logo for University of Chicago Press
Chicago Guide to Preparing Electronic Manuscripts
The University of Chicago Press
University of Chicago Press, 1987
This guide to preparing manuscripts on computer offers authors and publishers practical assistance on how to use authors' disks or tapes for typesetting. When the thirteenth edition of The Chicago Manual of Style was published in 1982, the impact of personal computers on the publishing process had just begun to be felt. This new book supplements information in the Chicago Manual by covering the rapidly changing subject of electronic manuscripts. Since the early 1980s more and more authors have been producing manuscripts on computers and expecting their publishers to make use of the electronic version. For a number of reasons, including the proliferation of incompatible machines and software, however, publishers have not always found it easy to work with electronic manuscripts. The University of Chicago Press has been doing so since 1981, and in this book passes on the results of six years' experience with preparing such manuscripts and converting them to type.
[more]

front cover of China and the Internet
China and the Internet
Using New Media for Development and Social Change
Song Shi
Rutgers University Press, 2024
Two oversimplified narratives have long dominated news reports and academic studies of China’s Internet: one lauding its potentials to boost commerce, the other bemoaning state control and measures against the forces of political transformations. This bifurcation obscures the complexity of the dynamic forces operating on the Chinese Internet and the diversity of Internet-related phenomena. China and the Internet analyzes how Chinese activists, NGOs, and government offices have used the Internet to fight rural malnutrition, the digital divide, the COVID-19 pandemic, and other urgent problems affecting millions of people. It presents five theoretically informed case studies of how new media have been used in interventions for development and social change, including how activists battled against COVID-19. In addition, this book applies a Communication for Development approach to examine the use and impact of China’s Internet. Although it is widely used internationally in Internet studies, Communication for Development has not been rigorously applied in studies of China’s Internet. This approach offers a new perspective to examine the Internet and related phenomena in Chinese society.
[more]

front cover of Chromatic Algorithms
Chromatic Algorithms
Synthetic Color, Computer Art, and Aesthetics after Code
Carolyn L. Kane
University of Chicago Press, 2014
These days, we take for granted that our computer screens—and even our phones—will show us images in vibrant full color. Digital color is a fundamental part of how we use our devices, but we never give a thought to how it is produced or how it came about.
           
Chromatic Algorithms reveals the fascinating history behind digital color, tracing it from the work of a few brilliant computer scientists and experimentally minded artists in the late 1960s and early ‘70s through to its appearance in commercial software in the early 1990s. Mixing philosophy of technology, aesthetics, and media analysis, Carolyn Kane shows how revolutionary the earliest computer-generated colors were—built with the massive postwar number-crunching machines, these first examples of “computer art” were so fantastic that artists and computer scientists regarded them as psychedelic, even revolutionary, harbingers of a better future for humans and machines. But, Kane shows, the explosive growth of personal computing and its accompanying need for off-the-shelf software led to standardization and the gradual closing of the experimental field in which computer artists had thrived.
           
Even so, the gap between the bright, bold presence of color onscreen and the increasing abstraction of its underlying code continues to lure artists and designers from a wide range of fields, and Kane draws on their work to pose fascinating questions about the relationships among art, code, science, and media in the twenty-first century.
[more]

front cover of Coding and Redundancy
Coding and Redundancy
Man-Made and Animal-Evolved Signals
Jack P. Hailman
Harvard University Press, 2008

This book explores the strikingly similar ways in which information is encoded in nonverbal man-made signals (e.g., traffic lights and tornado sirens) and animal-evolved signals (e.g., color patterns and vocalizations). The book also considers some coding principles for reducing certain unwanted redundancies and explains how desirable redundancies enhance communication reliability.

Jack Hailman believes this work pioneers several aspects of analyzing human and animal communication. The book is the first to survey man-made signals as a class. It is also the first to compare such human-devised systems with signaling in animals by showing the highly similar ways in which the two encode information. A third innovation is generalizing principles of quantitative information theory to apply to a broad range of signaling systems. Finally, another first is distinguishing among types of redundancy and their separation into unwanted and desirable categories.

This remarkably novel book will be of interest to a wide readership. Appealing not only to specialists in semiotics, animal behavior, psychology, and allied fields but also to general readers, it serves as an introduction to animal signaling and to an important class of human communication.

[more]

front cover of Cognitive Sensing Technologies and Applications
Cognitive Sensing Technologies and Applications
G.R. Sinha
The Institution of Engineering and Technology, 2023
Cognitive sensing systems combined with IoTs and smart technologies are used in countless applications such as industrial robotics, computer-aided diagnosis, brain-computer interface (BCI), human-computer interaction (HCI), telemedicine, driverless cars and smart energy systems.
[more]

front cover of Collaborative Language Engineering
Collaborative Language Engineering
A Case Study in Efficient Grammar-Based Processing
Edited by Stephan Oepen, Dan Flickinger, Jun-ichi Tsujii, and Hans Uszkoreit
CSLI, 2001
Following high hopes and subsequent disillusionment in the late 1980s, the past decade of work in language engineering has seen a dramatic increase in the power and sophistication of statistical approaches to natural language processing, along with a growing recognition that these methods alone cannot meet the full range of demands for applications of NLP. While statistical methods, often described as 'shallow' processing techniques, can bring real advantages in robustness and efficiency, they do not provide the precise, reliable representations of meaning which more conventional symbolic grammars can supply for natural language. A consistent, fine-grained mapping between form and meaning is of critical importance in some NLP applications, including machine translation, speech prosthesis, and automated email response. Recent advances in grammar development and processing implementations offer hope of meeting these demands for precision.

This volume provides an update on the state of the art in the development and application of broad-coverage declarative grammars built on sound linguistic foundations - the 'deep' processing paradigm - and presents several aspects of an international research effort to produce comprehensive, re-usable grammars and efficient technology for parsing and generating with such grammars.
[more]

front cover of Collected Papers of Martin Kay
Collected Papers of Martin Kay
A Half Century of Computational Linguistics
Martin Kay, with the editorial assistance of Dan Flickinger and Stephan Oepen
CSLI, 2010
Since the dawn of the age of computers, researchers have been pushing the limits of available processing power to tackle the formidable challenge of developing software that can understand ordinary human language.  At the forefront of this quest for the past fifty years, Martin Kay has been a constant source of new algorithms which have proven fundamental to progress in computational linguistics. Collected Papers of Martin Kay, the first comprehensive collection of his works to date, opens a window into the growth of an increasingly important field of scientific research and development. 
 
 
[more]

front cover of Computer
Computer
Paul Atkinson
Reaktion Books, 2010

The pixelated rectangle we spend most of our day staring at in silence is not the television as many long feared, but the computer—the ubiquitous portal of work and personal lives. At this point, the computer is almost so common we don’t notice it in our view. It’s difficult to envision that not that long ago it was a gigantic, room-sized structure only to be accessed by a few inspiring as much awe and respect as fear and mystery. Now that the machine has decreased in size and increased in popular use, the computer has become a prosaic appliance, little-more noted than a toaster. These dramatic changes, from the daunting to the ordinary, are captured in Computer by design historian Paul Atkinson.

Here, Atkinson chronicles the changes in physical design of the computer and shows how these changes in design are related to changes in popular attitude. Atkinson is fascinated by how the computer has been represented and promoted in advertising. For example, in contrast to ads from the 1970s and ’80s, today’s PC is very PC—genderless, and largely status free. Computer also considers the role of the computer as a cultural touchstone, as evidenced by its regular appearance in popular culture, including the iconography of the space age, HAL from 2001: A Space Odyssey, James Bond’s gadgetry, and Stars War and Star Trek.

Computer covers many issues ignored by other histories of computing, which have focused on technology and the economics involved in their production, but rarely on the role of fashion in the physical design and promotion of computers and their general reception. The book will appeal to professionals and students of design and technology as well as those interested in the history of computers and how they have shaped—and been shaped by—our lives.

[more]

logo for Harvard University Press
The Computer and the Mind
An Introduction to Cognitive Science
Philip Johnson-Laird
Harvard University Press, 1988

In a field choked with seemingly impenetrable jargon, Philip N. Johnson-Laird has done the impossible: written a book about how the mind works that requires no advance knowledge of artificial intelligence, neurophysiology, or psychology. The mind, he says, depends on the brain in the same way as the execution of a program of symbolic instructions depends on a computer, and can thus be understood by anyone willing to start with basic principles of computation and follow his step-by-step explanations.

The author begins with a brief account of the history of psychology and the birth of cognitive science after World War II. He then describes clearly and simply the nature of symbols and the theory of computation, and follows with sections devoted to current computational models of how the mind carries out all its major tasks, including visual perception, learning, memory, the planning and control of actions, deductive and inductive reasoning, and the formation of new concepts and new ideas. Other sections discuss human communication, meaning, the progress that has been made in enabling computers to understand natural language, and finally the difficult problems of the conscious and unconscious mind, free will, needs and emotions, and self-awareness. In an envoi, the author responds to the critics of cognitive science and defends the computational view of the mind as an alternative to traditional dualism: cognitive science integrates mind and matter within the same explanatory framework.

This first single-authored introduction to cognitive science will command the attention of students of cognitive science at all levels including psychologists, linguists, computer scientists, philosophers, and neuroscientists--as well as all readers curious about recent knowledge on how the mind works.

[more]

logo for The Institution of Engineering and Technology
Computer Control of Real-Time Processes
S. Bennett
The Institution of Engineering and Technology, 1990
This book provides an introduction to many aspects of computer control. It covers techniques or control algorithm design and tuning of controllers; computer communications; parallel processing; and software design and implementation. The theoretical material is supported by case studies covering power systems control, robot manipulators, liquid natural as vaporisers, batch control of chemical processes; and active control of aircraft.
[more]

logo for Harvard University Press
A Computer Perspective
Charles Eames
Harvard University Press, 1973

A Computer Perspective is an illustrated essay on the origins and first lines of development of the computer. The complex network of creative forces and social pressures that have produced the computer is personified here in the creators of instruments of computation, and their machines or tables; the inventors of mathematical or logical concepts and their applications; and the fabricators of practical devices to serve the immediate needs of government, commerce, engineering, and science.

The book is based on an exhibition conceived and assembled for International Business Machines Corporation. Like the exhibition, it is not a history in the narrow sense of a chronology of concepts and devices. Yet these pages actually display more true history (in relation to the computer) than many more conventional presentations of the development of science and technology.

[more]

logo for Harvard University Press
A Computer Perspective
Background to the Computer Age, New Edition
Charles Eames and Ray Eames
Harvard University Press, 1990

A Computer Perspective is an illustrated essay on the origins and first lines of development of the computer. The complex network of creative forces and social pressures that have produced the computer is personified here in the creators of instruments of computation, and their machines or tables; the inventors of mathematical or logical concepts and their applications; and the fabricators of practical devices to serve the immediate needs of government, commerce, engineering, and science.

The book is based on an exhibition conceived and assembled for International Business Machines (IBM) Corporation. Like the exhibition, it is not a history in the narrow sense of a chronology of concepts and devices. Yet these pages actually display more true history (in relation to the computer) than many more conventional presentations of the development of science and technology.

[more]

front cover of Computer Vision and Recognition Systems Using Machine and Deep Learning Approaches
Computer Vision and Recognition Systems Using Machine and Deep Learning Approaches
Fundamentals, technologies and applications
Chiranji Lal Chowdhary
The Institution of Engineering and Technology, 2021
Computer vision is an interdisciplinary scientific field that deals with how computers obtain, store, interpret and understand digital images or videos using artificial intelligence based on neural networks, machine learning and deep learning methodologies. They are used in countless applications such as image retrieval and classification, driving and transport monitoring, medical diagnostics and aerial monitoring.
[more]

logo for Intellect Books
Computers and Art
Second Edition
Edited by Stuart Mealing
Intellect Books, 2002
Computers and Art provides insightful perspectives on the use of the computer as a tool for artists. The approaches taken vary from its historical, philosophical and practical implications to the use of computer technology in art practice. The contributors include an art critic, an educator, a practising artist and a researcher. Mealing looks at the potential for future developments in the field, looking at both the artistic and the computational aspects of the field.
[more]

front cover of Computers in Education
Computers in Education
A Half-Century of Innovation
Robert Smith
CSLI, 2015
Described by the New York Times as a visionary “pioneer in computerized learning,” Patrick Suppes (1922-2014) and his many collaborators at Stanford University conducted research on the development, commercialization, and use of computers in education from 1963 to 2013. Computers in Education synthesizes this wealth of scholarship into a single succinct volume that highlights the profound interconnections of technology in education. By capturing the great breadth and depth of this research, this book offers an accessible introduction to Suppes’s striking work.
[more]

logo for Harvard University Press
Computers, Inc.
Japan’s Challenge to IBM
Marie Anchordoguy
Harvard University Press, 1989

This account of efforts to build a domestic Japanese computer industry is enlivened with quotations from industrial leaders commenting on the stages through which Japan has emerged as a world-class competitor.

In the late 1950s, Japan was still relying on IBM and other foreign suppliers. After the decision to enter the computer field, the government used protectionism, financial aid, and cooperative R&D projects to assist firms in developing hardware and improving their technology. The establishment of a quasi-public computer rental company to carry the burden of financing rentals played a key role in helping fledgling firms compete with IBM.

Marie Anchordoguy shows how government intervention in the market avoided the risks of technological sluggishness by encouraging keen competition among domestic computer firms. She traces the growth of Japanese computer hardware to Japan’s position as an exporter of mainframes and describes some of the problems encountered in producing software. This study provides a clear example of the way in which government–industry cooperation has enhanced Japan’s position in the world market.

[more]

logo for University of Minnesota Press
Computers, Surveillance, and Privacy
David Lyon and Elia Zureik, Editors
University of Minnesota Press, 1996

Computers, Surveillance, and Privacy was first published in 1996. Minnesota Archive Editions uses digital technology to make long-unavailable books once again accessible, and are published unaltered from the original University of Minnesota Press editions.

From computer networks to grocery store checkout scanners, it is easier and easier for governments, employers, advertisers, and individuals to gather detailed and sophisticated information about each of us. In this important new collection, the authors question the impact of these new technologies of surveillance on our privacy and our culture.

Although surveillance-literally some people "watching over" others-is as old as social relationships themselves, with the advent of the computer age this phenomenon has acquired new and distinctive meanings. Technological advances have made it possible for surveillance to become increasingly global and integrated-both commercial and government-related personal data flows more frequently across national boundaries, and the flow between private and public sectors has increased as well.

Addressing issues of the global integration of surveillance, social control, new information technologies, privacy violation and protection, and workplace surveillance, the contributors to Computers, Surveillance, and Privacy grapple with the ramifications of these concerns for society today. Timely and provocative, this collection will be of vital interest to anyone concerned with resistance to social control and incursions into privacy.

Contributors: Jonathan P. Allen, Colin J. Bennett, Simon G. Davies, Oscar H. Gandy Jr., Calvin C. Gotlieb, Rob Kling, Gary T. Marx, Abbe Mowshowitz, Judith A. Perrolle, Mark Poster, Priscilla M. Regan, James B. Rule.

David Lyon is professor of sociology at Queen's University, Canada. His previous books include The Electronic Eye: The Rise of Surveillance Society (Minnesota, 1994). Elia Zureik is also professor of sociology at Queen's University, Canada, and coedited (with Dianne Hartling) The Social Context of the New Information and Communication Technologies (1987).

[more]

front cover of The Computer's Voice
The Computer's Voice
From Star Trek to Siri
Liz W. Faber
University of Minnesota Press, 2020

A deconstruction of gender through the voices of Siri, HAL 9000, and other computers that talk

Although computer-based personal assistants like Siri are increasingly ubiquitous, few users stop to ask what it means that some assistants are gendered female, others male. Why is Star Trek’s computer coded as female, while HAL 9000 in 2001: A Space Odyssey is heard as male? By examining how gender is built into these devices, author Liz W. Faber explores contentious questions around gender: its fundamental constructedness, the rigidity of the gender binary, and culturally situated attitudes on male and female embodiment.

Faber begins by considering talking spaceships like those in Star Trek, the film Dark Star, and the TV series Quark, revealing the ideologies that underlie space-age progress. She then moves on to an intrepid decade-by-decade investigation of computer voices, tracing the evolution from the masculine voices of the ’70s and ’80s to the feminine ones of the ’90s and ’00s. Faber ends her account in the present, with incisive looks at the film Her and Siri herself.

Going beyond current scholarship on robots and AI to focus on voice-interactive computers, The Computer’s Voice breaks new ground in questions surrounding media, technology, and gender. It makes important contributions to conversations around the gender gap and the increasing acceptance of transgender people. 

[more]

front cover of Computing Taste
Computing Taste
Algorithms and the Makers of Music Recommendation
Nick Seaver
University of Chicago Press, 2022
Meet the people who design the algorithms that capture our musical tastes.
 
The people who make music recommender systems have lofty goals: they want to broaden listeners’ horizons and help obscure musicians find audiences, taking advantage of the enormous catalogs offered by companies like Spotify, Apple Music, and Pandora. But for their critics, recommender systems seem to embody all the potential harms of algorithms: they flatten culture into numbers, they normalize ever-broadening data collection, and they profile their users for commercial ends. Drawing on years of ethnographic fieldwork, anthropologist Nick Seaver describes how the makers of music recommendation navigate these tensions: how product managers understand their relationship with the users they want to help and to capture; how scientists conceive of listening itself as a kind of data processing; and how engineers imagine the geography of the world of music as a space they care for and control.
 
Computing Taste rehumanizes the algorithmic systems that shape our world, drawing attention to the people who build and maintain them. In this vividly theorized book, Seaver brings the thinking of programmers into conversation with the discipline of anthropology, opening up the cultural world of computation in a wide-ranging exploration that travels from cosmology to calculation, myth to machine learning, and captivation to care.
[more]

front cover of Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Lillian Ablon
RAND Corporation, 2016
Although spending on cybersecurity continues to grow, companies, government agencies, and nonprofit organizations are still being breached, and sensitive personal, financial, and health information is still being compromised. This report sets out the results of a study of consumer attitudes toward data breaches, notifications that a breach has occurred, and company responses to such events.
[more]

front cover of Control-Based Operating System Design
Control-Based Operating System Design
Alberto Leva
The Institution of Engineering and Technology, 2013
Control-Based Operating System Design describes the application of system- and control-theoretical methods to the design of computer operating system components. It argues that computer operating system components should not be first 'designed' and then 'endowed with control', but rather when possible conceived from the outset as controllers, synthesised and assessed in the system-theoretical world of dynamic models, and then realised as control algorithms. Doing so is certainly a significant perspective shift with respect to current practices in operating system design, but the payoff is significant too. In some sense, adopting the suggested attitude means viewing computing systems as cyber-physical ones, where the operating system plays the computational role, the physical elements are the managed resources, and the various (control) functionalities to be realised, interact and co-operate as a network.
[more]

front cover of Conversation and Community
Conversation and Community
Chat in a Virtual World
Lynn Cherny
CSLI, 1999
Conversation and Community is an examination of the speech community in an Internet 'virtual community'. Based on ethnographic research on a community of users of a MUD, or 'multi-user dimension', the book describes a close-knit community united in features of their language use, shared history, and relationships to other online communities. The author invokes the notion of register, or the variety of speech adapted to the communication situation, in her discussion of how users overcome the limitations of the typed, text medium and exploit its affordances for comfortable communication. Routines, conventional vocabulary and abbreviations, syntactic and semantic phenomena, and special turn-taking and repair strategies distinguish the MUD community's register. Because the MUD is programmable, commands may be added which reflect, alter, or reinforce the linguistic practices and culture of the community; competent speakers must also know the commands that produce the correct linguistic forms.
[more]

front cover of The Cost of Free Shipping
The Cost of Free Shipping
Amazon in the Global Economy
Jake Alimahomed-Wilson
Pluto Press, 2021

Winner of the United Association for Labor Education Book Award 2021, this is essential reading for everyone who wants to understand the role of Amazon in our economy and society. With Amazon, supply-chain, and unionization in the news, it is both timely and incredibly informative.

Amazon is the most powerful corporation on the planet and its CEO, Jeff Bezos, has become one of the richest individuals in history, and one of the few people to profit from a global pandemic. Its dominance has reshaped the global economy itself: we live in the age of “Amazon Capitalism.” 

“One-click” instant consumerism and its immense variety of products has made Amazon a worldwide household name, with over 60% of US households subscribing to Amazon Prime. In turn, these subscribers are surveilled by the corporation. Amazon is also one of the world's largest logistics companies, resulting in weakened unions and lowered labor standards.

The company has also become the largest provider of cloud-computing services and home surveillance systems, not to mention the ubiquitous Alexa.

With cutting-edge analyses, this book looks at the many dark facets of the corporation, including automation, surveillance, tech work, workers' struggles, algorithmic challenges, the disruption of local democracy and much more. The Cost of Free Shipping shows how Amazon represents a fundamental shift in global capitalism that we should name, interrogate, and be primed to resist.
 

[more]

front cover of The Counterfeit Coin
The Counterfeit Coin
Videogames and Fantasies of Empowerment
Christopher Goetz
Rutgers University Press, 2023
The Counterfeit Coin argues that games and related entertainment media have become almost inseparable from fantasy. In turn, these media are making fantasy itself visible in new ways. Though apparently asocial and egocentric—an internal mental image expressing the fulfillment of some wish—fantasy has become a key term in social contestations of the emerging medium. At issue is whose fantasies are catered to, who feels powerful and gets their way, and who is left out. This book seeks to undo the monolith of commercial gaming by locating multiplicity and difference within fantasy itself. It introduces and tracks three broad fantasy traditions that dynamically connect apparently distinct strata of a game (story and play), that join games to other media, and that encircle players in pleasurable loops as they follow these connections.
[more]

front cover of Craft Obsession
Craft Obsession
The Social Rhetorics of Beer
Jeff Rice
Southern Illinois University Press, 2016
Denied access to traditional advertising platforms by lack of resources, craft breweries have proliferated despite these challenges by embracing social media platforms, and by creating an obsessed culture of fans. In Craft Obsession, Jeff Rice uses craft beer as a case study to demonstrate how social media platforms such as Facebook and Twitter function to shape stories about craft.

Rice weaves together theories of writing, narrative, new media, and rhetoric with a personal story of his passion for craft beer. He identifies six key elements of social media rhetoric—anecdotes, repetition, aggregation, delivery, sharing, and imagery—and examines how each helps to transform small, personal experiences with craft into a more widespread movement. When shared via social media, craft anecdotes—such as the first time one had a beer—interrupt and repeat one another, building a sense of familiarity and identity among otherwise unconnected people. Aggregation, the practice of joining unlike items into one space, builds on this network identity, establishing a connection to particular brands or locations, both real and virtual. The public releases of craft beers are used to explore the concept of craft delivery, which involves multiple actors across multiple spaces and results in multiple meanings. Finally, Rice highlights how personal sharing operates within the community of craft beer enthusiasts, who share online images of acquiring, trading for, and consuming a wide variety of beers. These shared stories and images, while personal for each individual, reflect the dependence of craft on systems of involvement. Throughout, Rice relates and reflects on his own experience as a craft beer enthusiast and his participation via social media in these systems.

Both an objective scholarly study and an engaging personal narrative about craft beer, Craft Obsession provides valuable insights into digital writing, storytelling, and social media.
[more]

front cover of Creation
Creation
Life and How to Make It
Steve Grand
Harvard University Press, 2001

Working mostly alone, almost single-handedly writing 250,000 lines of computer code, Steve Grand produced Creatures®, a revolutionary computer game that allowed players to create living beings complete with brains, genes, and hormonal systems—creatures that would live and breathe and breed in real time on an ordinary desktop computer. Enormously successful, the game inevitably raises the question: What is artificial life? And in this book—a chance for the devoted fan and the simply curious onlooker to see the world from the perspective of an original philosopher-engineer and intellectual maverick—Steve Grand proposes an answer.

From the composition of the brains and bodies of artificial life forms to the philosophical guidelines and computational frameworks that define them, Creation plumbs the practical, social, and ethical aspects and implications of the state of the art. But more than that, the book gives readers access to the insights Grand acquired in writing Creatures—insights that yield a view of the world that is surprisingly antireductionist, antimaterialist, and (to a degree) antimechanistic, a view that sees matter, life, mind, and society as simply different levels of the same thing. Such a hierarchy, Grand suggests, can be mirrored by an equivalent one that exists inside a parallel universe called cyberspace.

[more]

front cover of The Creativity Code
The Creativity Code
Art and Innovation in the Age of AI
Marcus du Sautoy
Harvard University Press, 2020

“A brilliant travel guide to the coming world of AI.”
—Jeanette Winterson


What does it mean to be creative? Can creativity be trained? Is it uniquely human, or could AI be considered creative?

Mathematical genius and exuberant polymath Marcus du Sautoy plunges us into the world of artificial intelligence and algorithmic learning in this essential guide to the future of creativity. He considers the role of pattern and imitation in the creative process and sets out to investigate the programs and programmers—from Deep Mind and the Flow Machine to Botnik and WHIM—who are seeking to rival or surpass human innovation in gaming, music, art, and language. A thrilling tour of the landscape of invention, The Creativity Code explores the new face of creativity and the mysteries of the human code.

“As machines outsmart us in ever more domains, we can at least comfort ourselves that one area will remain sacrosanct and uncomputable: human creativity. Or can we?…In his fascinating exploration of the nature of creativity, Marcus du Sautoy questions many of those assumptions.”
Financial Times

“Fascinating…If all the experiences, hopes, dreams, visions, lusts, loves, and hatreds that shape the human imagination amount to nothing more than a ‘code,’ then sooner or later a machine will crack it. Indeed, du Sautoy assembles an eclectic array of evidence to show how that’s happening even now.”
The Times

[more]

front cover of Crime Dot Com
Crime Dot Com
From Viruses to Vote Rigging, How Hacking Went Global
Geoff White
Reaktion Books, 2021
From Anonymous to the Dark Web, a dizzying account of hacking—past, present, and future.

“Brilliantly researched and written.”—Jon Snow, Channel 4 News

 
“A comprehensive and intelligible account of the elusive world of hacking and cybercrime over the last two decades. . . . Lively, insightful, and, often, alarming.”—Ewen MacAskill, Guardian

On May 4, 2000, an email that read “kindly check the attached LOVELETTER” was sent from a computer in the Philippines. Attached was a virus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com. In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States’ hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war. From Anonymous to the Dark Web, Ashley Madison to election rigging, Crime Dot Com is a thrilling, dizzying, and terrifying account of hacking, past and present, what the future has in store, and how we might protect ourselves from it.
[more]

front cover of Critiquing Communication Innovation
Critiquing Communication Innovation
New Media in a Multipolar World
Rolien Hoyng
Michigan State University Press, 2022
Challenges to Silicon Valley’s dominant role in conjuring and patenting the world’s technological futures are arising around the world. As digital media technologies emerge from new, globally dispersed locations, a multipolar order of communication innovation seems to be in the making. Yet recovering our ability to imagine futures otherwise requires negotiating conditions—economic, geopolitical, sociocultural, and ecological—rather than reproducing them under the pretext of breaking with the present. The essays in this volume examine research on such conditions critically and comparatively in a variety of geographies. Paying due attention to China’s rise as an innovative platform society and AI powerhouse, this book addresses the broader question of a shifting world order and trends that are shaped by China’s influence but that extend beyond its borders. Looking at multipolar communication innovation through various critical lenses, our technological futures simultaneously appear to be old, new, and uncertain, while the infrastructures and platforms underpinning communication innovation both affiliate communities and set them apart.
[more]

front cover of The Cultural Logic of Computation
The Cultural Logic of Computation
David Golumbia
Harvard University Press, 2009

Advocates of computers make sweeping claims for their inherently transformative power: new and different from previous technologies, they are sure to resolve many of our existing social problems, and perhaps even to cause a positive political revolution.

In The Cultural Logic of Computation, David Golumbia, who worked as a software designer for more than ten years, confronts this orthodoxy, arguing instead that computers are cultural “all the way down”—that there is no part of the apparent technological transformation that is not shaped by historical and cultural processes, or that escapes existing cultural politics. From the perspective of transnational corporations and governments, computers benefit existing power much more fully than they provide means to distribute or contest it. Despite this, our thinking about computers has developed into a nearly invisible ideology Golumbia dubs “computationalism”—an ideology that informs our thinking not just about computers, but about economic and social trends as sweeping as globalization.

Driven by a programmer’s knowledge of computers as well as by a deep engagement with contemporary literary and cultural studies and poststructuralist theory, The Cultural Logic of Computation provides a needed corrective to the uncritical enthusiasm for computers common today in many parts of our culture.

[more]

front cover of The Cybernetic Border
The Cybernetic Border
Drones, Technology, and Intrusion
Iván Chaar López
Duke University Press, 2024
In The Cybernetic Border, Iván Chaar López argues that the settler US nation requires the production and targeting of a racialized enemy that threatens the empire. The cybernetic border is organized through practices of data capture, storage, processing, circulation, and communication that police bodies and constitute the nation as a bounded, territorial space. Chaar López historicizes the US government’s use of border enforcement technologies on Mexicans, Arabs, and Muslims from the mid-twentieth century to the present, showing how data systems are presented as solutions to unauthorized border crossing. Contrary to enduring fantasies of the purported neutrality of drones, smart walls, artificial intelligence, and biometric technologies, the cybernetic border represents the consolidation of calculation and automation in the exercise of racialized violence. Chaar López draws on corporate, military, and government records, promotional documents and films, technical reports, news reporting, surveillance footage, and activist and artist practices. These materials reveal how logics of enmity are embedded into information infrastructures that shape border control and modern sovereignty.
[more]

front cover of Cyber-Proletariat
Cyber-Proletariat
Global Labour in the Digital Vortex
Nick Dyer-Witheford
Pluto Press, 2015
The utopian promise of the internet, much talked about even a few years ago, has given way to the information highway’s brutal realities: coltan mines in the Congo, electronics factories in China, devastated neighborhoods in Detroit. In Cyber-Proletariat, Nick Dyer-Witheford shows the dark side of the information revolution through an unsparing analysis of class power and computerization. He reveals how technology facilitates growing polarization between wealthy elites and precarious workers and how class dominates everything from expanding online surveillance to intensifying robotization. At the same time he looks at possibilities for information technology within radical movements, casting contemporary economic and social struggles in the blue glow of the computer screen.
            Cyber-Proletariat brings Marxist analysis to bear on a range of modern informational technologies. The result is a book indispensable to social theorists and hacktivists alike and essential reading for anyone who wants to understand how Silicon Valley shapes the way we live today.
[more]

logo for The Institution of Engineering and Technology
Cybersecurity in Emerging Healthcare Systems
Agbotiname Lucky Imoize
The Institution of Engineering and Technology, 2024
Emerging healthcare networks are interconnected physical systems that use cyber technologies for interaction and functionalities. The proliferation of massive Internet of Things (IoT) devices enables remote and distributed access to cutting-edge diagnostics and treatment options in modern healthcare systems. New security vulnerabilities are emerging due to the increasing complexity of the healthcare architecture, in particular, threats to medical devices and critical infrastructure pose significant concerns owing to their potential risks to patient health and safety. In recent times, patients have been exposed to high risks from attacks capable of disrupting critical medical infrastructure, communications facilities, and services, interfering with medical devices, or compromising sensitive user data.
[more]

front cover of Cyberspaces Of Everyday Life
Cyberspaces Of Everyday Life
Mark Nunes
University of Minnesota Press, 2006
Networks and computer-mediated communication now penetrate the spaces of everyday life at a fundamental level. We communicate, work, bank, date, check the weather, and fuel conspiracy theories online. In each instance, users interact with network technology as much more than a computational device.

Cyberspaces of Everyday Life provides a critical framework for understanding how the Internet takes part in the production of social space. Mark Nunes draws on the spatial analysis work of Henri Lefebvre to make sense of cyberspace as a social product. Looking at online education, he explores the ways in which the Internet restructures the university. Nunes also examines social uses of the World Wide Web and illustrates the ways online communication alters the relation between the global and the local. He also applies Deleuzian theory to emphasize computer-mediated communications’ performative elements of spatial production.

Addressing the social and cultural implications of spam and anti-spam legislation, as well as how the burst Internet stock bubble and the Patriot Act have affected the relationship between networked spaces and daily living, Cyberspaces of Everyday Life sheds new light on the question of virtual space and its role in the offline world.

Mark Nunes is associate professor and chair of the English, Technical Communication, and Media Arts Department at Southern Polytechnic State University.
[more]

front cover of Cyberwar and Revolution
Cyberwar and Revolution
Digital Subterfuge in Global Capitalism
Nick Dyer-Witheford
University of Minnesota Press, 2019

Uncovering the class conflicts, geopolitical dynamics, and aggressive capitalism propelling the militarization of the internet


Global surveillance, computational propaganda, online espionage, virtual recruiting, massive data breaches, hacked nuclear centrifuges and power grids—concerns about cyberwar have been mounting, rising to a fever pitch after the alleged Russian hacking of the U.S. presidential election and the Cambridge Analytica scandal. Although cyberwar is widely discussed, few accounts undertake a deep, critical view of its roots and consequences. 

Analyzing the new militarization of the internet, Cyberwar and Revolution argues that digital warfare is not a bug in the logic of global capitalism but rather a feature of its chaotic, disorderly unconscious. Urgently confronting the concept of cyberwar through the lens of both Marxist critical theory and psychoanalysis, Nick Dyer-Witheford and Svitlana Matviyenko provide a wide-ranging examination of the class conflicts and geopolitical dynamics propelling war across digital networks.

Investigating the subjectivities that cyberwar mobilizes, exploits, and bewilders, and revealing how it permeates the fabric of everyday life and implicates us all in its design, this book also highlights the critical importance of the emergent resistance to this digital militarism—hacktivism, digital worker dissent, and off-the-grid activism—for effecting different, better futures.

[more]

front cover of Cyberwars in the Middle East
Cyberwars in the Middle East
Ahmed Al-Rawi
Rutgers University Press, 2021
Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political hacking is an aggressive and militant form of public communication employed by tech-savvy individuals, regardless of their affiliations, in order to influence politics and policies. Kenneth Waltz’s structural realism theory is linked to this argument as it provides a relevant framework to explain why nation-states employ cyber tools against each other.

On the one hand, nation-states as well as their affiliated hacking groups like cyber warriors employ hacking as offensive and defensive tools in connection to the cyber activity or inactivity of other nation-states, such as the role of Russian Trolls disseminating disinformation on social media during the US 2016 presidential election. This is regarded as a horizontal flow of political disruption. Sometimes, nation-states, like the UAE, Saudi Arabia, and Bahrain, use hacking and surveillance tactics as a vertical flow (top-bottom) form of online political disruption by targeting their own citizens due to their oppositional or activists’ political views. On the other hand, regular hackers who are often politically independent practice a form of bottom-top political disruption to address issues related to the internal politics of their respective nation-states such as the case of a number of Iraqi, Saudi, and Algerian hackers. In some cases, other hackers target ordinary citizens to express opposition to their political or ideological views which is regarded as a horizontal form of online political disruption. This book is the first of its kind to shine a light on many ways that governments and hackers are perpetrating cyber attacks in the Middle East and beyond, and to show the ripple effect of these attacks.
 
[more]


Send via email Share on Facebook Share on Twitter