Search results for "critical%20code%20studies%20working%20group"
Results 41 - 50 of 1106
|
Page 5 of 111
|
Sorted by: Relevance | Sort by: Date
|
Results per-page: 10 | 20 | 50 | All
|
[…]some poems, some mini-essays. One even sent a power-point presentation. This enactment of net-working across diasporic distance was a way to generate creative energy, which I find is most stimulated through conversation and interaction; hence the need for collaboration in the last decade or so. I asked specifically that they comment, if they could, on the “textuality” of the pieces: that is, how they could be “read.” But I also stipulated that any kind of response – a photograph or a drawing – would be acceptable. I got wonderfully varied answers from a range of poets, friends, and colleagues. Ed […]
[…]and Bell 2007) with an awareness of close reading as a historical medium specific practice. code: As critics primarily and coders peripherally, we recognize the importance of code in digital fiction, and we do so on a continuum. On the one end, the incorporation and recombination of elements of programming language, binary code, and mark-up conventions implicitly affects the semantic space of the text. On the other end, the same codestuff can be used explicitly, infecting and inflecting the text to defamiliarize the work of art. cybersomatics and corporeality: We believe that the reading of digital fiction involves a different kind of […]
[…]Geomancy: The Kids of the Book Machine, The Collected Research Reports of The Toronto Research Group, 1973-1982 (Vancouver: Talonbooks, 1992): 60. * * * Around 1650, Georg Philipp Harsdörffer devised an ingenious ballet. It’s simple: first, give each dancer a board inscribed with a letter of the alphabet; then watch as new words or phrases emerge from dance. The very movement of the dancer’s bodies will act as a combinatory mechanism from which language springs.Jan C. Westerhoff, “Poeta Calculans: Harsdörffer, Leibniz, and the Mathesis Universalis,” Journal of the History of Ideas 60.3 (1999): 465. There is no evidence that Harsdörffer […]
[…]also links to a 37,000-page archive of chemical industry documents assembled by the Environmental Working Group (EWG), a group that also operates the Human Toxome Project’s “Mapping the Pollution in People.” Links to this project provide users with a catalogue of particular toxicants found in human bodies all over the world. The project couples this chemical data with detailed portraits of real people who have tested positive for various toxicants and chemicals. Alaimo argues that such electronic literatures combine scientific data, medical narratives, and political calls to action to provide new practice of meaning-making for ordinary experts to use in […]
[…]the functions specified by the program), and intentions (it intends to compile/interpret the code and execute the commands and routines specified there). Although the human writes the code (and other humans have constructed the hardware and software essential to the computer’s operation), he is not in control of the lines that scroll across the screen, which are determined by the randomizing function and the program’s processes. What is the point of such generative programs? I think of John Cage’s aesthetic of “chance operations,” which he saw as a way to escape from the narrow confines of consciousness and open his […]
[…]Portrait(s) [as Other(s)]” and Judd Morrissey’s “The Jew’s Daughter.” I will introduce a critical vocabulary for examining these works, grouped around the following concepts: “The Holy Grails of Electronic Literature,” “Six Varieties of Crisis,” and the “Surrealist Fortune Cookie.” Respectively, these describe: the contradictions inherent between paradigms of science and paradigms of literature and how they have shaped motivations by creators; the manner in which writers of electronic works can provide “non-trivial” reading experiences in the absence of standard literary paradigms premised on apocalyptic (or simply “plotted”) narrative; and a concept of the basic unit of the sentence in an […]
[…]Lifeon Earth (2nd ed.). New York: W.H. Freeman. Marino, M. C. (2010, September 15). “Critical Code Studies and the electronic book review: An Introduction.” EBR : Electronic Book Review. Retrieved September 20, 2011, from http://www.electronicbookreview.com/thread/firstperson/ningislanded Matthew G. Kirschenbaum. (1997, 98). Lucid Mapping and Codex Transformissions in the Z-Buffer. Retrieved February 9, 2011, fromhttp://www2.iath.virginia.edu/mgk3k/lucid/ Mauler, H. (2004). The Zoo « ZEITGUISED. Retrieved September 20, 2011, from http://zeitguised.wordpress.com/2004/05/24/the-zoo/ Merleau-Ponty, M. (1962). Phenomenology of Perception. New York: Humanities Press. Mitchell, W. J. T. (1995). Picture Theory: Essays on Verbal and Visual Representation (1st ed.). University Of Chicago Press. Mitchell, W. J. T., & Hansen, M. B. N. (Eds.). (2010). Critical Terms for Media […]
[…]The group psychological meaning of secrecy is a relation between knowledge and ignorance: as the group configures its group dynamics around a secret, its cohesion depends on the maintenance of an illusion (42). In this lengthy passage, Krapp illustrates that digital technologies and the types of discourse that find growth in them essentially segregate themselves from anything outside its discursive regime. If one accepts that conspiracy theory is finding itself rooted in digital discourse, the truth object pursued by these theorists will forever remain outside of their knowledge, as that is the only way for the interested parties to sustain […]
[…]writing was focused on the technology of books and print. Implicit in its capacity to provoke critical thinking about the form of the book is the capacity to direct this critical attention to the broader tools of literary representation, including digital interfaces and code. However, it is against the backdrop of network textuality that the fullness of this technical estrangement can be explored. While Jakobson’s use of the word “ordinary” always carried connotations with the power to categorize, command, and declare, it is the prospect of the global, networked analytic process that produces the most potent realization of such “ordinary” […]
[…]of computational art (387)—projects that invite, if not require, attention to various forms of code. Code-core cybertextualism has undeniable virtues: it usefully drives innovation both in poetic practice and critical thinking, and it builds a detailed foundation for understanding, and eventually teaching, next-generation digital literacy. Long may its models and schemas endure. At the same time, concentrating on the core obviously does not help at the margins, where we confront more ambiguous encounters between writing and information systems. Beyond providing a dour reminder of forsaken rigor, hardcore cybertextualism sheds little light on my promiscuous confusion of récriture and database/interface poetics. […]