To do 4-12-2014

/?p=409

/wp-content/uploads/GunesAcarPresentation.pdf

How do search engines work

http://www.google.com/insidesearch/howsearchworks/thestory/
/?p=336

http://en.wikipedia.org/wiki/Web_search_engine

https://en.wikipedia.org/wiki/robots.txt

http://www.google.com/robots.txt
http://constantvzw.org/robots.txt
https://archive.org/robots.txt

Discover new search engines:
http://en.wikipedia.org/wiki/List_of_search_engines

Make 1 post on the blog with: Try to find a search engine we do not know. Use it to search, and compare the results to the results you find in to G**gle search and analyse !

Encryption 25-09

Edward Snowden in a TED Talk
(6:48 – 8:39) Companies give NSA direct access to their servers.
(8:39 – 10:14) Companies should encrypt their traffic in defence of their users.

http://korben.info/edward-snowden-chez-ted.html

To avoid your emails being bulk surveyed: set up encrypted email.
Instructions are here:
https://emailselfdefense.fsf.org/en/infographic.html

Key Signing Party

Olia Lialina’s work ‘summer’ lives in the network of friends.
http://kimasendorf.com/olia/summer/

The Whistled language of Gomera
https://www.youtube.com/watch?v=PgEmSb0cKBg
A language that lives in the acoustic environment of the mountains.

https://fr.wikipedia.org/wiki/Silbo

Lawrence Abu Hamdan
Language Gulf in the Shouting Valley
Family and Druzen neighbours and friends shouting over the Israel / Syria / Palestine border in the Golan heights.

Programme presentation 18-09-2014

What do you mean by Social Network, sorry Networked Social ?
What is Social?
What is Network ?

https://en.wikipedia.org/wiki/List_of_social_networking_websites

https://en.wikipedia.org/wiki/Network

https://en.wikipedia.org/wiki/Computer_network

https://en.wikipedia.org/wiki/Social_relation

Types of networks: central server model / peer to peer
peer to peer central server network
http://sebsauvage.net/comprendre/p2p/

Who provides network for who ? oh .. and why ?
What does ‘using’ the network mean ?
Who pays for it and how ?
Who benefits from it and how ?
Who owns the network ?
What is data ?

Artist Michelle Teran made a bustour in 2009 to visit people in real life, who posted to youtube.
http://www.ubermatic.lftk.org/blog/?p=225

Sharing knowledge <-> commercial technology

https://en.wikipedia.org/wiki/Information_wants_to_be_free

Google incorporates code art into its business model.
Do you want your art to be part of their business model ?

https://devart.withgoogle.com/#/about
Read those Terms of Use !
https://devart.withgoogle.com/#/faq

Artists fuck with google:
Free Art and Technology
http://fffff.at/fuck-google/

Artists kill their Facebook and Twitter account: Moddr made a WEB2.0 suicide machine:
http://suicidemachine.org/

Artist love everything their friends do automatically: Julien Deswaef made this Love Machine:
http://lovemachine.cc/#more-info

Thursday 31-01: Protocols

30s_womens_etiquette_8
Ce jeudi, nous commençons avec une conférence sur les différents protocoles conditionnent The Networked Social; une performance d’une heure entre Barcelone et Bruxelles. How to greet, TCP/IP, The Internet as a network of networks, Skype vs. Microsoft and The politics of protocols in Net Neutrality.

Ensuite, un atelier autour le Hypertext Transfer Protocol (http), avec Wendy Van Wynsberghe. Be ready to perform your favourite status code.

Wendy est membre de Constant, elle est curieuse de tout sorte de matière électronique, le textile, le son, open hardware, en utilisant uniquement des logiciels libres.

Adresse: Constant Variable, Rue Gallaitstraat 80 (Schaerbeek)
Tram 94 (stop: Liedts; 25 min. de Louise)
http://variable.constantvzw.org/define/index.php/Route

La session va commencer a 9h précis et va exceptionnellement durée jusqu’à 13:00. Make sure you arrive on time; coffee will be served.

Networked Social Cinema: Program

Hippies from hell (Ine Poppe, 2002) 19:26-23:25
Hippies from Hell are a group of hackers, techies, artists, writers and puzzlers. In the eighties they published hacker magazine Hacktic and in 1993 they started the first Dutch Internet-provider, xs4all, thus opening the Internet for the general public. Apart from this they throw wild parties and organize open-air hacker festivals, using the Internet as their social platform. On their mailing list they discuss almost every aspect of our technology infested society. The Dutch hackers, as the hippies were called initially, are a special group within the international hacker movement, which they helped create for a large part.
In the film artists play with hardware, young hippies hack their school-calculators, lock pickers open locks without a key: hacking is not just fooling around with technology, it is an attitude, an activity, a verb.

North By North West (Alfred Hitchcock, 1959)

Vital Statistics of a Citizen, Simply Obtained (Martha Rosler, 1977) 18:03-40:06
This chilling tape, “operatically” conceived, but neither a musical nor a documentary, probes the objectification of women and others in a technological/bureaucratic society. At its core is a long, continuous shot that reveals the part-by-part measurement and evaluation of a woman by a white-coated male examiner and a chorus of three women assistants. How do we come to see ourselves as objects? How do fragmentation and comparison assist in social control? This ordeal of scrutiny thinly alludes to a monumentally protracted episode of Truth or Consequences. The final sequence presents re-framed government photos of women being measured, accompanied by a voiceover litany of “crimes against women.” Rosler’s distanced depiction of the systematic, institutionalized “science” of measurement and classification is meant to recall the oppressive tactics of the armed forces or concentration camps, and to underscore the internalization of standards that determine the meaning of women’s being.

Faceless (Manu Luksch, 2007) Trailer
In a society under the reformed ‘Real-Time’ Calendar, without history nor future, everybody is faceless. A woman panics when she wakes up one day with a face. With the help of the Spectral Children she slowly finds out more about the lost power and history of the human face and begins the search for its future. FACELESS was produced under the rules of the ‘Manifesto for CCTV Filmmakers’. The manifesto states, amongst other things, that additional cameras are not permitted at filming locations, as the omnipresent existing video surveillance (CCTV) is already in operation. “RealTime orients the life of every citizen. Eating, resting, going to work, getting married – every act is tied to RealTime. And every act leaves a trace of data – a footprint in the snow of noise…”

My Fair Lady

I Love Alaska (Lernert Engelberts + Sander Plug, 2009) Episode 1 and 2
August 4, 2006, the personal search queries of 650,000 AOL (America Online) users accidentally ended up on the Internet, for all to see. These search queries were entered in AOL’s search engine over a three-month period. After three days AOL realized their blunder and removed the data from their site, but the sensitive private data had already leaked to several other sites. I love Alaska tells the story of one of those AOL users. We get to know a religious middle-aged woman from Houston, Texas, who spends her days at home behind her TV and computer. Her unique style of phrasing combined with her putting her ideas, convictions and obsessions into AOL’s search engine, turn her personal story into a disconcerting novel of sorts.

hello world and cpdp on the 24. of january

dear participants of the networked social,

it was very nice meeting you today and we look forward to our next sessions.
i am ccing femke and nicolas in this email, so that you now have all of our email addresses.
i am also sending you information about our visit to the “computers, privacy and data protection conference” on the 24. of january from 9am-12pm. the event takes place at les halles in schaerbeek.

you can find all information about the conference here:
http://www.cpdpconferences.org/

you can find the program of the day here:
http://www.cpdpconferences.org/thursday24january2013.html#top

you can find instructions on how to get to les halles here:
http://www.cpdpconferences.org/Resources/CPDP2013_Howtogetthere.pdf

we will meet at 9am at the main entrance. femke and i (seda) will pick you up and we will do the rounds till 12pm.
you can attend any of the sessions (see the program and notice there are three different rooms), meet people, ask them questions, and document your observations for your diary (pick your media of liking).
femke will brief you again shortly on thursday. if you have any questions, please ask per mail or otherwise.
wishing you a nice week and look forward to seeing you again.
best,
s.