4 Matching Annotations
- Mar 2023
-
news.ycombinator.com news.ycombinator.com
-
To make the object less mediated, its representation should ideally be as transparent as possible. AR in this regard is much more promising than VR, since in VR the representation takes place within another representation.To make the action less mediated, the action should be able to be embodied by the (technologically extended) user, as well as being inherent to the medium which represents the subject. Here we are building a bridge between the human body and a way to represent things that physically do not exist. It's never going to be ideal, but it could be better than what we have now.
-
With computer interfaces, you hardly ever interact with something in an immediate way. I want a comment to appear on this site but instead I am writing this text in a white box and not where the comment would appear. All the computer interactions are mediated by these in-between steps. (An example for unmediated interaction would be cooking. What you chop is what you get
-
To me, the the most interesting part of Bret Victors ideas lie in the re-embodiment of disembodied interactions. The computers choreograph us anyhow, but often in a very poor and limited way – only our fingertips and our eyes move a bit. Why not make the choreography of interaction richer? Why not create a computer-aided full-body choreography of interaction?
-
- Sep 2017
-
dl.dropboxusercontent.com dl.dropboxusercontent.com
-
Initially at least, civic hackathons were initially positioned as a form of public outreach for civic hackers, a loose-knit community interested in applying technology for social good. James Crabtree (2007) defined “civic hacking” as “the development of applications to allow mutual aid among citizens rather than through the state.” In particular, he suggested an extra-institutional definition, thatcivic hacking filled in where e-democracy had failed. The meaning of “civic” at this stage leaned towards a libertarian perspective, which remains a persistent critique of hacking among critical studies scholars (Golumbia, 2013).
-