Setting the record straight almost impossibleMore at the link.
* * * * *
The effect of misinformation on memory and reasoning cannot be completely eliminated, even after it has been corrected numerous times, say Australian psychologists.
Assistant Professor Ullrich Ecker and colleagues from The University of Western Australia outline their findings in a recent article published in Psychonomic Bulletin and Review. Ecker says this effect, known as 'continued influence effect of misinformation,' occurs even if the retraction itself is understood, believed, and remembered.
July 15, 2011
Effects of Misinfo Can't Be Eradicated
July 14, 2011
Wikileaks Update
Wired has finally released the full, alleged Manning-Lamo chat logs, and as Glenn Greenwald points out, it seems clear that the portions previously withheld are by no means limited to personal info about Manning or matters of national security, as Wired had claimed. On the contrary, the logs show Lamo to be deceptive and unreliable, and more importantly, contain substantial exculpatory evidence, including but not limited to evidence that Assange took precautions to ensure that he would not know who his leaker was (which could make it tough for the US to prove collusion).
Meanwhile, the hearing on Assange's appeal from the order approving his extradition to Sweden has concluded, but it's expected to be days or weeks before the new ruling issues (see The Guardian).
July 13, 2011
Ideas for Facebook Apps
July 12, 2011
Tales of Hacking, Madness, and Obsession
Amazon.com currently has available four copies of Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier by Suelette Dreyfuss (1997). They do not mention that the book was written by Dreyfuss "with research by Julian Assange." The copies are all used paperbacks and are priced from $349.94.
I could be wrong, but I thought I saw a downloadable copy somewhere on the 'net within the last 15 seconds . . . now where was it . . . .
Anyway, below is the long but fascinating video of a 2011-07-15 program with Assange, philosopher Slavoj Žižek, and Amy Goodman of Democracy Now (a somewhat larger version and a full transcript are available here). The venue for the program was cancelled twice because, the hosting organizations explained, the program was "too controversial," so the program ended up at the Frontline Club, well outside of London center; nonetheless, the 2,000 seats were sold out at £25 each.
By the way, the hearing is ongoing on Assange's appeal of the U.K. court order approving his extradition to Sweden; blow-by-blow at The Guardian.
Trespass/Parade
Trespass: First a Parade, Then a Party
* * * * *
On Sunday, October 2, 2011 the streets of downtown Los Angeles will erupt in a parade of local artists and residents, complete with music, dancing and performance. The parade is the culmination of Trespass, a collaborative project between Arto Lindsay, Rirkrit Tiravanija, and West of Rome Public Art (WoR). They have commissioned 40 Los Angeles based artists, including John Baldessari, Barbara Kruger, Nancy Rubins and Sterling Ruby, to produce a statement—their call to action, pleasure and reciprocity. The statements have been printed on T-shirts in English and in Spanish, and will be worn as part of the parade and sold via the West of Rome website. . . . This project has been created to coincide with Pacific Standard Time, a collaboration of more than 60 cultural institutions across Southern California coming together for the first time to celebrate the birth of the L.A. art scene, which begins October 2011.
On Monday, October 3, 2011 Trespass will reach its climax with a blow out benefit party for WoR at Union Station in downtown Los Angeles. Fantastic and transgressive Los Angeles iconic underground figure, Miss Vaginal Davis will shape our journey into the night. The rhythms of Trespass will permeate into the evening as musician Arto Lindsay will perform a unique piece composed for the occasion. Artist Rirkrit Tiravanija will engage the audience in a continuation of the collective experience of social awareness stemming from the parade.
More at www.trespassparade.org.
July 6, 2011
The Hacker Ethic
I've been reading Hackers by Steven Levy (1984, 1994); 25th Anniversary edition here. The book recounts the seminal exploits of a relatively small number of nerds who, during the late 1950s through the early '80s, created the basic architecture of computer cognition and memory that we inhabit today.
The meaning of the term, "hacker," has been hijacked since Levy's first edition was published. Now, it's used to suggest a cyber-burglar or worse, who steals or vandalizes for her/his personal profit or pleasure.
But originally, the term simply referred to one who creates computer hardware or software. Levy's "hackers" wrote the operating systems and visual interfaces that brought the mammoth, early computers under our recreative as well as productive control and developed the first widely-available personal computers, among other accomplishments.
And as the Amazon "product description" adds, "[t]hey had a shared sense of values, known as 'the hacker ethic,' that still thrives today."
The "hacker ethic":
- Access to computers – and anything that might teach you something about the way the world works – should be unlimited and total.
- All information should be free.
- Mistrust authority; promote decentralization.
- Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
- You can create art and beauty on a computer.
- Computers can change your life for the better.
(See Hackers by Steven Levy, p. 34 {2010 O'Reilly Media, Kindle Edition}.)
For years, these hackers worked day and night, driven by the sheer joy of creating something really cool, and receiving little or nothing more for their efforts beyond the respect of their few, similarly-obsessed fellows. They freely shared the programs and equipment they created, each helping the others to improve and de-bug their creations. As far as they were concerned, none of it should be owned, so none of it could be stolen.
The hackers inhabited a sort of cyber-utopian anarchy in which the only abuse that occurred consisted in the wrong-headed efforts of bureaucrats to restrict access based on claims such as a need for "security." And it was the hacker ethic that made possible the incredible flowering of human potential that occurred during this first decade or two leading up to the commercial success of personal computers and p.c.-based video games.
For me, the fact that such a benevolent anarchy can and has in fact endured for an extended period was one of many interesting revelations afforded by this book. It also provides what seems to be a conscientiously compiled history of our subsequent fall from this Eden, as well as a wealth of details about key, individual hackers and their deeds.
I read the paperback and then bought the e-book; recommended as an invaluable resource.
I recently came across an interesting site, datalove, propounding similar principles:
Data is essentialDatalove appears to be affiliated with Telecomix, one of the Anonymous-type organizations involved in efforts to help Egyptian protesters circumvent Mubarek's shut-down of the Egyptian internet.
Data must flow
Data must be used
Data is neither good nor bad
There is no illegal data
Data is free
Data cannot be owned
No man, machine or system shall interrupt the flow of data
Locking data is a crime against datanity
Love data
One of the nerds described in Levy's Hackers was John Conway, who created the computer game of Life, in which the goal is to design simple, graphic life-forms and then observe how their community either dies out or achieves immortality; below are gifs showing two "immortal" results from this game: (1) a single Gosper's Glider Gun creating "gliders" and (2) a breeder that leaves glider guns in its wake:
June 26, 2011
"Kill the Workers!" by Janice Kerbel
" . . . is a continuation of Kerbel’s interest in theatrical performance. There are no actors or sets; the dramaturgy and plot are portrayed solely through the various intensities, colours, light beams and directions of the stage lighting. The protagonist of the play is a spotlight that goes on an epic odyssey to abandon its serving role and be seen as a light in its own right instead."
June 25, 2011
The Dymaxion
First built in 1934, Buckminster Fuller's aerodynamically efficient vehicle could transport 11 passengers at 36 mpg.
Norman Foster, who worked with Fuller before the latter's death and recently rebuilt the car, writes, “ . . . Fuller drew attention to the ecological issues of today when he referred to ‘spaceship earth’ and the fragility of the planet; as such, his work and observations are even more important now than they were in his lifetime.”
More photos and info at gizmag here and here (thanks, Ben!)