Notes Abstract This essay surveys the development and current state of electronic literature, from the popularity of hypertext fiction in the 's to the present, focusing primarily on hypertext fiction, network fiction, interactive fiction, locative narratives, installation pieces, "codework," generative art and the Flash poem.
May This essay is derived from a guest lecture at Harvard, which incorporated an earlier talk at Northeastern. When I finished grad school in computer science I went to art school to study painting.
A lot of people seemed surprised that someone interested in computers would also be interested in painting. They seemed to think that hacking and painting were very different kinds of work-- that hacking was cold, precise, and methodical, and that painting was the frenzied expression of some primal urge.
Both of these images are wrong. Hacking and painting have a lot in common. In fact, of all the different types of people I've known, hackers and painters are among the most alike. What hackers and painters have in common is that they're both makers.
Along with composers, architects, and writers, what hackers and painters are trying to do is make good things.
They're not doing research per se, though if in the course of trying to make good things they discover some new technique, so much the better. I've never liked the term "computer science. Computer science is a grab bag of tenuously related areas thrown together by an accident of history, like Yugoslavia.
At one end you have people who are really mathematicians, but call what they're doing computer science so they can get DARPA grants.
In the middle you have people working on something like the natural history of computers-- studying the behavior of algorithms for routing data through networks, for example. And then at the other extreme you have the hackers, who are trying to write interesting software, and for whom computers are just a medium of expression, as concrete is for architects or paint for painters.
It's as if mathematicians, physicists, and architects all had to be in the same department. Sometimes what the hackers do is called "software engineering," but this term is just as misleading.
Good software designers are no more engineers than architects are. The border between architecture and engineering is not sharply defined, but it's there. It falls between what and how: What and how should not be kept too separate. You're asking for trouble if you try to decide what to do without understanding how to do it.
But hacking can certainly be more than just deciding how to implement some spec.It was Joe’s first date with Mary.
He asked her what she wanted in life and she replied, “I want to establish my career. That’s the most important thing to me right now.” Undeterred that she had no need for a man in her life, Joe entertained her with enough funny stories and cocky statements.
Practicing Essay Writing to Get Better. Did you know that Ernest Hemingway wrote his first novel without ever having written anything before? Did you know that Steven Spielberg directed his first.
The table below presents an abbreviated geologic time scale, with times and events germane to this essay. Please refer to a complete geologic time scale when this one seems inadequate. THE FALSE ALLURE OF GROUP SELECTION.
Human beings live in groups, are affected by the fortunes of their groups, and sometimes make sacrifices that benefit their groups. During the first year of PGDBA I learnt how Derivatives can play an important role in optimizing a Portfolio's performance and in managing risk.
The Online Writing Lab (OWL) at Purdue University houses writing resources and instructional material, and we provide these as a free service of the Writing Lab at Purdue.