zaterdag 30 juni 2012
Zinloosgeweld door Politie in Rotterdam
'De dronken Let die in Rotterdam op straat werd geschopt door een politieagente, gedroeg zich niet agressief. Hij stond met z'n armen te zwaaien en kwam niet dreigend over', aldus Nancy Pardo tegen RTV Rijnmond. Pardo was getuige van het schopincident en is de vriendin van Jovanny Dambruck, de man die het voorval filmde. HERE
Labels:
holland,
police brutality,
video
Legalize this! Dutch party moves for DDoS decriminalization
Dutch opposition party D66 has proposed the legalization of DDoS attacks as a form of protest. Activists would have to warn of their action in advance, giving websites time to prepare for their attack.
Kees Verhoeven, the campaign's leader, argues that it is strange that the fundamental right to demonstrate doesn’t extend to the online realm. The coming years would bring more instances of hacktivism, and it would be reasonable to introduce legislation to regulate, not ban it, he says.
Verhoeven proposes that DDoS attacks be legalized so long as the protesters say when they will start their action. That way, a website would have time to prepare for the attack, just like an office building has time to get ready for a rally next to it.
HERE
vrijdag 29 juni 2012
Proxy Your Way to Online Anonymity - Jack Donovan
Whatever your reason for desiring anonymity, you’ll find it hard to make yourself truly traceless on the web. Even if you refrain from signing in to any services, your IP traffic is logged almost everywhere you go. Even if you’re not worried about Big Brother, this can be disconcerting. Worry not, there’s still one thing you can do to get invisible — put all of your network activity behind a proxy. This masks your IP address using a virtual detour that makes it appear that your connection is originating from somewhere else in the world, like Brazil or China. Here’s how to set yourself up for backdoor browsing.
MORE
donderdag 28 juni 2012
adiZones and Lo-Lifes
This week I attended Regeneration Games, a talk at FreeWord on the branding and aesthetic ideology of Olympic-driven regeneration. Alberto Duman organised the event and presented three 'artifacts' of regeneration: the ArcelorMittal Orbit Tower, a promotional PDF selling the regeneration of Newham to Chinese investors, and 'adiZones'. The author and critic Owen Hatherley was then invited to respond to 'adiZones', a small development project intended on delivering part of the “Olympic Legacy” in the form of better community sports provision.
a MUST READ HERE
Labels:
advertisement,
commercial,
public space,
sports
woensdag 27 juni 2012
dinsdag 26 juni 2012
Google simulates the human brain
with 1000 machines, 16000 cores and a love of cats
Google stitched together 1,000 computers totaling 16,000 cores to form a
neural network with over 1 billion connections, and sent it to YouTube looking for cats.
Unlike the popular human time-sink, this was all in the name of
science: specifically, simulating the human brain. The neural machine
was presented with 10 million images taken from random videos, and went
about teaching itself what our feline friends look like. Unlike similar
experiments, where some manual guidance and supervision is involved,
Google's pseudo-brain was given no such assistance.
It wasn't
just about cats, of course -- the broader aim was to see whether
computers can learn face detection without labeled images. After
studying the large set of image-data, the cluster revealed that indeed
it could, in addition to being able to develop concepts for
human body parts and -- of course -- cats. Overall, there was 15.8
percent accuracy in recognizing 20,000 object categories, which the
researchers claim is a 70 percent jump over previous studies. Full
details of the hows and whys will be presented at a forthcoming
conference in Edinburgh. (source)
Our d13
Due to privacy concerns i had to take the vid down, for now...
Labels:
d13,
documenta,
Documentary,
freedom for amsterdam
maandag 25 juni 2012
zondag 24 juni 2012
vrijdag 22 juni 2012
Central Station (Culture Station) Kassel
The Hauptbahnhof was Kassel's main central station, until all long-distance trains were relocated to the newly built Bahnhof Kassel-Wilhelmshöhe in 1991. Today it is only a local commuter station, and large parts stand empty or are used for new purposes.
The Bahnhof was built between 1851 and 1856 following sketches of Gottlob Engelhard in the style of Romantic Classicism. At the beginning of the 20th century the station was extended, but mostly destroyed again through bombing during WWII. It was reconstructed between 1952 and 1960 under architect Friedrich Bätcher in the style of 1950s, with restoration and integration of some of the old features. In 1953 it was connected to the city center via the newly constructed pedestrian zone, the "Treppenstrasse".
In 1995 the disused railway station was turned into a cultural venue and became known as the KulturBahnhof. It includes the BALi cinemas, Caricatura, a gallery for comic art, the restaurant and club Gleis 1, the gallery Stellwerk, the KAZ (Kassel Architecture Centre) and the Offener Kanal Kassel (an interactive radio station). In 1997 and 2002 the KulturBahnhof was used as a venue for documenta X and 11.
Bing vs. Google - Image Results for "New Aesthetic"
Taken using Firefox Private Browsing and being non-logged in either
website, which should neutralize most results personalization. Search
results when also using Tor were very similar. source
donderdag 21 juni 2012
Do We Need a New Pottery Barn Rule for Cyberwarfare?
A couple of weeks ago, sources in the White House leaked that the US was behind Stuxnet (to bolster Obama's image as a militarily tough President?). That's the cyberweapon that sabotaged the centrifuges being used by the Iranians in their nuclear program last year.
However, the story doesn't end there. Researchers around the world found that a much more powerful cyberweapon called Flame, uses exactly the same code as Stuxnet. Given the evidence, officials confirmed that Flame is a US cyberweapon. It's a weapons system that functions as both a spy network and carrier battlegroup (it can gather info and stage attacks by other cyberweapons). It's also designed to penetrate even extremely secure networks (government and corporate).
What's the problem? Flame has been set loose. It isn't just on Iranian government networks. It's on the open Internet. It's self-replicating (making copies of itself) and infecting computers and networks around the world. Breaking into corporate and government system of friends and allies. Keylogging (at a minimum, it has the capacity to activate microphones and video cameras attached to the computer) the activities of hapless citizens around the world...
The question now is: now that people are aware of this cyberweapon, who's going to pay for the cleanup? The US essentially "stole" information and illegally violated the computers and networks of countless numbers of people and companies: stealing proprietary info, violating privacy rules, etc.
I can hear the cash registers of countless law suits ringing....
This leads me to an interesting question: Do we need a Pottery Barn Rule for cyberweapons?
First, a little background.
In 2002, to Colin Powell came up with something that Thomas Friedman later called the "Pottery Barn Rule." Powell came up with the rule to counter (unsuccessfully) advisors to the President that claimed invasion of Iraq would be fast, costless, and painless (as in, "they will great us with flowers.."). The Pottery barn rule describe the moral, financial, and security burden incurred with an invasion. In long form, it looks like this:
'You are going to be the proud owner of 25 million people. You will own all their hopes, aspirations, and problems. You'll own it all.'
Later, he added this: "It’s going to suck up a good 40 to 50 percent of the Army for years. And it’s going to take all the oxygen out of the political environment."
Friedman boiled the rule down to this:
"You break it, you own it."
Of course, if we had followed this advice in Iraq and Afghanistan, it would have saved countless lives (both killed and maimed). Less importantly, it would have allowed the US to shave $2 trillion off the last decade's "security" bill, while achieving the same impact (a defunct al Qaeda).
So, in shot, let's make a new rule for cyberweapons that pundits can point to later during a bout of buyer's remorse.
Let's call it The "WR Grace Rule"
It's a rule that WR Grace learned the hard way: through hundreds of thousands of lawsuits to recover damages due to asbestos and other chemical spills that have killed a countless number of people worldwide.
In simple form, it's:
"You contaminate it (a computer or network), you own it."
HERE
However, the story doesn't end there. Researchers around the world found that a much more powerful cyberweapon called Flame, uses exactly the same code as Stuxnet. Given the evidence, officials confirmed that Flame is a US cyberweapon. It's a weapons system that functions as both a spy network and carrier battlegroup (it can gather info and stage attacks by other cyberweapons). It's also designed to penetrate even extremely secure networks (government and corporate).
What's the problem? Flame has been set loose. It isn't just on Iranian government networks. It's on the open Internet. It's self-replicating (making copies of itself) and infecting computers and networks around the world. Breaking into corporate and government system of friends and allies. Keylogging (at a minimum, it has the capacity to activate microphones and video cameras attached to the computer) the activities of hapless citizens around the world...
The question now is: now that people are aware of this cyberweapon, who's going to pay for the cleanup? The US essentially "stole" information and illegally violated the computers and networks of countless numbers of people and companies: stealing proprietary info, violating privacy rules, etc.
I can hear the cash registers of countless law suits ringing....
This leads me to an interesting question: Do we need a Pottery Barn Rule for cyberweapons?
First, a little background.
In 2002, to Colin Powell came up with something that Thomas Friedman later called the "Pottery Barn Rule." Powell came up with the rule to counter (unsuccessfully) advisors to the President that claimed invasion of Iraq would be fast, costless, and painless (as in, "they will great us with flowers.."). The Pottery barn rule describe the moral, financial, and security burden incurred with an invasion. In long form, it looks like this:
'You are going to be the proud owner of 25 million people. You will own all their hopes, aspirations, and problems. You'll own it all.'
Later, he added this: "It’s going to suck up a good 40 to 50 percent of the Army for years. And it’s going to take all the oxygen out of the political environment."
Friedman boiled the rule down to this:
"You break it, you own it."
Of course, if we had followed this advice in Iraq and Afghanistan, it would have saved countless lives (both killed and maimed). Less importantly, it would have allowed the US to shave $2 trillion off the last decade's "security" bill, while achieving the same impact (a defunct al Qaeda).
So, in shot, let's make a new rule for cyberweapons that pundits can point to later during a bout of buyer's remorse.
Let's call it The "WR Grace Rule"
It's a rule that WR Grace learned the hard way: through hundreds of thousands of lawsuits to recover damages due to asbestos and other chemical spills that have killed a countless number of people worldwide.
In simple form, it's:
"You contaminate it (a computer or network), you own it."
HERE
26/6 | Me, Myself and I //or// How to make your own new identity – 20:00
With: Heath Bunting at Vondelbunker! HERE
woensdag 20 juni 2012
Adidas pulls "shackle shoe" design
Adidas has decided not to sell this particular shoe design after a photo of it on their Facebook page generated quite a negative response. VIA
Julian Assange seeking asylum in Ecuadorian embassy in London
Julian Assange has dramatically sought political asylum at the Ecuadorean embassy in London, days after the supreme court rejected the last of his appeals against extradition to Sweden to face sex crime accusations and after what he called a "declaration of abandonment" by his own government in Australia.
MORE
dinsdag 19 juni 2012
Crovitz: The U.N.'s Internet Power Grab
It's easy to understand why countries like Russia, China and Iran would want to rewire the Internet, cutting off access to their citizens and undermining the idea of a World Wide Web. What's more surprising is that U.S. diplomats are letting authoritarian regimes hijack an obscure U.N. agency to undermine how the Internet works, including for Americans.
MORE
MORE
maandag 18 juni 2012
zondag 17 juni 2012
The Karl Marx MasterCard Is Here. It Needs A Tagline.
The German bank Sparkasse Chemnitz recently launched a Karl Marx credit card. The bank let people vote online for 10 different images, and Marx was the "very clear winner," beating out a palace, a castle and a racetrack, among others. Reuters has more on the story.
The card, obviously, needs a tagline. Post your suggestions in the comments, or tweet them with the tagline #marxcard. We'll post our favorites here. VIA
zaterdag 16 juni 2012
(GRATI S!)
>>>cONSPIRACy<<<
DOGtimesSs#01 session
16/06/2012 15:30h Start: DOGtimesSummerschool-2012
Location: Amsterdam, Vondelpark under the bridge
http://vondelbunker.nl/lokatie/
My Name Is Janez Janša
Five years ago, three artists legally changed their name to Janez Janša and joined the conservative Slovenian Democratic Party (SDS.) So far, so almost normal. Except that Janez Janša is also he name of the leader of the party and Prime Minister of Slovenia. Suddenly there were more Janez Janšas acting together within the same physical and media space.< br />
Their experience is being turned into the documentary My Name Is Janez Janša in which individuals, artists and academics ponder about the meaning and purpose of one's name from both private and public perspectives.
MORE
vrijdag 15 juni 2012
I Wanna Be Famous (HD)
I found this music video on YouTube that seems very useful to illustrate what is a microfascism. We start from the idea that a microfascism emerges when there is a blocked and repressed desire that is molarized through a codificated flow which investment is totalitarian. When that happens, the creative line of flight that involves desire becomes a line of abolition or a line of death. In the video we have a girl who wants to be famous and whose subjectivity lies encysted in common sense. She is a girl who lives alone in a small apartment, who has no money neither a job, but is noble and with a good personality. While she does not know what to do with her life, she really wants to be famous. The desire that goes through her is encoded by a collective representation that undoubtedly onrushes her imperiously. Such representation has been able to make her believe that being a celebrity is important and that is just enough to have a bit of personality to be famous. While she dumps on herself the use that she makes of common sense, she believes she should be already. However, she feels she should do something to achieve it. Given that such a desire buggers her into a line of death, she decides to kill somebody important to release her onslaught. Her reason tells her that maybe she cannot literally be a star but at least she can be someone important. Her desire is so significant that it extrapolates her beyond all representation: she considers that it should be as simple as committing assassination. She gets to think that maybe the “guy” who governs the country can be useful for this. The irrefutable logic that triangulates her small oedipus makes her go out to the open public, purchase a weapon and stalk the streets with joy. Guitar in hand, she considers indispensable for her act to be of public order, she knows that her mother will be proud to see her on television. No matter the way: with a weapon, a knife, with her mind. It is a question of being famous. At the end, she reverses its collective investment infuriating the masses, while her lynching ensures her to be included on the board of history. VIA
Labels:
art education,
music video,
reblog
Death of an invention - John Lichfield
It was France's first glimpse of an online future. But now, 30 years after it was invented, the wired experiment that foreshadowed the World Wide Web is about to lose its connection once and for all.
READ
READ
donderdag 14 juni 2012
DjRun
Music and running naturally united.
DjRun plays your own music, picking songs that match your running or walking tempo. It's as simple as hitting play! DjRun Pro can even adapt the playback tempo like a real DJ, following your stride rate! While mainly targeted towards running, DjRun works with all sports that exhibit steady repetitive movement, like walking, hiking, cycling, rope-skipping, rollerskating, rowing, fitness ...
How does it work?
HERE
woensdag 13 juni 2012
DOGtimesSs#01 >>>cONSPIRACy<<< (Grati S!)
Dear Pack,
be most welcome to the first edition of DOGtimes-Summerschool!
With kind regards,
The Other Dogs!
DOGtimesSs#01 session >>>cONSPIRACy<<<
15:30h Start: DOGtimesSummerschool-2012
Location: Amsterdam, Vondelpark under the bridge
http://vondelbunker.nl/lokatie/
15:30h => 16:00
Drinks: white PORT-wine & white grapes
~PLEASE, BRING YOUR OWN GLASSES~
~AND SOME WINE&GRAPES TO SHARE!~
Introduction: DOGtimesSs#01 >>>cONSPIRACy<<<
16:00h
Lecture: Willem Van Weelden at 19.5.on “Laptopradio”
~Smartphone with Flash required~
16:30h
Discussion: collective interests, information and supports
17:00h => 01:00h
Opening: “ONDERTUSSEN”
A two-day DOGTIME exhibition at the Vondelbunker
Location: Amsterdam, Vondelpark8 inside the bridge
http://schijnheilig.org/2012/06/ondertussen/
19:00h => 07:00h
After-party: “La Nuit Blanche”
http://www.nuitblancheamsterdam.nl/
DOGtimesSs#01(gratis!)
June 16th 2012(Opening"ONDERTUSSEN")
session >>>cONSPIRACy<<<(proposal)
DOGtimes$$#02
July 4th 2012(Preview"GRA-S")
session >>>le$$≠MORE<<<(proposal)
DØGtimes$$#03
session >>>le$$≈lesson<<<(proposal)
DΘGtimes$$#04
session >>>FA≥IDUM<<<(proposal)
DOGtımesSs#05
session >>>FA≤IDUM<<<(proposal)
DOGŧimesSs#06
session >>> . . . <<<(proposal)
ĐOGtimesSs#07
session >>> . . . <<<(proposal)
be most welcome to the first edition of DOGtimes-Summerschool!
With kind regards,
The Other Dogs!
DOGtimesSs#01 session >>>cONSPIRACy<<<
15:30h Start: DOGtimesSummerschool-2012
Location: Amsterdam, Vondelpark under the bridge
http://vondelbunker.nl/lokatie/
15:30h => 16:00
Drinks: white PORT-wine & white grapes
~PLEASE, BRING YOUR OWN GLASSES~
~AND SOME WINE&GRAPES TO SHARE!~
Introduction: DOGtimesSs#01 >>>cONSPIRACy<<<
16:00h
Lecture: Willem Van Weelden at 19.5.on “Laptopradio”
~Smartphone with Flash required~
16:30h
Discussion: collective interests, information and supports
17:00h => 01:00h
Opening: “ONDERTUSSEN”
A two-day DOGTIME exhibition at the Vondelbunker
Location: Amsterdam, Vondelpark8 inside the bridge
http://schijnheilig.org/2012/06/ondertussen/
19:00h => 07:00h
After-party: “La Nuit Blanche”
http://www.nuitblancheamsterdam.nl/
DOGtimesSs#01(gratis!)
June 16th 2012(Opening"ONDERTUSSEN")
session >>>cONSPIRACy<<<(proposal)
DOGtimes$$#02
July 4th 2012(Preview"GRA-S")
session >>>le$$≠MORE<<<(proposal)
DØGtimes$$#03
session >>>le$$≈lesson<<<(proposal)
DΘGtimes$$#04
session >>>FA≥IDUM<<<(proposal)
DOGtımesSs#05
session >>>FA≤IDUM<<<(proposal)
DOGŧimesSs#06
session >>> . . . <<<(proposal)
ĐOGtimesSs#07
session >>> . . . <<<(proposal)
dinsdag 12 juni 2012
What Ancient Greeks Can Teach Us about Drones and Cyber-War
When freshmen in my humanities colloquium at Stevens Institute of Technology ask why they have to read stuff by ancient Greeks, I reply that we have much to learn from old guys like Thucydides. In his history of the Peloponnesian War, a clash between the city-states Athens and Sparta, Thucydides recounted a negotiation between Athenians and leaders of Melos, an island kingdom striving to remain neutral. MORE HERE
On the Natural History of Surveillance - Adam Rothstein
Upon hearing the phrase, we may not know exactly what a “cephalic sniffer” is, nor whether it is a real piece of technology. However, as to what such a nefarious device might be able to do, we could surely begin to imagine from the name alone. And as for whether it is technological reality (it is not, being invented by Philip K. Dick in his story Clans of the Alphane Moon), from its “sci-fi” sounding alliteration we might guess correctly that it is purely fantasy.
At least it was fantasy when PKD invented it in 1964....
HERE
maandag 11 juni 2012
Abonneren op:
Posts (Atom)