+++++   915

« earlier    

(2) SHAN SHUI Interactive installation Geert Mul 2013 - YouTube
SHAN SHUI Geert Mul 2013 Interactive installation featuring 500 Shan-Shui (Mountain - Water) style Chinese paintings. Courtesy: Gallery Ron Mandos Amsterdam Software programming: Carlo Prelz Production assistant: Shihui Wang 地平线 Perspective is a cultural property. The history of paintings of landscapes shows us a history of perception. The relativity of perception becomes most apparent when we look at 'the other'. And so 'the east' (east of what ?) can serve as an excellent point of reflection for 'the west' (west of what ?) and the other way around. The installations Shan-Shui and HORIZONS (https://vimeo.com/36303071) form a complementary outlook on the perception of the landscape from the west and the east.
art  newmedia  interaction  land  +++++ 
2 days ago by jonippolito
Books News: Plagiarism Software Unveils a New Source for 11 of Shakespeare’s Plays
[Amateur scholar] Mr. McCarthy used decidedly modern techniques to marshal his evidence, employing WCopyfind, an open-source plagiarism software, which picked out common words and phrases in the manuscript and the plays. In the dedication to his manuscript, for example, North urges those who might see themselves as ugly to strive to be inwardly beautiful, to defy nature. He uses a succession of words to make the argument, including “proportion,” “glass,” “feature,” “fair,” “deformed,” “world,” “shadow” and “nature.” In the opening soliloquy of Richard III (“Now is the winter of our discontent …”) the hunchbacked tyrant uses the same words in virtually the same order to come to the opposite conclusion: that since he is outwardly ugly, he will act the villain he appears to be. “People don’t realize how rare these words actually are,” Mr. McCarthy said. “And he keeps hitting word after word.
literature  data  digitalhumanities  sharing  success  +++++  amateur  socialmemory 
12 days ago by jonippolito
[Jon Ippolito] Don't Blame the Internet - The Washington Post
In his speech to Congress, Bush said, "Freedom and fear are at war." But his efforts to cripple the safeguards that guarantee the free exchange of ideas, here and around the world, make it unclear which side he is on in this war. The newly created Office of Homeland Security, rather than letting unwarranted suspicion quash the Internet's inherent freedoms, should recognize its liberating potential and learn from it.

As recent events confirm, New York's resilience derives from the interconnections it fosters among its vibrant and heterogeneous inhabitants. It is in decentralized structures that promote such communal networks, rather than in reinforced steel, that we will find the architecture of survival.
press  network  success  terror  Privacy  security  +++++ 
20 days ago by jonippolito
Barnyard Dust Offers a Clue to Stopping Asthma in Children - The New York Times
as many as 10.6 percent of grade-school children have asthma, according to data from the Centers for Disease Control and Prevention. And there is no cure for this chronic and frightening disease.

The discovery originated with an idea that has been around for years: that a growing number of children were developing asthma because their daily environments were simply too clean.

If children are exposed to microbes that stimulate their immune systems in the first few years of life, they will be protected against asthma, the hypothesis says. As asthma rates climbed, researchers published study after study supporting what has become known as the hygiene hypothesis.
health  defect  success  sustainability  immunology  +++++ 
22 days ago by jonippolito
A 15-Year-Old Convinced Verizon He Was the Head of the CIA
British teenager managed to obtain access to sensitive U.S. plans about intelligence operations in different Middle East countries by acting as former CIA Director John Brennan, a court heard on Friday. Kane Gamble, 18, researched Brennan and used the information he gathered to speak to an internet company and persuade call handlers to give him access to the spy chief's email inbox in 2015. He pretended to be both a Verizon employee and Brennan to access Brennan's internet account. Astonishingly, Gamble managed to gain access to Brennan's emails and his addressbook, as well as his iCloud storage. He even managed to remotely access the iPad of Brennan's wife... Gamble, aged 15 at the time, also persuaded a helpdesk at the FBI that he was the then deputy director Mark Giuliano
security  hacking  defect  youth  +++++ 
23 days ago by jonippolito
Darpa Wants to Build an Image Search Engine out of DNA
Strauss will be working with Ceze to first extract all the visual features from the crowdsourced images, and then map them into strings of As, Ts, Cs, and Gs. Each photo might get tens of thousands of unique DNA segments, each one encoding for a curve, or a vertical line, or a patch of blue. Then they can introduce a coded “query,” just the way you would type a few keywords into Google search. Except this query would be a string of DNA that corresponds to some of those visual features. And each query sequence would get a special coating of magnetic nanoparticles. Drop a few of those in a microtest tube of DNA, where 10,000 images are stored in a few milliliters, and they’ll grab all the sequences that are a match. Then you just need a magnet to haul them out and a sequencer and some more algorithms to turn them back into visual images.
preservation  biotech  socialmemory  visual  collection  digitalcuration  +++++ 
25 days ago by jonippolito
Julian Dibbell » A Rape in Cyberspace
two separate and credible sources revealed to me that the virtual psychosis of Mr. Bungle had been even starker than anyone guessed: that the Bungle account had been the more or less communal property of an entire NYU dorm floor, that the young man at the keyboard on the evening of the rape had acted not alone but surrounded by fellow students calling out suggestions and encouragement, that conceivably none of those people were speaking for Bungle when he showed up in emmeline’s room to answer for the crime, that Dr. Jest himself, thought commonly to have reincarnated the whole Bungle and nothing but the Bungle, in fact embodied just one member of the original mob — just one scattered piece of a self more irreparably fragmented than any RL multiple personality could ever fear to be.
violence  sex  network  psychology  governance  +++++ 
6 weeks ago by jonippolito
Creating Glow Effects with CSS / Coder's Block
[fourth number is spread size] box-shadow takes the shape of the element it’s on. If we make an element round with border-radius: 50%, then box-shadow will follow suit.

We can stack multiple glow effects on an element by giving box-shadow multiple sets of values, separated by commas. The glow effects will be stacked with first on top, last on bottom.
css  reference  +++++  nmd305 
6 weeks ago by jonippolito
Prumsodun Ok: The magic of Khmer classical dance | TED Talk | TED.com
[90% of practitioners wiped out by Khmer Rouge but it survives to this day] For more than 1,000 years, Khmer dancers in Cambodia have been seen as living bridges between heaven and earth. In this graceful dance-talk hybrid, artist Prumsodun Ok -- founder of Cambodia's first all-male and gay-identified dance company -- details the rich history of Khmer classical dance and its current revival, playing the ancient and ageless role of artist as messenger.
performance  dance  preservation  socialmemory  +++++  violence  success 
7 weeks ago by jonippolito
Media Art History » 7th International Conference on the Histories of Media Art, Science and Technology – RE:TRACE 2017
[Good compendium of info on all conferences in the series] The series aims at highlighting the increasing importance of media art for our contemporary culture and society, and placing it in an intercultural and historic context. For nearly 14 years, this conference series brings together prominent researchers, artists and scientists and sets topics of importance for the Humanities and the interdisciplinary research landscape. The bi-annual conference series (Banff 2005, Berlin 2007, Melbourne 2009, Liverpool 2011, Riga 2013, Montreal 2015, Krems/Wien 2017) is initiated and administered by the CONFERENCE SERIES BOARD of internationally renowned researchers of the field.
conference  presentation  history  media  art  +++++ 
8 weeks ago by jonippolito
[FERPA, COPPA, and badges] Frequently Asked Questions
A school is permitted to disclose PII from a student’s education records to 3rd parties without obtaining consent when that information has been appropriately designated “Directory Information” by the school or learning institution.

Generally, Directory Information is information that wouldn’t be considered harmful or an invasion of privacy if disclosed. It can include the student’s name, email address, degrees, honors, and awards received, phone number, photograph, date and place of birth, major field of study, participation in officially recognized activities and sports, the most recent previous educational agency or institution attended, grade level or year, and enrollment status. Directory information is designated by the school or learning institution and determined at its discretion. A badge may contain a student’s Directory Information, such as his/her email address and honors, awards, or degrees. Even if you designate information in a badge as Directory Information, a parent or student can request that you not share that information, and you shouldn’t send that information after a parent or student has made such a request.
What “Best Practices” Should I Consider Implementing When Disclosing Student Data?

It’s your responsibility to discuss FERPA compliance obligations with your legal counsel in connection with OBI. Regardless of how you classify data, we recommend that students and/or parents or legal guardians have as much transparency and choice as possible when it comes to sharing student data. You may want to ask qualified legal advisers about some of the following best practices:

Make sure your Privacy and Directory Information policies provide notice of your disclosure practices associated with issuing a badge.
Don’t include actual grades or individual test scores in a badge.
Don’t include sensitive information such as social security numbers, health, medical, or disability information in a badge.
Don’t allow users who are under 13 to send badges to the Mozilla Backpack.
Only include the minimal amount of data that must be embedded in a badge under the OBI specification.
badge  education  Privacy  +++++ 
8 weeks ago by jonippolito
Bodymovin - aescripts + aeplugins - aescripts.com
An After Effects extension to export animations for web. Animations are exported as .json files that use the bodymovin.js player that comes along with the plugin. You can render animations in the browser on svg, canvas and html. It supports a subset of After Effects features.
animation  Javascript  utility  AfterEffects  +++++  nmd205 
11 weeks ago by jonippolito
Mapping the Atlantic Charter · Norumbega [Colin Windhorst via Neatline]
[DIG student project based on historic meeting between Churchill and FDR in 1941, a precedent for the United Nations]
alumni  digitalcuration  maine  map  history  +++++ 
november 2017 by jonippolito
xkcd: Research Risks
[Graph showing risk of your research being used by a supervillain versus breaking free from your facility]
research  defect  fun  +++++ 
november 2017 by jonippolito
ART+COM Studios | Terravision
Terravision, 1994

Ter­rav­i­sion is a net­worked vir­tual rep­re­sen­ta­tion of the earth based on satel­lite im­ages, aer­ial shots, al­ti­tude data and ar­chi­tec­tural data. It serves as an en­vi­ron­ment to or­gan­ise and ac­cess in­for­ma­tion spa­tially. Users can nav­i­gate seam­lessly from overviews of the earth to ex­tremely de­tailed ob­jects and build­ings.

Ad­di­tion­ally to the pho­to­re­al­is­tic rep­re­sen­ta­tion of the earth, all kinds of spa­tial in­for­ma­tion-data are in­te­grated. Even his­tor­i­cal aer­ial shots and ar­chi­tec­tural data are of­fered in the sys­tem; this al­lows users to nav­i­gate not only spa­tially but also through time. All data are dis­trib­uted and net­worked and are streamed into the sys­tem ac­cord­ing to the user’s needs.

Ter­rav­i­sion was the first sys­tem to pro­vide a seam­less nav­i­ga­tion and vi­su­al­i­sa­tion in a mas­sively large spa­tial data en­vi­ron­ment. In order to nav­i­gate this data, three core com­po­nents were cre­ated as an in­ter­face: a large sphere ref­er­enc­ing the globe to pilot the planet; a 3D mouse to fly around; and a touch screen to in­ter­act with ob­jects on the vir­tual earth.

Ter­rav­i­sion is an isochro­nous re­al­i­sa­tion of Neal Stephen­son’s lit­er­ary idea in the novel “Snow Crash” as well as a pre­quel to Google Earth.

Deutsche Telekom Berkom GmbH sup­ported the re­search pro­ject.
map  Google  art  newmedia  history  place  interface  +++++ 
november 2017 by jonippolito
Streaming-Only Shows Come With One Huge Problem for Consumers and Historians
In their book Re-collection, co-authors Jon Ippolito and Richard Rinehart quote an industry lawyer who, in a letter to the U.S. Copyright Office, asserted that the industry rejects “the view that copyright owners and their licensees are required to provide consumers with perpetual access to creative works.” Of course we all understand that our Netflix subscriptions don’t entitle us to watch 30 Rock or Beavis and Butt-Head in perpetuity. (Both shows are gracing Hulu at the moment.) But the problem runs deeper than the practical implications of individuals having to pay for multiple subscriptions in order to maintain access to their favorite shows. The problem is systemic. Providing “perpetual access” really requires a system that is decentralized with plenty of redundancy built in, and that’s just what streaming video platforms are unable to offer. When talking about the preservation of information, librarians use the expression “LOCKSS” or “lots of copies keep stuff safe.” If every library—or every Walmart—in the country has a copy of a certain DVD, it’s unlikely that all those copies will be destroyed or lost simultaneously. But online streaming platforms are highly centralized by their very nature, and it’s doubtful that they really have the resources to maintain “lots” of carefully maintained copies of their exclusive content....

Experts have proposed strategies for saving all sorts of corporate-owned digital content, including TV. Rumsey suggests that lawmakers create more legal and financial incentives to encourage the entertainment industry to deposit digital assets in libraries and archives. Ippolito, who is director of the digital curation graduate program at the University of Maine, believes that concept of long-term storage of digital media is unworkable. Rather than impose analog methods on digital media, he recommends developing strategies that best suit the digital world. For example, emulation is a preservation strategy that allows a new computer to imitate an older computer so that it will be compatible with older software. But because emulation would encourage consumers to reuse old things (say, games or videos) rather than buy new ones, the entertainment industry objects to it, citing copyright infringement.

In spite of these differences of opinion in the world of archives and digital curation, all these ideas have one common denominator: Creating tax incentives, mandating archival deposit, and reforming copyright all require action from Congress. Given the history of gridlock in Washington, we may have no choice but to continue to accept the inevitability of digital impermanence.

Rachel Paige King is a freelance writer and media librarian at Long Island University. Her articles have appeared in Salon, Tablet, and Atlas Obscura.
law  preservation  digitalcuration  media  movie  television  defect  network  press  @i  +++++ 
november 2017 by jonippolito
The popularity of zombies is due to a mistake in Night of the Living Dead - The Verge
Zombies are everywhere, with blockbuster TV shows like The Walking Dead and in Game of Thrones, and films such as 28 Days Later, World War Z, Zombieland, and many others. That popularity stems directly from George R. Romero’s 1968 film Night of the Living Dead. A new video essay from Kristian Williams delves into how one mistake with the film’s release led to the renaissance of zombie stories that terrify and entertain us.

That popularity is due in part to the fact that when Night of the Living Dead was released, its distributor forgot to place a copyright indicator when it changed the title from Night of the Flesh Eaters to its current moniker. According to copyright law at the time, leaving that symbol and the year off meant that it entered the public domain. “The film’s entry into the public domain became the ultimate distribution tool,” says Williams, because theaters, video stores, and TV stations could air it at no cost.

Here, you can watch it right now on YouTube, or download it off of the Internet Archive:

Copyright laws changed a decade after the film hit theaters, so leaving the mark off an original work now wouldn’t allow this to happen. Williams explains out that Romero’s undead were far different from the original zombies from Haitian folklore, and that it was original enough that a copyright would have protected the concept of the modern zombie. Indeed, had the film not entered the public domain, Romero’s hold on the film and concept would have lasted through at least 2024.

Because of the error, Zombies became a thing that could easily be exploited by other creators. Williams notes that if Romero retained the copyright through 2024, we wouldn’t get works like Shaun of the Dead, Michael Jackson’s Thriller, Game of Thrones, The Walking Dead, and the hundreds of other works that have proliferated in the years since.
law  success  sharing  violence  movie  television  comics  nmd205  variablemedia  +++++ 
november 2017 by jonippolito
Museum Wars!
Bednarz O'Connell
@bednarz
·
Sep 13
Who would win in a staff battle between @sciencemuseum and @NHM_London, what exhibits/items would help you be victorious? #askacurator
digitalcuration  socialmedia  success  museum  +++++  marketing 
november 2017 by jonippolito
| Nintendo - Corporate Information | Legal Information (Copyrights, Emulators, ROMs, etc.)
Can I Download a Nintendo ROM from the Internet if I Already Own the Authentic Game?

...The backup/archival copy exception is a very narrow limitation relating to a copy being made by the rightful owner of an authentic game to ensure he or she has one in the event of damage or destruction of the authentic. Therefore, whether you have an authentic game or not, or whether you have possession of a Nintendo ROM for a limited amount of time, i.e. 24 hours, it is illegal to download and play a Nintendo ROM from the Internet.

How Does Nintendo Feel About the Emergence of Video Game Emulators?

The introduction of emulators created to play illegally copied Nintendo software represents the greatest threat to date to the intellectual property rights of video game developers. As is the case with any business or industry, when its products become available for free, the revenue stream supporting that industry is threatened. Such emulators have the potential to significantly damage a worldwide entertainment software industry which generates over $15 billion annually, and tens of thousands of jobs.

What Does Nintendo Think of the Argument that Emulators are Actually Good for Nintendo Because it Promotes the Nintendo Brand to PC Users and Leads to More Sales?

Distribution of an emulator developed to play illegally copied Nintendo software hurts Nintendo's goodwill, the millions of dollars invested in research & development and marketing by Nintendo and its licensees. Substantial damages are caused to Nintendo and its licensees. It is irrelevant whether or not someone profits from the distribution of an emulator. The emulator promotes the play of illegal ROMs , NOT authentic games. Thus, not only does it not lead to more sales, it has the opposite effect and purpose.

How Come Nintendo Does Not Take Steps Towards Legitimizing Nintendo Emulators?

Emulators developed to play illegally copied Nintendo software promote piracy. That's like asking why doesn't Nintendo legitimize piracy. It doesn't make any business sense. It's that simple and not open to debate.

People Making Nintendo Emulators and Nintendo ROMs are Helping Publishers by Making Old Games Available that are No Longer Being Sold by the Copyright Owner. This Does Not Hurt Anyone and Allows Gamers to Play Old Favorites. What's the Problem?

The problem is that it's illegal... [more in cip-x/nintendo_emulator_faq.html]
emulation  law  defect  game  socialmemory  +++++  economics 
october 2017 by jonippolito

« earlier    

related tags

!!!!!!  !!!!!  !!!!  !!  #tedbi328  *****  ****  ***  @b  @i  ^^^  ^^^^^  administration  adobe  advertising  aftereffects  alghoritms  alumni  amateur  angeloippolito  animal  animation  app  apple  application  art  audio  augmentedreality  background  backup  badge  biotech  blog  book  brainfuck  braing  branding  brent_ozar  bug  bugs  cck  censorship  city  climatechange  cms  code  collection  color  comics  conference  cool  creativity  css  css3  dance  data  database  defect  design  designers  development  digitalcuration  digitalhumanities  disassembly  download  drupal  drupal7  economics  education  emulation  ethics  evaluation  facebook  fallout  fanfic  fiction  file  filesystem  fireworks  fixer  font  fontes  fonts  free-fonts  free  freebies  freefonts  fuck  fun  future  gallery  game  gender  generator  google  governance  graphic  graphics  growthhacking  gtd  gui  hack  hacking  health  history  html  html5  icon  iconos  icons  identity  ie  ie6  ifttt  image  images  imce  immunology  indigenous  infographic  inspiration  interaction  interface  internetofthings  ipad  iphone  javascript  jquery-plugins  jquery  js  land  language  law  layout  lettering  library  life  lightbox  links  literature  logo  mac  maine  manager  map  marketing  media  military  minecraft  mlp  mobile  modal  module  modules  movie  museum  network  newmedia  nmd104  nmd205  nmd305  p2p  parallaxscrolling  pattern  patterns  performance  permaculture  phd  photo  photography  photoshop  pinboard  place  placeholder  plugin  plugins  politics  popup  presentation  preservation  press  prettyphoto  privacy  programming  project  psd  psychology  rationality  reference  remix  research  resource  resources  rules  sansserif  security  serif  service  sex  sharing  sins  sketch  socialmedia  socialmemory  software  sql  steam  stock  storage  story  street  studio  styleguide  success  sustainability  sviluppo  teched-2012  television  templates  terror  text  texture  textures  theme  tips  todo  tool  tools  turing  twitter  type  typographic  typography  ui  update  upload  useful  utility  variablemedia  video  violence  visual  visualization  war  web-design  web  web_design  webdesign  webdev  website  wordpress  wysiwyg  youth 

Copy this bookmark:



description:


tags: