dc.contributor.author | Helmreich, Stefan | en_US |
dc.coverage.temporal | Fall 2004 | en_US |
dc.date.issued | 2004-12 | |
dc.identifier | 21A.350J-Fall2004 | |
dc.identifier | local: 21A.350J | |
dc.identifier | local: SP.484J | |
dc.identifier | local: STS.086J | |
dc.identifier | local: WGS.484J | |
dc.identifier | local: IMSCP-MD5-695bd3109970ac7c6e70affc60c0a1a1 | |
dc.identifier.uri | http://hdl.handle.net/1721.1/75796 | |
dc.description.abstract | This course examines computers anthropologically, as meaningful tools revealing the social and cultural orders that produce them. We read classic texts in computer science along with works analyzing links between machines and culture. We explore early computation theory and capitalist manufacturing; cybernetics and WWII operations research; artificial intelligence and gendered subjectivity; the creation and commodification of the personal computer; the hacking aesthetic; non-Western histories of computing; the growth of the Internet as a military, academic, and commercial project; the politics of identity in cyberspace; and the emergence of "evolutionary" computation. | en_US |
dc.language | en-US | en_US |
dc.rights.uri | Usage Restrictions: This site (c) Massachusetts Institute of Technology 2012. Content within individual courses is (c) by the individual authors unless otherwise noted. The Massachusetts Institute of Technology is providing this Work (as defined below) under the terms of this Creative Commons public license ("CCPL" or "license") unless otherwise noted. The Work is protected by copyright and/or other applicable law. Any use of the work other than as authorized under this license is prohibited. By exercising any of the rights to the Work provided here, You (as defined below) accept and agree to be bound by the terms of this license. The Licensor, the Massachusetts Institute of Technology, grants You the rights contained here in consideration of Your acceptance of such terms and conditions. | en_US |
dc.subject | Computing | en_US |
dc.subject | machines and culture | en_US |
dc.subject | computation theory | en_US |
dc.subject | cybernetics | en_US |
dc.subject | operations research | en_US |
dc.subject | artifical intelligence | en_US |
dc.subject | personal computer | en_US |
dc.subject | commodification | en_US |
dc.subject | hacking | en_US |
dc.subject | hacker | en_US |
dc.subject | Internet | en_US |
dc.subject | cyberspace | en_US |
dc.subject | indentity in cyberspace | en_US |
dc.subject | cosmology | en_US |
dc.subject | clockwork | en_US |
dc.subject | Charles Babbage | en_US |
dc.subject | Ada Lovelace | en_US |
dc.subject | Industrial Revolution | en_US |
dc.subject | calculating machine | en_US |
dc.subject | coding | en_US |
dc.subject | cold war | en_US |
dc.subject | Alan Turing | en_US |
dc.subject | African mathematical systems | en_US |
dc.subject | counterculture | en_US |
dc.subject | PC | en_US |
dc.subject | gaming | en_US |
dc.subject | open source | en_US |
dc.subject | free software | en_US |
dc.subject | software | en_US |
dc.subject | 21A.350J | en_US |
dc.subject | 21A.350 | en_US |
dc.subject | SP.484J | en_US |
dc.subject | SP.484 | en_US |
dc.subject | STS.086J | en_US |
dc.subject | STS.086 | en_US |
dc.title | 21A.350J / SP.484J / STS.086J / WGS.484J The Anthropology of Computing, Fall 2004 | en_US |
dc.title.alternative | The Anthropology of Computing | en_US |