| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

Provisional Idiot

Page history last edited by PBworks 16 years, 4 months ago

PI


PROVISIONAL IDIOT

 

 

 

 

 

 

 


 

though these two maps look very different, they have equivalent dynamics (fixed-points, cycles, convergence), and the peicewise linear one is eazy to analyse compared to the (at least) 5th degree polynomial looking thing...crazy shit...looks funny cuz i dont think you can define functions in a peicewise way in gnuplot (suggestions?) ...more theory building to come

 


How "PI" does have an interesting network of meanings and associations...no? Each of course evolved in very different and ARGUABLY unrelated situations - the Greek letter, the mathematical symbol, the Private Investigator, the Principal Investigator - and yet, due to the organizing ability of the mind of one Provisional Idiot, all such arguable differences in origins of the different meanings collapse into one well folded, tightly-packed AcroNym that we are able to throw around with as much or as little abandon as we so choose, or do not choose.

 

Nice.

 

None of your "PGP" links work, below. What is it and why does it matter (to ask the begged question)? - UrthBound

 

w4mw


 

hey there linux jockey, just installed ssh on my computer and now i'm looking for someone with which to have a NSA cyber exchange. my laptop is a sweet little dell latitude running ubuntu dapper, and lately she's been hurting for a download. so if any of you console cowboy's out there feel like hooking up, let's exchange ip addresses.

 

-PROVISIONAL IDIOT
inet addr:192.168.2.11X (X=0-9)

username: user

password: asdfg


Borne by idle winds and boredom, spores shaken from the SOC film fest have sprouted pods all over town: apparently the TAZ is the new cash crop this summer. as this mycelium of community burrows deeper into the social substrate of State College, multiple ad hoc networks coalesce into an ever expanding autopoietic being. with insatiable hunger, it seeks the nourishment of fresh heads—the gray goop of neuron pudding—feeling pangs of information withdrawal.

 

KNOW THIS:

invasion and propagation of the pod people is inevitable; we/it cannot be stopped. come feed the TAZ, and watch our garden grow.

-PI

 

interesting side note:

 

contact has been established with a local administration species. though mostly harmless, their presence has been deliberately asserted and territorial boundaries have been drawn in the sand...

 

A quote from Officer Henderson: “What kind of wacky movie is this???”


Interested in PGP? Well I'm trying to teach a class on it at the center for sustainability, sometime early in the summer TBA. Anyhow...I think a class on PGP should focus on properly using the software, intelligently managing and protecting your private keys, and following a exchange protocol that ensures maximum security.... I.E. the course would be less about mathematical machinery beneath PGP (unless sudden interest arises), and more about using PGP in practice. Thus I still have much to learn/study.... This does not mean, however, that the class should be delayed until I receive the "proper" education on the subject, as the computational power of many "parallel" minds focused on a single task always exceeds the computation power of one--as Im sure you already know--even if his software has been more recently updated... Tinkering and hacking and playing with the PGP software, I think, should play an integral role in our educational setting, and thus experience with PGP will be helpful but not necessary. This is not to say that I will come unprepared to teach, but rather (as it should be) the student/teacher boundary will be dynamic in the non-linear sense, prone to rapid fluctuation and unpredictable topology....

 

Please let me know if you're interested in such a class, what kind of expectations you might have, etc. so I can adequately prepare for this ad hoc educational TAZ...


Why do you need PGP?

 

It's personal. It's private. And it's no one's business but yours. You may be planning a political campaign, discussing your taxes, or having an illicit affair. Or you may be doing something that you feel shouldn't be illegal, but is. Whatever it is, you don't want your private electronic mail (E-mail) or confidential documents read by anyone else. There's nothing wrong with asserting your privacy. Privacy is as apple-pie as the Constitution.

 

-philip zimmermann, creator of pgp (pretty good privacy encryption)


 

 

This previous attack description is confusing and can be described using all manner of technical jargon.

 

 

 

Got some interesting spam today. Reads like poetry. Cut and Paste profundity.


Proposal:

 

develop a public-key protocol to be embedded into peer-to-peer networking systems, one that exploits the "ad hoc" topological structure of these systems in order to create "secure" information exchange. Current protocols rely on the expectation that information is time-coded, i.e. valuable for only a finite period of time, in order to foster security. While this is "very" true for many type of information exchange, it "much less" true for certain types of information (think Paris Hilton video). Thus I develop a protocol which does not depend on "time-coded-ness" for security, instead taking, "The existence of information "guarantees" its multiplication," as my primary axiom, from which my protocol will sprout out of the peer-to-peer's distinct topological structure.

 

StudyMaterial



I'm having trouble finding Centre of the Cyclone on this here information super-highway. Anyone have an idea of where i might a copy?

 

 

 

It Looks Like Free Culture Has Enter The Meme-pool


 

 

I need to float...interrupt current behavioral patterns, and forge a healthier feed-back loop...cuz right now I'm all frayed wires and short circuits...

 

 

 

Proposal: Class float some future Friday...Is anyone interested?

Yeah, but when you say 'class float' I imagine twelve of us trying to fit into the tank at once. How's that gonna work?-Echan

 


 

Hey PI: I like the guide below as a set of tactics for metaprogramming. I think it needs "gathering" to be added to the mix, so I hereby do so. Would you find correlative rhetorical tactics in Cosmic Trigger for each of your metaprorgamming tactics and link them here please? - mobius

 

CUt, paste, REmix MetaProgramming Guide

 

 

 

 

1. AWARENESS

Researchers have repeatedly discovered that different people respond to mind-changing event in many different ways--including two different people having opposite responses to the same external stimulus. There have been a number of studies about this phenomena, including: (SarwerFoner, 1957), (Henninger, et. al., 1965), (Rickels & Downing, 1966), (McNair et al., 1966). Over the years, it has been discovered that a person’s mental abilities, expectations, prior experience, age, sex, race, personality traits, and personality types can all potentially influence a person's reaction to a shared stimulus. For instance, a sedative drug administered to an extroverted confident athlete caused the athlete to feel anxiety and disorientation. In contrast, an introverted nervous intellectual felt calmness when the same drug was administered.

 

 

 

2. INTERRUPTION

 

 

I began to see brilliant, shimmering blotches of color. Some were deep purple with yellow halos around them. They suddenly would change, in a moving pattern to brilliant yellow centers surrounded by red radiating celia pulsating gradually into dark blues and yellows. But I never could drum up a real picture. I was watching a Siamese cat I had many years ago. He loved cantaloupe, and there I was in the kitchen listening to him howl for a piece of melon. My aunt and I were sitting at a round oak table and she said, "If you don't give him some, he won't shut up." I heard her say that. I heard the cat, too. As I showered off the slickness of the epsom salts, I felt wonderful, refreshed and mentally stimulated. Personally, I can hardly wait to try it again.

 

 

 

 

 

 

3. ISOLATION

Isolation guarantees are an important aspect of transactional protection. Transactions ensure the data your transaction is working with will not be changed by some other transaction. Moreover, the modifications made by a transaction will never be viewable outside of that transaction until the changes have been committed.

 

That said, there are different degrees of isolation, and you can choose to relax your isolation guarantees to one degree or another depending on your application's requirements. The primary reason why you might want to do this is because of performance; the more isolation you ask your transactions to provide, the more locking that your brain must do. With more locking comes a greater chance of blocking, which in turn causes your threads to pause while waiting for a lock. Therefore, by relaxing your isolation guarantees, you can potentially improve your application's throughput. Whether you actually see any improvement depends, of course, on the nature of your application's data and transactions.

 

 

4. ATTENTION

For man there are two types of time, sacred and profane, the former experienced in religious festivals, the latter in ordinary daily life. Religious festivals reactualised sacred events from the mythical origins, so participating in them meant stepping out of ordinary time and into sacred time, the time of origins. Religious festivals occurred periodically, so sacred time was also circular.

 


Hey there pi... i tried to email you the file but it didn't work. i uploaded it to the files on the wiki... engl471_assign1. If you can't find it or it didn't upload properly, let me know. RoBoCoP

 

It's been a while since since I've plugged my wetware interface into the wiki, let its slithering tentacles bore deep into my skull and couple itself with my trembling neurons. Frightened and disgusted, I imagine the wiki as a symbiosis of flesh, silicon, and electricity, recoiling from it the same way you might recoil at the prospect of some alien entity probing your asshole—too foreign and too sensual. Yes, the wiki is committing unspeakable sex acts with my brain, feeding off my circuitry and ejaculating information back in between the synapses in some kind of terrifying feedback loop: mind-fuck, mind-fuck, mind-fuck... Pregnant with its semantic offspring, sometimes I think I like it.

 

 

 

This is the simplest metaphor I can come up with to explain how I am feeling. You may think I'm crazy, but at least I'm having fun.

 

 

I've been reluctant to speak about mathematics, as most people possess feelings of hatred for my beloved major...On second thought, I don't think I am going to share what I was about to, which has something to do with the systematic creation and destruction of reality tunnels within the mathematical tradition as a means to foster “open” mindedness. Perhaps a quote would suffice:

 

 

Being attached to a speculation is not a good guide to research planning. One should always try both directions of every problem. Prejudice has caused famous mathematicians to fail to solve famous problems whose solution was opposite to their expectations, even though they had developed all the methods required.

—Anil Nerode, Cornell University


Who is the great magician that

 

makes the grass green?

 

Wow, thanks for posting that, ProvisioinalIdiot. Watching RAW, I'd love to be able to shrug him off, but he does something to my brain. ~Echan


 

Something, Not Someone, Will Be Watching

The birth of thinking machine is marked for 2007. Web 3.0 promises to breath intelligence into the internet, coordinate the random blips of locally distributed synapses into global unison—into the dance of sentience. Is this all just science fiction? If not, what then are implications for the society of control? Before the mechanical eye of the camera watched only in silence, lacking the agency to report its surveillance—the requirement of the human behind the camera, leaving only thousands of hours of useless unwatched video tape. But now what happens when the camera itself gains the capacity to critical think, the ability to discern “threats” and translate them into meaningful text, to edit multimedia into a cohesive analysis faster, more precise, and more accurate, than any human can? Remember, any wo/man must suffer from fatigue, but the machine will watch with unwavering attention.

 

Don’t get me wrong, I think web 3.0 will be a tremendously good thing. But as with any technology someone’s going to hack it and exploit it for personal or political gains.

 

Some brief concluding thoughts: What will be the counter hacks? Will they necessarily fool both wo/man and machine? Is this the death of the English major/literary theorist? Although I think the answer to the last question will decidedly no, I, personally, desire the contrary (the death of one age, the birth of another, which is to say I desire evolution).

 

http://easyubuntu.freecontrib.org/get.html


 

 

Let's break the mold and set the standard

I am filled with the desire to make this wiki sparkle and dazzle, precipitate an evolution of the class room, and set the standard for what an English class could be. This is my last full semester and I’m feeling the desperation that precedes an unfulfilled education fantasy–my appetite for knowledge grows exponentially, the awareness of my ignorance follows in close pursuit. I say we upgrade this biotch, wikify the wiki to the nth dimension. We got some talented people in this class, diverse educational backgrounds abound. We got computer scientists, IST gurus, rhetoricians, teachas, educators, strategerizers, anthropologists, and mathematicians (to name a few of the crew) The parallel computational power of the collective mind dwarfs that of any one individual, so let’s all preach the gospel of our miscellaneous disciplines—merge and bifurcate in fractal informatic (informatic apparently isn’t a word… so I hereby, by no authority whatsoever, declare it to mean: containing or having qualities of information; a modifier which emphasizes the aspects of an object that involves information) patterns.

 

I’m putting it on the TA Syllabus, an out of class workshop to discuss, plan, and implement technologies of collaboration. (This could be your final project if you are looking for one.) Here’s what I had in mind:

 

1)An rss feed of the churnings and transformations of our wiki that samples a paragraph or two from recently changed wikis and can be shared with other wikis, blogs, and websites. i.e :

Provisional Idiot

I am filled with the desire to make this wiki sparkle and dazzle…

 

2)A search engine ala the brain.

 

3)Pod casts of class (live maybe).

 

4)And rss feed of outside news sources pertaining to relevant subjects.

 

Got any ideas, put them above. Think I lack imagination or am just plain stupid (as the name suggests) then please attend the meeting after class Thursday, Feb. 9. Be excited, show some initiative, and get your fucking money’s worth out of this (over?) expensive institution….

 

11:11 pm Thursday, no takers yet... I would greatly appreciate if anyone has experience with PHP, RSS, web applications would share that they share their knowledge with the rest of us. Anyone with graphic design experience would be appreciated too.

2/27/07 - I'm late! And while I'm technically a dunce, I'm willing to work/collaborate/co-operate/intertwingle with anyone who wants to work on this. What I see is a front page interface with (as you said) and RSS feed (I don't know what RSS means, but I've seen the feeds before) of samples of blogs. So, you go to the 'blog pile' page and see a snippet from each blog. As for class podcasts...I know nothing of how to make a podcast, but I have a mini DV camera with great image and sound quality, and some editing talent (audio and visual), so perhaps snipets of class could go up on the wiki? ~ Ceridwen

PBWiki has an RSS feed set up for all public wikis. Just use http://biotelemetrica.pbwiki.com/rss2.php?private=1. However editing it may pose a problem, i.e. changing what comes through on the feed, how much of it, etc. But it's a start...- moops


It would appear that this is a rock group of some sort.

For 14 pages of documents, The Grateful Dead FBI report contains surprisingly little information, amounting to about two full sentences of text: “LSD originates from San Francisco, California through a renown rock group known as the Grateful Dead. The Grateful is well known to DEA, San Francisco.” Well no shit…when was this document released? Electric Kool-Aid Acid Test was published in 1968, and anyone who even browsed that book would have known that The Dead indulged in a little LSD. Perhaps more interesting than the few nothings of text about The Grateful Dead are the features of the document itself, the bureaucratic title pages and the marginalia. For instance, on page 5, it can be seen that the document was produced by or sent to (I can’t tell) the FBI division pertaining to the Black Panthers. What’s the connection between The Dead and the BPP? Is it only involving drugs (the informant seems to have a number which to contact the Grateful Dead), or does the connection run deeper? Pages 7(c) and 7(d) are blacked out completely for unclear reasons described as “the following number is to used is reference regarding these documents. 100-455011-10 enclosure pages 2 & 4.” Call me a skeptic, but I doubt the existence of said document, for why black out something which is available elsewhere. To impede, if not totally obstruct the flow of information? (A very useful rhetorical tactic, reminiscent of Borges— in times of crisis, simply reference non-existent sources of information.) Lastly, the entire document is covered in coded scribbles: b7c appears a dozen times, sometimes adjacent to text which goes something like “prepared by” and “report of”, and probably references the agent who primarily handled the Grateful Dead files…(Note: after viewing a couple of extra files, it seems that b7c is some kind of exemption code, and not a specific reference to the content of the deleted material. What, then, does b7d and o/s mean?) I find it unfortunate that these series of symbols are most compelling items of the document. On the other hand, it’s kind of funny to me, how boring this text really is, and that I find it infinitely more interesting to study the FBI’s encryption protocol, rather than information it codes…It seems to me that all this crap serves only to further the hypothesis that bureaucracy exists solely to produce more text, nothing more, nothing less.

 

 

This document contains neither recommendations nor conclusions…

 

 


RFID Showcase

 

I think the origin of the fear one feels (besides evolutionary reasons) for technology like RFID stems from the un-locatable ubiquitous locus of power that it (claims to) possess. So why not ease the tension by placing some of the control in the hands of the chip bearers? Why not make the frequency of the RFID chip emit tunable? If every chip came with a hand held computer that could modify the information signal as well as receive broadcasts from other RFID user, I think people might feel a little more comfortable about having an electronic device planted in beneath their skin.

 

 

Imagine you’re at Zeno’s on a Friday night having a pint of IPA. You finish your glass, but the waitress is nowhere in sight. You download a menu on your Hand Held Computer of Zeno’s expansive and ever fluctuating beer list, find something that looks good a make and order via RFID chip that carries not only your identification (would this not eliminate the traditional fake ID?), but also your payment information. After a few drinks, you’re ready for some conversation. An interesting/attractive boy/girl/other catches your eye, so you scan the room with your HHCPU and up pops a dozen or so Facebook-like profiles of the surrounding crowd. You scroll through the faces until you find the intriguing man/woman. Is she/he single, looking for a relationship, or just some fun? Does she/he read Cosmo or Cosmic Trigger? Now that you know she/he is proud of the fact that she/he hasn’t read a book since High School, you don’t think that you’ll be buying her/him that drink you were thinking about. It’s been twenty minutes since your buddy went to take a piss, so you scan the room again (queuing your search this time for friends only) to see if the bastard has ditched you in his drunken stupor. The search page comes up and instead of seeing your buddy you see the twisted smirk of your psycho ex-girl/boyfriend. It’s time to leave…you don’t need that drama, not now not ever. Glad to have escaped that potential mess, you decide to head to bed, and dial out a signal for a taxi to take you home. You don’t even need know where you are or where you’re going (which unfortunately is a very plausible scenario in Happy Valley), the RFID chip will tell the driver where to go (and pay for you too). You get to your apartment, but the goddamn door is locked. Not to worry, you simply wave your arm in front of the scanner and the door instantaneously opens. Falling ass-first onto a puke-stained futon, you feel a touch of pity for the primitive bastards who in past times would have had to wait, drunken and furious, by the unyielding wooden entrance for someone to let them in. Moments later your pity transforms into an unmitigated desire to smoke, so you scan the building to see if Joe the local purveyor of marijuana is around (he said he was getting headys…you don’t trust such designations, but your willing to pay the extra twenty). He is, so you call him up, but he doesn’t answer. “I know you’re here somewhere, you bastard!” you mumble aloud, your breath tainted with whiskey. You walk down the hall to his door and dial your HHCPU to search only in a 15 foot radius, narrowing possibilities of his whereabouts. “I know you’re in there!” you yell, between pounds on the door…you dimly understand that tonight you might be losing a friendship and a connection, but damn it you want that AK-47, regardless of the consequences….With the transaction made, and couple bong rips taken, you’re ready for bed. With your last conscious thoughts before sleep, you think: “Where would I be/without my RFID? Not here, not here...” Later when your roommate comes home, he notes the strange countenance that your dreaming face possesses on this particular evening: an expression of contentment, a self-satisfied grin. “It must have been a good night…must of gotten laid or something.”

 

Is there a market for this kind of social networking thing?

 

So Mobius gave me a good idea...the RFID chip should have different access levels: one for friends, family, strangers, business, shopping...so when you meet with a client, they don't see the ode to your drinking problem that you recklessly placed in your profile...

 

Here is another idea:

 

Tag celebrities, map their partying habits for public consumption, and advertise their presence in chic night clubs for promotion and profit…If you’re famous you don’t deserve privacy.


Cyber—a versatile prefix…masquerading as an adjective.

 

Any emerging technology precipitates a linguistic struggle (we discussed this in class, did we not?), a mismatched synthesis of analogy and context that defines a new order of language out of an existing one. As with any assimilation of “new” signs into a preexisting symbolic system, the result is rarely pretty and more often than not produces an ambiguity that borders on meaninglessness. The authors of the Introduction to The National Strategy to Secure Cyberspace face the same inescapable dilemma of defining an object (the internet) which has been identified but has yet to be articulated or understood in a linguistic context. In order to render Cyberspace more tangible to their audience, the authors rely on the language of security and defense, inserting its concrete imagery into the nebulous space of information (the internet). Perhaps cued by Gibson’s portmanteau, Cyberspace, here the analogy seems to be territorial—the idea of spatial interaction appearing to be the prominent metaphor. I imagine, and in part the text evokes, images of bulwarks, advancing (cyber) armies, and the resulting clashes when the two meet. (Notice that in the President’s letter, as if a monarch before his feudal constituency, Bush calls for the creation of a “public-private partnership” in order to protect national infrastructures.) Here’s an excerpt:

 

 

Do you see anything peculiar? Read the above text again, but remove the word “cyber” from the highlighted selections. What if anything does the addition of “cyber” to the paragraph modify? It still makes sense, and I glean just about the same interpret with or without cyber’s presence. So what purpose does it serve? Certainly, it indicates a location and a (vague) context, but nothing in the above paragraph illustrates how cyber mutates the character of the words, "incidents", "threats", "attacks". Employed almost as a prefix, rather than an adjective, its proximity to the aforementioned words produces an unclear effect, as if these nouns realize the “space” embedded into its interpretation—events that indicate the existence of the stage/medium in which they occur. Such rhetoric leaves me with an unsatisfactory feeling that nothing new has been defined, as if the authors haphazardly threw in a word, that could have been easily replaced with by a myriad of others to similar effect, in order to convey a context and meaning that they were not yet ready to describe. That is to say, I smell a hustle…someone who’s trying to capitalize the dizzying effect of an emerging technology that no one fully understands.

 

Do you feel the same, or am I overreacting?

 

Reading over some of my previous posts, I begin to see a trend. I am already too aware of the influence of multi-discipline heritage on writing possibilities, the barriers erected around unfamiliar discourses—entire domains of knowledge I simply won’t tread because they belong different traditions of episteme. My mathematical sensibilities demand (but do not require) an axiomatic system that is previously agreed upon by the participants of the discourse—without which this discourse and analysis of this discourse seems ill-defined—which is to say, I can draw any conclusion I like. And yet I intuit this feeling is false, an excuse that is not without merit (but an excuse nonetheless) that has hereto prevented me from diving head first into our assigned analysis. With this paragraph I hope, having identified this regretful tendency, to resist it in future writing. Help keep me to my word...don't let me deliver the same old cop out.


 

Although I don’t have particularly much to say, I’d thought I’d keep typing to the beat, cuz I’m afraid of losing the rhythm.

 

 

A most precise and concise rhetorical analysis of the TIA flowchart/mandala thing, PI. Yes, a work of a magus, a text that looks like an image that looks like a text saying nothing in particular in an Incredibly Authoritative Way. I do love the flowchart and the concept map as heuristic tools for organizing my thoughts into different kinds of actions and questions, but here the TIA rhetoric does look like classic psyops with powerpoint. Just to test out the powerpoint, I imagine the TIA getting together and pretending to dicuss the flow chart. How shall we remix this flowchart, and to what end?--flobius

 

Maybe I’m not the only one who thinks so, but the TIA operations picture seems to me a mess of imagery, a labyrinth of arrows and coded symbols. My eyes attempt to follow the prescribed trajectory, the linear path suggested in the marquee, but inevitably they end with they have begun, bewildered and slightly amused.

 

Bear with me as I try to decipher its hieroglyphics.

 

Notice the broken chain connecting biometric and transactional data; what does it suggest? Is there a weak link between them? Do the lines of motion adjacent to gap illustrate a divergence (in technology, in methodology, in I don’t know) of these datas from each other, threatening the integrity of link itself? With the emergence of TIA does privacy and security becomes nothing but a perforated line, through which ambiguous arrows easily pass? And how about the colored blobs? What the fuck are those? Hostile individuals? Their information? The model they fit into? (The enemy will take on many colors and shapes, to be sure.) A clue might their container, its wandering edge perhaps suggesting a lack of clear definition—these blobs seemingly clouded in mystery, so to speak. Do they belong to unknown? The only thing I’m certain of is that it all ends in a decision. To preempt? To monitor? To confuse?

 

TIA’s motives will/can never be known. Maybe that’s the point….or maybe I’m dumb...After all if you look at the file extension, you'll see that this was (originally? surreptitiously changed to?) a powerpoint file. Someone please agree or disagree.

 

P.S. I'm excited that this wiki is popping and shaking with life...


Once again, I’ve been duped by the rhetorician… As if to challenge assertions made in the first paragraph, I scanned the proceeding text with deliberate intent, determined to read—not simply browse—each word, and decipher its design within the context of the sentence/paragraph/proposal. Such a task would take multiple readings—this I understood—as the reading process itself would require me to halt mid-sentence/paragraph, and ponder over a particular piece of text to make sense of it, before beginning the sentence/paragraph anew. And where did my eyes first stop to take a deeper more contemplative look? Clause (1) of The Wiki Response section, of course.

 

(1)Students learn to use different media to achieve their rhetorical aims. By working with a medium most students have never interacted with ( wiki), students intuitively learn the difference medium makes to their writing. Being reflective about medium is crucial as media diversify and proliferate.

 

Immediately I recognized the familiar refrain from class: Wiki is the medium is the message. I had not planned to stop (how could I have?) on that those particular sentences, but I felt strangely compelled, as if being jerked along by unseen rhetorical strings, and made to dance some Pinocchio act. I laughed the kind of inward chuckle you do when you think you’ve seen all the magician’s tricks and watch him closely for the sleight of hand, only to be fooled/humbled once again by your misplaced attention… Herr Doktor Mobius, you are wily one, Sir.

 

Over the break I read a book which illustrated this point nicely:

 

You know those personal advertisements in magazines like the New Statesman? I thought I [write about myself in that way.]

 

60+ widowed doctor, children grown up, active, cheerful if inclined to melancholy, kindly, non-smoker, amateur Flaubert scholar, likes reading, food, travel to familiar places, old films, has friends, but seeks…

 

You see the problem. But seeks…Do I? What do I seek? A tender fortyish div or wid for companionship stroke marriage? No…I always read those pining paragraphs in the back of magazines, though I never feel like replying; and I’ve just realized why. Because I don’t believe any of them. They aren’t lying—indeed, they’re all trying to be utterly sincere—but they aren’t telling the truth. The column distorts the way the advertisers describe themselves. No one would think of himself as an active non-smoker inclined to melancholy if that wasn’t encouraged, even demanded, by the form. Two conclusions: first, that you can’t define yourself directly, just by looking face-on into the mirror; and second, that Flaubert, as always was right. Style does arise from subject matter. Try as they might, those advertisers are always beaten down by form; they are forced—even at the one time they need to be candidly personal—into an unwished impersonality.

 

 

(I’ve come to realize that I really am a child of interactive media: in preparing the above text I hopelessly desired a search queue, but unfortunately had to find the quotation for myself)

 

As I remembered the above quotation I began to think about how the wiki medium transforms/becomes the message, and about the trajectory and origin of the wiki-voice. The effect wiki medium has on the preparation of text, compared to say personal advertisement, seems to me more subtle. The lineage of the wiki seems in part personal blog/message board, and in part interconnection. The possibility of direct response—the expectation of a mobius-like division between author and audience—flavors the text in a way that I find distinct, yet difficult distinguish from, say, the traditional essay (or the above mentioned mediums) in a rigorous way. I’ll try my best though… Personally, when writing in wiki form, I begin to imagine the audience as the major premise; rather than simply articulate/construct an idea into symbolic language, I feel as though I’m trying foremost to explain rather than create, though of course I’m doing both. Likewise, the emphasis on explanation induces a kind inter-textuality—the linking of outside/inside sources— in order to both indicate and direct readers to deeper reservoirs of meaning, as if to say: click here if you want to really understand what I’m saying… As Wiki pages lead to more and more wiki pages, the ecology of the connection becomes increasingly complex: additional readings can produce drastically different experiences—as interconnections between wikis create the real possibility of you reading text that is adjunct to, but entirely different from, the original. (Think Wikipedia) Mapping out the course of multiple readings resembles something like a mycelium network: and I think retracing of the reading trajectory becomes an essential part of the wiki experience, at once its biggest allure and most powerful rhetorical tool…It made me a believer.

 

And somewhere in the muddle of the last paragraph, between the strands of self-reference and hyper-text, lies the wiki, though I couldn’t tell you where the heart is.

 

Well I that all I can muster up for now…maybe tomorrow we can talk about the Lorenz attractor that graces our blog page.


 

Provisional Idiot

 

Concealed somewhere in the depths of Total Information Awareness operates another hidden agenda—the deliberate suppression of the apparatus of the surveillance itself. The method and recorded medium the must remain secret; it is not for public consumption. Total Information Awareness requires this additional practice (if not multiple practices hereto unknown to me) in order sustain itself as deep reservoir of useful information its name suggests: contained within the material of the information itself hides traces of surveillance devices…Once you see your in distorted image on monitor’s screen, the camera is located and circumvented. Hence the recording and recording device, analogous to the observer and the object of observation, is inextricable linked (as this sentiment is often stated). In order to remain most effective, information must be concealed, protected—if the code becomes public then it can modified and multiply ad infinitum….

 

 

Here is one way how to key information a secret

 

If Herr Docktor Mobius feels so inclined I would love to teach the class about public keys codes so that the class can get a flavor how this cryptography works. It is an interesting subject that is very much connected to semiotics, the study and language of signs.

 

 

Provisional: Schedule the Public Key Encryption class on the wiki! Dr Mobius says Yes Aye!- Flobius

 

Provisional: Wiki on the Wiki project was wondering if you would be able to help us implement our Audio interview with Mobius to our Wiki page. The raw audio is on there but you have to download it in able to hear it, I know there has to be a way of just clicking a play button and letting it stream off the Wiki. Also Mobius had informed us that you are talented in the area of fading background noise (even though its not that bad) it would still improve the quality of the overall footage. If you could help us out and eliminate the background noise or enhance the Audio in anyway and just shoot me an email at wrm130@psu.edu that would be awesome or just post it back on our Wiki page. Thanks really appreciate it . ~ Mach (Wiki on the Wiki project)

Comments (0)

You don't have permission to comment on this page.