A Network Orange: Logic and Responsibility in the Computer by Richard Crandall, Marvin Levich, H. Rheingold

By Richard Crandall, Marvin Levich, H. Rheingold

Computer expertise has turn into a replicate of what we're and a display on which we undertaking either our hopes and our fears for how the realm is altering. prior during this century, really within the post-World warfare II period of extraordinary progress and prosperity, the social agreement among citi­ zens and scientists/engineers was once epitomized through the road Ronald Reagan promoted as spokesman for basic electrical: "Progress is our so much impor­ tant product. " in additional contemporary a long time, post-Chernobyl, post-Challenger, post-Bhopal, post-Microsoft, the social agreement has passed through a transfor­ mation. extra everyone is doubtful, apprehensive, and downright against the inspiration that extra know-how promises a greater existence. what's a "better life"? Who advantages and who loses whilst new applied sciences swap the best way we are living, paintings, examine, and play? Who has a say within the means applied sciences are designed and deployed? the place are we going, are we yes we wish to pass there, and who has the facility to do something approximately itt From the early days of the railroads, into the period of electrification, in the course of the McLuhan age, a lot of the discourse approximately know-how has been hype, utopianism, and what a few historians have referred to as "the rhetoric of the technological chic. " we have now stumbled on, despite the fact that, that now not everyone gain economically or politically from technological change.

Show description

Read Online or Download A Network Orange: Logic and Responsibility in the Computer Age PDF

Similar counting & numeration books

Statistical and Computational Inverse Problems (Applied Mathematical Sciences)

This e-book covers the statistical mechanics method of computational resolution of inverse difficulties, an cutting edge sector of present learn with very promising numerical effects. The suggestions are utilized to a couple of genuine global purposes reminiscent of restricted perspective tomography, picture deblurring, electical impedance tomography, and biomagnetic inverse difficulties.

A Concise Introduction to Languages and Machines

This easy-to-follow textual content presents an obtainable creation to the major issues of formal languages and summary machines inside of laptop technological know-how. the writer follows the winning formulation of his first e-book in this topic, this time making those center computing themes extra basic and offering a good beginning for undergraduates.

Principles of Secure Network Systems Design

As e-commerce turns into the norm of industrial transactions and data be­ comes a necessary commodity, it can be crucial that vast efforts be made to check and rectify the issues with the underlying architectures, strategies, equipment, which are taken with offering and and instruments, in addition to organizational constructions, using companies in relation to details know-how.

3D-Computation of Incompressible Internal Flows: Proceedings of the GAMM Workshop held at EPFL, 13–15 September 1989, Lausanne, Switzerland

The purpose of the 1989 GAMM Workshop on 3D-Computation of Incompressible inner Flows used to be the simulation of a pragmatic incompressible circulation box in an enormous commercial software. In view of the problems enthusiastic about formulating the sort of try out case, requiring the provision of an experimental info base, severe care needed to be taken within the number of the correct one.

Extra info for A Network Orange: Logic and Responsibility in the Computer Age

Sample text

Here is another example of cotasking: Humans can compensate for poor vision by echolocation-a kind of sonar that uses the sounds of footsteps, say, rebounding off walls. It is as though one peripheral takes over for another. This skill is evidently a way of negotiating a highly variable environment. The great dynamic range of human peripherals is just an example of exqUisite design, not the final word on efficient I/O. " The principle here can be summarized thus: The (conscious) human benefits from exquisitely designed peripherals, and furthermore these peripherals can cotask, with each other and with the brain, with respect to chaotic data excursion.

There are systems that mtegrate cenam compressed video-representation schemes with other compressed audio-representatiOn schemes. However. to date there seems [to bel no unifying framework for integrating multimedia data which is independent of both the specific medIUm and its storage.

Toward a Theory of Machine Consciousness 27 and second order regression features. extracted from the index weighted cepstral coefficients derived from the twelfth order model of perceptually based linear prediction analysis .... The training was done on clean speech produced in a normal environment (without background noise) and the testing on Lombard or nOisy-Lombard speech. Accuracy was judged by recognition rates. 11 It is hard to imagine a more convoluted and detailed passage, even on a technological research subject.

Download PDF sample

Rated 4.10 of 5 – based on 46 votes