5 Matching Annotations
  1. May 2018
    1. er. Kay ultimately attempted toclose his own ontological circle and find object-computers recursively defining eachother and infinitively deferring any concrete representation. It is striking how much thisvision anticipated the current world of networked computers with large cloud-basedtasks spread across multiple individual machin

      Ideas de Maturana y Varela respecto a la clausura operacional dialogarían fuertemente con este enfoque de la computación.

    2. Smalltalk also advanced this metaphor of computation as objects along anotherrelated track that turned computation into a self-referential system of interactingcomputers. Kay (1996) describes this understanding of objects in relation to computers.Smalltalk is a recursion on the notion of computer itself. Instead of dividingBcomputer stuff^into things each less strong than the whole—like data structures,procedures, and functions which are the usual paraphernalia of programminglanguages—each Smalltalk object is a recursion on the entire possibilities of thecomputer. Thus its semantics are a bit like having thousands and thousands ofcomputer all hooked together by a very fast network. Questions of concreterepresentation can thus be postponed almost indefinit
  2. Feb 2018
    1. Tal vez, en última instancia, este esfuerzo fue mi intento imperfecto para hacer una declaración político-ontológica, aprovechando los espacios ultra diseñados de aquello que llamamos la academia, el libro y el proceso de pensamiento.

      Interesante ver cómo usa espacios hiperdiseñados para deconstruir el diseño.

    2. . El diseño mismo se convierte en un proyecto en transición y se une a otros proyectos teórico-políticos que buscan enriquecer nuestro entendimiento de la vida y de lo humano.
  3. Sep 2017
    1. the ordinary hacker emerged from the entanglement ofhackerspaces. Writing on hacking has a rich subtext of intertwined human and non-human agencies. Tim Jordancompelling argued that the essence of hacking deeply involves reciprocalinteractions between individuals and things (Jordan, 2008). Hackers are often thought to be exceptional masters of technology. According this narrative, they leverage expertise with hands-on work to reveal what’s inside “black boxes.” This chapter explores an intriguing counter-argument: things make the hacker. This process deeply involves affect, a sense of community, and identification with a personal narrative.

      Las cosas crean a los hackers. que a su vez crean/modifican cosas que crean/modifican a más hackers!