Life in Code and Software/Attributions: Difference between revisions

No edit summary
No edit summary
Line 8: Line 8:
Berry, D. M. (2011) Iteracy: Reading, Writing and Running Code, accessed 15/03/2012, http://stunlaw.blogspot.com/2011/09/iteracy-reading-writing-and-running.html
Berry, D. M. (2011) Iteracy: Reading, Writing and Running Code, accessed 15/03/2012, http://stunlaw.blogspot.com/2011/09/iteracy-reading-writing-and-running.html
''(c) David M. Berry, made available here for reuse by permission of the author''
''(c) David M. Berry, made available here for reuse by permission of the author''
Bogost, I. (2005) Procedural Literacy: Problem Solving with Programming, Systems, & Play, Telemedium, accessed 15/03/2012, http://www.bogost.com/downloads/I.%20Bogost%20Procedural%20Literacy.pdf
''(c) 2005 Telemedium''


Chun, W. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16328263
Chun, W. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16328263

Revision as of 00:25, 16 March 2012

Back to the book


Berry, David. M. “A Contribution Towards a Grammar of Code.” Fibreculture Journal 13 : n. pag. Web. 9 Nov 2009, accessed 16/03/2012, http://thirteen.fibreculturejournal.org/fcj-086-a-contribution-towards-a-grammar-of-code/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)

Berry, D. M. (2011) Iteracy: Reading, Writing and Running Code, accessed 15/03/2012, http://stunlaw.blogspot.com/2011/09/iteracy-reading-writing-and-running.html (c) David M. Berry, made available here for reuse by permission of the author

Bogost, I. (2005) Procedural Literacy: Problem Solving with Programming, Systems, & Play, Telemedium, accessed 15/03/2012, http://www.bogost.com/downloads/I.%20Bogost%20Procedural%20Literacy.pdf (c) 2005 Telemedium

Chun, W. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16328263 (c) 2010 Wendy Chun

Davidson, C. (2012) Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms, DML Central, accessed 15/03/2012, http://dmlcentral.net/blog/cathy-davidson/why-we-need-4th-r-reading-writing-arithmetic-algorithms (c) 2012 C. Davidson, Creative Commons Attribution 3.0 License

Deleuze, G. (1992) Postscript on the Societies of Control, October, vol. 59, pp 3-7, accessed 15/03/2012, http://www.n5m.org/n5m2/media/texts/deleuze.htm (c) 1992 October/MIT Press

Frabetti, F. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16263212 (c) 2010 F. Frabetti

Kitchin, R. (2012) The Programmable City, Environment and Planning B: Planning and Design, volume 38, pages 945-951, accessed 15/03/2012, http://www.envplan.com/epb/editorials/b3806com.pdf Copyright © 2012 a Pion publication, Environment and Planning B: Planning and Design

Langner, R. (2011) Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon, accessed 02/03/2012, http://www.youtube.com/watch?feature=player_embedded&v=CS01Hmjv1pQ © TED CONFERENCES, LLC

MacKenzie, A. (2006) “The Problem of Computer Code: Leviathan or Common Power?” Institute for Cultural Research, Lancaster University. 10 August 2006, accessed 15/03/2012, http://www.lancs.ac.uk/staff/mackenza/papers/code-leviathan.pdf (c) 2006 Adrian MacKenzie

MacKenzie, A. (2008) Wirelessness as Experience of Transition, Fibreculture, 13, accessed 15/03/2012, http://thirteen.fibreculturejournal.org/fcj-085-wirelessness-as-experience-of-transition/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)

Marino, Mark C. “Critical Code Studies” Electronic Book Review. 2006. Available at http://www.electronicbookreview.com/thread/electropoetics/codology Creative Commons: Attribution-NonCommercial-ShareAlike 2.5 Generic (CC BY-NC-SA 2.5)

McCallum, L., and Smith, D. (2012) Show Us Your Screens, accessed 04/03/2012, http://vimeo.com/20241649 (c) McCallum, L., and Smith, D.

Matrosov, A., Rodionov, E., Harley, D. and Malcho, J. (n.d.) Stuxnet Under the Microscope, accessed 04/03/2012, http://go.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf © 2012 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. Freely Available White Papers

Parisi, L. and Portanova, S. (2012) Soft Thought (in architecture and choreography), Computational Culture, issue 1, accessed 16/03/2012, http://computationalculture.net/article/soft-thought (c) 2012 Copyright the Authors, Computational Culture is an online open-access peer-reviewed journal

Ramsay, S. (2010) Algorithms are Thoughts, Chainsaws are Tools, accessed 04/03/2012, http://vimeo.com/9790850 (c) Stephan Ramsay

Slavin, K. (2010) How algorithms shape our world, TEDGlobal accessed 15/03/2012,http://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world.html © TED CONFERENCES, LLC

Weisstein, Eric W. "Turing Machine." From MathWorld--A Wolfram Web Resource, accessed 15/03/2012, http://mathworld.wolfram.com/TuringMachine.html © 1999-2012 Wolfram Research, Inc.

Wing, J. M. (2009) Computational Thinking and Thinking About Computing, accessed 15/03/2012, http://www.youtube.com/watch?v=C2Pq4N-iE4I (c) Jeannette Wing, standard Youtube license

Wolf, G. (2010) The Quantified Self, TED, accessed 15/03/2012, http://www.youtube.com/watch?v=OrAo8oBBFIo (c) 2010 TED CONFERENCES, LLC