FW: my design me

1999-11-12 Thread Michael Gurstein



-Original Message-
From: wade tillett [mailto:[EMAIL PROTECTED]] 
Sent: Thursday, November 11, 1999 9:46 AM
To: Nettime
Subject:  my design me


http://www.surgery.com/topics/body.html

A computer generated golden metallic female body with unbelievable
proportions is shown over the faded background of a keyboard.  Clickable
cyan boxes are shown over specific areas of the body with the following
text: 

*Pick the area you would like to improve

*   Head (face, neck, and hair)
*   Arms (sagging skin, excess fat flab, etc.)
*   Breast (sagging, too big, too small, uneven, etc.)
*   Abdomen (excess fat, excess skin hanging down, etc.)
*   Buttocks (too fat, saggy, etc.)
*   Thighs (excess fat, cellulite, etc.)
*Calves (too small, too fat, etc.)

The examples in parentheses suggest what could be wrong with your body -
that is, what varies from the perfected computer generated model.  We can
no longer be compared to the ideal naturally occurring body, but rather to
a computer generated model - a utopic persona based on a conglomeration of
the best.  We can no longer be compared to the naturally occurring body
because we are no longer reliant on natural means for obtaining
(maintaining) this body.  Now this increased power and ability to change
our body makes the body we live in a design of our own - choosing not to
modify our body is just as much a design as modifying our body. 
Abstention is as much design as creation, if we have the ability to
design.  And we have always had the ability to design.  We constantly
design our selves - by eating (or not eating, also what we eat), by
walking (or not walking), by reproducing (or not reproducing), by our
actions (or non-actions).  "Where nothing is in its place, lies disorder. 
Where in the desired place there is nothing, lies order." (Brecht qtd. in
Baudrillard, Simulacra and Simulation, 155) 

* Thigh Liposculpture
*  What would you like to do?
*   See Before and After Pictures
*   Find out about usual Costs
*   Read about this operation
*   Find a doctor near you that would be glad to explain your
options

What has changed is the transferability of our actions.  We can now sit at
a computer instead of walking; the money we make while sitting at the
computer can be transferred into a liposuction (or 'liposculpture' as this
web site calls it).  The action attempts to correct its own non-actions
through a design transference. 

* Pick the area you would like to improve 

*Hair (for baldness, thinning hair, etc.)
*Upper Eyes (tired looking eyes, sad, small etc.) 
*Lower Eyes (tired looking eyes, bags, extra skin, etc.) 
*Ears (excess fat, excess skin hanging down, etc.) 
*Nose (too big, too small, too wide, too narrow, etc.) 
*Mouth (enhance the lips, improve wrinkles, etc.) 
*Neck (fix sagging skin, take away excess fat, etc.) 
*Face
*Facelift
*Skin Resurfacing (Laser) 
*Skin Resurfacing (Chemical Peel) 

We have also increased the limits of our designs, the possibilities of our
design.  There are a lot more choices here than on the barbie my design
site.  This is beyond mass production.  There are a lot more choices now
than were previously possible through actions as design, deterministic
choice.  We didn't used to be able to design noses.  Now with surgery,
prosthetics, eugenics, genetic engineering, we can modify the design of
life itself.  We have modified deterministic choice, natural selection,
evolution.  We are now our own gods - products of our own design. 

>"Are we adapting our bodies to the dress, or the other way around?" 
(Thanks to Tjebbe van Tijen for the quote) 

We still operate within the limits of our design, within the program,
although we are constantly expanding these limits.  What limits our
designs the most is our social program of utopia.  This is the definition
of utopia: the exclusion of possibilities.  (No possibilities of adding a
third arm.  The body is limited to our utopic idea of it.  Detachable
prosthetics such as the internet or airplanes are used to extend our
bodies' possibilities without modifying our utopic definition of self.) 

"But let there be no misunderstanding; it is not that a real man, the
object of knowledge, philosophical reflection or technical intervention,
has been substituted for the soul, the illusion of the theologians.  The
man described for us, whom we are invited to free, is already in himself
the effect of a subjection much more profound than himself.  A 'soul'
inhabits him and brings him to existence, which is itself a factor in the
mastery that power exercises over the body.  The soul is the effect and
instrument of a political anatomy; the soul is the prison of the body."
(Foucault, Discipline and Punish, 30) 





#  distributed via : no commercial use without permission
#   is a moderated mailing list for net criticism,
#  collaborative text

FW: Effective Demand

1999-11-12 Thread Michael Gurstein



-Original Message-
From: William B. Ryan [mailto:[EMAIL PROTECTED]] 
Sent: Friday, November 12, 1999 2:37 PM
To: DEBT Discussion List
Subject: Effective Demand


FIRST INTERIM REPORT Submitted to His Majesty's Premier and
Legislative Council of Alberta, at Edmonton, Alberta, May 23, 1935.

...Effective demand originated in the barter system, that is to say,
individuals parted with a surplus of real wealth in their possession
to obtain in exchange real wealth of a different variety for which
they had a need...In the modern world, however, the preponderating
feature in effective demand which is universally employed to carry on
the world's business is what is technically called a "credit
instrument," of which there are several forms. For the purposes of
this preamble it is only necessary to consider the cheque...

While it is clear that under a barter system there is always
sufficient effective demand although it may be inequitably
distributed, under a money or cheque system both inequitable and
ineffective demand are certain unless production and demand are
consciously and systematically related.

Cheques are drawn upon deposits, and it is admitted by all responsible
authorities that deposits are created, to a major extent, by purely
book-keeping transactions on the part of banking institutions. It is
therefore correct to say that banking institutions are in a position
to create, claim as their property, and to lend upon their own terms,
effective demand which is the only method by which real wealth
produced by the general public can be transferred from the producer of
it to the user...At the moment it is sufficient to emphasise that the
whole economic environment of the individual, his level of education,
and to a large extent the conditions of his physical, mental and moral
development, are controlled by the provision or withholding of this
effective demand which is in essence merely a book-keeping process...

Without going too far into this aspect of the matter, it may be said
that the financial system in its orthodox form has worked fairly
successfully during an age of expansion in which preponderatingly
large quantities of capital goods, not intended to be used directly by
individuals, have been produced, and the purchasing power or effective
demand which has been distributed to individuals as an inducement to
produce other capital goods has been available to them as effective
demand for a sufficient quantity of consumable goods. Since this
process of expansion is beyond question proceeding at a much slower
rate, while the debts which have been contracted in regard to previous
expansion are becoming increasingly onerous, sufficient purchasing
power for the use of the general population does not become available
through orthodox methods, and if it did, by excessive concentration
upon capital production or Public Works, the breakdown of the system
owing to intolerable debt charges would only be accentuated.

In regard to the Province of Alberta, therefore, it appears to me to
be evident that little which is effective can be done to relieve the
economic difficulties which exist unless a departure is made from
methods which were moderately effective in the past but are no longer
suitable to conditions which have changed fundamentally. Any attempt
to deal with the situation, which does not recognize its fundamental
cause, must discredit the Administration and eventually result either
in an abolition of organized forms of government in favour of a pure
financial hegemony, or in a continuous disintegration of social
morale, possibly ending in something approaching anarchy...

It is clear, and all experience confirms this view, that if credit
instruments can be issued under the sanction of the constituted legal
authority, in this case the Province, no difficulty arises in
obtaining their universal acceptance within the range of the
jurisdiction of the governing body. This has been successfully
demonstrated beyond question in many instances and under the most
unfavourable conditions, during the past twenty years. In Great
Britain, in 1914, the whole population was accustomed to handling
actual gold coins, and in fact, strongly disliked the only existing
paper money, the Bank of England note. Within a week of the outbreak
of War a complete change from gold metallic currency to a paper
currency was instituted without visible shock, in spite of the well-
known existence of enemy agents-provocateurs, using all possible
efforts to destroy confidence in the new money. Under conditions which
could never be paralleled in this country, and after calculated
inflation never before known in history, one series of paper Marks
after another has been accepted and has functioned in Germany with no
tangible backing other than the mere declaration that it was legal
tender. No difficulty might be expected, therefore, if certain cheques
were made legal tender.

A difficulty does arise, however, where a considerable porti

Micro$oft Democracy -- no joke this time!

1999-11-12 Thread Christoph Reuss

M$ excludes non-customers from voting...

> http://www.theregister.co.uk/99-14.html
>
> Posted 11/11/99 2:34pm by Graham Lea
>
> MSNBC blunders over poll position
>
> Polls conducted on the Internet are prone to being invaded by
> afficionados who wish their view to prevail. There are, of course, other
> ways to give an incorrect picture of sentiment, such as miscounting the
> voting, or -- as has just happened -- having a bug that does not allow
> certain categories of voters to express a view.
>
> As pointed out by Joeri Sebrechts ("How about that MSNBC?" in The
> Register Bulletin Board), an MSNBC poll after Judge Jackson's findings
> strangely did not allow Netscape Navigator users to vote.  Nobody
> expects MSNBC to be particularly anti-Microsoft, but the service was
> badly caught out when it asked whether readers agreed that Microsoft had
> monopoly power and that consumers have been harmed, and what should
> happen. As is so often the case, the form of the questions was
> technically flawed, but that was not the major problem (only one remedy
> could be suggested, for example).
>
> Netscape users found they could not vote because the voting buttons,
> which appeared fleetingly, did not render properly. Debate centred
> around whether this was deliberate, since denying voting to Netscape
> users would most likely bias the result towards Microsoft, or whether it
> was just incompetent. It was soon flushed out that the problem was with
> Netscape's buggy way of dealing with cascading style sheets. The Opera
> browser (which is as near standard as you can get in a browser) did
> render the questionnaire correctly, as did Mozilla M10 but not KDF. This
> begs the question as to whether MSNBC knew that Netscape had a problem
> in this area, which was exploited, or again, was just technically
> incompetent. It was noteworthy that the site proclaims that it is
> "optimised for IE and Windows Media Player" and is maintained by MSNBC
> Interactive News, One Microsoft Way, Fort Redmond. The problem was
> reported to MSNBC, and suddenly the applet was fixed for Netscape with
> Windows.  
> ^^^
[...]




COMPUTER WARFARE

1999-11-12 Thread Johnny Holiday/John A. Taube

In the San Francisco Chronicle, November 8, 1999

COMPUTER WARFARE

By Bradley Graham of the Washington Post

WASHINGTON - During last spring's conflict with Yugoslavia, the Pentagon
considered hacking into Serbian computer networks to disrupt military
operations and basic civilian services.

But it refrained from doing so, according to senior defense officials,
because of uncertainties and limitations surrounding the emerging field
of cyber warfare.

"We went through the drill of figuring out how we would do some of these
cyber things if we were to do them," said a senior military officer.
"But we never went ahead with any.

As computers revolutionize many aspects of life, military officials have
stepped up development of cyber weapons and spoken ominously of their
potential to change the nature of war. Instead of risking planes to bomb
power grids, telephone exchanges or rail lines, for example, Pentagon
planners envision soldiers at computer terminals silently invading
foreign networks to shut down electrical facilities, interrupt phone
service, crash trains and disrupt financial systems.

But such attacks, officials say, pose nettlesome legal, ethical and
practical problems.

Midway through the war with Yugoslavia, the Defense Department's top
legal office issued guidelines warning that misuse of computer network
attacks could subject U.S. authorities to war crimes charges. It advised
commanders to apply the same "law of war" principles to computer attack
that they do to the use of bombs and missiles. These call for hitting
targets that are of military necessity only, minimizing collateral
damage and avoiding indiscriminate attacks.

Military officials said concern about legalities was only one of the
reasons U.S. authorities resisted the temptation to, say, raid the bank
accounts of Yugoslav President Slobodan Milosevic. Other reasons
included the untested or embryonic state of the U.S. cyber arsenal and
the rudimentary or decentralized
nature of some Yugoslav systems, which officials said did not lend
themselves to computer assault.
U.S. forces did attack some computers that controlled the Yugoslav air
defense system, the officials said. But the attacks were launched from
electronic jamming aircraft rather than over computer networks.

No plan for an electronic attack on Yugoslav computer networks ever
reached the stage of a formal legal assessment, according to several
defense officials familiar with the planning. And the 50 pages of
guidelines, prepared by the Pentagon general counsel's office, were not
drafted with the Yugoslav operation specifically in mind.

But officials said the document, which has received little publicity,
reflected the collective thinking of Defense Department lawyers about
cyber warfare and marked the U.S. government's first formal attempt to
set legal boundaries for the military's involvement in computer attack
operations.

It told commanders to remain wary of targeting institutions that are
essentially civilian, such as banking systems, stock exchanges and
universities, even though cyber weapons might provide the ability to do
so.

In wartime, the document advised, computer attacks and other forms of
what the military calls "information operations" should be conducted
only by members of the armed forces, not civilian agents. It also stated
that before launching any assaults, commanders must carefully gauge
potential damage beyond the intended target, much as the Pentagon now
estimates the number of likely casualties from bombings.

While computer attacks may appear to be a cleaner means of destroying
targets - with less prospect for physical destruction or loss of life
than bombs - Pentagon officials say such views are deceiving. By
penetrating computer systems that control communications,
transportation, energy and other basic services in a foreign country,
cyber weapons can have serious cascading effects, disrupting not only
military operations but civilian life, officials say.

The full extent of the U.S. computer arsenal is among the most tightly
held national security secrets. But reports point to a broad range of
weapons under development, including use of computer viruses, or "logic
bombs," to disrupt enemy networks; the feeding of false information to
sow confusion and the morphing of video images onto foreign television
stations to deceive. Last month, the Pentagon announced it was
consolidating plans for offensive as well as defensive computerized
operations under a four-star general who heads the U.S. Space Command in
Colorado Springs, Colo.

In their guidelines document, titled "An Assessment of International
Legal Issues in Information Operations," the Pentagon's lawyers warned
of such unintended effects of computer attacks as opening the floodgates
of a dam, causing an oil refinery in a populated area to explode or
triggering the release of radioactivity. They mentioned the possibility
of computer attacks spilling over into neutral or friendly nations and

About SASE

1999-11-12 Thread S. Lerner

>Date: Fri, 12 Nov 1999 09:19:27 -0500
>
>I am writing on behalf of the Society for the Advancement of Socio-Economics
>(SASE), an organization to which I belong.  SASE is an international
>multi-disciplinary organizations with members in over 50 countries.  The
>purpose of SASE is to advance the understanding of economic behavior across a
>broad range of
>academic disciplines.  We are interested in developing closer contacts with
>individuals and organizations with similar interests.
>
>The 12th annual meeting on Socio-Economics will be held at the London School
>of Economics from July 7-10, 2000.  The theme of the meeting is "Citizenship
>and Exclusion." A copy of the Call for Papers and other information on SASE
>is posted on the SASE web site at:  www.sase.org.
>
>Please contact the SASE office (e-mail: [EMAIL PROTECTED])  if you have any
>questions about the meeting or the organization.
>