Issue 8 Hacks, Leaks, and Breaches »The Extortion Stack…TV hacker drama Mr. Robot. Even the liberating hack Brunner postulates is not too improbable in the centralized data apparatus he envisions: later computer scientists adopted his term for “worm…
Issue 4 Food Infrastructures »Scaling Up/Scaling Down…a consequence, consumers ignore or cannot see the social, economic, and environmental damage that these food systems cause. For the promoters of alternatives, scaling food systems down increases consumer awareness…
Issue 6 The Total Archive »In the Name of Humanity…disappearing in the fortified vaults of wealthy private buyers (Shabi 2015). Apparently, there seems to be some consensus that artifacts, thought to be part of the common cultural heritage of…
Issue 8 Hacks, Leaks, and Breaches »Interview: Lorenzo Franceschi-Bicchierai…could look at and understand or try to verify. These were sophisticated pieces of code that needed people with a lot of technical skills to understand and figure out what…
Issue 6 The Total Archive »Alan Lomax and the Temple of Movement…massive archive of movement. Along with dance experts Irmgard Bartenieff and Forestine Paulay, Lomax set out on a mission: to collect, view, code, and catalog filmed samples of dance from…
Issue 6 The Total Archive »The Genomic Open…writing code, stopping only to ice his wrists (Townsend 2015). Yet, questions arose on the ground about the value and meaning of an endeavor that required an ever-growing number of…
Issue 2 Crowds and Clouds »Romans or Barbarians? Political Campaigns and Social Media in Colombia…and oversimplified[1] in Colombian public culture as clientelistic networks. Mockus’ campaign appealed to a younger, urban, middle-class vote that was mobilized mostly via web-based social media. By looking at how…