Life in Code and Software/Attributions: Difference between revisions
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited. | Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited. | ||
Berry, D. M. (2008) 'A Contribution Towards a Grammar of Code', ''Fibreculture'', 13. | Berry, D. M. (2008) 'A Contribution Towards a Grammar of Code', ''Fibreculture'', 13. | ||
Line 17: | Line 17: | ||
Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited. | Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited. | ||
Berry, D. M. (2011) 'Iteracy: Reading, Writing and Running Code'. | Berry, D. M. (2011) 'Iteracy: Reading, Writing and Running Code'. | ||
Line 51: | Line 51: | ||
Link to Vimeo: http://vimeo.com/16328263 | Link to Vimeo: http://vimeo.com/16328263 | ||
Davidson, C. (2012) 'Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms,' ''DML Central.'' | Davidson, C. (2012) 'Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms,' ''DML Central.'' | ||
Line 59: | Line 59: | ||
Licence: ©2012 Davidson'', Creative Commons Attribution 3.0 License''. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | Licence: ©2012 Davidson'', Creative Commons Attribution 3.0 License''. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | ||
Deleuze, G. (1992) 'Postscript on the Societies of Control', ''October'', vol. 59, pp 3-7. | Deleuze, G. (1992) 'Postscript on the Societies of Control', ''October'', vol. 59, pp 3-7. | ||
Line 73: | Line 73: | ||
Licence: © 1998 Dijkstra. Made available here via transcription. | Licence: © 1998 Dijkstra. Made available here via transcription. | ||
Gardner, M. (1970) 'The Fantastic Combinations of John Conway's New Solitaire Game "Life"', ''Scientific American'', 223 (October): 120-123. | Gardner, M. (1970) 'The Fantastic Combinations of John Conway's New Solitaire Game "Life"', ''Scientific American'', 223 (October): 120-123. | ||
Line 81: | Line 81: | ||
Licence: ©1970 Scientific American. Made available via a link to ibiblio. | Licence: ©1970 Scientific American. Made available via a link to ibiblio. | ||
<br> Golumbia, D. (2003) 'Computation, Gender, and Human Thinking,' '' | <br> Golumbia, D. (2003) 'Computation, Gender, and Human Thinking,' ''Differences: A Journal of Feminist Cultural Studies,'' 14:2 (Summer): 27-48. | ||
Licence: ''© ''2003 Brown University & Differences''. ['''DAVID - YOU CAN'T INCLUDE THIS ONE. IT'S NOT FREELY AVAILABLE ON PROJECT MUSE BUT BEHIND A PAY WALL.]''''' | |||
Guattari, F. (1989) 'The Three Ecologies,' ''New Formations'', 8. | |||
Link: http://www.amielandmelburn.org.uk/collections/newformations/08_131.pdf | |||
Licence: © 1989 New Formations. Distributed under a Creative Commons Lisence according to the Barry Amiel and Norman Melbourne Trust. <br> | |||
Fogg, B. J., Cuellar, G., and Danielson, D. (2003) 'Motivating, Influencing, and Persuading Users,' In Jacko, J. and Sears A. (eds.), ''The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications.'' | |||
Link: http://bjfogg.com/hci.pdf | |||
Licence: ''© ''2003 Laurence Erbaum Associates. '''[David - where is this from?]''' | |||
Fuller, M. and Matos, S. (2011) Feral Computing: From Ubiquitous Calculation to Wild Interactions, ''Fibreculture'', issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-135-feral-computing-from-ubiquitous-calculation-to-wild-interactions/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited. | Fuller, M. and Matos, S. (2011) Feral Computing: From Ubiquitous Calculation to Wild Interactions, ''Fibreculture'', issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-135-feral-computing-from-ubiquitous-calculation-to-wild-interactions/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited. |
Revision as of 11:29, 19 June 2012
Andersen, C. U. and Pold, S. (2011) 'The Scripted Spaces of Urban Ubiquitous Computing: The Experience, Poetics, and Politics of Public Scripted Space', Fibreculture, 19.
Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Berry, D. M. (2008) 'A Contribution Towards a Grammar of Code', Fibreculture, 13.
Link: http://thirteen.fibreculturejournal.org/fcj-086-a-contribution-towards-a-grammar-of-code/
Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Berry, D. M. (2011) 'Iteracy: Reading, Writing and Running Code'.
Link: http://stunlaw.blogspot.com/2011/09/iteracy-reading-writing-and-running.html
Licence: © David M. Berry, made available here for reuse by permission of the author.
Berry, D. M. (2012) Understanding Digital Humanities, London: Palgrave Macmillan.
Link: http://www.palgrave.com/PDFs/9780230292642.pdf
Licence © 2012 David M. Berry, Palgrave Macmillan. Sample chapter available for open access.
Berry, D. M. (2012) 'Thinking Software: Realtime Streams and Knowledge in the Digital Age'.
Link to Vimeo: http://vimeo.com/39256099
Bogost, I. (2005) 'Procedural Literacy: Problem Solving with Programming, Systems, & Play, Telemedium'.
Link: http://www.bogost.com/downloads/I.%20Bogost%20Procedural%20Literacy.pdf
Licence: © 2005 Telemedium. Made freely available on author's website.
Coleman, G. (2010) 'The Anthropology of Hackers,' The Atlantic.
Link: http://www.theatlantic.com/technology/archive/2010/09/the-anthropology-of-hackers/63308/
Licence: © 2010 The Atlantic Monthly Group. All Rights Reserved. Made available via a link to The Atlantic.
Chun, W. (2010) Critical Code Studies.
Link to Vimeo: http://vimeo.com/16328263
Davidson, C. (2012) 'Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms,' DML Central.
Link: http://dmlcentral.net/blog/cathy-davidson/why-we-need-4th-r-reading-writing-arithmetic-algorithms
Licence: ©2012 Davidson, Creative Commons Attribution 3.0 License. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Deleuze, G. (1992) 'Postscript on the Societies of Control', October, vol. 59, pp 3-7.
Link: http://www.n5m.org/n5m2/media/texts/deleuze.htm
Licence: ©1992 MIT Press. Made available here via a link.
Dijkstra, E. W. (1998) 'On the Cruelty of Really Teaching Computing Science'.
Licence: © 1998 Dijkstra. Made available here via transcription.
Gardner, M. (1970) 'The Fantastic Combinations of John Conway's New Solitaire Game "Life"', Scientific American, 223 (October): 120-123.
Link: http://www.ibiblio.org/lifepatterns/october1970.html
Licence: ©1970 Scientific American. Made available via a link to ibiblio.
Golumbia, D. (2003) 'Computation, Gender, and Human Thinking,' Differences: A Journal of Feminist Cultural Studies, 14:2 (Summer): 27-48.
Licence: © 2003 Brown University & Differences. [DAVID - YOU CAN'T INCLUDE THIS ONE. IT'S NOT FREELY AVAILABLE ON PROJECT MUSE BUT BEHIND A PAY WALL.]
Guattari, F. (1989) 'The Three Ecologies,' New Formations, 8.
Link: http://www.amielandmelburn.org.uk/collections/newformations/08_131.pdf
Licence: © 1989 New Formations. Distributed under a Creative Commons Lisence according to the Barry Amiel and Norman Melbourne Trust.
Fogg, B. J., Cuellar, G., and Danielson, D. (2003) 'Motivating, Influencing, and Persuading Users,' In Jacko, J. and Sears A. (eds.), The Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies, and Emerging Applications.
Link: http://bjfogg.com/hci.pdf
Licence: © 2003 Laurence Erbaum Associates. [David - where is this from?]
Fuller, M. and Matos, S. (2011) Feral Computing: From Ubiquitous Calculation to Wild Interactions, Fibreculture, issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-135-feral-computing-from-ubiquitous-calculation-to-wild-interactions/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Frabetti, F. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16263212 (c) 2010 F. Frabetti
Goetz, T. (2011) Harnessing the Power of Feedback Loops, Wired, accessed 12/09/2011, http://www.wired.com/magazine/2011/06/ff_feedbackloop/ (c) 2011 Wired
Jerz, D. G. (2007) Somewhere Nearby is Colossal Cave: Examining Will Crowther's Original "Adventure" in Code and in Kentucky, Digital Humanities Quarterly, Volume 1 Number 2, accessed 15/03/2012, http://www.digitalhumanities.org/dhq/vol/001/2/000009/000009.html This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Kitchin, R. (2012) The Programmable City, Environment and Planning B: Planning and Design, volume 38, pages 945-951, accessed 15/03/2012, http://www.envplan.com/epb/editorials/b3806com.pdf Copyright © 2012 a Pion publication, Environment and Planning B: Planning and Design
Kovacs, G. (2010) Tracking the trackers, TED, accessed 05/06/2012, http://www.youtube.com/watch?v=f_f5wNw-2c0 (c) 2010 TED CONFERENCES, LLC
Langner, R. (2011) Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon, accessed 02/03/2012, http://www.youtube.com/watch?feature=player_embedded&v=CS01Hmjv1pQ © TED CONFERENCES, LLC
Latour, B. (2012) The Whole is Always Smaller Than Its Parts - A Digital Test of Gabriel Tarde’s Monads, British Journal of Sociology, accessed 15/03/2012, http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf (c) 2012 Bruno Latour/British Journal of Sociology
MacKenzie, A. (2006) “The Problem of Computer Code: Leviathan or Common Power?” Institute for Cultural Research, Lancaster University. 10 August 2006, accessed 15/03/2012, http://www.lancs.ac.uk/staff/mackenza/papers/code-leviathan.pdf (c) 2006 Adrian MacKenzie
MacKenzie, A. (2008) Wirelessness as Experience of Transition, Fibreculture, 13, accessed 15/03/2012, http://thirteen.fibreculturejournal.org/fcj-085-wirelessness-as-experience-of-transition/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Manovich, L. (2008) Software Takes Command, accessed 15/03/2012, http://lab.softwarestudies.com/2008/11/softbook.html Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Marino, Mark C. “Critical Code Studies” Electronic Book Review. 2006. Available at http://www.electronicbookreview.com/thread/electropoetics/codology Creative Commons: Attribution-NonCommercial-ShareAlike 2.5 Generic (CC BY-NC-SA 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-ShareAlike 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
McCallum, L., and Smith, D. (2012) Show Us Your Screens, accessed 04/03/2012, http://vimeo.com/20241649 (c) McCallum, L., and Smith, D.
Matrosov, A., Rodionov, E., Harley, D. and Malcho, J. (n.d.) Stuxnet Under the Microscope, accessed 04/03/2012, http://go.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf © 2012 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. Freely Available White Papers
Najjar, M. (2012) Cover Image: 'the sublime brain [of jonathon]', http://www.michaelnajjar.com/, (c) 2011 Michael Najjar, permission for use and reproduction of image as book cover of Life in Code and Software given by the artist. title: "the sublime brain [of jonathon]", original size: 150 x 150 cm, © michael najjar, courtesy by the artist
Parikka, J. (2011) Media Ecologies and Imaginary Media: Transversal Expansions, Contractions, and Foldings, Fibreculture, issue 19, accessed 15/03/2012, http://seventeen.fibreculturejournal.org/fcj-116-media-ecologies-and-imaginary-media-transversal-expansions-contractions-and-foldings/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Parisi, L. and Portanova, S. (2012) Soft Thought (in architecture and choreography), Computational Culture, issue 1, accessed 16/03/2012, http://computationalculture.net/article/soft-thought (c) 2012 Copyright the Authors, Computational Culture is an online open-access peer-reviewed journal
Ramsay, S. (2010) Algorithms are Thoughts, Chainsaws are Tools, accessed 04/03/2012, http://vimeo.com/9790850 (c) Stephan Ramsay
Ramsay, S. (2011) On Building, accessed 15/03/2012, http://lenz.unl.edu/papers/2011/01/11/on-building.html (c) Stephan Ramsay
Slavin, K. (2010) How Algorithms Shape Our World, TEDGlobal.
Link: http://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world.html
Lisence: © TED CONFERENCES, LLC
Turing, A.M. (1936). "On Computable Numbers, with an Application to the Entscheidungs problem". Proceedings of the London Mathematical Society. 2 42: 230–65, accessed 15/03/2012, http://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdf (c) 1937 London Mathematical Society
Turing, A.M. (1950). Computing machinery and intelligence. Mind, 59, 433-460. (c) 1950 Mind
Weisstein, Eric W. "Turing Machine." From MathWorld--A Wolfram Web Resource, accessed 15/03/2012, http://mathworld.wolfram.com/TuringMachine.html © 1999-2012 Wolfram Research, Inc.
Wing, J. M. (2006) Computational Thinking, Proceedings of the ACM, accessed 15/03/2012, http://www.cs.cmu.edu/afs/cs/usr/wing/www/publications/Wing06.pdf (c) Communication of the ACM and Jeannette Wing
Wing, J. M. (2009) Computational Thinking and Thinking About Computing, accessed 15/03/2012, http://www.youtube.com/watch?v=C2Pq4N-iE4I (c) 2009 IHMC and Jeannette Wing, standard Youtube license
why the lucky stiff (2009) Hackety Hack, accessed 15/05/2012, http://vimeo.com/5047563 (c) 2009 why the lucky stiff, made available for use by the author under standard Vimeo video license.
Wolf, G. (2010) The Quantified Self, TED, accessed 15/03/2012, http://www.youtube.com/watch?v=OrAo8oBBFIo (c) 2010 TED CONFERENCES, LLC