SlideShare a Scribd company logo
1 of 107
Virtual Worlds and
Narrative Control Guidance
Peter Ludlow
Department of Philosophy
Northwestern University
Two approaches to digital
humanities
Two approaches to digital
humanities
1. Application of digital tools to humanities
research.
Two approaches to digital
humanities
1. Application of digital tools to humanities
research.
e.g. Data mining corpora
Two approaches to digital
humanities
1. Application of digital tools to humanities
research.
e.g. Data mining corpi
2. Application of strategies from the humanities
to digital technologies and products.
Two approaches to digital
humanities
1. Application of digital tools to humanities
research.
e.g. Data mining corpi
2. Application of strategies from the humanities
to digital technologies and products.
e.g. Studies of narrative structures in video games
Two approaches to digital
humanities
1. Application of digital tools to humanities
research.
e.g. Data mining corpi
2. Application of strategies from the humanities
to digital technologies and products.
e.g. Studies of narrative structures in video games
Two approaches to digital
humanities
1. Application of digital tools to humanities
research.
e.g. Data mining corpi
2. Application of strategies from the humanities
to digital technologies and products.
e.g. Studies of narrative structures in video games
Question: How far can we extend this project?
The Plan
The Plan
1. Narrative description in virtual worlds
The Plan
1. Narrative description in virtual worlds
2. Narrative guidance in virtual worlds
The Plan
1. Narrative description in virtual worlds
2. Narrative guidance in virtual worlds
3. Narrative guidance in programming
1. Narrative Description
in Virtual Worlds
The Second Life Herald
Second Life
Second Life Avatar Creation
Second Life Content Creation
The Second Jessie War
(From the pages of the Herald)
The Land Baron on the Jessie
Border
Trouble Brewing
One Song and Tank Split
Don’t Call Me a Pussy!
WWIIOLers Get Revenge
Tank on the Rebound
Or not.
What happened to those nukes?
Baller MoMo King
Culture Clash in Virtual Worlds
The Corporate Invasion
Toyota
Scion Meets a Magical Snail Race Chariot
Nissan
The Day The Elf King Retires, Palmisano
Addresses Troops
2. Narrative Guidance in Virtual
Worlds
2. Narrative Guidance in Virtual
Worlds
What is Narrative Guidance?
Ways We Influence Civic Behavior in
the “Real World”
• Physical Constraints: Build Walls, Control
Movement
• Legal Constraints: Punishment and
Imprisonment
• Social Constraints: “Shunning”, “Flaming”
• Narrative Constraints: Guiding Narratives
Guiding Narratives?
• Guiding Narratives
Fabius
In Virtual World…
• Physical Constraints: Build barriers, ban
individuals from area
• Legal Constraints: Ban individuals from game
(technically difficult).
• Social Constraints: “Shunning”, “Flaming”
• Narrative Guidance: Background Stories are
often missing
In Virtual World…
• Physical Constraints: Build barriers, ban
individuals from area
• Legal Constraints: Ban individuals from game
(technically difficult).
• Social Constraints: “Shunning”, “Flaming”
• Narrative Guidance: Background Stories are
often missing But not always!
EVE Online Chronicles
Day of Darkness,
Fan Video based on Chronicles
Intentional Narratives
in Second Life
• Marty Kelz
Intentional Narratives
in Second Life
• Marty Kelz
Intentional Narratives
in Second Life
• Marty Kelz https://www.youtube.com/watch?v=NKCVLwFKxYU
3. Narrative Guidance in
Programming
Who is a Programmer?
Who is a Programmer?
What would narrative guidance
in programming look like?
How do we control programming
now?
Waterfall Software Development
Agile Software Development
How traditional companies see it
Agile Software Development
The Scrum
Offices in…
• Kampala
• Johanessberg
• Beijing
• Chengdu
• Shanghai
• Hamburg
• London
• Manchester
• Bangalore
• Chennai
• Gurgaion
• Pune
• Porto Allegre
• Sao Paulo
• Quito
HQ: Chicago
ThoughtWorks Pune
ThoughtWorks Away Day in Brazil
ThoughtWorks Away Day in Brazil
ThoughtWorks Away Day in Brazil
ThoughtWorks Away Day in Brazil
ThoughtWorks Uganda
What is at stake?
Lawrence Lessig:
Code and other Laws of
Cyberspace.
Lessig’s “pathetic dot”
Lessig’s “pathetic dot”
What social architects
used to look like
What they look like now.
What they look like now.
What they look like now.
What they look like now.
Question
Is ThoughtWorks an aberration or can the
humanities play a role in software
development worldwide, and ultimately
reclaim its historical role in the development
of our sciences, technologies, and political
institutions?

More Related Content

Similar to Digital humanities: Narrative Guidance

Emergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGEmergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGAnn DeMarle
 
Tech trends that bend 2-2014
Tech trends that bend  2-2014Tech trends that bend  2-2014
Tech trends that bend 2-2014Jason Ohler
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible? Mathias Klang
 
Second Life: The Future of Communications?
Second Life:  The Future of Communications?Second Life:  The Future of Communications?
Second Life: The Future of Communications?Nicola Marae Allain, PhD
 
Between Hermeneutics and Deceit: Keeping Natural Language Generation in Line
Between Hermeneutics and Deceit: Keeping Natural Language Generation in LineBetween Hermeneutics and Deceit: Keeping Natural Language Generation in Line
Between Hermeneutics and Deceit: Keeping Natural Language Generation in LineLeah Henrickson
 
Week 3 summer hum 140 - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing aroundWeek 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140 - hanging out and messing aroundRay Brannon
 
Surveillance And Power
Surveillance And PowerSurveillance And Power
Surveillance And PowerMarj Kibby
 
Enthralled by the Immediate - usc imsc retreat - 01 jun2016
Enthralled by the Immediate - usc imsc retreat - 01 jun2016Enthralled by the Immediate - usc imsc retreat - 01 jun2016
Enthralled by the Immediate - usc imsc retreat - 01 jun2016Mark Dixon
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with InternetMathias Klang
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyCRS4 Research Center in Sardinia
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Ryland Sherman
 
O'Reilly Webinar - Cyborg Anthropology: A Short Introduction
O'Reilly Webinar - Cyborg Anthropology: A Short IntroductionO'Reilly Webinar - Cyborg Anthropology: A Short Introduction
O'Reilly Webinar - Cyborg Anthropology: A Short IntroductionAmber Case
 
The Magic Circle presentation @ Wharton's Tech-Fast
The Magic Circle presentation @ Wharton's Tech-FastThe Magic Circle presentation @ Wharton's Tech-Fast
The Magic Circle presentation @ Wharton's Tech-FastTimothy Michael
 
Social Media: Week Four - Social Media Ecologies - Revised 4/12
Social Media: Week Four - Social Media Ecologies - Revised 4/12Social Media: Week Four - Social Media Ecologies - Revised 4/12
Social Media: Week Four - Social Media Ecologies - Revised 4/12Ray Brannon
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime finalHarsha Matta
 
Nodal Points - The Emerging Real-Time Social Web (@Reboot 10)
Nodal Points -  The Emerging Real-Time Social Web (@Reboot 10)Nodal Points -  The Emerging Real-Time Social Web (@Reboot 10)
Nodal Points - The Emerging Real-Time Social Web (@Reboot 10)Jyri Engeström
 
Ethics and Games Series: Observer by Sherry Jones (Aug. 19, 2018)
Ethics and Games Series: Observer by Sherry Jones (Aug. 19, 2018)Ethics and Games Series: Observer by Sherry Jones (Aug. 19, 2018)
Ethics and Games Series: Observer by Sherry Jones (Aug. 19, 2018)Sherry Jones
 
Gathering Real-World Insights with Anthropology
Gathering Real-World Insights with AnthropologyGathering Real-World Insights with Anthropology
Gathering Real-World Insights with AnthropologyMatt Baline
 

Similar to Digital humanities: Narrative Guidance (20)

Emergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKINGEmergent MEDIA, NEXT GEN THINKING
Emergent MEDIA, NEXT GEN THINKING
 
Tech trends that bend 2-2014
Tech trends that bend  2-2014Tech trends that bend  2-2014
Tech trends that bend 2-2014
 
Recognizing the Gift
Recognizing the GiftRecognizing the Gift
Recognizing the Gift
 
Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?Off the Grid: Is anonymity possible?
Off the Grid: Is anonymity possible?
 
Second Life: The Future of Communications?
Second Life:  The Future of Communications?Second Life:  The Future of Communications?
Second Life: The Future of Communications?
 
Between Hermeneutics and Deceit: Keeping Natural Language Generation in Line
Between Hermeneutics and Deceit: Keeping Natural Language Generation in LineBetween Hermeneutics and Deceit: Keeping Natural Language Generation in Line
Between Hermeneutics and Deceit: Keeping Natural Language Generation in Line
 
Week 3 summer hum 140 - hanging out and messing around
Week 3 summer hum 140  - hanging out and messing aroundWeek 3 summer hum 140  - hanging out and messing around
Week 3 summer hum 140 - hanging out and messing around
 
Surveillance And Power
Surveillance And PowerSurveillance And Power
Surveillance And Power
 
Enthralled by the Immediate - usc imsc retreat - 01 jun2016
Enthralled by the Immediate - usc imsc retreat - 01 jun2016Enthralled by the Immediate - usc imsc retreat - 01 jun2016
Enthralled by the Immediate - usc imsc retreat - 01 jun2016
 
Privacy with Internet
Privacy with InternetPrivacy with Internet
Privacy with Internet
 
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economyRaoul chiesa - Auditing the hacker mind - da wargames a underground economy
Raoul chiesa - Auditing the hacker mind - da wargames a underground economy
 
Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316Privacy guest lecture 3.31.15 T316
Privacy guest lecture 3.31.15 T316
 
O'Reilly Webinar - Cyborg Anthropology: A Short Introduction
O'Reilly Webinar - Cyborg Anthropology: A Short IntroductionO'Reilly Webinar - Cyborg Anthropology: A Short Introduction
O'Reilly Webinar - Cyborg Anthropology: A Short Introduction
 
The Magic Circle presentation @ Wharton's Tech-Fast
The Magic Circle presentation @ Wharton's Tech-FastThe Magic Circle presentation @ Wharton's Tech-Fast
The Magic Circle presentation @ Wharton's Tech-Fast
 
Assignment 21
Assignment 21Assignment 21
Assignment 21
 
Social Media: Week Four - Social Media Ecologies - Revised 4/12
Social Media: Week Four - Social Media Ecologies - Revised 4/12Social Media: Week Four - Social Media Ecologies - Revised 4/12
Social Media: Week Four - Social Media Ecologies - Revised 4/12
 
Hacking a cause of cyber crime final
Hacking a cause of cyber crime finalHacking a cause of cyber crime final
Hacking a cause of cyber crime final
 
Nodal Points - The Emerging Real-Time Social Web (@Reboot 10)
Nodal Points -  The Emerging Real-Time Social Web (@Reboot 10)Nodal Points -  The Emerging Real-Time Social Web (@Reboot 10)
Nodal Points - The Emerging Real-Time Social Web (@Reboot 10)
 
Ethics and Games Series: Observer by Sherry Jones (Aug. 19, 2018)
Ethics and Games Series: Observer by Sherry Jones (Aug. 19, 2018)Ethics and Games Series: Observer by Sherry Jones (Aug. 19, 2018)
Ethics and Games Series: Observer by Sherry Jones (Aug. 19, 2018)
 
Gathering Real-World Insights with Anthropology
Gathering Real-World Insights with AnthropologyGathering Real-World Insights with Anthropology
Gathering Real-World Insights with Anthropology
 

More from Peter Ludlow

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Peter Ludlow
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and ConspiracyPeter Ludlow
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Peter Ludlow
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Peter Ludlow
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismPeter Ludlow
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfarePeter Ludlow
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Peter Ludlow
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in troublePeter Ludlow
 
What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.Peter Ludlow
 

More from Peter Ludlow (10)

Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)Group Epistemology and Irregular Warfare (the chickens come home to roost)
Group Epistemology and Irregular Warfare (the chickens come home to roost)
 
Hacktivism 6: Networks and Conspiracy
Hacktivism 6:  Networks and ConspiracyHacktivism 6:  Networks and Conspiracy
Hacktivism 6: Networks and Conspiracy
 
Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.Hacktivism 3: Risk taking and tipping points.
Hacktivism 3: Risk taking and tipping points.
 
Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.Hacktivism 2: A brief history of hacktivism.
Hacktivism 2: A brief history of hacktivism.
 
Hacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivismHacktivism lecture 1: The deep origins of hacktivism
Hacktivism lecture 1: The deep origins of hacktivism
 
Hacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfareHacktivism 7: Epistemology and irregular warfare
Hacktivism 7: Epistemology and irregular warfare
 
Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018Dynamic lexicon brazil 2018
Dynamic lexicon brazil 2018
 
Truth in fanfic
Truth in fanficTruth in fanfic
Truth in fanfic
 
Hacktivists in trouble
Hacktivists in troubleHacktivists in trouble
Hacktivists in trouble
 
What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.What Can We Learn from the Unabomber?: Nothing.
What Can We Learn from the Unabomber?: Nothing.
 

Recently uploaded

Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Digital humanities: Narrative Guidance