Life in Code and Software/Attributions: Difference between revisions

No edit summary
No edit summary
Line 3: Line 3:
<br>  
<br>  


Andersen, C. U. and Pold, S. (2011) 'The Scripted Spaces of Urban Ubiquitous Computing: The Experience, Poetics, and Politics of Public Scripted Space', ''Fibreculture'', 19.
Andersen, C. U. and Pold, S. (2011) 'The Scripted Spaces of Urban Ubiquitous Computing: The Experience, Poetics, and Politics of Public Scripted Space', ''Fibreculture'', 19.  


Link: http://nineteen.fibreculturejournal.org/fcj-133-the-scripted-spaces-of-urban-ubiquitous-computing-the-experience-poetics-and-politics-of-public-scripted-space/  
Link: http://nineteen.fibreculturejournal.org/fcj-133-the-scripted-spaces-of-urban-ubiquitous-computing-the-experience-poetics-and-politics-of-public-scripted-space/  


Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 


<br>


Berry, D. M. (2008) 'A Contribution Towards a Grammar of Code', ''Fibreculture'', 13.  
Berry, D. M. (2008) 'A Contribution Towards a Grammar of Code', ''Fibreculture'', 13.  
Line 15: Line 15:
Link: http://thirteen.fibreculturejournal.org/fcj-086-a-contribution-towards-a-grammar-of-code/  
Link: http://thirteen.fibreculturejournal.org/fcj-086-a-contribution-towards-a-grammar-of-code/  


Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  
 


<br>


Berry, D. M. (2011) 'Iteracy: Reading, Writing and Running Code'.  
Berry, D. M. (2011) 'Iteracy: Reading, Writing and Running Code'.  
Line 25: Line 25:
Licence:&nbsp;©&nbsp;David M. Berry'', made available here for reuse by permission of the author.''  
Licence:&nbsp;©&nbsp;David M. Berry'', made available here for reuse by permission of the author.''  


 
<br> Berry, D. M. (2012) ''Understanding Digital Humanities'', London: Palgrave Macmillan.  
Berry, D. M. (2012) ''Understanding Digital Humanities'', London: Palgrave Macmillan.  


Link: http://www.palgrave.com/PDFs/9780230292642.pdf  
Link: http://www.palgrave.com/PDFs/9780230292642.pdf  


Licence ''© ''2012 David M. Berry, Palgrave Macmillan. Sample chapter available for open access.
Licence ''© ''2012 David M. Berry, Palgrave Macmillan. Sample chapter available for open access.  
 


Berry, D. M. (2012) 'Thinking Software: Realtime Streams and Knowledge in the Digital Age'.  
<br> Berry, D. M. (2012) 'Thinking Software: Realtime Streams and Knowledge in the Digital Age'.  


Link to Vimeo: http://vimeo.com/39256099  
Link to Vimeo: http://vimeo.com/39256099  


 
<br> Bogost, I. (2005) 'Procedural Literacy: Problem Solving with Programming, Systems, &amp; Play, Telemedium'.  
Bogost, I. (2005) 'Procedural Literacy: Problem Solving with Programming, Systems, &amp; Play, Telemedium'.


Link: http://www.bogost.com/downloads/I.%20Bogost%20Procedural%20Literacy.pdf  
Link: http://www.bogost.com/downloads/I.%20Bogost%20Procedural%20Literacy.pdf  


Licence: ''© ''2005 Telemedium, Made freely available on author's website.<br>
Licence: ''© ''2005 Telemedium. Made freely available on author's website.<br>  
 
Coleman, G. (2010) 'The Anthropology of Hackers,' ''The Atlantic.''


Link: http://www.theatlantic.com/technology/archive/2010/09/the-anthropology-of-hackers/63308/
Coleman, G. (2010) 'The Anthropology of Hackers,' ''The Atlantic.''


Licence:&nbsp; © 2010 The Atlantic Monthly Group. All Rights Reserved. <br>
Link: http://www.theatlantic.com/technology/archive/2010/09/the-anthropology-of-hackers/63308/


Licence:&nbsp; © 2010 The Atlantic Monthly Group. All Rights Reserved. Made available via a link to ''The Atlantic''.<br>


Chun, W. (2010) Critical Code Studies.


Chun, W. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16328263 ''(c) 2010 Wendy Chun'', made available for use by the author under standard Vimeo video license.
Link to Vimeo: http://vimeo.com/16328263  






Davidson, C. (2012) Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms, DML Central, accessed 15/03/2012, http://dmlcentral.net/blog/cathy-davidson/why-we-need-4th-r-reading-writing-arithmetic-algorithms ''(c) 2012 C. Davidson, Creative Commons Attribution 3.0 License''. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Davidson, C. (2012) 'Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms,' ''DML Central.''


''Link: ''http://dmlcentral.net/blog/cathy-davidson/why-we-need-4th-r-reading-writing-arithmetic-algorithms


Licence: ©2012 Davidson'', Creative Commons Attribution 3.0 License''. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Deleuze, G. (1992) Postscript on the Societies of Control, ''October'', vol. 59, pp 3-7, accessed 15/03/2012, http://www.n5m.org/n5m2/media/texts/deleuze.htm ''(c) 1992 MIT Press.''




Dijkstra, E. W. (1998) On the cruelty of really teaching computing science, accessed 15/03/2012, http://virtual.itca.edu.sv/dokeos/sinapsis/cd/doctos-sw-libre/docus-ewd/EWD1036%20-%20On%20the%20cruelty%20of%20really%20teaching%20computing%20scienc.pdf ''(c) 1998 Dijkstra, E. W.'' 
Deleuze, G. (1992) 'Postscript on the Societies of Control', ''October'', vol. 59, pp 3-7.  


Link: http://www.n5m.org/n5m2/media/texts/deleuze.htm


Licence: ©1992 MIT Press. Made available here via a link.


Gardner, M. (1970) The fantastic combinations of John Conway's new solitaire game "life", Scientific American, 223 (October 1970): 120-123, accessed 15/03/2012, http://www.ibiblio.org/lifepatterns/october1970.html ''(c) 1970 Scientific American.''
<br> Dijkstra, E. W. (1998) 'On the Cruelty of Really Teaching Computing Science'.  


Link: http://virtual.itca.edu.sv/dokeos/sinapsis/cd/doctos-sw-libre/docus-ewd/EWD1036%20-%20On%20the%20cruelty%20of%20really%20teaching%20computing%20scienc.pdf


Golumbia, D. (2003) "Computation, Gender, and Human Thinking," ''differences: A Journal of Feminist Cultural Studies'' 14:2 (Summer 2003). 27-48. ''(c) 2003 David Golumbia/differences.''  
Licence: © 1998 Dijkstra. Made available here via transcription.&nbsp;  






Guattari, F. (1989) The Three Ecologies, ''New Formations'', no. 8, accessed 15/03/2012, http://www.amielandmelburn.org.uk/collections/newformations/08_131.pdf ''(c) 1989 New Formations'' 
Gardner, M. (1970) 'The Fantastic Combinations of John Conway's New Solitaire Game "Life"', ''Scientific American'', 223 (October): 120-123.  


Link: http://www.ibiblio.org/lifepatterns/october1970.html


Licence: ©1970 Scientific American. 


Fogg, B. J., Cuellar, G., and Danielson, D. (2003) Motivating, Influencing, and Persuading Users, In Jacko, J. and Sears A. (eds.), The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications, accessed 15/03/2012, http://bjfogg.com/hci.pdf ''(c) 2003 Laurence Erbaum Associates''
<br> Golumbia, D. (2003) "Computation, Gender, and Human Thinking," ''differences: A Journal of Feminist Cultural Studies'' 14:2 (Summer 2003). 27-48. ''(c) 2003 David Golumbia/differences.''  


<br>


Guattari, F. (1989) The Three Ecologies, ''New Formations'', no. 8, accessed 15/03/2012, http://www.amielandmelburn.org.uk/collections/newformations/08_131.pdf ''(c) 1989 New Formations''


Fuller, M. and Matos, S. (2011) Feral Computing: From Ubiquitous Calculation to Wild Interactions, ''Fibreculture'', issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-135-feral-computing-from-ubiquitous-calculation-to-wild-interactions/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.
<br>


Fogg, B. J., Cuellar, G., and Danielson, D. (2003) Motivating, Influencing, and Persuading Users, In Jacko, J. and Sears A. (eds.), The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications, accessed 15/03/2012, http://bjfogg.com/hci.pdf ''(c) 2003 Laurence Erbaum Associates''


<br>


Frabetti, F. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16263212 ''(c) 2010 F. Frabetti''
Fuller, M. and Matos, S. (2011) Feral Computing: From Ubiquitous Calculation to Wild Interactions, ''Fibreculture'', issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-135-feral-computing-from-ubiquitous-calculation-to-wild-interactions/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.


<br>


Frabetti, F. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16263212 ''(c) 2010 F. Frabetti''


Goetz, T. (2011) Harnessing the Power of Feedback Loops, Wired, accessed 12/09/2011, http://www.wired.com/magazine/2011/06/ff_feedbackloop/ ''(c) 2011 Wired'' 
<br>


Goetz, T. (2011) Harnessing the Power of Feedback Loops, Wired, accessed 12/09/2011, http://www.wired.com/magazine/2011/06/ff_feedbackloop/ ''(c) 2011 Wired''


<br>


Jerz, D. G. (2007) Somewhere Nearby is Colossal Cave: Examining Will Crowther's Original "Adventure" in Code and in Kentucky, Digital Humanities Quarterly, Volume 1 Number 2, accessed 15/03/2012, http://www.digitalhumanities.org/dhq/vol/001/2/000009/000009.html ''This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  
Jerz, D. G. (2007) Somewhere Nearby is Colossal Cave: Examining Will Crowther's Original "Adventure" in Code and in Kentucky, Digital Humanities Quarterly, Volume 1 Number 2, accessed 15/03/2012, http://www.digitalhumanities.org/dhq/vol/001/2/000009/000009.html ''This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  


<br>


Kitchin, R. (2012) The Programmable City, Environment and Planning B: Planning and Design, volume 38, pages 945-951, accessed 15/03/2012, http://www.envplan.com/epb/editorials/b3806com.pdf ''Copyright © 2012 a Pion publication, Environment and Planning B: Planning and Design''


Kitchin, R. (2012) The Programmable City, Environment and Planning B: Planning and Design, volume 38, pages 945-951, accessed 15/03/2012, http://www.envplan.com/epb/editorials/b3806com.pdf ''Copyright © 2012 a Pion publication, Environment and Planning B: Planning and Design'' 
<br>
 
 


Kovacs, G. (2010) Tracking the trackers, TED, accessed 05/06/2012, http://www.youtube.com/watch?v=f_f5wNw-2c0 ''(c) 2010 TED CONFERENCES, LLC''  
Kovacs, G. (2010) Tracking the trackers, TED, accessed 05/06/2012, http://www.youtube.com/watch?v=f_f5wNw-2c0 ''(c) 2010 TED CONFERENCES, LLC''  


<br> Langner, R. (2011) Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon, accessed 02/03/2012, http://www.youtube.com/watch?feature=player_embedded&amp;v=CS01Hmjv1pQ ''© TED CONFERENCES, LLC''


Langner, R. (2011) Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon, accessed 02/03/2012, http://www.youtube.com/watch?feature=player_embedded&amp;v=CS01Hmjv1pQ ''© TED CONFERENCES, LLC'' 
<br>
 
 


Latour, B. (2012) The Whole is Always Smaller Than Its Parts - A Digital Test of Gabriel Tarde’s Monads, ''British Journal of Sociology'', accessed 15/03/2012, http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf ''(c) 2012 Bruno Latour/British Journal of Sociology''  
Latour, B. (2012) The Whole is Always Smaller Than Its Parts - A Digital Test of Gabriel Tarde’s Monads, ''British Journal of Sociology'', accessed 15/03/2012, http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf ''(c) 2012 Bruno Latour/British Journal of Sociology''  


<br>


MacKenzie, A. (2006) “The Problem of Computer Code: Leviathan or Common Power?” Institute for Cultural Research, Lancaster University. 10 August 2006, accessed 15/03/2012, http://www.lancs.ac.uk/staff/mackenza/papers/code-leviathan.pdf ''(c) 2006 Adrian MacKenzie''


MacKenzie, A. (2006) “The Problem of Computer Code: Leviathan or Common Power?” Institute for Cultural Research, Lancaster University. 10 August 2006, accessed 15/03/2012, http://www.lancs.ac.uk/staff/mackenza/papers/code-leviathan.pdf ''(c) 2006 Adrian MacKenzie'' 
<br>
 
 


MacKenzie, A. (2008) Wirelessness as Experience of Transition, Fibreculture, 13, accessed 15/03/2012, http://thirteen.fibreculturejournal.org/fcj-085-wirelessness-as-experience-of-transition/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  
MacKenzie, A. (2008) Wirelessness as Experience of Transition, Fibreculture, 13, accessed 15/03/2012, http://thirteen.fibreculturejournal.org/fcj-085-wirelessness-as-experience-of-transition/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  


 
<br>


Manovich, L. (2008) Software Takes Command, accessed 15/03/2012, http://lab.softwarestudies.com/2008/11/softbook.html ''Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  
Manovich, L. (2008) Software Takes Command, accessed 15/03/2012, http://lab.softwarestudies.com/2008/11/softbook.html ''Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  


 
<br>


Marino, Mark C. “Critical Code Studies” Electronic Book Review. 2006. Available at http://www.electronicbookreview.com/thread/electropoetics/codology ''Creative Commons: Attribution-NonCommercial-ShareAlike 2.5 Generic (CC BY-NC-SA 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-ShareAlike 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  
Marino, Mark C. “Critical Code Studies” Electronic Book Review. 2006. Available at http://www.electronicbookreview.com/thread/electropoetics/codology ''Creative Commons: Attribution-NonCommercial-ShareAlike 2.5 Generic (CC BY-NC-SA 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-ShareAlike 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  


<br>


McCallum, L., and Smith, D. (2012) Show Us Your Screens, accessed 04/03/2012, http://vimeo.com/20241649 ''(c) McCallum, L., and Smith, D.''


McCallum, L., and Smith, D. (2012) Show Us Your Screens, accessed 04/03/2012, http://vimeo.com/20241649 ''(c) McCallum, L., and Smith, D.'' 
<br>
 
 
 
Matrosov, A., Rodionov, E., Harley, D. and Malcho, J. (n.d.) Stuxnet Under the Microscope, accessed 04/03/2012, http://go.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf ''© 2012 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. Freely Available White Papers'' 


Matrosov, A., Rodionov, E., Harley, D. and Malcho, J. (n.d.) Stuxnet Under the Microscope, accessed 04/03/2012, http://go.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf ''© 2012 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. Freely Available White Papers''


<br>


Najjar, M. (2012) Cover Image: 'the sublime brain [of jonathon]', http://www.michaelnajjar.com/, (c) 2011 Michael Najjar, permission for use and reproduction of image as book cover of ''Life in Code and Software'' given by the artist. title: "the sublime brain [of jonathon]", original size: 150 x 150 cm, © michael najjar, courtesy by the artist  
Najjar, M. (2012) Cover Image: 'the sublime brain [of jonathon]', http://www.michaelnajjar.com/, (c) 2011 Michael Najjar, permission for use and reproduction of image as book cover of ''Life in Code and Software'' given by the artist. title: "the sublime brain [of jonathon]", original size: 150 x 150 cm, © michael najjar, courtesy by the artist  


 
<br>


Parikka, J. (2011) Media Ecologies and Imaginary Media: Transversal Expansions, Contractions, and Foldings, Fibreculture, issue 19, accessed 15/03/2012, http://seventeen.fibreculturejournal.org/fcj-116-media-ecologies-and-imaginary-media-transversal-expansions-contractions-and-foldings/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  
Parikka, J. (2011) Media Ecologies and Imaginary Media: Transversal Expansions, Contractions, and Foldings, Fibreculture, issue 19, accessed 15/03/2012, http://seventeen.fibreculturejournal.org/fcj-116-media-ecologies-and-imaginary-media-transversal-expansions-contractions-and-foldings/ ''Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)''. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.  


<br>


Parisi, L. and Portanova, S. (2012) Soft Thought (in architecture and choreography), Computational Culture, issue 1, accessed 16/03/2012, http://computationalculture.net/article/soft-thought ''(c) 2012 Copyright the Authors, Computational Culture is an online open-access peer-reviewed journal''


Parisi, L. and Portanova, S. (2012) Soft Thought (in architecture and choreography), Computational Culture, issue 1, accessed 16/03/2012, http://computationalculture.net/article/soft-thought ''(c) 2012 Copyright the Authors, Computational Culture is an online open-access peer-reviewed journal'' 
<br>
 
 
 
Ramsay, S. (2010) Algorithms are Thoughts, Chainsaws are Tools, accessed 04/03/2012, http://vimeo.com/9790850 ''(c) Stephan Ramsay'' 


Ramsay, S. (2010) Algorithms are Thoughts, Chainsaws are Tools, accessed 04/03/2012, http://vimeo.com/9790850 ''(c) Stephan Ramsay''


<br>


Ramsay, S. (2011) On Building, accessed 15/03/2012, http://lenz.unl.edu/papers/2011/01/11/on-building.html ''(c) Stephan Ramsay''
Ramsay, S. (2011) On Building, accessed 15/03/2012, http://lenz.unl.edu/papers/2011/01/11/on-building.html ''(c) Stephan Ramsay''  
 


<br>


Slavin, K. (2010) How Algorithms Shape Our World, TEDGlobal.  
Slavin, K. (2010) How Algorithms Shape Our World, TEDGlobal.  
Line 161: Line 171:
Link: http://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world.html  
Link: http://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world.html  


Lisence: ''© ''TED CONFERENCES, LLC
Lisence: ''© ''TED CONFERENCES, LLC  


<br>


Turing, A.M. (1936). "On Computable Numbers, with an Application to the Entscheidungs problem". Proceedings of the London Mathematical Society. 2 42: 230–65, accessed 15/03/2012, http://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdf ''(c) 1937 London Mathematical Society''


Turing, A.M. (1936). "On Computable Numbers, with an Application to the Entscheidungs problem". Proceedings of the London Mathematical Society. 2 42: 230–65, accessed 15/03/2012, http://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdf ''(c) 1937 London Mathematical Society'' 
<br>


Turing, A.M. (1950). Computing machinery and intelligence. Mind, 59, 433-460. ''(c) 1950 Mind''


<br>


Turing, A.M. (1950). Computing machinery and intelligence. Mind, 59, 433-460. ''(c) 1950 Mind''
Weisstein, Eric W. "Turing Machine." From MathWorld--A Wolfram Web Resource, accessed 15/03/2012, http://mathworld.wolfram.com/TuringMachine.html ''© 1999-2012 Wolfram Research, Inc.''  


<br>


Wing, J. M. (2006) Computational Thinking, Proceedings of the ACM, accessed 15/03/2012, http://www.cs.cmu.edu/afs/cs/usr/wing/www/publications/Wing06.pdf ''(c) Communication of the ACM and Jeannette Wing''


Weisstein, Eric W. "Turing Machine." From MathWorld--A Wolfram Web Resource, accessed 15/03/2012, http://mathworld.wolfram.com/TuringMachine.html ''© 1999-2012 Wolfram Research, Inc.'' 
<br>
 
 
 
Wing, J. M. (2006) Computational Thinking, Proceedings of the ACM, accessed 15/03/2012, http://www.cs.cmu.edu/afs/cs/usr/wing/www/publications/Wing06.pdf ''(c) Communication of the ACM and Jeannette Wing'' 
 
 
 
Wing, J. M. (2009) Computational Thinking and Thinking About Computing, accessed 15/03/2012, http://www.youtube.com/watch?v=C2Pq4N-iE4I ''(c) 2009 IHMC and Jeannette Wing, standard Youtube license'' 


Wing, J. M. (2009) Computational Thinking and Thinking About Computing, accessed 15/03/2012, http://www.youtube.com/watch?v=C2Pq4N-iE4I ''(c) 2009 IHMC and Jeannette Wing, standard Youtube license''


<br>


why the lucky stiff (2009) Hackety Hack, accessed 15/05/2012, http://vimeo.com/5047563 ''(c) 2009 why the lucky stiff'', made available for use by the author under standard Vimeo video license.  
why the lucky stiff (2009) Hackety Hack, accessed 15/05/2012, http://vimeo.com/5047563 ''(c) 2009 why the lucky stiff'', made available for use by the author under standard Vimeo video license.  


 
<br>


Wolf, G. (2010) The Quantified Self, TED, accessed 15/03/2012, http://www.youtube.com/watch?v=OrAo8oBBFIo ''(c) 2010 TED CONFERENCES, LLC''
Wolf, G. (2010) The Quantified Self, TED, accessed 15/03/2012, http://www.youtube.com/watch?v=OrAo8oBBFIo ''(c) 2010 TED CONFERENCES, LLC''

Revision as of 11:11, 19 June 2012

Back to the book


Andersen, C. U. and Pold, S. (2011) 'The Scripted Spaces of Urban Ubiquitous Computing: The Experience, Poetics, and Politics of Public Scripted Space', Fibreculture, 19.

Link: http://nineteen.fibreculturejournal.org/fcj-133-the-scripted-spaces-of-urban-ubiquitous-computing-the-experience-poetics-and-politics-of-public-scripted-space/

Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.


Berry, D. M. (2008) 'A Contribution Towards a Grammar of Code', Fibreculture, 13.

Link: http://thirteen.fibreculturejournal.org/fcj-086-a-contribution-towards-a-grammar-of-code/

Licence: Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.


Berry, D. M. (2011) 'Iteracy: Reading, Writing and Running Code'.

Link: http://stunlaw.blogspot.com/2011/09/iteracy-reading-writing-and-running.html

Licence: © David M. Berry, made available here for reuse by permission of the author.


Berry, D. M. (2012) Understanding Digital Humanities, London: Palgrave Macmillan.

Link: http://www.palgrave.com/PDFs/9780230292642.pdf

Licence © 2012 David M. Berry, Palgrave Macmillan. Sample chapter available for open access.


Berry, D. M. (2012) 'Thinking Software: Realtime Streams and Knowledge in the Digital Age'.

Link to Vimeo: http://vimeo.com/39256099


Bogost, I. (2005) 'Procedural Literacy: Problem Solving with Programming, Systems, & Play, Telemedium'.

Link: http://www.bogost.com/downloads/I.%20Bogost%20Procedural%20Literacy.pdf

Licence: © 2005 Telemedium. Made freely available on author's website.

Coleman, G. (2010) 'The Anthropology of Hackers,' The Atlantic.

Link: http://www.theatlantic.com/technology/archive/2010/09/the-anthropology-of-hackers/63308/

Licence:  © 2010 The Atlantic Monthly Group. All Rights Reserved. Made available via a link to The Atlantic.

Chun, W. (2010) Critical Code Studies.

Link to Vimeo: http://vimeo.com/16328263


Davidson, C. (2012) 'Why We Need a 4th R: Reading, wRiting, aRithmetic, algoRithms,' DML Central.

Link: http://dmlcentral.net/blog/cathy-davidson/why-we-need-4th-r-reading-writing-arithmetic-algorithms

Licence: ©2012 Davidson, Creative Commons Attribution 3.0 License. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Deleuze, G. (1992) 'Postscript on the Societies of Control', October, vol. 59, pp 3-7.

Link: http://www.n5m.org/n5m2/media/texts/deleuze.htm

Licence: ©1992 MIT Press. Made available here via a link.


Dijkstra, E. W. (1998) 'On the Cruelty of Really Teaching Computing Science'.

Link: http://virtual.itca.edu.sv/dokeos/sinapsis/cd/doctos-sw-libre/docus-ewd/EWD1036%20-%20On%20the%20cruelty%20of%20really%20teaching%20computing%20scienc.pdf

Licence: © 1998 Dijkstra. Made available here via transcription. 


Gardner, M. (1970) 'The Fantastic Combinations of John Conway's New Solitaire Game "Life"', Scientific American, 223 (October): 120-123.

Link: http://www.ibiblio.org/lifepatterns/october1970.html

Licence: ©1970 Scientific American.


Golumbia, D. (2003) "Computation, Gender, and Human Thinking," differences: A Journal of Feminist Cultural Studies 14:2 (Summer 2003). 27-48. (c) 2003 David Golumbia/differences.


Guattari, F. (1989) The Three Ecologies, New Formations, no. 8, accessed 15/03/2012, http://www.amielandmelburn.org.uk/collections/newformations/08_131.pdf (c) 1989 New Formations


Fogg, B. J., Cuellar, G., and Danielson, D. (2003) Motivating, Influencing, and Persuading Users, In Jacko, J. and Sears A. (eds.), The human-computer interaction handbook: fundamentals, evolving technologies, and emerging applications, accessed 15/03/2012, http://bjfogg.com/hci.pdf (c) 2003 Laurence Erbaum Associates


Fuller, M. and Matos, S. (2011) Feral Computing: From Ubiquitous Calculation to Wild Interactions, Fibreculture, issue 19, accessed 15/03/2012, http://nineteen.fibreculturejournal.org/fcj-135-feral-computing-from-ubiquitous-calculation-to-wild-interactions/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.


Frabetti, F. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16263212 (c) 2010 F. Frabetti


Goetz, T. (2011) Harnessing the Power of Feedback Loops, Wired, accessed 12/09/2011, http://www.wired.com/magazine/2011/06/ff_feedbackloop/ (c) 2011 Wired


Jerz, D. G. (2007) Somewhere Nearby is Colossal Cave: Examining Will Crowther's Original "Adventure" in Code and in Kentucky, Digital Humanities Quarterly, Volume 1 Number 2, accessed 15/03/2012, http://www.digitalhumanities.org/dhq/vol/001/2/000009/000009.html This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.


Kitchin, R. (2012) The Programmable City, Environment and Planning B: Planning and Design, volume 38, pages 945-951, accessed 15/03/2012, http://www.envplan.com/epb/editorials/b3806com.pdf Copyright © 2012 a Pion publication, Environment and Planning B: Planning and Design


Kovacs, G. (2010) Tracking the trackers, TED, accessed 05/06/2012, http://www.youtube.com/watch?v=f_f5wNw-2c0 (c) 2010 TED CONFERENCES, LLC


Langner, R. (2011) Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon, accessed 02/03/2012, http://www.youtube.com/watch?feature=player_embedded&v=CS01Hmjv1pQ © TED CONFERENCES, LLC


Latour, B. (2012) The Whole is Always Smaller Than Its Parts - A Digital Test of Gabriel Tarde’s Monads, British Journal of Sociology, accessed 15/03/2012, http://www.bruno-latour.fr/sites/default/files/123-WHOLE-PART-FINAL.pdf (c) 2012 Bruno Latour/British Journal of Sociology


MacKenzie, A. (2006) “The Problem of Computer Code: Leviathan or Common Power?” Institute for Cultural Research, Lancaster University. 10 August 2006, accessed 15/03/2012, http://www.lancs.ac.uk/staff/mackenza/papers/code-leviathan.pdf (c) 2006 Adrian MacKenzie


MacKenzie, A. (2008) Wirelessness as Experience of Transition, Fibreculture, 13, accessed 15/03/2012, http://thirteen.fibreculturejournal.org/fcj-085-wirelessness-as-experience-of-transition/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.


Manovich, L. (2008) Software Takes Command, accessed 15/03/2012, http://lab.softwarestudies.com/2008/11/softbook.html Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.


Marino, Mark C. “Critical Code Studies” Electronic Book Review. 2006. Available at http://www.electronicbookreview.com/thread/electropoetics/codology Creative Commons: Attribution-NonCommercial-ShareAlike 2.5 Generic (CC BY-NC-SA 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-ShareAlike 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.


McCallum, L., and Smith, D. (2012) Show Us Your Screens, accessed 04/03/2012, http://vimeo.com/20241649 (c) McCallum, L., and Smith, D.


Matrosov, A., Rodionov, E., Harley, D. and Malcho, J. (n.d.) Stuxnet Under the Microscope, accessed 04/03/2012, http://go.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf © 2012 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. Freely Available White Papers


Najjar, M. (2012) Cover Image: 'the sublime brain [of jonathon]', http://www.michaelnajjar.com/, (c) 2011 Michael Najjar, permission for use and reproduction of image as book cover of Life in Code and Software given by the artist. title: "the sublime brain [of jonathon]", original size: 150 x 150 cm, © michael najjar, courtesy by the artist


Parikka, J. (2011) Media Ecologies and Imaginary Media: Transversal Expansions, Contractions, and Foldings, Fibreculture, issue 19, accessed 15/03/2012, http://seventeen.fibreculturejournal.org/fcj-116-media-ecologies-and-imaginary-media-transversal-expansions-contractions-and-foldings/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5). This is an open-access article distributed under the terms of the Creative Commons Attribution-Noncommercial-No Derivative Works 2.5 License, which permits non-commercial use, distribution, and reproduction in any medium, provided the original author and source are credited.


Parisi, L. and Portanova, S. (2012) Soft Thought (in architecture and choreography), Computational Culture, issue 1, accessed 16/03/2012, http://computationalculture.net/article/soft-thought (c) 2012 Copyright the Authors, Computational Culture is an online open-access peer-reviewed journal


Ramsay, S. (2010) Algorithms are Thoughts, Chainsaws are Tools, accessed 04/03/2012, http://vimeo.com/9790850 (c) Stephan Ramsay


Ramsay, S. (2011) On Building, accessed 15/03/2012, http://lenz.unl.edu/papers/2011/01/11/on-building.html (c) Stephan Ramsay


Slavin, K. (2010) How Algorithms Shape Our World, TEDGlobal.

Link: http://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world.html

Lisence: © TED CONFERENCES, LLC


Turing, A.M. (1936). "On Computable Numbers, with an Application to the Entscheidungs problem". Proceedings of the London Mathematical Society. 2 42: 230–65, accessed 15/03/2012, http://www.cs.virginia.edu/~robins/Turing_Paper_1936.pdf (c) 1937 London Mathematical Society


Turing, A.M. (1950). Computing machinery and intelligence. Mind, 59, 433-460. (c) 1950 Mind


Weisstein, Eric W. "Turing Machine." From MathWorld--A Wolfram Web Resource, accessed 15/03/2012, http://mathworld.wolfram.com/TuringMachine.html © 1999-2012 Wolfram Research, Inc.


Wing, J. M. (2006) Computational Thinking, Proceedings of the ACM, accessed 15/03/2012, http://www.cs.cmu.edu/afs/cs/usr/wing/www/publications/Wing06.pdf (c) Communication of the ACM and Jeannette Wing


Wing, J. M. (2009) Computational Thinking and Thinking About Computing, accessed 15/03/2012, http://www.youtube.com/watch?v=C2Pq4N-iE4I (c) 2009 IHMC and Jeannette Wing, standard Youtube license


why the lucky stiff (2009) Hackety Hack, accessed 15/05/2012, http://vimeo.com/5047563 (c) 2009 why the lucky stiff, made available for use by the author under standard Vimeo video license.


Wolf, G. (2010) The Quantified Self, TED, accessed 15/03/2012, http://www.youtube.com/watch?v=OrAo8oBBFIo (c) 2010 TED CONFERENCES, LLC