437516L,60L,67108864L,8224L,4L,134217764L,
4194364L,164L,4194356L,536870932L,1048628L,4227120L,36L,48L,
4202528L,148L,536870932L,134217892L,36L,36L,22L,524294L,
537919504L,134223892L,336077344L,82976L,335552512L,67117056L,67108864L,68157440L,
68165680L,68157440L,67108864L,71311489L,68157456L,68165632L,201334800L,67109024L,
67117296L,67108896L,67117104L,68165680L,68157488L,528L,84L,2099300L,
268438096L,2103472L,6291696L,4196384L,2097712L,1115184L,590376L,4784160L,
598016L,598048L,268443664L,134225920L,8225L,2105344L,8272L,1048752L,
48L,134225936L,80L,268435552L,4194884L,134217792L,96L,64L,
269492272L,76088356L,589840L,524320L,109576198L,76283942L,545783814L,126357542L,
59248678L,8421415L,131232L,143130630L,76316678L,8421414L,41943046L,524310L,
9175062L,852004L,262180L,603979780L,8421382L,67108918L,8388614L,67960832L,
134758404L,590884L,4718624L,4784164L,4718596L,4390944L,134218752L,196612L,
4262916L,134235136L,0L,4194304L,4195364L,4326432L,132624L,538050720L,
289L,16L,16L,135071248L,134217744L,134217888L,786996L,589856L,
134218784L,1049124L,8208L,1058336L,1057328L,0L,269484064L,1048614L,
1049760L,10240L,134217762L,2060L,2304L,544L,0L,536870948L,
606224L,536872960L,38918L,524288L,22L,16777512L,48L,67108896L,
268435456L,100669734L,16794784L,16L,32822L,32L,1072L,16L,
599044L,524322L,32L,8912914L,269025280L,268517408L,268959746L,4195328L,
262144L,786470L,288L,1072L,131105L,82048L,0L,0L,
134217732L,134217732L,134217728L,67108864L,8208L,0L,8192L,0L,
4L,268959744L,268443680L,10244L,536870912L,32768L,8192L,8224L,4L
};
}
/*
-------------------------------------------------------------------------
Databases referenced in this project:
http://www.cia.gov/cia/publications/factbook/
http://www.fao.org/WAICENT/FAOINFO/SUSTDEV/EIdirect/climate/EIsp0007.htm
http://www.fao.org/WAICENT/FAOINFO/SUSTDEV/EIdirect/climate/EIsp0056.htm
http://www.fao.org/WAICENT/FAOINFO/SUSTDEV/EIdirect/climate/EIsp0009.htm
http://www.ethnologue.com/country_index.asp?place=all
http://www.ethnologue.com/show_language.asp?code=POR
http://unstats.un.org/unsd/mi/mi_results.asp?row_ID=656&fID=r5
http://www.worldbank.org/hipc/about/map/map.html
http://www.panda.org/species/tiger/distribution.cfm
http://www.olympic.org/uk/athletes/results/search_r_uk.asp
http://www.eia.doe.gov/emeu/iea/tableg2.html
http://www.ivodka.com/vodka-by-country.html
http://www.eia.doe.gov/oiaf/ieo/figure_62.html
http://www.deathpenaltyinfo.org/juvchar.html
http://www.olympic.org/uk/athletes/results/search_r_uk.asp
http://www.hotnsaucey.com/countries.html
http://www.cricket.org/link_to_database/NATIONAL/ICC/
http://www.bp.com/centres/energy2002/oil/consumption.asp#
http://www.food-insects.com/book7_31/
http://www.transparency.org/cpi/2001/cpi2001.html#cpi
http://138.251.140.21/~josh/flags/alpha.html
http://www.foreignborn.com/visas_imm/other_visas/11pilot_program.htm
http://www.unaids.org/barcelona/presskit/barcelona%20report/table.html
http://www.boston.com/news/daily/27/sex_chart.htm
http://www.landmines.org/glc/index-glc.asp
http://www.state.gov/g/tip/rls/tiprpt/2002/10678.htm
http://www.flmnh.ufl.edu/fish/Sharks/statistics/GAttack/World.htm
http://www.snpp.com/episodeguide.html
http://www.eur.nl/fsw/research/happiness
http://www.fsmitha.com/h3/map21-ot.html
http://www.fsmitha.com/h1/map20per.htm
http://www.fsmitha.com/h1/map19rm.htm
http://faculty.vassar.edu/piketay/evolution/SiteMap.html
http://users.erols.com/mwhite28/20c-pop3.htm
http://www.fao.org/fi/body/rfb/cecaf/cecaf_mapandmem.htm
"In the Line of Fire," National Geographic, August 2002
*/
Plain text code
To view Axis properly, please widen your browser window to encompass this line:
Gepostet von Nina Wenhart ... hh:mm 6:07 PM 0 replies tags - artistic software, code art, exhibitions, programming
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget | I'm reading: >> Golan Levin, "AxisApplet", 2002 ~ |
>> timeline of hacker history
Gepostet von Nina Wenhart ... hh:mm 6:01 PM 0 replies tags - hacking, timeline
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget | I'm reading: >> timeline of hacker history ~ |
>> The Mentor, "The Conscience of a Hacker", 1986
from: http://www.phrack.org/issues.html?issue=7&id=3&mode=txt
==Phrack Inc.==
Volume One, Issue 7, Phile 3 of 10
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The following was written shortly after my arrest...
\/\The Conscience of a Hacker/\/
by
+++The Mentor+++
Written on January 8, 1986
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Another one got caught today, it's all over the papers. "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.
But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.
I'm in junior high or high school. I've listened to teachers explain
for the fifteenth time how to reduce a fraction. I understand it. "No, Ms.
Smith, I didn't show my work. I did it in my head..."
Damn kid. Probably copied it. They're all alike.
I made a discovery today. I found a computer. Wait a second, this is
cool. It does what I want it to. If it makes a mistake, it's because I
screwed it up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.
And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
"This is it... this is where I belong..."
I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...
You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless. We've been dominated by sadists, or
ignored by the apathetic. The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the
beauty of the baud. We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals. We explore... and you call us criminals. We seek
after knowledge... and you call us criminals. We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.
I am a hacker, and this is my manifesto. You may stop this individual,
but you can't stop us all... after all, we're all alike.
+++The Mentor+++
_______________________________________________________________________________
Gepostet von Nina Wenhart ... hh:mm 5:59 PM 0 replies tags - hacking, hacktivism, manifesto, text
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget | I'm reading: >> The Mentor, "The Conscience of a Hacker", 1986 ~ |
>> McKenzie Wark, "A Hacker Manifesto [version 4.0]"
from: http://subsol.c3.hu/subsol_2/contributors0/warktext.html
MANIFESTATION
01. There is a double spooking the world, the double of abstraction. The fortunes of states and armies, companies and communities depend on it. All contending classes - the landlords and farmers, the workers and capitalists - revere yet fear the relentless abstraction of the world on which their fortunes yet depend. All the classes but one. The hacker class.
02. Whatever code we hack, be it programming language, poetic language, math or music, curves or colourings, we create the possibility of new things entering the world. Not always great things, or even good things, but new things. In art, in science, in philosophy and culture, in any production of knowledge where data can be gathered, where information can be extracted from it, and where in that information new possibilities for the world are produced, there are hackers hacking the new out of the old. While hackers create these new worlds, we do not possess them. That which we create is mortgaged to others, and to the interests of others, to states and corporations who control the means for making worlds we alone discover. We do not own what we produce - it owns us.
03. And yet we don't quite know who we are. While we recognise our distinctive existence as a group, as programmers, as artists or writers or scientists or musicians, we rarely see these ways of representing ourselves as mere fragments of a class experience that is still struggling to express itself as itself, as expressions of the process of producing abstraction in the world. Geeks and freaks become what they are negatively, through their exclusion by others. Hackers are a class, but an abstract class, a class as yet to hack itself into manifest existence as itself.
Abstraction
04. Abstraction may be discovered or produced, may be material or immaterial, but abstraction is what every hack produces and affirms. To abstract is to construct a plane upon which otherwise different and unrelated matters may be brought into many possible relations. It is through the abstract that the virtual is identified, produced and released. The virtual is not just the potential latent in matters, it is the potential of potential. To hack is to produce or apply the abstract to information and express the possibility of new worlds.
05. All abstractions are abstractions of nature. To abstract is to express the virtuality of nature, to make known some instance of its manifold possibilities, to actualise a relation out of infinite relationality. Abstractions release the potential of physical matter. And yet abstraction relies on something that has an independent existence to physical matter -- information. Information is no less real than physical matter, and is dependent on it for its existence. Since information cannot exist in a pure, immaterial form, neither can the hacker class. Of necessity it must deal with a ruling class that owns the material means of extracting or distributing information, or with a producing class that extracts and distributes. The class interest of hackers lies in freeing information from its material constraints.
06. As the abstraction of private property was extended to information, it produced the hacker class as a class. Hackers must sell their capacity for abstraction to a class that owns the means of production, the vectoralist class - the emergent ruling class of our time. The vectorialist class is waging an intensive struggle to dispossess hackers of their intellectual property. Patents and copyrights all end up in the hands, not of their creators, but of the vectoralist class that owns the means of realising the value of these abstractions. The vectoralist class struggles to monopolise abstraction. Hackers find themselves dispossessed both individually, and as a class. Hackers come piecemeal to struggle against the particular forms in which abstraction is commodified and made into the private property of the vectoralist class. Hackers come to struggle collectively against the usurious charges the vectoralists extort for access to the information that hackers collectively produce, but that vectoralists collectively come to own. Hackers come as a class to recognise their class interest is best expressed through the struggle to free the production of abstraction not just from the particular fetters of this or that form of property, but to abstract the form of property itself.
07. What makes our times different is that what now appears on the horizon is the possibility of a society finally set free from necessity, both real and imagined, by an explosion in abstract innovations. Abstraction with the potential once and for all to break the shackles holding hacking fast to outdated and regressive class interests. The time is past due when hackers must come together with all of the producing classes of the world - to liberate productive and inventive resources from the myth of scarcity. "The world already possesses the dream of a time whose consciousness it must now possess in order to actually live it."
Production
08. Production produces all things, and all producers of things. Production produces not only the object of the production process, but also the producer as subject. Hacking is the production of production. The hack produces a production of a new kind, which has as its result a singular and unique product, and a singular and unique producer. Every hacker is at one and the same time producer and product of the hack, and emerges in its singularity as the memory of the hack as process.
10. The hack produces both a useful and a useless surplus, although the usefulness of any surplus is socially and historically determined. The useful surplus goes into expanding the realm of freedom wrested from necessity. The useless surplus is the surplus of freedom itself, the margin of free production unconstrained by production for necessity.
11. The production of a surplus creates the possibility of the expansion of freedom from necessity. But in class society, the production of a surplus also creates new necessities. Class domination takes the form of the capture of the productive potential of society and its harnessing to the production, not of liberty, but of class domination itself. The ruling class subordinates the hack to the production of forms of production that may be harnessed to the enhancement of class power, and the suppression or marginalisation of other forms of hacking. What the producing classes - farmers, workers and hackers - have in common is an interest in freeing production from its subordination to ruling classes who turn production into the production of new necessities, who wrest slavery from surplus. The elements of a free productivity exist already in an atomised form, in the productive classes. What remains is the release of its virtuality.
Class
12. The class struggle, in its endless setbacks, reversals and compromises returns again and again to the unanswered question - property - and the contending classes return again and again with new answers. The working class questioned the necessity of private property, and the communist party arose, claiming to answer the desires of the working class. The answer, expressed in the Communist Manifesto was to "centralise all instruments of production in the hands of the state." But making the state the monopolist of property has only produced a new ruling class, and a new and more brutal class struggle. But perhaps this was not the final answer, and the course of the class struggle is not yet over. Perhaps there is another class that can pose the property question in a new way - and offer new answers to breaking the monopoly of the ruling classes on property.
13. There is a class dynamic driving each stage of the development of the vectoral world in which we now find ourselves. The pastoralist class disperse the great mass of peasants who traditionally worked the land under the thumb of feudal landlords. The pastoralists supplant the feudal landlords, releasing the productivity of the land which they claim as their private property. As new forms of abstraction make it possible to produce a surplus from the land with fewer and fewer farmers, pastoralists turn them off their land, depriving them of their living. Dispossessed farmers seek work and a new home in cities. Here farmers become workers, as capital puts them to work in its factories. Capital as property gives rise to a class of capitalists who own the means of production, and a class of workers, dispossessed of it - and by it. Dispossessed farmers become workers, only to be dispossessed again. Having lost their land, they lose in turn their culture. Capital produces in its factories not just the necessities of existence, but a way of life it expects its workers to consume. Commodified life dispossess the worker of the information traditionally passed on outside the realm of private property as culture, as the gift of one generation to the next, and replaces it with information in commodified form.
14. Information, like land or capital, becomes a form of property monopolised by a class of vectoralists, so named because they control the vectors along which information is abstracted, just as capitalists control the material means with which goods are produced, and pastoralists the land with which food is produced. Information circulated within working class culture as a social property belonging to all. But when information in turn becomes a form of private property, workers are dispossessed of it, and must buy their own culture back from its owners, the vectoralist class. The whole of time, time itself, becomes a commodified experience.
15. Vectoralists try to break capital's monopoly on the production process, and subordinate the production of goods to the circulation of information. The leading corporations divest themselves of their productive capacity, as this is no longer a source of power. Their power lies in monopolising intellectual property - patents and brands - and the means of reproducing their value - the vectors of communication. The privatisation of information becomes the dominant, rather than a subsidiary, aspect of commodified life. As private property advances from land to capital to information, property itself becomes more abstract. As capital frees land from its spatial fixity, information as property frees capital from its fixity in a particular object.
16. The hacker class, producer of new abstractions, becomes more important to each successive ruling class, as each depends more and more on information as a resource. The hacker class arises out of the transformation of information into property, in the form of intellectual property, including patents, trademarks, copyright and the moral right of authors. The hacker class is the class with the capacity to create not only new kinds of object and subject in the world, not only new kinds of property form in which they may be represented, but new kinds of relation beyond the property form. The formation of the hacker class as a class comes at just this moment when freedom from necessity and from class domination appears on the horizon as a possibility.
Property
17. Property constitutes an abstract plane upon which all things may be things with one quality in common, the quality of property. Land is the primary form of property. Pastoralists acquire land as private property through the forced dispossession of peasants who once shared a portion of it in a form of public ownership. Capital is the secondary form of property, the privatisation of productive assets in the form of tools, machines and working materials. Capital, unlike land, is not in fixed supply or disposition. It can be made and remade, moved, aggregated and dispersed. An infinitely greater degree of potential can be released from the world as a productive resource once the abstract plane of property includes both land and capital - such is capital's 'advance'.
18. The capitalist class recognises the value of the hack in the abstract, whereas the pastoralists were slow to appreciate the productivity that can flow from the application of abstraction to the production process. Under the influence of capital, the state sanctions forms of intellectual property, such as patents and copyrights, that secure an independent existence for hackers as a class, and a flow of innovations in culture as well as science from which development issues. Information, once it becomes a form of property, develops beyond a mere support for capital - it becomes the basis of a form of accumulation in its own right.
19. Hackers must calculate their interests not as owners, but as producers, for this is what distinguishes them from the vectoralist class. Hackers do not merely own, and profit by owning information. They produce new information, and as producers need access to it free from the absolute domination of the commodity form. Hacking as a pure, free experimental activity must be free from any constraint that is not self imposed. Only out of its liberty will it produce the means of producing a surplus of liberty and liberty as a surplus.
20. Private property arose in opposition not only to feudal property, but also to traditional forms of the gift economy, which were a fetter to the increased productivity of the commodity economy. Qualitative, gift exchange was superseded by quantified, monetised exchange. Money is the medium through which land, capital, information and labour all confront each other as abstract entities, reduced to an abstract plane of measurement. The gift becomes a marginal form of property, everywhere invaded by the commodity, and turned towards mere consumption. The gift is marginal, but nevertheless plays a vital role in cementing reciprocal and communal relations among people who otherwise can only confront each other as buyer and sellers of commodities. As vectoral production develops, the means appear for the renewal of the gift economy. Everywhere that the vector reaches, it brings into the orbit of the commodity. But everywhere the vector reaches, it also brings with it the possibility of the gift relation.
21. The hacker class has a close affinity with the gift economy. The hacker struggles to produce a subjectivity that is qualitative and singular, in part through the act of the hack itself. The gift, as a qualitative exchange between singular parties allows each party to be recognised as a singular producer, as a subject of production, rather than as a commodified and quantified object. The gift expresses in a social and collective way the subjectivity of the production of production, whereas commodified property represents the producer as an object, a quantifiable commodity like any other, of relative value only. The gift of information need not give rise to conflict over information as property, for information need not suffer the artifice of scarcity once freed from commodification.
22. The vectoralist class contributed, unwittingly, to the development of the vectoral space within which the gift as property could return, but quickly recognised its error. As the vectoral economy develops, less and less of it takes the form of a social space of open and free gift exchange, and more and more of it takes the form of commodified production for private sale. The vectoralist class can grudgingly accommodate some margin of socialised information, as the price it pays in a democracy for the furtherance of its main interests. But the vectoralist class quite rightly sees in the gift a challenge not just to its profits but to its very existence. The gift economy is the virtual proof for the parasitic and superfluous nature of vectoralists as a class.
VECTOR
23. In epidemiology, a vector is the particular means by which a given pathogen travels from one population to another. Water is a vector for cholera, bodily fluids for HIV. By extension, a vector may be any means by which information moves. Telegraph, telephone, television, telecommunications: these terms name not just particular vectors, but a general abstract capacity that they bring into the world and expand. All are forms of telesthesia, or perception at a distance. A given media vector has certain fixed properties of speed, bandwidth, scope and scale, but may be deployed anywhere, at least in principle. The uneven development of the vector is political and economic, not technical.
24. With the commodification of information comes its vectoralisation. Extracting a surplus from information requires technologies capable of transporting information through space, but also through time. The archive is a vector through time just as communication is a vector that crosses space. The vectoral class comes into its own once it is in possession of powerful technologies for vectoralising information. The vectoral class may commodify information stocks, flows, or vectors themselves. A stock of information is an archive, a body of information maintained through time that has enduring value. A flow of information is the capacity to extract information of temporary value out of events and to distribute it widely and quickly. A vector is the means of achieving either the temporal distribution of a stock, or the spatial distribution of a flow of information. Vectoral power is generally sought through the ownership of all three aspects.
25. The vectoral class ascend to the illusion of an instantaneous and global plane of calculation and control. But it is not the vectoralist class that comes to hold subjective power over the objective world. The vector itself usurps the subjective role, becoming the sole repository of will toward a world that can be apprehended only in its commodified form. The reign of the vector is one in which any and every thing can be apprehended as a thing. The vector is a power over all of the world, but a power that is not evenly distributed. Nothing in the technology of the vector determines its possible use. All that is determined by the technology is the form in which information is objectified.
26. The vectoral class struggles at every turn to maintain its subjective power over the vector, but as it continues to profit by the proliferation of the vector, some capacity over it always escapes control. In order to market and profit by the information it peddles over the vector, it must in some degree address the vast majority of the producing classes as subjects, rather than as objects of commodification. The hacker class seeks the liberation of the vector from the reign of the commodity, but not to set it indiscriminately free. Rather, to subject it to collective and democratic development. The hacker class can release the virtuality of the vector only in principle. It is up to an alliance of all the productive classes to turn that potential to actuality, to organise themselves subjectively, and use the available vectors for a collective and subjective becoming.
Education
27. Education is slavery, it enchains the mind and makes it a resource for class power. When the ruling class preaches the necessity of an education it invariably means an education in necessity. Education is not the same as knowledge. Nor is it the necessary means to acquire knowledge. Education is the organisation of knowledge within the constraints of scarcity. Education 'disciplines' knowledge, segregating it into homogenous 'fields', presided over by suitably 'qualified' guardians charged with policing the representation of the field. One may acquire an education, as if it were a thing, but one becomes knowledgeable, through a process of transformation. Knowledge, as such, is only ever partially captured by education, its practice always eludes and exceeds it.
28. The pastoralist class has resisted education, other than as indoctrination in obedience. When capital required 'hands' to do its dirty work, the bulk of education was devoted to training useful hands to tend the machines, and docile bodies who would accept as natural the social order in which they found themselves. When capital required brains, both to run its increasingly complex operations and to apply themselves to the work of consuming its products, more time spent in the prison house of education was required for admission to the ranks of the paid working class.
29. The so-called middle class achieve their privileged access to consumption and security through education, in which they are obliged to invest a substantial part of their income. But most remain workers, even though they work with information rather than cotton or metal. They work in factories, but are trained to think of them as offices. They take home wages, but are trained to think of it as a salary. They wear a uniform, but are trained to think of it as a suit. The only difference is that education has taught them to give different names to the instruments of exploitation, and to despise those their own class who name them differently.
30. Where the capitalist class sees education as a means to an end, the vectoralist class sees it as an end in itself. It sees opportunities to make education a profitable industry in its own right, based on the securing of intellectual property as a form of private property. To the vectoralists, education, like culture, is just 'content' for commodification.
31. The hacker class have an ambivalent relationship to education. The hacker class desires knowledge, not education. The hacker comes into being though the pure liberty of knowledge in and of itself. The hack expresses knowledge in its virtuality, by producing new abstractions that do not necessarily fit the disciplinary regime of managing and commodifying education. . Hacker knowledge implies, in its practice, a politics of free information, free learning, the gift of the result to a network of peers. Hacker knowledge also implies an ethics of knowledge subject to the claims of public interest and free from subordination to commodity production. This puts the hacker into an antagonistic relationship to the struggle of the capitalist class to make education an induction into wage slavery.
32. Only one intellectual conflict has any real bearing on the class issue for hackers: Whose property is knowledge? Is it the role of knowledge to authorise subjects through education that are recognised only by their function in an economy by manipulating its authorised representations as objects? Or is it the function of knowledge to produce the ever different phenomena of the hack, in which subjects become other than themselves, and discover the objective world to contain potentials other than it appears?
HACKING
33. The virtual is the true domain of the hacker. It is from the virtual that the hacker produces ever-new expressions of the actual. To the hacker, what is represented as being real is always partial, limited, perhaps even false. To the hacker there is always a surplus of possibility expressed in what is actual, the surplus of the virtual. This is the inexhaustible domain of what is real without being actual, what is not but which may be. To hack is to release the virtual into the actual, to express the difference of the real.
34. Through the application of abstraction, the hacker class produces the possibility of production, the possibility of making something of and with the world - and of living off the surplus produced by the application of abstraction to nature - to any nature. Through the production of new forms of abstraction, the hacker class produces the possibility of the future - not just 'the' future, but an infinite possible array of futures, the future itself as virtuality.
35. Under the sanction of law, the hack becomes a finite property, and the hacker class emerges, as all classes emerge, out of a relation to a property form. Like all forms of property, intellectual property enforces a relation of scarcity. It assigns a right to a property to an owner at the expense of non-owners, to a class of possessors at the expense of the dispossessed.
36. By its very nature, the act of hacking overcomes the limits property imposes on it. New hacks supersede old hacks, and devalues them as property. The hack as new information is produced out of already existing information. This gives the hacker class an interest in its free availability more than in an exclusive right. The immaterial nature of information means that the possession by one of information need not deprive another of it.
37. To the extent that the hack embodies itself in the form of property, it gives the hacker class interests quite different from other classes, be they exploiting or exploited classes. The interest of the hacker class lies first and foremost in a free circulation of information, this being the necessary condition for the renewed statement of the hack. But the hacker class as class also has an interest in the representation of the hack as property, as something from which a source of income may be derived that gives the hacker some independence from the ruling classes.
38. The very nature of the hack gives the hacker a crisis of identity. The hacker searches for a representation of what it is to be a hacker in the identities of other classes. Some see themselves as vectoralists, trading on the scarcity of their property. Some see themselves as workers, but as privileged ones in a hierarchy of wage earners. The hacker class has produces itself as itself, but not for itself. It does not (yet) possess a consciousness of its consciousness. It is not aware of its own virtuality. It has to distinguish between its competitive interest in the hack, and its collective interest in discovering a relation among hackers that expresses an open and ongoing future.
INFORMATION
39. Information wants to be free but is everywhere in chains. Information is the potential of potential. When unfettered it releases the latent capacities of all things and people, objects and subjects. Information is indeed the very potential for there to be objects and subjects. It is the medium in which objects and subjects actually come into existence, and is the medium in which their virtuality resides. When information is not free, then the class that owns or controls it turns its capacity toward its own interest and away from its own inherent virtuality.
40. Information has nothing to do with communication, or with media. "We do not lack communication. On the contrary, we have too much of it. We lack creation. We lack resistance to the present." Information is precisely this resistance, this friction. At the urgings of the vectoralist class, the state recognises as property any communication, any media product with some minimal degree of difference recognisable in commodity exchange. Where communication merely requires the repetition of this commodified difference, information is the production of the difference of difference.
41. The arrest of the free flow of information means the enslavement of the world to the interests of those who profit from information's scarcity, the vectoral class. The enslavement of information means the enslavement of its producers to the interests of its owners. It is the hacker class that taps the virtuality of information, but it is the vectoralist class that owns and controls the means of production of information on an industrial scale. Privatising culture, education and communication as commodified content, distorts and deforms its free development, and prevents the very concept of its freedom from its own free development. While information remains subordinated to ownership, it is not possible for its producers to freely calculate their interests, or to discover what the true freedom of information might potentially produce in the world.
42. Free information must be free in all its aspects - as a stock, as a flow, and as a vector. The stock of information is the raw material out of which history is abstracted. The flow of information is the raw material out of which the present is abstracted, a present that forms the horizon the abstract line of an historical knowledge crosses, indicating a future in its sights. Neither stocks nor flows of information exist without vectors along which they may be actualised. The spatial and temporal axes of free information must do more offer a representation of things, as a thing apart. They must become the means of coordination of the statement of a movement, at once objective and subjective, capable of connecting the objective representation of things to the presentation of a subjective action.
43. It is not just information that must be free, but the knowledge of how to use it. Information in itself is a mere thing. It requires an active, subjective capacity to become productive. Information is free not for the purpose of representing the world perfectly, but for expressing its difference from what is, and for expressing the cooperative force that transforms what is into what may be. The test of a free society is not the liberty to consume information, nor to produce it, nor even to implement its potential in private world of one's choosing. The test of a free society is the liberty for the collective transformation of the world through abstractions freely chosen and freely actualised.
REPRESENTATION
44. All representation is false. A likeness differs of necessity from what it represents. If it did not, it would be what it represents, and thus not a representation. The only truly false representation is the belief in the possibility of true representation. Critique is not a solution, but the problem itself. Critique is a police action in representation, of service only to the maintenance of the value of property through the establishment of its value.
45. The politics of representation is always the politics of the state. The state is nothing but the policing of representation's adequacy to the body of what it represents. Even in its most radical form, the politics of representation always presupposes an abstract or ideal state that would act as guarantor of its chosen representations. It yearns for a state that would recognise this oppressed ethnicity, or sexuality, but which is nevertheless still a desire for a state, and a state that, in the process, is not challenged as an statement of class interest, but is accepted as the judge of representation.
46. And always, what is excluded even from this enlightened, imaginary state, would be those who refuse representation, namely, the hacker class as a class. To hack is to refuse representation, to make matters express themselves otherwise. To hack is always to produce a difference, if only a minute difference, in the production of information. To hack is to trouble the object or the subject, by transforming in some way the very process of production by which objects and subjects come into being and recognise each other by their representations.
47. The politics of information, of knowledge, advances not through a critical negation of false representations but a positive politics of the virtuality of statement. The inexhaustible surplus of statement is that aspect of information upon which the class interest of hackers depends. Hacking brings into existence the inexhaustible multiplicity of all codes, be they natural or social, programmed or poetic. But as it is the act of hacking that composes, at one and the same time, the hacker and the hack, hacking recognises no artificial scarcity, no official licence, no credentialing police force other than that composed by the gift economy among hackers themselves.
48. A politics that embraces its existence as statement, as affirmative difference, not as negation can escape the politics of the state. To ignore or plagiarise representation, to refuse to give it what it claims as its due, is to begin a politics of statelessness. A politics which refuses the state's authority to authorise what is a valued statement and what isn't. A politics which is always temporary, always becoming something other than itself. Even useless hacks may come, perversely enough, to be valued for the purity of their uselessness. There is nothing that can't be valued as a representation. The hack always has to move on.
49. Everywhere dissatisfaction with representations is spreading. Sometimes its a matter of breaking a few shop windows, sometimes of breaking a few heads. So-called 'violence' against the state, which rarely amounts to more than throwing rocks at its police, is merely the desire for the state expressed in its masochistic form. Where some call for a state that recognises their representation, others call for a state that beats them to a pulp. Neither is a politics that escapes the desire cultivated within the subject by the educational apparatus.
50. Sometimes direct democracy is posited as the alternative. But this merely changes the moment of representation - it puts politics in the hands of claimants to an activist representation, in place of an electoral one.. Sometimes what is demanded of the politics of representation is that it recognise a new subject. Minorities of race, gender, preference demand the right to representation. But soon enough they discover the cost. They must now police the meaning of this representation, and police the adherence of its members to it. Even at its best, in its most abstract form, on its best behaviour, the colour blind, gender neutral, multicultural state just hands the value of representation over to the commodity form. While this is progress, particularly for those formerly oppressed by the state's failure to recognise their identity as legitimate, it stops short at the recognition of expressions of subjectivity that seeks to become something other than a representation that the state can recognise and the market can value.
51. But there is something else hovering on the horizon of the representable. There is a politics of the unrepresentable, a politics of the presentation of the non-negotiable demand. This is politics as the refusal of representation itself, not the politics of refusing this or that representation. A politics which, while abstract, is not utopian. In its infinite and limitless demand, it may even be the best way of extracting concessions precisely through its refusal to put a name - or a price - on what revolt desires.
REVOLT
52. The revolts of 1989 are the signal events of our time. What the revolts of 1989 achieved was the overthrow of regimes so impervious to the recognition of the value of the hack that they had starved not only their hackers but also their workers and farmers of any increase in the surplus. With their cronyism and kleptocracy, their bureaucracy and ideology, their police and spies, they starved even their pastoralists and capitalists of innovative transformation and growth.
53. The revolts of 1989 overthrew boredom and necessity. At least for a time. They put back on the world historical agenda the limitless demand for free statement. At least for a time. They revealed the latent destiny of world history to express the pure virtuality of becoming. At least for a time, before new states cobbled themselves together and claimed legitimacy as representations of what revolt desired. The revolts of 1989 opened the portal to the virtual, but the states that regrouped around this opening soon closed it. What the revolts really achieved was the making of the world safe for vectoral power.
54. The so-called anti-globalisation protests of the 90s are a ripple caused by the wake of these signal events, but a ripple that did not know the current to which it truly belonged. This movement of revolt in the overdeveloped world identifies the rising vectoral power as a class enemy, but all too often it allowed itself to be captured by the partial and temporary interests of local capitalist and pastoralist classes. It was a revolt is in its infancy that has yet to discover the connection between its engine of limitless desire and free statement, and the art of making tactical demands.
55. The class struggle within nations and the imperial struggle between nations has taken shape as two forms of politics. One kind of politics is regressive. It seeks to return to an imagined past. It seeks to use national borders as a new wall, a neon screen behind which unlikely alliances might protect their existing interests in the name of a glorious past. The other form is the progressive politics of movement. The politics of movement seeks to accelerate toward an unknown future. It seeks to use international flows of information, trade or activism as the eclectic means for struggling for new sources of wealth or liberty that overcomes the limitations imposed by national coalitions.
56. Neither of these politics corresponds to the old notion of a left or right, which the revolutions of 1989 have definitively overcome. Regressive politics brings together luddite impulses from the left with racist and reactionary impulses from the right in an unholy alliance against new sources of power. Progressive politics rarely takes the form of an alliance, but constitutes two parallel processes locked in a dialogue of mutual suspicion, in which the liberalising forces of the right and the social justice and human rights forces of the left both seek non-national and transnational solutions to unblocking the system of power which still accumulates at the national level.
57. There is a third politics, which stands outside the alliances and compromises of the post-89 world. Where both progressive and regressive politics are representative politics, which deal with aggregate party alliances and interests, this third politics is a stateless politics, which seeks escape from politics as such. A politics of the hack, inventing relations outside of representation.
58. Expressive politics is a struggle against commodity property itself. Expressive politics is not the struggle to collectivise property, for that is still a form of property. Expressive politics is the struggle to free what can be free from both versions of the commodity form - its totalising market form, and its bureaucratic state form. What may be free from the commodity form altogether is not land, not capital, but information. All other forms of property are exclusive. The ownership by one excludes, by definition, the ownership by another. But information as property may be shared without diminishing anything but its scarcity. Information is that which can escape the commodity form.
59. Politics can become expressive only when it is a politics of freeing the virtuality of information. In liberating information from its objectification as a commodity, it liberates also the subjective force of statement. Subject and object meet each other outside of their mere lack of each other, by their desire merely for each other. Expressive politics does not seek to overthrow the existing society, or to reform its larger structures, or to preserve its structure so as to maintain an existing coalition of interests. It seeks to permeate existing states with a new state of existence, spreading the seeds of an alternative practice of everyday life.
Version 4.0 edited by Joanne Richardson for subsol. A much longer Version 2.0 can be found online at feelergauge and textz.com . Version 3.0 is still off-line.
Gepostet von Nina Wenhart ... hh:mm 5:40 PM 0 replies tags - hacking, hacktivism, manifesto, publications, text, theory
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget | I'm reading: >> McKenzie Wark, "A Hacker Manifesto [version 4.0]" ~ |
>> La Monte Young, "Composition 1960 #10"
consists only of one line of instruction:
"draw a straight line and follow it"
website dedicated to it:
http://instructionset.org/instruction/4/
Gepostet von Nina Wenhart ... hh:mm 5:21 PM 0 replies tags - artists, code art, concept art, fluxus, minimalism
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget | I'm reading: >> La Monte Young, "Composition 1960 #10" ~ |
>> definition: systems
from: http://pespmc1.vub.ac.be/ASC/SYSTEM.html
SYSTEM
1) a set of variables selected by an observer. (Ashby, 1960)
2) Usually three distinctions are made: 1. An observed object. 2. A perception of an observed object. This will be different for different observers. 3. A model or representation of a perceived object. A single observer can construct more than one model or representation of a single object. Some people assume that 1. and 2. are the same. This assumption can lead to difficulties in communication. Usually the term "system" is used to refer to either 1. or 2. "Model" usually refers to 3. Ashby used the terms machine," "system," and "model" in that order for the three distinctions. (Umpleby)
3) a set or arrangement of entities so related or connected so as to form a unity or organic whole. (Iberall)
4) Any definable set of components. (Maturana and Varela, 1979)
Any portion of the material universe which we choose to separate in thought from the rest of the universe for the purpose of considering and discussing the various changes which may occur within it under various conditions is called a system. (J. W. Gibbs, from his biography by Muriel Rukeyser, page 445)
(1) A set of variables selected by an observer (Ashby) together with the constraints across variables he either discovers, hypothesises or prefers. Inasmuch as the variables of a system may represent (see representation) the components of a complex machine, an organism or a social institution and a constraint is the logical complement of a relation, an equivalent definition of system is that (2) it represents a set of components together with the relations connecting them to form a whole unity. Unlikee in general systems theory, in cybernetics, a system is an observer's construct. If it describes, simulates or predicts a portion of his environments it may be regarded as a model of that portion (see reconstructability). The model and the modelled "world" share the same organization but because of their different material realizations they are likely to differ in structure. Cybernetics starts with investigating all possible systems and then inquires why certain systems are not materially realized, or it asks why certain conceivable behaviors are not followed. Systems neither exist independent of an observer nor imply a purpose. (Krippendorff)
Gepostet von Nina Wenhart ... hh:mm 4:08 PM 0 replies tags - definitions, systems
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget | I'm reading: >> definition: systems ~ |
>> Douglas Davis, "The World's First Collaborative Sentence" , started 1994
from: http://www.whitney.org/arport/collection/index.shtml
Commissioned by the Lehman College Art Gallery, The City University of New York,
with the assistance of Gary Welz, Robert Schneider, and Susan Hoeltzel
Brief History
It began in December 1994, when the Lehman College Art Gallery and its director, Susan Hoeltzel, commissioned The World's First Collaborative Sentence as part of "InterActions," a survey of Douglas Davis' early work (1967-81) in a variety of media, from drawing, printmaking, and photography to performance, videotapes, and live satellite television broadcasting. Using a server provided by the City University of New York (CUNY) -- and working closely with professor Robert Schneider in the department of mathematics at Lehman College -- Davis documented the exhibition on the Web and created an entirely new work linked to the exhibition's theme.
Unveiled on December 7, 1994, the site was linked to a live performance in the Lehman College Art Gallery. Artist Nathalie Novarina, participating in the performance via phone from Geneva, supplied the Sentence's maiden image and its first words. In collaboration with Gary Welz, Davis designed the formal interactive structure of the Sentence.
In January 1995, Barbara and the late Eugene M. Schwartz purchased both the concept of the Sentence and the site itself. As a symbol of ownership, the Schwartzes received a disk that recorded the first days of the site, including the earliest contributions. The Schwartzes' generosity allowed further work to be done on the design of the Sentence as well as a revision of the introductory homepage that adds information about the meaning and intention of the work. Professor Schneider has maintained the Sentence on the Web for over ten years, breaking up the enormous volume of contributions into separate "chapters" (there are now twenty-one). Susan Hoeltzel, moreover, has actively encouraged the evolution of the Sentence at every step. The work was included in several interactive installations -- at the Kwangju Biennale in Korea in 1995, at the School of Visual Arts' "Digital Salon" exhibition later that year (which toured internationally), and in 1999 at the Zentrum für Kunst und Medientechnologie (ZKM) in Karlsruhe, Germany (as part of the exhibition "net.condition") -- all of which attracted thousands of online contributions.
In 1995, Mrs. Schwartz donated the Sentence to the Whitney Museum of American Art. Davis commemorated the Whitney's acquisition of the Sentence by designing, with Vincent M. Spina, a logo -- W-M Music -- which now lives among the year 2000 contributions to the Sentence itself. W-M stands for "Wrap Music," a series of audio files that includes conceptual songmaking and historic sounds sent to the Sentence in its earliest days.
From its inception, the Sentence has received a torrent of words, sounds, and images, contributors having learned about the site by word-of-mouth, web-based references, or press attention. The appeal of the Sentence is that it gives the world a space in which to speak its collective and its individual mind.
As of early 2000, the estimated number of actual contributions neared 200,000 and incorporated dozens of languages. The only "rule" of the Sentence is that no one is allowed to type a period at the end of their contributions. Though ingenious users have occasionally found ways to break this rule, the vast majority have abided by it with great passion, criticizing those who discover ways to type a period at the end of a grammatically completed thought. The Sentence may well go on forever, or at least until a superior force or the limitations of web technology calls a halt to it.
As the skills of users have increased, the Sentence has grown to incorporate far more than words. In addition to texts, there are now photographs, video, sounds, graphics, and links to thousands of other websites, contributed by people of all ages and cultures. Among the contributions are musings, rants, lyrical poems, political and spiritual tracts, fragments of thought, and philosophical speculation, as well as occasional vulgarities. They address such concerns as art, literature, sexuality, religion, the nature of play, the meaning of the "sentence" itself, and the vaster subjects of life and death.
Douglas Davis is grateful to all those who are writing and designing the Sentence and regards them as fully equal collaborators. He also thanks the original sponsors of the Sentence at the Lehman College Art Gallery, the students of Lehman college, and Barbara and the late Eugene M. Schwartz.
"The Sentence has no end. Sometimes I think it had no beginning. Now I salute its authors, which means all of us. You have made a wild, precious, awful, delicious, lovable, tragic, vulgar, fearsome, divine thing."
—Douglas Davis, April 4, 2000
to participate in the sentence-project, go here:
http://artport.whitney.org/collection/davis/writesentence.html
Gepostet von Nina Wenhart ... hh:mm 2:46 PM 0 replies tags - collaboration, netart, poetry, text
Bookmark this post:blogger tutorials
Social Bookmarking Blogger Widget | I'm reading: >> Douglas Davis, "The World's First Collaborative Sentence" , started 1994 ~ |
>> additional class blogs
>> labels
- Alan Turing (2)
- animation (1)
- AR (1)
- archive (14)
- Ars Electronica (4)
- art (3)
- art + technology (6)
- art + science (1)
- artificial intelligence (2)
- artificial life (3)
- artistic molecules (1)
- artistic software (21)
- artists (68)
- ASCII-Art (1)
- atom (2)
- atomium (1)
- audiofiles (4)
- augmented reality (1)
- Baby (1)
- basics (1)
- body (1)
- catalogue (3)
- CAVE (1)
- code art (23)
- cold war (2)
- collaboration (7)
- collection (1)
- computer (12)
- computer animation (15)
- computer graphics (22)
- computer history (21)
- computer programming language (11)
- computer sculpture (2)
- concept art (3)
- conceptual art (2)
- concrete poetry (1)
- conference (3)
- conferences (2)
- copy-it-right (1)
- Critical Theory (5)
- culture industry (1)
- culture jamming (1)
- curating (2)
- cut up (3)
- cybernetic art (9)
- cybernetics (10)
- cyberpunk (1)
- cyberspace (1)
- Cyborg (4)
- data mining (1)
- data visualization (1)
- definitions (7)
- dictionary (2)
- dream machine (1)
- E.A.T. (2)
- early exhibitions (22)
- early new media (42)
- engineers (3)
- exhibitions (14)
- expanded cinema (1)
- experimental music (2)
- female artists and digital media (1)
- festivals (3)
- film (3)
- fluxus (1)
- for alyor (1)
- full text (1)
- game (1)
- generative art (4)
- genetic art (3)
- glitch (1)
- glossary (1)
- GPS (1)
- graffiti (2)
- GUI (1)
- hackers and painters (1)
- hacking (7)
- hacktivism (5)
- HCI (2)
- history (23)
- hypermedia (1)
- hypertext (2)
- information theory (3)
- instructions (2)
- interactive art (9)
- internet (10)
- interview (3)
- kinetic sculpture (2)
- Labs (8)
- lecture (1)
- list (1)
- live visuals (1)
- magic (1)
- Manchester Mark 1 (1)
- manifesto (6)
- mapping (1)
- media (2)
- media archeology (1)
- media art (38)
- media theory (1)
- minimalism (3)
- mother of all demos (1)
- mouse (1)
- movie (1)
- musical scores (1)
- netart (10)
- open source (6)
- open source - against (1)
- open space (2)
- particle systems (2)
- Paul Graham (1)
- performance (4)
- phonesthesia (1)
- playlist (1)
- poetry (2)
- politics (1)
- processing (4)
- programming (9)
- projects (1)
- psychogeography (2)
- publications (36)
- quotes (2)
- radio art (1)
- re:place (1)
- real time (1)
- review (2)
- ridiculous (1)
- rotten + forgotten (8)
- sandin image processor (1)
- scientific visualization (2)
- screen-based (4)
- siggraph (1)
- situationists (4)
- slide projector (1)
- slit scan (1)
- software (5)
- software studies (2)
- Stewart Brand (1)
- surveillance (3)
- systems (1)
- tactical media (11)
- tagging (2)
- technique (1)
- technology (2)
- telecommunication (4)
- telematic art (4)
- text (58)
- theory (23)
- timeline (4)
- Turing Test (1)
- ubiquitious computing (1)
- unabomber (1)
- video (14)
- video art (5)
- video synthesizer (1)
- virtual reality (7)
- visual music (6)
- VR (1)
- Walter Benjamin (1)
- wearable computing (2)
- what is? (1)
- William's Tube (1)
- world fair (5)
- world machine (1)
- Xerox PARC (2)
>> timetravel
-
▼
08
(252)
-
▼
7
(141)
-
▼
13
(26)
- >> jodi.org
- >> Golan Levin, "AxisApplet", 2002
- >> timeline of hacker history
- >> The Mentor, "The Conscience of a Hacker", 1986
- >> McKenzie Wark, "A Hacker Manifesto [version 4.0]"
- >> La Monte Young, "Composition 1960 #10"
- >> definition: systems
- >> Douglas Davis, "The World's First Collaborative...
- >> Cornelia Sollfrank, "Women Hackers", 1999
- >> interview: Florian Cramer, Cornelia Sollfrank, ...
- >> CrimethInc., "Recipes for Disaster", 2004
- >> Cut Ups
- >> Brion Gysin, "Cut-Ups Self-Explained", 1970
- >> William S. Burroughs, "The Cut-Up Method of Bri...
- >> Roman Verostko, "Epigenetic Art Revisited: Soft...
- >> Erkki Huhtamo, "WEB STALKER SEEK AARON Reflecti...
- >> Christiane Paul, "Public CulturalProduction Art...
- >> Casey Reas, "Programming Media", 2003
- >> Christiane Paul, "CODeDOC", 2002
- >> Christiane Paul, "CODeDOC II", 2003
- >> Olga Goriunova, Alexei Shulgin , "Artistic Soft...
- >> runme.org
- >> Florian Cramer + Ulrike Gabriel, "Software Art"...
- >> Florian Cramer, "words made flesh: code, cultur...
- >> Florian Cramer, mez, ,,Re(ad.htm" , 2002
- >> Florian Cramer, "Exe.cut[up]able statements: Th...
-
▼
13
(26)
-
▼
7
(141)
>> cloudy with a chance of tags
followers
.........
- Nina Wenhart ...
- ... is a Media Art historian and researcher. She holds a PhD from the University of Art and Design Linz where she works as an associate professor. Her PhD-thesis is on "Speculative Archiving and Digital Art", focusing on facial recognition and algorithmic bias. Her Master Thesis "The Grammar of New Media" was on Descriptive Metadata for Media Arts. For many years, she has been working in the field of archiving/documenting Media Art, recently at the Ludwig Boltzmann Institute for Media.Art.Research and before as the head of the Ars Electronica Futurelab's videostudio, where she created their archives and primarily worked with the archival material. She was teaching the Prehystories of New Media Class at the School of the Art Institute of Chicago (SAIC) and in the Media Art Histories program at the Danube University Krems.