User:)biyibiyibiyi(/RW&RM 04/bibliography: Difference between revisions
No edit summary |
No edit summary |
||
Line 12: | Line 12: | ||
* Turner, F. (2010). From Counterculture to Cyberculture. Chicago: University of Chicago Press. | * Turner, F. (2010). From Counterculture to Cyberculture. Chicago: University of Chicago Press. | ||
* Markoff, J. (2014). What the dormouse said. New York: Penguin Books. | * Markoff, J. (2014). What the dormouse said. New York: Penguin Books. | ||
It's quite lengthy and rich with details, writing from a journalistic perspective on how personal computer is invented. | |||
I am missing critical commentary on, for example, when once computer become personal, does it become an instrument of liberation or subjectification? | |||
* Striegl, L. and Emerson, L. (2019). Anarchive as technique in the Media Archaeology Lab | building a one Laptop Per Child mesh network. International Journal of Digital Humanities, 1(1), pp.59-70. | * Striegl, L. and Emerson, L. (2019). Anarchive as technique in the Media Archaeology Lab | building a one Laptop Per Child mesh network. International Journal of Digital Humanities, 1(1), pp.59-70. | ||
* Abraham, A. and Bansal, L. (2006). In the shade of the commons. Amsterdam: Waag Society. | * Abraham, A. and Bansal, L. (2006). In the shade of the commons. Amsterdam: Waag Society. | ||
* Barbrook, R. And Cameron, A. ()The Internet Revolution: From Dot-com Capitalism to Cybernetic Communism. Amsterdam: Institute for Network Cultures. | * Barbrook, R. And Cameron, A. ()The Internet Revolution: From Dot-com Capitalism to Cybernetic Communism. Amsterdam: Institute for Network Cultures. | ||
* | * |
Revision as of 17:17, 6 October 2019
- Galloway, A. (2004). Protocol: How Control Exists After Decentralization. MIT Press.
- Rosenzweig, R. (1998). Wizards, Bureaucrats, Warriors, and Hackers: Writing the History of the Internet. The American Historical Review, 103(5), p.1530.
- Mazzilli-Daechsel, S. (2019). Simondon and the maker movement. Culture, Theory and Critique, pp.1-13.
- Lindtner, S. (2015). Hacking with Chinese Characteristics. Science, Technology, & Human Values, 40(5), pp.854-879.
- Larkin, B. (2013). The Politics and Poetics of Infrastructure. Annual Review of Anthropology, 42(1), pp.327-343.
- Bridle, J. (2018). New Dark Age: Technology and the End of the Future. London ; Brooklyn, NY: Verso
- Easterling, K. (2014). Extrastatecraft; London ; Brooklyn, NY: Verso
- Crary, J. (2014). 24/7. London: Verso.
- Han, B. (2017). Psychopolitics. London ; Brooklyn, NY: Verso
- Aranda, J., Kuan Wood, B., Vidokle, A., Assange, J., Berardi Bifo, F., Diederichsen, D., Latour, B., Lovink, G., MacCormack, P., Obrist, H. and Steyerl, H. (2015). The Internet Does Not Exist. Berlin: Sternberg Press.
- Halpern, O. (2015). Beautiful data. Durham: Duke University Press.
- Turner, F. (2010). From Counterculture to Cyberculture. Chicago: University of Chicago Press.
- Markoff, J. (2014). What the dormouse said. New York: Penguin Books.
It's quite lengthy and rich with details, writing from a journalistic perspective on how personal computer is invented. I am missing critical commentary on, for example, when once computer become personal, does it become an instrument of liberation or subjectification?
- Striegl, L. and Emerson, L. (2019). Anarchive as technique in the Media Archaeology Lab | building a one Laptop Per Child mesh network. International Journal of Digital Humanities, 1(1), pp.59-70.
- Abraham, A. and Bansal, L. (2006). In the shade of the commons. Amsterdam: Waag Society.
- Barbrook, R. And Cameron, A. ()The Internet Revolution: From Dot-com Capitalism to Cybernetic Communism. Amsterdam: Institute for Network Cultures.