Thursday, June 5, 2008

Week 11

This week focussed on Electronic Civil Liberties / Creative Commons / Free and Open Source Software

We spoke about some of the cases that the Electronic Frontier Foundation are currently defending. This includes the NSA/AT&T alleged spying case, where the government allegedly wiretapped the internet communications going through San Francisco.

We also discussed the Concept "Creative Commons" this is an alternative way to license content to put out onto the internet to share with other people. The creative commons scheme challenges regular copyright, by allowing the creator to specific the conditions of use of their work. This frees up content for remixing and reuse...

Again there was no tutorial tasks as this time was used to complete and update blogs.

Week 10

This week I found the reading When Pigs Fly: The Death of Oink, the Birth of Dissent, and a Brief History of Record Industry Suicide really quite interesting as it told the history/ evolution of file sharing, downloading of music and the impact this had on the industry.

Main points included were:

  • Downloading this is a form of stealing
  • Artists no longer have control of release dates, secrets (eg. artwork on cd covers being released before set dates)
  • Fans becoming enemies of the artists
  • Panic in the industry
  • The idea that everyone is entitled to use music download sites and aquire the music free of charge simply because the technology exists

We watched Cocaine Jesus, an example of post-copyright film-making: it is so cheap and easy to do that you can give it away free.

We also watched the short documentary film: Steal This Film 2

There were no tutorial tasks for this week

Week 9

This week we made use of the lecture time to watch the movie Bladerunner.

Bladerunner was made from the paranoid and reality-challenging literary work of Phillip K. Dick, author of the novel "Do Androids Dream of Electronic Sheep"

Common themes in Dick;s work include:
  • Artificial intellegence
  • Cities out of control
  • Post-industrial Dystopia
Other of Dick's novels include Ubik, A Scanner Darkly, and Flow My Tears, the Policeman Said.Movies made from Dick's stories include: Total Recall, Minority Report, Next and Paycheck.

Outlines of our written assessment (Item 2) were due this week so no tutorial tasks were carried out

Week 8

"Cyberpunk is a science fiction genre based in the possibilities inherent in computers, genetics, body modifications and corporate developments in the near future. The word comes from the amalgamation of Cybernetics (the study of communication, command and control in living organisms, machines and organisations) and Punk (a style of fast, loud, short rock music with an anarchist political philosophy and a DIY, anti-expert, 'seize the day' approach to life)."

The lecture explored the concept of Cyberpunk and movies that feature this theme

On such Movie is William Gibson's "Burning Chrome" which shares the common themes as followed:
  • the future is revolutionized by the networked computer
  • 'cyberspace' is the matrix of electronic data in those networks
  • global corporations eclipse government as the source of power
  • power depends on information rather than money or arms
  • the 'sprawl' is the jerry-built mega-city that covers most of the world and where those not employed by corporations struggle to survive
  • sim-stim (simulated stimulation) is a new entertainment format that plays directly into the body so you experience the world though the stars? senses and emotions
  • the merging of organic and mechanical elements in the human body
    the malleability of human identity

Cyberpunk Themes centre around

1. Technology and Mythology

2. Utopia and Dystopia

3. Cities and Machines

4. Technological Change

5. Modernism to Postmodernism

Interesting to note where the specific methologies that could apply to the study of these new technologies and the cultures. These include:

  • critical cyberculture studies explores the social, cultural and economic interactions that take place online;
  • critical cyberculture studies explores unfolds and examines the stories we tell about such interactions;
  • critical cyberculture studies analyses a range of social, political and economic considerations that encourage, make possible and/or thwart individual and group access to such interactions;
  • critical cyberculture assesses the deliberate, accidental and alternative technological decision- and design-processes which, when implemented, form the interface between the network and its users.

There were no tutorial task this week. We instead learnt how to research using University Databases which i found to be a big help.

Week 7

This week's lecture discussed whether or not video games are a waste of time.
  • Video Games Studies includes the following types of games:
    Arcade GamesConsolesComputer GamesMUDsMMOGs

  • Video games have evolved alongside technology/computers

  • Militaries include the use of video games for training purposes

  • Narratology is the study of video games which are structured like that of a story or literary work. It is often assumed that these games can be studied like texts. An example of work adhering to this theme include: 'Hamlet on Holodeck' by Janet Murray
  • The opposite of this is Ludology which focusses solely on game play elements. Followers argue that the story element in many games are there for decoration only

In the tutorial, we discussed the lecture and evolution of the video game. We also did an exercise that explored the basic elements of Microsoft Word and Excel. This included making a cover letter for a potential job, carried out in stages; each one adding it's own feature such as bold, italics, mailing lists etc. It was interesting to learn features that will definately come in handy many a time in the future.

Week 6

This week provided a detailed history on computers and computing. Important dates and accomplishments to note are as follows
  • The first attempt at a computer was created by Charles Babbage named the 'Difference Engine." This was designed to calculate and print mathematical tables. Unfortunately this was not completed in his lifetime. He later created the "Analytical Engine" which was a massive, brass, steam-powered, general purpose, mechanical computer.
  • Babbage was aided by Ada Byron, Lady Lovelace. She annotated her own translation of an Italian article about Babbage, named Sketch of the Analytical Engine.
  • Work on the computer was later carried out by Alan Turing who invented the first working computer, The Bombe.
  • Computers were first commercially produced by IBM in the 1950s
  • Xerox PARC developed the mouse and GUI in the early 70s
  • The first personal computer was released in 1975
  • Bill Gates wrote a language called BASIC for the Altair
  • Steve Jobs and Steve Wozniak created Apple
  • IBM and Microsoft joined to take over the computing industry
  • Linus Torvalds created GNU/Linux (Open Source software development)
  • The internet, is a network of networks (what is often called an internetwork).
  • The idea of the internet came from the RAND corporation in the 1960s
  • The World Wide Web or Web for short, is one particular use of the Internet that emerged in the 1990s. The Web merges the techniques of (i) internetworking and (ii) hypertext to make an easy-to-use, but powerful, global system that shares all information accessible as part of a seamless hypertext space.
  • Cyberspace is a much more difficult term to define, sitting as it does at the interconnction of reality and imagination, the hardware and the software, logic assembly of silicon and electricity on the desk and the wetware between your ears.
  • In 1972 Karl Popper wrote about the nature of reality as being divided into three worlds:
    World 1 - the objective material world of natural things and their physical properties
    World 2 - subjective consciousness: intentions, calculations, feelings, thoughts, dreams, memories, etc in individual minds
    World 3 - the public structures produced by living minds interacting with each other and the real world.
  • Early Internet Applications include: Email, File Transfer Protocol (FTP), Internet Relay Chat (IRC), MUDs - Multy User Domain games.

There was no Tute due to Anzac day.

Wednesday, May 7, 2008

Week 5

This week’s lecture gave a good insight into Wikipedia and its credibility. It was learned that Wikipedia is not a credible, scholarly source. This is evident as shown in the articles written about Steve Stockwell and Lee Cox which held no truthfulness whatsoever. Whereas there are people employed to screen everything that is written to ensure truthfulness and credibility, articles are being posted at such a fast rate that these editors cannot keep up.

A short story – Tlon, Uqbar, Orbis Tertius by Jorge Luis Borges was read as well. Although quite hard to understand, the story explored ideas of a made up country, Uqbar, and how by creating false knowledge, truth is altered and people can start to believe it without physical proof.

Important notes included:
Correspondence Theory: Just the facts - observable, measurableCoherence Theory: Does it fit together and make sense?Performative Theory: I do declare
Social Theory: What can we agree on?

Tutorial Task
Walter Benjamin’s ideas in “Art in the Age of Mechanical Reproduction” do apply to contemporary digital media as it discusses new forms of communication in comparison to old forms eg. Audiences seeing everything in a play in comparison to the highly edited forms of entertainment watched nowadays, in the forms of television and movies.
Now that anyone with a computer can create things digitally (music, images, videos, etc), art is starting to lose its authenticity. Artworks made in the past suffer in physical condition and change ownership many times. Digital art can always be produced as many times as needed as well as updated – therefore losing its authenticity.
For this reason, photo shopped images are not authentic.
Also, it was found that digital things do not have an aura, as said by Benjamin, “that which withers in the age of mechanical reproduction is the aura of the work of art.” He further explains that “the technique of reproduction detaches the reproduced object from the domain of tradition.” Really, once a work of art is reproduced, the original loses its value as everyone has access to their own copy at much cheaper prices.

Wednesday, April 9, 2008

Week 4

This week’s lecture reflected upon Old Communication Technologies, with the lecture starting off with a look at an old rock scribing featuring animals in different positions with several humans scattered over the piece. Whereas the meaning of the work was unclear, it was still interesting to note the way humans communicated in that age.
Also discussed was the origins of the alphabet, ancient texts and jumping forward many years, print, telegraph, telephone, radio, cinema etc.
The subject of semiotics was also brought up, which seemed interesting, followed by the perspectives of several notable theorists.

During the tutorial this week, a scavenger hunt was conducted with the answers as follows; (Some were not found)


1.

2. Johan Vaaler, a Norwegian inventor with a degree in electronics, science and mathematics, invented the paperclip in 1899. http://inventors.about.com/library/inventors/blpaperclip.htm
3. The disease is caused by infection with Ebola virus, named after a river in the Democratic Republic of the Congo (formerly Zaire) in Africa, where it was first recognized. http://www.cdc.gov/ncidod/dvrd/spb/mnpages/dispages/ebola/qa.htm
4. The largest recorded earthquake in the world was a magnitude 9.5 (Mw) in Chile on May 22, 1960. http://www.cdli.ca/CITE/earthquakes_what.htm
5. 1,073,741,824 kilobytes in a terabyte; the power: 2^30 http://www.t1shopper.com/tools/calculate/
6. Ray Tomlinson http://emlab.berkeley.edu/users/bhhall/e124/e124emailinvention.pdf
7. A fast-spreading bot/virus that participates in a network of infected computers and allows a hacker to control your computer
http://resnet.ucsd.edu/stormworm.shtml Heise Security estimates that, as of early August 2007, 1.7 million computers were infected worldwide as part of a massive botnet, and that number has surely escalated since then. http://arstechnica.com/news.ars/post/20070902-storm-worm-adds-millions-of-computers-to-botnet.html
8.
9. Veteran Rex
http://www.brispop.com/index.cfm?action=dsp_bio&artistID=611
10.

Also in the tutorial, the question was asked as to how search engines rank the stuff they find on the internet. I found this brief description on
http://www.buzzle.com/editorials/6-10-2005-71368.asp

“It's common knowledge that Google relies heavily
on inbound relevant links to rank a site. Now they explain exactly how it works.
As well as the number, quality and anchor text factors of a link. Google
seems to also consider historical factors. Apparently the Google 'sandbox' or
aging delay begins count down the minute links to a new site are discovered.
Google records the discovery of a link, link changes over time, the speed at
which a site gains links and the link life span."



Another useful site I found entitled “Search Engine Ranking Factors” which was put together by 37 leaders in the world of organic search engine optimization and included 200+ ranking factors. Although too long to be summarised in this blog, it is of much value and is recommended for reading. The site is:
http://www.seomoz.org/article/search-ranking-factors

When asked what our favourite search engine is, I decided have found Google to be my favourite search engine, for the simple fact that it provides a vast array of information closely related to the searched subject matter.

Wednesday, April 2, 2008

Week 3

This week’s lecture provided time for us to watch Jean Luc Godard’s film Alphaville, made in 1965. The film centres around a detective agent from the ‘Outlands’ who enters Alphaville – a large area controlled by Professor Von Braun and an obscenely large computer referred to as Alpha-60. The great power of Alpha-60 has caused citizens of Alphaville to lose the ability to think, feel and love. The movie was quite hard to understand, but the main issue derived from the it was that of ever changing and evolving technology and its impact on humans. It stirred thought as to the perceptions of the movie at the time of it's release. In 1965 the issues and ideologies explored would have been outlandish and hard to digest, whereas we now look back over thirty years later to find the technologies are now standard and widely accessed, although the computer has not yet managed to take over human thought. Once getting past the initial frustrations of subtitles, novice special effects and the like, the movie can be appreciated for it's artistic value and important place in the realm of communication and technology.

In this week’s tutorial the film Alphaville was discussed. Also touched on were the views on the movie from 1965 as opposed to today. It was found that the ideas the film presented would have seemed obscene and outlandish to those who viewed the film in 1965, but are now looked viewed as old and basic, with technology having evolved in leaps and bounds since the film’s making.
Also, the blogs were worked on, and a new feature of ‘friend adding’ was discovered. This will enable students to share ideas, provide constructive critisism and form an interactive online presence.

Wednesday, March 19, 2008

Week 2

Clearly email is not dead. This became apparent in week two’s lecture after reviewing the results of the New Communication Technology survey. Around 60% of survey participants say email has its place, many of whom are using email on a weekly basis. With 81% of survey takers saying they like having a wide range of information available to them as opposed to the 16% who feel overloaded, it looks as if the internet is more than useful. Pew Internet (Pew Internet & American Life Project) was of great use during the lecture, giving insight into the many uses the internet has, as well as examples of positive attitudes towards the internet.

Despite the many benefits the internet provides for us, awareness was raised the lecture as to just how many scams are presently operating via the internet. Phishing, spam, empty promises and thousands of inappropriate advertisements bombard email accounts on a daily basis. Privacy is imperative and personal details, especially bank details, must never be given out on the internet.

Are bloggers journalists? This was also a question of much discussion brought up in the lecture. An interesting point of thought was whether bloggers have the qualifications to be a journalist and if so, do they have morals or ethics they must abide by? Because of the increasing number of bloggers sharing their opinion on present issues, information sources are becoming unreliable due to the sharing of incorrect or bias viewpoints – something that must be considered when researching for assignments.

In tutorial, the week’s lecture was discussed and blog accounts were set up. Also, the ‘save as’ issue was covered and now all students are aware of where documents can be saved, with up to 50 megabytes available. Some issues occurred with students being unable to log in, and some automatically being logged out which proved the idea bought up in the lecture in that caution must be taken as technology is not 100% reliable.