| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Finally, you can manage your Google Docs, uploads, and email attachments (plus Dropbox and Slack files) in one convenient place. Claim a free account, and in less than 2 minutes, Dokkio (from the makers of PBworks) can automatically organize your content for you.

View
 

MetaProgramming

Page history last edited by dax 9 years, 7 months ago

English 473

 


 

Office Hours: Thursday, 3:15-4:15, Center for the Study of Altered Consciousness, 501 Carpenter & Friday, 11-1, Center for Sustainability (Porter Road)

 


 

Metaprogramming the Society of Control: Rhetoric and Contemporary Security Interfaces

There is no need to invoke the extraordinary pharmaceutical productions, the molecular engineering, the genetic manipulations, although these are slated to enter the new process. There is no need to ask which is the toughest regime, for it's within each of them that liberating and enslaving forces confront one another....There is no need to fear or hope, but only to look for new weapons. Gilles Deleuze, Society of Control

 

 


 

 

 

This course will focus student attention on the tools, practices and assumptions of the contemporary security state as it seeks to govern the constantly proliferating information commons in the Wars on Terror(isms) and Drugs. Students will collaboratively investigate and creatively alter discourses of filesharing, hacking, biometrics and identification, data mining, surveillence and Temporary Autonomous Zones. As a course in rhetoric (the science of attention), the seminar will offer theories and practices for navigating and altering contemporary rhetorical ecologies featuring internet telephony, rfid systems and multimedia technical composition in the open source commons and its constantly differentiating subcultures. Participants will help compose global open source standards for emerging technologies such as nanotechnology and biotelemetrics.


Course Requirements

As practice in the inhabitation of temporary autonomous zones, students will compose for wiki three times per week, working with texts, images and sound. Students will compose a collaborative as well as individual final project analogous to a 15-20 page research paper.

 

 

TemporarilyAutonomousSyllabus

 

Cached Syllabus - In case the current one is down

 

Blog Pile - Student Blogs are created here, where they are banged upon, composed. dreamed, intertwingled three times weekly.

 

Texts

 

A Primer on the History of Programming Languages

 

 Draft of New GPL License

2600 The Hacker Quarterly

 

The Cryptoanarchist Manifesto

 

Bey, Hakim Temporary Autonomous Zones and Ontological Anarchy

 

Burrroughs, William S. The Electronic Revolution

 

Clastres, Pierre. Society Against the State

 

Dick, Philip K. Ubik

 

Doyle, Richard. The Transgenic Involution

 

Department of Homeland Security, National Strategy to Secure Cyberspace

 

Lessig, Free Culture

 

Yu Wei Lin    Hacking Practices and Software Development: A Social Worlds Analysis of ICT Innovation and the Role of Free/Libre Open Source Software

 

The Political Economy of Open Source Software

 

Wilson, Robert Anton Cosmic Trigger (Volume 1)

 

A Rulebook for Argument

The Social Engineering FAQ

 

 

Softwares

 

Entropy Growing a Surveillence-Free Peer to Peer Network Inside the Internet

Bittorrent - You'll Need This or another Bittorrent client to download the Lessig torrent

 

 

Audio

Hope So Many MP3s of digital culture, so little time]

 

A Torrent of Hope

 

Video

http://www.archive.org/details/e-dv166_sf_01_pavlosky_001.mpg

 

Operating Systems

Ubuntu - Linux For Human Beings

 

Open BSD

 

Programming**

Squeak!

 

Ruby

 

Etoys

 

Latest Softwares

 

 

 

 

computer help forum

 

 

 

 

Comments (0)

You don't have permission to comment on this page.