Life in Code and Software/Attributions

Back to the book


Berry, David. M. “A Contribution Towards a Grammar of Code.” Fibreculture Journal 13 : n. pag. Web. 9 Nov 2009, accessed 16/03/2012, http://thirteen.fibreculturejournal.org/fcj-086-a-contribution-towards-a-grammar-of-code/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)

Chun, W. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16328263 (c) 2010 Wendy Chun

Deleuze, G. (1992) Postscript on the Societies of Control, October, vol. 59, pp 3-7, accessed 15/03/2012, http://www.n5m.org/n5m2/media/texts/deleuze.htm (c) 1992 October/MIT Press

Frabetti, F. (2010) Critical Code Studies, accessed 15/03/2012, http://vimeo.com/16263212 (c) 2010 F. Frabetti

Kitchin, R. (2012) The Programmable City, Environment and Planning B: Planning and Design, volume 38, pages 945-951, accessed 15/03/2012, http://www.envplan.com/epb/editorials/b3806com.pdf Copyright © 2012 a Pion publication, Environment and Planning B: Planning and Design

Langner, R. (2011) Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon, accessed 02/03/2012, http://www.youtube.com/watch?feature=player_embedded&v=CS01Hmjv1pQ © TED CONFERENCES, LLC

MacKenzie, A. (2006) “The Problem of Computer Code: Leviathan or Common Power?” Institute for Cultural Research, Lancaster University. 10 August 2006, accessed 15/03/2012, http://www.lancs.ac.uk/staff/mackenza/papers/code-leviathan.pdf (c) 2006 Adrian MacKenzie

MacKenzie, A. (2008) Wirelessness as Experience of Transition, Fibreculture, 13, accessed 15/03/2012, http://thirteen.fibreculturejournal.org/fcj-085-wirelessness-as-experience-of-transition/ Creative Commons Attribution-NonCommercial-NoDerivs 2.5 Australia (CC BY-NC-ND 2.5)

Marino, Mark C. “Critical Code Studies” Electronic Book Review. 2006. Available at http://www.electronicbookreview.com/thread/electropoetics/codology Creative Commons: Attribution-NonCommercial-ShareAlike 2.5 Generic (CC BY-NC-SA 2.5)

McCallum, L., and Smith, D. (2012) Show Us Your Screens, accessed 04/03/2012, http://vimeo.com/20241649 (c) McCallum, L., and Smith, D.

Matrosov, A., Rodionov, E., Harley, D. and Malcho, J. (n.d.) Stuxnet Under the Microscope, accessed 04/03/2012, http://go.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf © 2012 ESET North America. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET spol. s r.o. or ESET North America. Freely Available White Papers

Parisi, L. and Portanova, S. (2012) Soft Thought (in architecture and choreography), Computational Culture, issue 1, accessed 16/03/2012, http://computationalculture.net/article/soft-thought (c) 2012 Copyright the Authors, Computational Culture is an online open-access peer-reviewed journal

Ramsay, S. (2010) Algorithms are Thoughts, Chainsaws are Tools, accessed 04/03/2012, http://vimeo.com/9790850 (c) Stephan Ramsay

Slavin, K. (2010) How algorithms shape our world, TEDGlobal accessed 15/03/2012,http://www.ted.com/talks/kevin_slavin_how_algorithms_shape_our_world.html © TED CONFERENCES, LLC

Weisstein, Eric W. "Turing Machine." From MathWorld--A Wolfram Web Resource, accessed 15/03/2012, http://mathworld.wolfram.com/TuringMachine.html © 1999-2012 Wolfram Research, Inc.

Wing, J. M. (2009) Computational Thinking and Thinking About Computing, accessed 15/03/2012, http://www.youtube.com/watch?v=C2Pq4N-iE4I (c) Jeannette Wing, standard Youtube license

Wolf, G. (2010) The Quantified Self, TED, accessed 15/03/2012, http://www.youtube.com/watch?v=OrAo8oBBFIo (c) 2010 TED CONFERENCES, LLC