Michaela’s prezi on race & ethnicity online

Here’s Michaela’s prezi from today if you’d like to fill out your notes or see what you missed!


small group work on cyberfeminism

  1. Quickly review the notes you just took on my lecture introducing you to the work of Donna Haraway.
  2. Reread this quote from the entry on “Cyberfeminism”:  “‘Cyberspace does not exist in a vacuum; it is intimately connected to numerous real-world institutions and systems that thrive on gender separation and hierarchy’; cyberfeminism, accordingly, should be a political undertaking committed to creating and maintaining real and virtual places for women in regard to new technologies—such as creating new feminist platforms and resources, including hands-on techno-education for women and working directly with code—while also critically assessing the “impact of new technologies on the lives of women and the insidious gendering of technoculture in everyday life” (108).
  3. Now, I’d like you to pick a specific digital media platform or piece of software and try to remagine it as a specifically feminist platform or piece of software. For example, what would a feminist word processor look like? A feminist videogame? A feminist D2L? A feminist search engine? The point here is to think as far outside of the current status quo as possible in order to imagine what could be possible.


in class work on politics, new media, and hacking

Politics and New Media

  1. Why and how (in what specific ways) do people tend to think that the Internet provides the possibility of undermining traditional political institutions, hierarchies, and power relations? Looking back on what we’ve learned so far in class, how do social network sites seem to support this belief and how do they undermine this belief?
  2. What is communicative capitalism and how does it express a skepticism toward the possibility of the power of networks (and, by implication, social networks) to bring about any kind of meaningful social change?
  3. Tactical media use “shifts the aim of politics away from traditional revolutionary aims into a ‘micropolitics of disruption, intervention, and education.'” Go to http://critical-art.net/?cat=2 and choose one tactical media project to look at. Then, discuss the project in terms of the previous quote.
  4. And finally, what exactly does the author mean by this sentence: “Early notions that the abstract geometry of cyberspace would allow an escape from binary structures and the concrete constraints of power (Haraway 1991) have been challenged by a recognition of the integration of cyberspace and everyday life.” Can you come up with some examples to support what Hands is saying here?


  1. What is a hacker? (just to spell out the obvious: the definition is in the reading)
  2. Given this definition, come up with a way in which you have hacked something, some system, whether computer-based or not.
  3. Who are the heirs of hackers?
  4. What’s the distinction between a hacker who’s a builder and a hacker who’s a breaker?
  5. What is UNIX? Speculate about why it attracts hackers. Also, why are hackers who work on UNIX said to be part of “a recursive public”?

how to do literary research

  1. What is the difference between a primary source and a secondary source? Should a research paper include primary sources, secondary sources, or both?
  2. What is an example of a nonacademic source and what do you use these nonacademic sources for?
  3. What is the difference between a library catalog and a database? Name some databases relevant to our class.
  4. What is the difference between Chinook and Prospector and Interlibrary Loan?
  5. What is the difference between subject word searching and keyword searching?
  6. What does “peer reviewed article” mean and why do you want to include these sources in your papers?
  7. Which literature-related databases are full text? What IS “full text”? Which database is the most complete and extensive for doing literary research?
  8. When you’re doing an advanced search, what function does the Boolean operator “and” serve?
  9. When you’re doing an advanced search, what function does the Boolean operator “or” serve?
  10. When you’re doing an advanced search, what function does the Boolean operator “not” serve?
  11. When you’re doing an advanced search, what function does the Boolean operator “*” or “?” serve?
  12. When evaluating a source for a research project, what aspects of the source should you consider?
  13. What do you need to do to conduct research on your computer at home/off-campus?

in class discussion questions on John Battelle

  1. What is a “database of intentions” and why does Battelle use this phrase to describe Google?
  2. How is searching “material culture”? What is material about our internet searches?
  3. How do you think search will rewire the relationship between us and the government? Has this already happened since the publication of The Search in 2005? How has searching rewired the relationship between public and private?
  4. Do some research (online of course!) on the Turing Test. How is this test relevant to the future of search?
  5. What does Battelle mean that “on the internet…all intent is commercial in one way or another”? (30) Give an example.

small group work on Matthew Fuller

Group 1:
“Software is too often reduced to being simply a tool for the achievement of pre-existing, neutrally formulated tasks. Culture becomes an engineering problem.”

In Microsoft Word “the work of literary writing and the task of data-entry share the same conceptual and performative environment, as do the journalist and the occasional HTML-coder.”

Group 2:
“What this means contemporarily is that the disappearance of the worker is best achieved by the direct subsumption of all their potentiality within the apparatus of the work.”

“A program like Word doesn’t deny autonomous work or the desire for it, but parasitises it, corrals and rides it at the same time as entering into an arrangement of simultaneous
recomposition of scope.”

Group 3:
“The user becomes an object, but at a particular position in the hierarchy of the others. The user-object is excluded from the internal transmission of information, and instead allocated representations of this information as interface.”

“It should be possible to analyze a piece of software on the basis of procedurally documenting every point which constitutes an event, to record the points at which we move from one state to another or at which boundaries are produced to certain behaviors, not merely within the modes but at every level of the software.”

Group 4:
“To be effective, human-machine integration required that people and machines be comprehended in similar terms so that human-machine systems could be engineered to maximize the performance of both kinds of component. Word has no direct interest in information and communication, but rather in its facilitation.”

“The interface is the threshold between the underlying structure of the program and the user. As a threshold it contains elements of both.”