2015.10.25 NATC International Symposium at the Tokyo Univ. of Art Campus (Yokohama, Basha Michi).
With Jasia Reichardt, curator of the 1968 ICA exhibition "Cybernetic Serendipity".
Using the present to create the future - the Web in South AfricaDerek Keats
Using the present to create the future: How can we move South Africa from consumer to producer of web technologies. My keynote talk at the ZAWWW2011 conference, Sept 15th, 2011 in Johannesburg.
Using the present to create the future - the Web in South AfricaDerek Keats
Using the present to create the future: How can we move South Africa from consumer to producer of web technologies. My keynote talk at the ZAWWW2011 conference, Sept 15th, 2011 in Johannesburg.
This is a brief introduction to Cybernetics, created for my Interdisciplinary Studies 500 class at Royal Roads University, Winter 2013. If you have questions, feel free to comment here!
The theory of investment portfolios is a well defined component of financial science. While sound in principle, it faces some setbacks in its real-world implementation. Cybernetics presents an unorthodox “new” way of studying the process of portfolio management. First, the known theory is translated in cybernetic terminology. A reformulation of the investment portfolio problem as a cybernetic system is proposed where the Investor is the controlling system and the portfolio is the controlled system. Also the portfolio controlling process is dissected in several ordered phases, so that each phase is represented as a subsystem within the structure of the controlling system Investor. Second, various known models of investors are competed systematically on a unified data track. Among the many proposed approaches for managing an investment portfolio there is one generating possible solutions to the investment portfolio problem using multi-stage selection. Third, by heuristic restructuring new models of investors may be assembled, which in turn are to be competed as well.
Presentation of Heylighen, Francis, and Joslyn, Cliff, (2001). Cybernetics and Second-order Cybernetics. In R.A. Meyers (ed.), Encyclopedia of Physical Science & Technology, 3rd ed. New York: Academic Press.
Introduction to Informatics
PhD in Informatics
Human-Computer Interaction Design Track
Indiana University Bloomington
Fall 2012
AREAS OF INNOVATION: MIXED REALITY IN THE INDUSTRY AND OUR EVERYDAY LIFEsinnerschrader
The arrival of the HoloLens marks a turning point in creating applications that enrich the real world with virtual objects. The device’s immersive experience, which is referred to as Mixed Reality, opens up an entire world of potential uses in industrial enterprises as well as our everyday lives. Holograms not only enrich our environment – interaction with holograms also facilitates our daily activities. In this session we will give you an overview of what sets the HoloLens apart from other Augmented and Virtual Reality devices, what it can do and what you can do with it. We will also provide an outlook on the use cases we see for the device and discuss your own ideas for the HoloLens. And finally we would like to give you the opportunity for a short hands-on demo.
Presentation on trends and future research directions in Augmented Reality. Given by Mark Billinghurst at the Smart Cloud 2015 conference on September 16th, 2015, in Seoul, Korea.
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...Amit Sheth
Keynote at the 3rd Asian Semantic Web Conference (ASWC2008), Bangkok, Thailand, Feb 2-5, 2009. http://aswc2008.ait.ac.th/invitedspeaker2.html
More details: http://wiki.knoesis.org/index.php/Computing_For_Human_Experience
Seminar on "Cybercultures" using the Communication Theory - in 2001, by Pierre Levy - in a journal article written by Teixeira A.C., Beutler, D., Antônio, M., Trentin, M. & Folle, D. (2017). DO - 10.4236/ce.2017.81010 This my found prose version, 2020.
This is a brief introduction to Cybernetics, created for my Interdisciplinary Studies 500 class at Royal Roads University, Winter 2013. If you have questions, feel free to comment here!
The theory of investment portfolios is a well defined component of financial science. While sound in principle, it faces some setbacks in its real-world implementation. Cybernetics presents an unorthodox “new” way of studying the process of portfolio management. First, the known theory is translated in cybernetic terminology. A reformulation of the investment portfolio problem as a cybernetic system is proposed where the Investor is the controlling system and the portfolio is the controlled system. Also the portfolio controlling process is dissected in several ordered phases, so that each phase is represented as a subsystem within the structure of the controlling system Investor. Second, various known models of investors are competed systematically on a unified data track. Among the many proposed approaches for managing an investment portfolio there is one generating possible solutions to the investment portfolio problem using multi-stage selection. Third, by heuristic restructuring new models of investors may be assembled, which in turn are to be competed as well.
Presentation of Heylighen, Francis, and Joslyn, Cliff, (2001). Cybernetics and Second-order Cybernetics. In R.A. Meyers (ed.), Encyclopedia of Physical Science & Technology, 3rd ed. New York: Academic Press.
Introduction to Informatics
PhD in Informatics
Human-Computer Interaction Design Track
Indiana University Bloomington
Fall 2012
AREAS OF INNOVATION: MIXED REALITY IN THE INDUSTRY AND OUR EVERYDAY LIFEsinnerschrader
The arrival of the HoloLens marks a turning point in creating applications that enrich the real world with virtual objects. The device’s immersive experience, which is referred to as Mixed Reality, opens up an entire world of potential uses in industrial enterprises as well as our everyday lives. Holograms not only enrich our environment – interaction with holograms also facilitates our daily activities. In this session we will give you an overview of what sets the HoloLens apart from other Augmented and Virtual Reality devices, what it can do and what you can do with it. We will also provide an outlook on the use cases we see for the device and discuss your own ideas for the HoloLens. And finally we would like to give you the opportunity for a short hands-on demo.
Presentation on trends and future research directions in Augmented Reality. Given by Mark Billinghurst at the Smart Cloud 2015 conference on September 16th, 2015, in Seoul, Korea.
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...Amit Sheth
Keynote at the 3rd Asian Semantic Web Conference (ASWC2008), Bangkok, Thailand, Feb 2-5, 2009. http://aswc2008.ait.ac.th/invitedspeaker2.html
More details: http://wiki.knoesis.org/index.php/Computing_For_Human_Experience
Seminar on "Cybercultures" using the Communication Theory - in 2001, by Pierre Levy - in a journal article written by Teixeira A.C., Beutler, D., Antônio, M., Trentin, M. & Folle, D. (2017). DO - 10.4236/ce.2017.81010 This my found prose version, 2020.
TechSoup Global and Guardian Seminar: Transforming your charity by bringing your data to life seminar. Presentation by Nathaniel Manning, Director of Business Development and Strategy at Ushahidi illustrated how they use crowdsourcing, big data and the opensource tools they have developed to help with disaster relief, political accountability and other development issues. Mobile phones were identified as one of the key ways that data is provided and collected in developing countries.
I talk about the evolution of digital content into services, the role of sensors in the future of the web, about the idea of man-machine collaboration in internet services, and about the role of social networking in building content.
In this original Digital Art and Philosophy class, we will become familiar with different forms of digital art and related philosophical issues. Digital art is anything related to computers and art such as using a computer to create art or an art display that is digitized. Philosophical aspects arise regarding art, identity, performance, interactivity, and the process of creation. Students may respond to the material in essay, performance, or digital art work (optional). Instructor: Melanie Swan. Syllabus: www.MelanieSwan.com/PCA
This is a vision talk, looking at what is happening on the Web with large scale community interactions. It discusses ongoing efforts, Chinese Human Flesh Search Engine, and a research agenda for "Social Machines" based on these emerging challenges.
The Web and its Publics (by Tommaso Venturini & Jean-Philippe Cointet)medialabSciencesPo
Presentation given by Tommaso Venturini and Jean-Philippe Cointet at the seminar of the research group "Ethique, Technologies, Organisations, Société (ETOS)" of the Institut TELECOM / TEM Research and the Centre de recherche Sens, Ethique, Société (CERSES), and the New York University / NYU in France.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
2. Agenda / 議題
1) to layout an overview of the history of
Cybernetics
サイバネティクスの歴史の概観を提示
2) to image the future (and desirable) state
of Cybernetic Serendipity
未来の(望ましい)サイバネティック・セレンディピティを
イメージする
12. Cybernetics is acting as a feedback
system for Humanity
サイバネティクスは人類に対するフィードバッ
クシステムとして作動している
13. reviewing the subject: Cybernetics
解題:サイバネティクス
• computational control of systems related to human being
人間に関係するシステムの計算機的制御
• “How can man and machine can coexist?”
人間と機械はどのように共存できるのか?
heteronomous system (von Neumann) autonomous system (Wiener)
principle matching (identical) fitting (coherence)
mode of
organization
input/output
mapping function
operational closure,
behavior specific to the system
mode of
interaction
world defined by instruction and
representation
emergence of meaning
F. Varela : “Autonomie et Connaissance – Essai sur le Vivant” (Eds. du Seuil, Paris, 1988), P222
17. “It is the purpose of Cybernetics to
develop a language and techniques that
will enable us indeed to attack the
problem of control and communication in
general, but also to find the proper
repertory of ideas and techniques to
classify their particular manifestations
under certain concepts. “
Norbert Wiener
Human Use of Human Being (1950) p17
18. milestones of Cybernetics discussions
サイバネティクスの標石
• N.Wiener and the Macy Conference:
Von Neumann, Wiever, Shannon
• Heinz von Foerster : Observing Systems (Observing Observation)
• Maturana=Varela : Autopoiesis theory (Life systems)
• Ernst von Glasersfeld: Radical Constructivism
• N. Luhmann : Social System Sociology
• E. Thompson : Enactivism theory
• all deal with the problem of evolving system of communication
すべてコミュニケーション・システムの進化と関係する
19. • TECHNIUM by Kevin Kelly
modern cybernetic comprehension of technology
現代におけるサイバネティックな技術論
20. reviewing the subject: Serendipity
解題:セレンディピティ
• Happy Accidents / Chance Discoveries
幸せな邂逅 / 機会の発見
• Nowadays Happy C.S. includes:
• Greater accessibility to knowledge base via Search
Engines, Wikipedia, Open Educational Resources, Q&A
• Greater matching of social and personal
opportunities: Social Networking Services,
Crowdfunding, Crowdsourcing, Market place, Open
Source Software / Content
21. reviewing the subject: Serendipity
解題:セレンディピティ
• some momenta of UnHappy Accidents
不幸せな邂逅のいくつかの事例
• Facebook+Twitter : Arab Spring ~ DAESH (IS)
• E. Snowden case : PRISM (NSA / Five Eyes)
• Flash Crash of 2.45 (2010) : High Frequency Trading Algorithms of
Wall Street 高頻度取引アルゴリズム
• Ad Tech’s influence on users minds (e.g. Facebook experiment) 広告技
術がユーザーの意識に及ぼす影響(Facebook実験など)
• Accidental Bombing by Assault Drones 爆撃ドローンによる誤爆
22. “At present nothing prevents our thinking
of this. We may dream of the time when
the machine à gouverner may come to
supply - whether for good or evil - the
present obvious inadequacy of the brain
when the latter is concerned with the
customary machinery of politics. ”
Père Dubarle,
cited in : Norbert Wiener
Human Use of Human Being (1950) p180
23. “Its real danger, however, is the quite
different one that such machines, though
helpless by themselves, may be used by a
human being or a block of human beings
to increase their control over the rest of
the human race or that political leaders
may attempt to control their populations
by means not of machines themselves but
through political techniques as narrow and
indifferent to human possibility as if they
had, in fact, been conceived
mechanically.”
Norbert Wiener
Human Use of Human Being (1950) p181
24. “The great weakness of the machine - the
weakness that saves us so far from being
dominated by it - is that it cannot yet take
into account the vast range of probability
that characterizes the human situation.”
Norbert Wiener
Human Use of Human Being (1950) p181
25. “The same methods that today just
manipulate what we want to buy could
tomorrow be used to control which news
outlets we follow, whose opinions we
trust, and even which politicians we vote
for. ”
Murray Shanahan
The Technological Singularity (2015)
28. What is the state of expression in the
information society?
情報社会における表現の状況とは?
29. “Nous ne manquons pas de
communication, au contraire nous en
avons trop, nous manquons de création.
Nous manquons de résistance au présent.
La création de concepts fait appel en elle-
même à une forme future, elle appelle une
nouvelle terre et un peuple qui n’existe
pas.”
G. Deleuze, F.Guattari
「Qu’est-ce que la Philosophie」(1996)
31. • The media reception of Cybernetic Serendipity was on the whole extremely favorable.
In a review symptomatic of much press coverage, the Evening Standard enthused:
"Where in London could you take a hippy, a computer programmer, a ten-
year-old schoolboy and guarantee that each would be perfectly happy for an
hour without you having to lift a finger to entertain them?" [7] The Guardian
agreed that it "lured into Nash House people who would never have dreamed
of attending an ICA exhibition before" [8]. Cybernetic Serendipity promised fun for
the whole family, not just an elite of art connoisseurs. “Children, scientists and the
simply curious could spend fascinated hours in this world of computer
art" [9]. The press celebrated the exhibition as an event that "guaranteed to
fascinate anyone from toddling age to the grave" [10]. Even the writer in The
Lady felt compelled to urge that "one must go to the present exhibition at the
INSTITUTE OF CONTEMPORARY ARTS ... not to understand in the least what
is going on but to experience that particular tingle which is inherent in an act
of threshold-crossing” [11]. Art critic Jonathan Benthall declared that Cybernetic
Serendipity would be remembered as a "landmark," not least due to its "breeziness
and catholicity” [12]. Others agreed: "For breaking new ground, revealing new
fields of experiment, seminal importance, sheer hard work and enormous
organization, the exhibition Cybernetic Serendipity… is arguably the most
important exhibition in the world at the moment” [13]. According to Brent
McGregor, “the status of the event was such that Umberto Eco came from
Italy to view its wonders” [14]
32. • (…) to make chance discoveries in the course of
using cybernetic devices, or, as the Daily Mirror put
it at the time, to use computers “to find unexpected
joys in life and art”.
33. transformation of expression / 表現行為の変容
• Evolution of authorship
作者性の変化
• massively online multiple authorship &
derivative creation
作者の集団化と派生創作
• => OpenSourceSoftware, Wiki, Git/GitHub, CC, SNS
• computational creation using big data
ビッグデータを利用した計算機による創作
55. “Bio is the New Digital”
Nicholas Negroponte
cited in: Joi Ito (ed) (2015)
Before/After Internet: Human Evolution on the Net
56. “A being that never had to face these
biological inconveniences, whether it was
a technologically enhanced human or an
AI, would lack the basis for truly
understanding human suffering. ”
Murray Shanahan
The Technological Singularity (2015)
57. “Is there a compromise position between
conservative anthropocentrism and
posthuman fundamentalism? ”
Murray Shanahan
The Technological Singularity (2015)
58. Cybernetics is a tool to actively observe
and construct human essences
サイバネティクスは能動的に人間の本質を観察し、
かつ構築する方法
59. Perspective for a Happier Cybernetic Serendipity
より幸福なサイバネティック・セレンディピティへの展望
• Cybernetics as Philosophy of the Information Era
情報時代の哲学としてのサイバネティクス
• Digital Literacy : how to increase our autopoietic aspect
(i.e. creativity) of each psychic system (read: “human”)
デジタル・リテラシー:個別の心的システム(人間)の自己創出性(創造
性)をどう増幅するか
• create means of Creative Communication, not
mechanical communication
機械的なコミュニケーションではなく、創造的なコミュニケーションの方法
を作ること
60.
61. Fear leads to obscurantism , precaution
does not. And enthusiasm leads to
creation.
63. Before/After Internet: Human Evolution on the Net
ネットで進化する人類:ビフォア/アフター・インターネット(KADOKAWA)
Joi Ito, Kevin Slavin, Dominique Chen, Sputniko!, Hiroya Tanaka, Naotaka Fujii (2015)
10/28(水)
刊行予定