1.11.2006

acerca de un puto avion gigantesto...que diria virilio

El Ejército colombiano, al igual que la policía, la Fuerza Aérea Colombiana (FAC), tienen dispuestas medidas para garantizar la seguridad de la nave en su estadía en Colombia.

1.06.2006

da (poco) placer copiar y pegar esto:

Plagiarism Defined

Webster’s defines plagiarism as “the unauthorized use or close imitation of the
language and thoughts of another author and the representation of them as one’s own
original work ” (New York: Gramercy Books, 1996).

In other words, plagiarism is the misappropriation of another person’s words or
ideas. It is therefore of paramount importance that you properly cite all sources and
make no claim to originality when restating someone else’s thoughts to develop or
underscore your own argument. Mastery of the technical aspects of writing should help
you ward off any ambiguity regarding ownership or authorship of a statement or idea.

How to Avoid Plagiarism

1. When you take handwritten notes or cut and paste on the computer, carefully
document all published sources, including websites, CD-ROMs, and other electronic
media. Identify sources by author, title, place of publication, publisher, date, and page
numbers.

2. When quoting from a source, indicate borrowed phrases and sentences by
enclosing them in quotation marks or, in the case of longer passages, by setting them off
in indented single-space blocks.

3. Paraphrasing, that is, substituting your own synonyms for the words in a
borrowed quotation, constitutes plagiarism if you claim the idea as your own. You
should credit the source by referencing the author or title and page number in
parentheses. Example: (Vasquez 99).

4. It is not necessary to document sources for commonly known facts, proverbial
sayings or famous quotations, but facts that are not common knowledge and are derived
from the work of another must be cited. If you are not certain, cite.

5. Provide complete documentation of your sources in an alphabetized list of
“Works Cited” at the end of your paper.

6. Submitting your own work for credit more than once, without authorization from
your professors, is a form of plagiarism.

1.02.2006

como los gringos ven a las "gangs" pff

While much attention has been given to the association of street gangs with drugs, there has been little public discussion of the economics of this association. In the past, those street gangs that depended upon crime as a source of income were limited to the traditional methods of extortion, robbery and burglary as a means of providing that income. Because of the opportunistic nature of such crimes, coupled with the risk of personal injury and/or being sent to jail, many of the gang members could be lured away from the gang by positive alternatives such as: a chance to learn a skill and obtain gainful employment.

The availability of cocaine and the ease with which it can be converted to "crack" has changed the route through which the gang obtains its income and as a direct result, the nature of the gangs response of offers of positive alternatives. By way of illustration, consider the following:
On an initial investment of $2,500.00 worth of cocaine and using two readily available household chemicals, $10,000.00 worth of "crack" can be produced. In areas of high demand it is not unusual for a gang to "turn over" (increase the profit on) its initial investment by a factor of four. Therefore, the $10,000.00 worth of crack becomes $40,000.00 by the end of the day.

Typically the gang will employ one person to collect the money for the drugs, one person to deliver the drug to the buyer and two look outs/security men. Their pay can be as low as $50.00 per day each. Often a percentage is offered to the team for sales over a certain amount per day.

If the $200.00 per day cost of the team is deducted, the profit for the day would be $29,800.00. That's tax free money and continues seven days a week, three hundred and sixty five days a year.

In light of these facts, it becomes clearer why gangs resort to violence in disputes over the best sales areas and why the mere offer of a job at minimum wage does not readily deter a youth from this profitable enterprise.

Gang enterprise, justified through the gang system of values, incorporated into the gang structure, and embraced by the gang as an acceptable economic foundation for the gang society, will prove to be a monumental challenge for communities determined to eliminate the gang phenomenon.

11.28.2005

real?

Yet the drive for the real, as Zizek suggests, always culminates in its opposite:
theatrical spectacle. Why? Because the real is only able to be sustained if we
fictionalize it.[2] To look for the real, then, is not to look for it directly: it
is to look to our fictions, discerning how realit y is "transfunctionalized"
through them.

frags.

Según el Center for Internacional Policy los precios son los mismos desde
hace 18 meses, aproximadamente 180 dólares por gramo. Frente a los problemas
de pureza, se sabe también que entre más menudeada, más impura la cocaína,
es la plusvalía del jíbaro, un fenómeno común en todo el mundo.


se mantienen o aumentan los niveles de exportación hasta las 800 toneladas,
según algunos analistas, por lo que sería lógica la incautación anual de
cerca de 170 toneladas este año, producto de las delaciones y de los “cruces
mal hechos”. Solo los Estados Unidos consumen 285 toneladas al año, según la
INTERPOL Colombia produjo 440 toneladas de cocaína en el 2003, suficientes
para cubrir el consumo gringo anual y de sobra.

Y como explicar que en Europa también hayan crecido los decomisos y que el
precio de la cocaína este a la baja, 80 Euros en las calles de Barcelona,
en el país de mayor consumo en el viejo continente, lo que en la lógica
gringa significaría mayor disponibilidad. Algo anda mal con la
distribución espacial, las cifras y las “lógicas del mercado”.


La ley 30 de estupefacientes sirve para encerrar campesinos y a uno que otro
narcotraficante caído en desgracia. Para los agraciados se diseño la ley de
justicia y paz. No en vano en Colombia se dice: “detrás de cada ley hay un
nuevo gran negocio”.

www.prensarural.org

11.19.2005

lo que piensa una colombiana

no hay nada como mi colombia mi tierra linda sea con o sin guerrilleros.

yo lo que mas extraño de colombia son las rumbas en juanchito, la ropita,y obviamente la comidita ya que vivo españoles y desde que me vine no he podido comer todas esas cosas ricas de mi pais como empanaditas,papas rellenas,almojabanas,buñuelos,pandebono,chocolatico,y los snakies que es lo que mas extraño
haaaaaaaaaaaaaaaaaayyyyyyyyyyyyyyyyyyy que rico volver a comer todo esto verdad se nos vuelve la boquita agua bueno alguna vez las volveremos a probar lo siento por los colombianos resentidos y malos que ya no piensan volver a nuestra tierra linda pero bueno mejor siempre y cuando sigan mandando el dinerito para aya ya que asi nuestro pais se va a enriquecer gracias a todos nosotros.

bueno chaito y espero que algun dia estemos comiendo de nuevo todo lo que tanto extrañamos los quiero mucho


¡¡¡COLOMBIA ES LA PUTERIA!!!!!!!!!!!

por: lady · Mayo 25, 2005 12:40 PM

11.11.2005

hacol

falleció en la cárcel Bellavista por una sobredosis de ‘chamberlain’, licor que producen los internos.

10.12.2005

acerca de sonido e identidad (tecnologia)


On Oct 12, 2005, at 1:07 AM

_
_
_
_

Pregunta el SIT:

1. Que diferencia encuentras en la manera como se ha asumido la tecnología en nuestra comunidad con repecto a otras comunidades (ej: Los ayer´s usaron guitarras electricas, batería y bajo para hacer musica colombiana en los años 70)

R/yo vi a los ayer's tocar a mitad de los 80'as en mi colegio, ya eran viejos los ayers y tal vez la profesora que los invito a tocar en el dia del bazar quisiera creer que se apoyaba en ellos como ejemplo de banda que podria ayudarnos como "influencia" o modelos a definir nuevos rasgos musicales y artisticos...pero claro la presentacion de los ayers fue por nosotros menospreciada, como buenos esnobistas preferiamos oir tocar un cover de dreams (los clash o the cure) que esos hippies de ancon inspirados en la psicodelia...una lastima no haber tenido referencias suficientes para poder leer el uso que hacian de sus instrumentos. La comparacion entre los ayers versus dreams es interesante, nos dice que ambos solo hacian "covers" ya fuera de la cancion, de la formula musical o hasta del peinado y la pose de cierto musico....asi tambien Bajo Tierra por ejemplo inspirada en los clash o big audio dynamite (sampling)...extraña conexion esa con un movimiento punk ya acabado en Londres pero bien replicado y resucitado en narco medellin.

porque aun suena BigAudioDynamite en las emisoras de medellin? si ya no suena en ninguna otra parte?? porque son unos amarrados y no compran musica en las emisoras o porque verdaderamente hay un reflejo social y cultural en el uso de samples y las letras de las canciones?? yo me quedo con la primera opcion aunque me gustaria pensar que es la segunda.

Es dificil comparar "nuestra comunidad" con otras comunidades...en la musica electronica de la cual no soy experto esta claro que en colombia, paricularmente en medellin tenemos un gran vacio en referencias, y no hablo solo de sonidos o tecnologias sino de la historia de la practica misma, del hacer la musica electronica o mejor, del hacer la electronica musica. Yo para nada soy un defensor de la academica pero es claro que es un gran vacio en "nuestra comunidad", y dicho vacio que podria ser para bien, ya que permitiria, gracias a la libertad e ignorancia, la no-presencia de estructuras musicales de educacion formal pero si la mas abierta y fresca de las experimentaciones no formales...

lastimosamente eso ultimo poco se ve, o se oye. la mayoria (de lo poco que conosco de musica electronica hecha en colombia, se basa en casi los mismos sonidos, parches, samples y loops de lo que suena en el "underground" de limewire o cualquier otro p2p. como los ayers hicieron con los beatles, dreams hizo con the police, bajotierra con the clash, estados alterados con depeche mode x con mouse on mars, y con dj bobo y z con la misma pretencion esnobista con que se yo el sello pi del undergound holandes...blablabla.

entonces si hemos de seguir con los "esnobismos" y parte del ejercio se trata de comparar comunidades, aunque no este deacuerdo con esta linea pero por la salud de la respuesta propondria pensar en la "historia" del duo austricaco Farmers Manual http://web.fm/twiki-bin/view/Fmext quienes no limitan sus click a la modulacion de samples, no limitan el computador a solo el sonido sino que se expanden a imagen, web y comunidad...tal vez sea eso lo que pueda decir, creo que la musica electronica en "nuestro" contexto apenas empieza a ver el horizonte de la colaboracion, de la imbricacion dentro de una manifestacion que no solo puedan clasificar como artistica sino social, y claro no me refiero al Dj wannabe raver que socializa en el aleteo del deck o cualquier otra fiesta de hotel estil "after-party"....es comunidad eso a lo que seguramente jardin cosmico apunta...y no se trata solamente de otro *net-label que copia el modelo "net-label" ni de otro "home-made" CD sino de un evento como este del SIT que reuna a gente a pensar la relacion entre sonido e identidad (dejando de lado la tecnologia que nos es nada mas que un instrumento accidental en este caso y en la mayoria de sus apariciones)

si hemos de pensar tecnologia, debemos entonces considerar la economia a la que pertenece, de de ahi llegamo rapidamente a la conclusion de que obedesemos a ella. y que como muchos han escrito en otras partes, el boom de la musica electronica se debio tambien a una estrategia de mercado para vender mas computadores...ahi estaria definida otra mas de la razones que han afectado a "nuestros" jovenes.

otro vector que aparece al mirar el componente tecnologia, es el de las clasificaciones segun el hardware+software usado...desde los sonidos con el amiga ha los hacks de game boys pasando llegando al live coding de chuck o cualquiera de los miembros de toplap.org


2. Conoces algún proyecto de nuestra comunidad que tenga un acercamiento a la tecnología de manera particular y que pueda tener alguna repercusión internaciónal? (Ej: Luis Paz -Goes, Planetarica- diseño y contruyó un filtro analogo de altas especificaciones)



no aun. pienso en los delirios wagnerianos de juan ospina con Comportamiento y Salud...pero como no conosco lo del "filtro analogo de altas especificaciones" (suena algo asi como una herramienta usada por los espias ingleses liderados por turing en la segunda guerra mundial o tal vez por pablo escobar para mandar mensajes codificadas en sonido acerca de rutas y ordenes) me quedo corto en la respuesta...y ya que esta la palabra internacional, no sobra decir que internacional no significa un grammy, eso es lo peor que le puede pasar a un musico..es como ser bajado de categoria, ser descreditado.


3. De las tecnologías que conoces cual crees que es la que mas puede beneficiar el desarrollo de proyectos sonoros en los proximos años? (ej: la posibilidad de hacer trasmisión de conciertos en internet)


Como elemento sonoro y experimento social internet fue muy bien explorado en 1998 por colegas y amigos como Rasa, Raitis y la gente de Re-lab en Latvia (ver: www.rixc.lv) quienes hicieron comunidad y sonido a traves del delay producido por sus streams que viajaban alrededor del mundo..de austria y londres a riga a australia.

Si, internet, pero antes de ir a internet debemos practicar eso que se llama colaborar, y sin esperar nada a cambio (si eso es posible)

Despues de esto, cualquier tecnologia servira de disculpa y claro internet es la gran replicadora de redes, potencializa bien los efectos de una produccion.


4. Alguna experiencia en tu relación con la tecnología que quieras compartir con estas personas?



el movimiento de software libre es un buen lugar desde donde repensar ambas practicas, el hacer comunidad y el hacer musica-video-ruidos-paginas webs-experimentaciones-net.radios etc...

audacity
puredata
supercollider
chuck
fluxus
pawfal
toplap
piksel
dynebolic
muse
ogg

son algunas palabras que se me ocurre podrian dar referencias via google

se que hay muchas cosas por discutir y pues si se quiere para eso estan los blogs y sus casillas de comentarios.

/alej00d

10.09.2005

from flirian cramer on the Negroponte Enterprise

The European Media Lab was launched at the height
of the tech bubble but closed its doors in
January this year. Its output may disappoint the
Irish government, but it won't surprise anyone
familiar with the original MIT Media Lab.

[snip]

You left out the juicy bit:

| The institution was founded in the 1980s by Nicholas Negroponte
| as a way of relieving gullible corporations of their money. The
| haphazard and often whimsical "research" was scorned by real computer
| scientists, but succeeding in its goal of attracting attention from
| a gadget-happy mass media. Negroponte even funded his own tech porn
| publication: Wired magazine, to promote the utopian adventure.
|
| And they're still at it. This year we featured the Labs' Clocky - a
| shagpile-covered alarm clock that runs away from you.
|
| The only difference with MIT Media Lab Eire is that the taxpayer,
| rather than, private donors, were invited to sponsor the playpen.
|
| We can't improve on the Sunday Times description of the scandal,
| written by John Burns, which begins thus:
|
| "One of its biggest research projects was a sensor to read peoples
| minds. But MediaLab Europe (MLE), a project that cost the Irish
| taxpayer almost ¤40m, must have thought the Irish government was
| already telepathic. It refused to tell ministers how many people it
| employed, what they were paid, or to provide audited accounts."

This seems somewhat symptomatic for the whole so-called "new media" cyberkitsch,
and I wouldn't be too sad if these were the signs of its ultimate collapse and
vanishing. I wouldn't be surprised if in one or two decades, people will consider
"new media" retrofuturist camp, just as "cybernetics" before.

-F

10.06.2005

morocco - argelia border

this is the situation:

Since the past week, Moroccan Authorities are responsible of Sub-Saharan immigrants´s deportations to the Sahara Dessert, on Argelian territory. They don´t have into account any agreement to accept these deportations. Deported immigrants are in an arid zone with just arena, not town, not food, not water. There are declarations that report about eight deaths (one woman and two men) and a undetermined number of disappeared persons. Sub-Saharan´s original countries are numerous: Congo RCD, Costa de Marfil, Mali, Nigeria, Liberia, Camerun, Senegal, Guinea Bissau, Guinea Conakry, Congo, Brazzaville, Gambia, Niger, Somalia, Sudan etc...

We order:
* To the European Commission, Spanish Government and United Nations: the immediate research of these facts.
* To the Commissioned High of United Nations for Refugees: the protection and asylum to people that demand it in Moroccan territory.
* To the Moroccan Government the immediate engagement of these deportations and the respect to the human rights.
* To the Algerian Government to effect a international protest in front of these facts. They have to try protecting to these deported persons of possible negative repercussions.
* To the origin countries governments and embassies: research about these facts and defence of human rights of its citizens in Morocco.

we are looking for gps data to generate maps to hand to the people being deported:
this are the cities that serve as reference to where their are located, its important to keep in mind that all main roads are under surveillance and that water is fundamental. if anyone has information from this region please send it to funkzvv@gmail.com.



email sent to:
map_authors@yahoogroups.com

hola,

we looking for gps maps or data to generate them from the borderlands between morroco and algeria, around the cities of:

Figuid
Bechar
Bou Arfa
Er Rachidia


it will be use for humanitarian porpuses in this desert areas where hundreds of persons are being deported during the last week.

http://news.bbc.co.uk/2/hi/africa/4292840.stm and elsewhere

thanks in advance for any light on where or how to get references for the area...water or shelter and of course not only the main roads


/kdag

u'wa

Los U´wa habitan entre los 72° 32´ de longitud oeste y los 6° 30´ de latitud norte, en la Cordillera Oriental localizada en los Andes colombianos. Ocupan la región conocida como Sarare que abarca espacios de los departamentos de Arauca, Boyacá, Norte de Santander, Santander y Casanare. Dicha región se extiende desde las postrimerías de la Sierra Nevada del Cocuy y del Piedemonte Llanero hasta el Valle de Pamplona, en el norte. El asentamiento poblacional actual está localizado en la vertiente oriental de la Sierra Nevada del Cocuy-Güicán.

10.05.2005

ghandi

He practiced a method of protesting by civil
disobedience to fight the british. A part of the freedom movement was how to make salt on owr own, without depending on the british, and how to make cloth on owr own without depending on the imported mill cloth. These are good illustrations of how technology could enable people develop a culture. So we adopted that spirit and gave the call: let us weave our own code.

turistas de mierda o de chocolate?

Olsen said he preferred the term "space flight participant" to "space tourist."

"'Tourism' implies that anyone can just write a check and go up there. That's not what happened," he told AP.

9.30.2005

_Infiltration and Tactical Aesthetics_

_Infiltration and Tactical Aesthetics_
As an organization, the IAA is an exercise in tactical aesthetics - we use
the visual and rhetorical devices of sanctioned research organizations in
an elaborate performance aimed at infiltrating engineering culture. By
demonstrating technical competence, we earn the right to speak to
engineers not as activists or theorists, but rather as an "Institute" of
fellow travelers, indistinguishable in many respects from the research
organizations where our audience toils every day. Our projects are
presented as "research findings" at university lectures and technical
conferences, and are reported on in engineering journals and trade
publications. Our critique of engineering practice thus comes from within
engineering culture, and is given material weight by the production of
working artifacts.

While there is a long history of artists and social theorists questioning
relationships between technology and society, there is an equally long
history of engineers ignoring art and social theory. By acting as
engineers who address contentious political issues, we undermine the
normalized ambivalence that characterizes engineering practice. The works
thus act as Trojan horses, carrying our critique through the gates of
detachment that guard engineers against taking responsibility for the
products of their labor. In lieu of ambivalence, we offer the engineering
community the image of an "engaged engineering" that works diligently in
the service of freedom and human dignity, and takes responsibility for the
world it helps create.

Bergen Collab

From: alejo.duque@europeangraduateschool.net
Subject: Re: [pikselproject05] osc messages
Date: September 29, 2005 11:59:52 PM GMT+02:00
To: pikselproject05@drone.ws

On Sep 29, 2005, at 7:56 PM, JS wrote:

About the offline/online issue. I'm thinking that if the data is gathered offline, the best way to go would be to build a database with which we could interface. Especially, one of the things we'll have to do in any case is associate GPS positions with pre-filmed movie scenes shot at these locations, so we'll need a database anyway.


theres a need to build a RDMS, good point. it will make things easier to control even from the "magic carpet" if we decide to use it. but the less we do things offline the better IMHO in special in this relation between video keyframes to gps waypoints mentioned earlier.

If we are to do everything offline, better start thinking about a way to represent this database and to interface with it in Drone. OSC would then just be used to convert the data from k2o to this database. What should we use? MySQL? XMLRPC?

What do you guyz think?


anyway SQL is already present via gpsdrive; kismet works with gpsdrive as you guys very well know...k2o filters data in realtime...speed, altitude, direction..whatever we like to be melted with video, openGL, sound instruments, etc., but say also that clicking rec or any other camera button will create a waypoint we could ourselves tag -kapitalist, yuppies, punks, dog-run, etc-..this experimental interface has been built with pd+pidip but it only went till the point of overlaying gpsdata over video signal in realtime...no waypoints could be created interactively as far as i know, and it will be interesting to see at least an approach to realtime sensible data mapping...going off-line with this will be like imovie or final cut effects...nice simulations.

looking at the OSC bridges from kismet (or gpsdrive if there are) i tend to think its possible to be done in pd or, if drone if it gets firewire input and OSC is already inplemented(?) maybe we can do this in drone in a lively way. surely some things will be done offline, but the more we can do in realtime the better.

mis dos centavos,
/a

9.29.2005

utopia

This requires an enormous amount of voluntaristic
action and goodwill, resulting in productive processes which are in all likelyhood less competitive, unlike peer production.

9.28.2005

Como definir la filosofia occidental desde la perspectiva de la tecnologia?

Indian birch-bark canoes, to take another example, were faster and more maneuverable than any small European boat. In 1605 three laughing Indians in a canoe literally paddled circles around the lumbering dory paddled by traveler George Weymouth and seven other men. Despite official disapproval, the stunned British eagerly exchanged knives and guns for Indian canoes. Bigger European ships with sails were obviously better for long-distance travel along the shore. Indians got hold of them through trade and shipwreck, and trained themselves to be excellent sailors. By the time of the Pilgrims, a rising proportion of the shipping traffic along the New England coast was of indigenous origin and the English were fearful, Harvard historian Joyce E. Chaplin has argued, ''that Indians might get the upper hand."
Most important, the foreigners, coming from lands plagued by recurrent famine, were awed by Indian agriculture. Based on maize, which yields more grain per acre than any other cereal, it used sophisticated techniques that kept the land fertile in ways that Europeans had not seen. A 2003 commentary in the journal Science described the creation of maize as ''arguably man's first, and perhaps his greatest, feat of genetic engineering."
Even the Europeans' purported superiority in military technology was evanescent. The ''peeces" that Winslow thought the Wampanoag wanted, for example, were less than they seemed. To be sure, Indians were disconcerted by their first experiences with European guns: the explosion and smoke, the lack of a visible projectile. But the natives quickly learned that 16th-century matchlocks were fired by shoving a flaming fuse into an open pan of gunpowder, a process that took two or three minutes for every shot. In any case, most of the colonists were such dreadful shots, from lack of practice, that their muskets were little more than noisemakers.
By contrast, Indian longbows were fearsomely fast and precise--''far better than the average musket of the Plymouth colonists in rapidity and accuracy of fire," according to the noted arms scholar Harold L. Peterson. Wielded by people who had practiced archery since childhood, they could shoot 10 arrows a minute and were accurate up to 200 yards. To the dismay of colonists at Jamestown in 1607, a Powhatan Indian sank an arrow a foot deep into a target the Europeans thought impervious to an arrow shot--''which was strange," Jamestown council president George Percy observed, ''being that a Pistoll could not pierce it."
Similar stories played out across the hemisphere. Schoolchildren still learn that superior European technology let Francisco Pizarro and a force of 168 Spaniards conquer the Inca in 1532. Pizarro, textbooks say, had two advantages: steel (swords and armor, rifles and cannons) and horses. (Geographer Jared Diamond, in his 1994 bestseller ''Guns, Germs, and Steel," echoes this point.) The Indians had no steel weapons and no animals to ride (llamas are too small). They also lacked the wheel and the arch. With such inferior technology, the Inca had no chance. ''What could [the Inca] offer against this armory?" asked John Hemming, author of a fine history of the conquest. ''They were still fighting in the bronze age."

9.27.2005

acerca de la instalacion en Bergen


Whether they frustrate or resist the structure that is imposed is not important here. It is the possibility that meaning can be produced at a tactical level, even when a strategic position is denied, that is key. In the case of an imposed structure of spaces – a mathematical description of all possible spaces – it appears that locative media operates at this level of resistance. It starts to take shape as a tactical media: the [murmur] project, for example, has annotated sites in several Canadian cities often overlooked in officially sanctioned histories. Adopting the convention of the ‘commemorative plaque’, spoken word recordings are delivered to mobile phones to provide a commentary on specific locations which are described and located within an established representation of physical space – these are known locations within the scope of street maps....

http://murmurvancouver.ca/



from utangete:


...the most interesting and probably the most urgent thing is to conduct singular and transversal investigations on the margins of these majority formations, to see how people are reacting, innovating, resisting and fleeing.

The goal, then, is to map out the majority models of self and group within each of the emerging continental systems, to see how they function within the megamachines of production and conquest – and at the same time, to cross the normative borders they put into effect, in order to trace microcartographies of difference, dissent, deviance and refusal. For that, it's necessary to travel and to collaborate, to invent concepts and also set-ups, ways of working. One tactic is to juxtapose sociological arguments with activist inventions and artistic experiments. Another is to crisscross the languages, and even better, the families of languages, and to reside in the gaps between their truth claims and sensoriums. But still another is just to drift and see what happens. The ideas of Felix Guattari, particularly in Chaosmosis and the untranslated study, Cartographies schizoanalytiques, can provide a kind of crazy compass for these attempts to articulate something subjectively and collectively, outside the existing frames.

9.26.2005

network

The contemporary basemap references the city as a collection of static landmarks defined by their official boundaries and Cartesian coordinates. However, the city is an enormously dynamic mechanism, which incorporates variable patterns of movement, occupation, and density. The fluctuating nature of wireless networks reinforces these dynamics, while simultaneously calling into question the traditional boundaries of the physical infrastructure. As we develop strategies for creating collaborative maps, using locative media, we must also develop a cartographic language that is well suited to plotting the temporal qualities of this evolving landscape. By visualizing the city through this broader notion of mapping, we have the opportunity to see the landscape in new ways, ultimately becoming aware of the changing practices that inform our notion of place.

___


"Space is a practiced place" [1] - Michel de Certeau

Digital networks and wireless technologies are radically reforming the contemporary notions of urban place. As network technologies move away from their hardwired roots, they are activating an urban dynamic that is no longer based on referencing static landmarks, but on a notion of the city in which spatial references become events. These developments imply a changing pattern of urban reference in which invisible boundaries of connectivity alternately thicken or marginalize the urban territories they overlay.


___

Lately, these unsettled debates over how to think about networks have affected major writings about where societies as a whole may be headed. Consider, for example, this treatment in Francis Fukuyama's The Great Disruption (1999), which does not view networks as a distinctive form of organization that is newly on the rise:

"If we understand a network not as a type of formal organization, but as social capital, we will have much better insight into what a network's economic function really is. By this view, a network is a moral relationship of trust: A network is a group of individual agents who share informal norms or values beyond those necessary for ordinary market transactions. The norms and values encompassed under this definition can extend from the simple norm of reciprocity shared between two friends to the complex value systems created by organized religions" (Fukuyama, 1999, p. 199, italics in original).
This is different from the view espoused by Manuel Castells in The Rise of the Network Society (1996). He recognizes, in a manner not unlike Fukuyama, the importance that values and norms play in the performance of networks and other forms of organization. Yet, his deeper point is that networks are spreading and gaining strength as a distinct form of organization:

"Our exploration of emergent social structures across domains of human activity and experience leads to an overarching conclusion: as a historical trend, dominant functions and processes in the information age are increasingly organized around networks. Networks constitute the new social morphology of our societies ... While the networking form of social organization has existed in other times and spaces, the new information technology paradigm provides the material basis for its pervasive expansion throughout the entire social structure" (Castells, 1996, p. 469).
Fukuyama's view reflects mainly the social network approach to analysis, Castells's the organizational approach - and his view is more tied to the influence of the information revolution. Our own view is decidedly in the latter camp (Arquilla and Ronfeldt, 1996, 2000; Ronfeldt, 1992, 1996); but that is not the main point here. The point is that these debates are far from settled; they will persist for years. Meanwhile, where netwar is the object of concern - as in assessing the degree to which an adversary is or is not a netwar actor, and how well it is designed for particular strategies and tactics - the analyst should be steeped in the organizational as much as the social approach. Organizational design is the decisive factor (even when the actors are individuals).

Against this backdrop, good progress at network analysis is being made by anthropologists, sociologists, and political scientists who are studying the growing roles of organizational networks in social movements. Their definitions of "network" have not always improved on prior ones. For example, a pathbreaking study of transnational advocacy movements (Keck and Sikkink, 1998) defines networks rather vaguely as "forms of organization characterized by voluntary, reciprocal, and horizontal patterns of communication and exchange" (p. 8). But their full discussion considers all the organizational, doctrinal, technological, and social dynamics that an effective social movement - and netwar actor - requires.

An early study that pointed in this direction, by sociologist Luther Gerlach and anthropologist Virginia Hine, held that U.S. social movements in the 1960s amounted to "segmented, polycentric, ideologically integrated networks" (SPINs). According to Gerlach (1987, p. 115, based on Gerlach and Hine, 1970),

"By segmentary I mean that it is cellular, composed of many different groups... . By polycentric I mean that it has many different leaders or centers of direction... . By networked I mean that the segments and the leaders are integrated into reticulated systems or networks through various structural, personal, and ideological ties. Networks are usually unbounded and expanding... . This acronym [SPIN] helps us picture this organization as a fluid, dynamic, expanding one, spinning out into mainstream society."
The SPIN concept is rarely noticed by scholars who work on social or organizational networks, but it remains highly relevant to understanding the theory and practice of netwar - in many respects, the archetypal netwar design corresponds to a SPIN. While Gerlach (e.g., 1999) has focused mainly on environmental and other social movements in the United States, the SPIN concept illuminates dynamics being developed in various terrorist, criminal, ethnonationalist, and fundamentalist networks around the world.

9.17.2005

alej00 on the 81km limit

We are worst than a tipical tourist, we are Media Tourists

this idea of da "Media Tourist" is based on Tapio's text, is introduce here to make us aware of the danger we (drone+soup) face. ending on being nothing more than boring consumist people using fancy technologies. i guess we will agree on moving away from that, so lets try to face towards material that can either, by extreme similarity or by obsecene opposition, breaks the codes of any "touristic" experience of Bergen. (withouth loosing reference to the capitalistic infection of the tourist).
as said on a previous post and in chat2 we have to be also aware of not making up "another" data representation installation...nowadays this is as boring as once so called "interactive" art..

in the blend of the words tourist + agent i dont see what js says: "A tourist IS an agent". If we stick to that wikipedia definition of agent that says that for an agent its ontological commitments are clear... this will then be far from the signs and adverts that moves the superficial wills and convictions of the "tourist". Of course we can call this vageness an ontological drive but it will never have an strong commitment as the agent definition declares making it differ and creating a contradiction in terms, since the tourist is just guided by a whim and the agent has a clear ontological agenda. So far so good as a Title for an exploration. Travel Agent deals also with the "guided tour" idea to which we sing as festival travellers. As "Media Tourists"

being a tourist is to pay to temporarily avoid our own ethics (those related to the territoire where we "belong"), a tourist evades his place and moves 81kmts* to the margins in an attemp to discover the "other" and to report back with videos, photos, emails and postcards as if s/he where out to conquer the world throught repetitively mediatized material.

*(i think it should be one kmt. more than the 80km limit range defined by the World Tourism Organization:)... a possible title/idea to follow. it makes one think about the things we could find at exactly 81kmts outside from the place where the installation should be presented....we could work on a site specific installation 81km away from the center where its should be located. then we can play/use all our gizmos to present it inside of the gallery.

we agree on the Tourist as a departing concept to explore but seems that our perspectives digress, theres no interest in using the "biometrics" of real tourists consuming Bergen. sincerely as i tried to explain in chat2, i think that even tought we should examine the psychology of the "tourist" we know now from our first hand experience that either you sign to make the guided tour or you allow yourself to get lost and follow your instinct.

if we follow the first one is very likely we will end up at queus in macdonals and museusm, follow the tourists in paris..or even bergen..

how to elaborate on the idea of all of us being nothing more than tourists in todays world..sold on t.v as a lastminute trip. when we think we belong to a place, more than anything or anyone we end up awaken by kids that do appropiatte the same city and corners in a much more sincere or to the core way...or even a tourist can come from far to tell us about how splendid is the view from a city tower we have never climb but gew up in gestalt with it.

another thing, how much do the people from Bergen like to have those tourists? phps as much as the switz enjoy the money that jews or indians bring to the economy, and they allow them to make all those stupid questions about yodeling and fondue just because at the end they have the sure conviction they will leave the country in few days. what does a tourist conquer? the answer is clear in godards carabiniers.

about the technical side: i dont want to fall into it to much til we get some conceptual ground where to stand. i hope that we get some input from the other people potentialy involved in this project. since we do need a 3rd perspective to move on.

about the database narrative of lev manovich's soft cinema: it's very exiting in terms of the conceptual uses of metadata to trace the indexes that they (the programmers) use for building his piece. but in terms of user/reader/viewer experience is not exciting at all (personal experience). it misses the point IMHO, to bridge concept and formalization in the piece.

9.02.2005

Neanderthal

"Yet the evidence is here that modern humans could cope with cold conditions better than the Neanderthals thanks to culture and technology, for instance with better clothing, better fire control and perhaps better shelters."

readme de .tb

Hacktivismo's .tb .tb is a portable, Live(-CD) Linux Operating System. The goal consists of creating a secure-by-default, trusted Internet communication-and connectivity platform with anonymized connections, and secured storage, out of the box, on top of a portable OS, supporting a maximum of diverse hardware and media. It can be compiled entirely from sources (and hence, entirely customized, if you want) for reasons of peer-review and trust, hence the name Trusted Build -- .tb. Trusted Builds Trusted organizations like Hacktivismo, but also other independents, like EFF, human rights groups, and organizations who wish to prepare a build for their own target group can offer binary Trusted Builds, LiveCD ISOs, by running the INSTALL script and using the TBuild folder and gentoo sources downloaded from the net. If you build from sources, you basically copy and paste the contents from the "INSTALL" file to a Linux shell. The copy and paste is ONLY necessary because the script contains 'chroot' parts, which are not easy to automate, and because supervision of the build process is recommended (not necessary). Besides that, it is as easy as running a normal script. If you need a MAC version, you must build on a MAC Linux, if you want a PC version, on a x86 Linux. One may hand-edit the INSTALL file and TBase files to change things, e.g. the default CD-Encryption passphrase ("freedom") or the default login/password ("user"/"hacktivismo"). The building from source is the difficulty level of Admin, i.e. any Linux system administrator can handle this, and the trust of something you built from sources is maximum. Using a Trusted Build (binary LiveCD .ISO), created by an organization, requires no skill or prior notice, and the trust for end-users is how much they trust the party who made the binary build. To make this easy and secure, Hacktivismo .tb was based on the popular Gentoo Linux distribution, since it can entirely be created from source with simple instructions, and because Gentoo supports many different CPU architectures in builds from scratch. As an extra bonus, a Gentoo-based build takes away maintenance and update costs away from Hacktivismo .tb itself, since any new Hacktivismo .tb build uses the very latest stable Gentoo and other Open-Source packages, and Gentoo is maintained by hundreds of contributors and always up-to-date, including dedicated handling for security alerts and updates. Easily built from scratch So, .tb comes also as a readymade bootable CD/System-Image for end-users with practically no prior technical knowledge. But the complete way of creating Hacktivismo .tb is based on a 5-stage copy-paste INSTALL script, and this will be done exclusively from common sources available from Gentoo servers, and a small Configuration Package (TBuilder/TBase) from Hacktivismo that customizes them to become .tb. To create it from scratch according to the INSTALL script, you just need a Linux account of your choice (on the same CPU architecture you want to create it for), about 36 hours of compilation, 2GByte free space and about 500 MBytes of installation traffic, and perparation time, 98% of which requires no interaction, just CPU, HD, and network resources. Current Packages And Features The size goal of Hacktivismo .tb is to stay under 600Mbytes, yet always be fully customizable and compilable from source (today, no other Live-CD Linux distribution can be hand-compiled or customized from scratch!). It right away boots into X11 with the simplistic Fluxbox window manager, and comes with: Browser - Firefox and Lynx Mail - Sylpheed-Claws Filesharing - MLDonkey (supports all popular filesharing protocols, w/ GUI) Crypto - GPG for PGP crypto (and the full Linux crypto API) Terminal/Modem - Minicom (and PPPD, PPPOED) Secure Chat - SILC and Naim Editors - vim, xpdf and ted (office-like rich-text-format editor) Also, Hacktivismo .tb contains a kudzu-based hardware auto-configuration system, and supports, detects and activates most common devices automatically. This includes automatically activating the network, if DHCP is available. For further required network-, system-, and media-mounting configuration, a streamlined, extremely easy to use, configuration GUI is planned for Hacktivismo .tb. A related essential TODO is, for whenever a storage medium such as a USB stick is available, to save the modified user information from the home directory such as browser settings, mail settings and emails, private keys, and personal files, securely encrypted on that external (e.g. USB) medium in a user-friendly dialogue. Common media and encryption are already supported. Crypto by default Our goal of maximum privacy includes, that every communication made through the system, is by default encrypted and/or anonymized. To achieve this, we currently build on the Onion Routing project (tor). A tor-proxy is run by default and interacts with privoxy for anonymized HTTP sessions and dante for anonymized SOCKS5 sessions through which all generic TCP applications are tunneled, while all HTTP/SOCKS5 traffic passes through the TOR node. In the GUI menu of the X environment, all applications by default will tunnel through TOR via HTTP or SOCKS5 (socksify) for anonymization. Nobody can figure out who you're talking to, or what you're actually saying when doing this. We chose TOR as an encrypted anonymizing and traffic remixing service over e.g. Freenet or Six/Four because it 1) has already deployed a reliable (test-) infrastructure, similar to the MixMaster remailers, and 2) works very reliably as a transparent tunnel without configuration overhead, 3) and even with NAT. NOTE: TOR may be functional, but is still under development. There is no real guarantee of its full anonymity/privacy features yet. The important key concept is that we tunnel traffic by default over an Anonymizing Infrastructure, and that this stands. We may wait for TOR to mature, or find a generic solution based on Freenet, Java AnonProxy, Ciphire, or a Six/Four successor. Tailormade for extreme scenarios When created fully according to the instructions, Hacktivismo .tb comes as an encrypted CD ISO image with only a small boot loader section in plain text. Everyone who creates a Hacktivismo .tb from scratch can chose his own passphrase. Thereforce, in countries where the sole posession of Hacktivismo .tb may be dangerous, far less can be proven: if one does not know the start-up passphrase, the Live CD will remain 99% unreadable. Hacktivismo .tb recognizes the need to be very stealthy. Since it is a Live-CD, the filesystem is mirrored in RAM, and changes and new data are only written to memory, never to disk. And, for example, the default REBOOT menu button will restart the system within at least the next 5 seconds when pressed, removing all compromising information from memory. A future goal is to start off that Live System not just by booting it as a CD, but by launching directly into the downloaded image from Windows. This could already be done simply by VMware, but we want it working in really all situations. We may download the CD image and a launcher application in a format that the 'debug.com' from Windows translates back into binary, in case that executable download is not permitted. The launcher, probably similar to the old-fashioned 'LoadLin' might read the image in memory and soft-restart the machine into the Hacktivismo .tb operating system. Our work regarding user protection in extreme scenarios is and will always be an ongoing effort, and we are always up to feedback and individual requirements and experiences in this area. Team Hacktivismo

9.01.2005

fur piksel et al

We live in a world overly contaminated. Both material and inmaterial waste, remnants of human activities, toxic and poisonous imperialistic images flowing through mainstream media as: texts, sounds, videos electronically paired via metadata indexes; and every computer in the network feeding this manic vortex ad-infinitum.

Jean Baudrillard called out for a halt, a "stop!" for the production of more images, more "content", in an attempt to eventually find a way to rethink ourselves again.

Along the same lines we will like to ask if sometimes we reach a similar level in the universe of open source programming, particulary the scale of LiveCD's has proved that the offer surpases by far the demand and even the needs of a certain group of users. Becoming hermetic tools used only by their developers.

We believe that the act of trimming down and making simplified tools to develop precise and specific tasks might be the way to find in this very structure the sense for insurgent programming. And the adoption of this tools ba a wider audience.

But, is there a reason for stopping programmers from developing "new" applications? we tend to think that to call their attention at least, to force a pause from witch they rethink their many times loose efforts could be somehow a sane act. At least to re aim the targets and save the bullets, specially when artisticly driven programmers are so few and amunitions run low so fast.

What about concetrating efforts on instead of the development of "new" things, programming could be building bridges between many of those great software dispositivs that pre-exist. So to make our weapons more precise and stronger? There is no question about the fact that every programmer checks first what is out there before beginning, an economical attitude that could save menthal energy and phisical efforts to the task. Is his/her desition to embark in beginning from scratch, a desition based on a complex judgement of quality, originality, usability or simply another everyday egotistical selfish human act.

We think that in this very economical attemp a programmer that works for an artistic goal should invest his efforts on imbricating his work within the pre-existing world of applications.

We tend to think that in the realm of artistic production there might not be a need for new applications but a need for a creative enterprise that situates many of those pieces of software already written/growing out there in the Open Sorce universe. A process in witch one can trace that what holds together the artistic practices we work for in the less of the institutionalized ways.

"Expect the output of every program to become the input to another, as yet unknown, program". (basic unix principle)

8.08.2005

offshoring a festival

|001emdaer| exiled dispositiv towards a collaborative social deportment by:alejandro duque




Outsourcing [Illegal] Information Traffic
.a call for software and ideas.


-this project aims to motivate the inspiration of young programmers,
hackers, crackers. all kinds of computer users in south america.
-for it we will be opening a contest [OIIT] that will give prizes to 2
ideas (let them be viable in practical computer terms as software -code-
or as literary inspiration in the lineage of the "fantastic reality"
literature, in reference not to that what is fantastic and far from
real, but to what is inspired in reality and appears fantastic.
-it will be the way to create a festival outside of a
festival(readme100 offshoring and nourishing far from its statements,
beyond its basic propositions), if elected, we will use the money
(500euros) to set up an open call in the L.U.G's (linux user groups)
mailing lists and support the free software agents in far away continents.
-We will document and edit a text (article) that will reflect the
potentialities and drives towards "insurgent" practices, those that
intrinsically belong to the essence of network and collide interestingly
in a country with a renowned infamous tradition on trafficking and
smuggling: Colombia (we will pay close attention to trace ideas related
with electronic borders, demilitarized zones and servers, i.p's black
holes, replicators, virtual tunnels, etc.)

The result of this feedback research will serve to address the following
question:
How can networking be a more than magical way for crossing natural wisdoms?

Some part of South America faces its sell-out signing a treaty called
TCL, (Tratado de Libre Comercio) Peru, Ecuador, Colombia and the U.S.A.
This countries are basically forced to agree in points that will allow
genetical apropiation and exploitation by North American corporations.
Via the patenting figure they (U.S.A) will steal the basic wisdoms of
ancient cultures. It's not only about drugs, but about plants, animals
and perhaps even water resources. This is anyway old news since its been
taking place since the encounter of pre-colombian cultures with the
Spanish colonizers some 500 years ago.

iIlegality raises the price of drugs, so in the particular case of
cocaine its better to keep them illegal and avoid talking about them in
these TCL treaty, but ironically drugs are the one produce that
represents more income to both parts is not a topic to be consider in
the tables that define the conditions for this treaty.


alejo duque (kolumbien)
"politics of friendship" as a guideline for the logic behind smuggling
goods and ideas. research for a PhD dissertation at www.egs.edu. what
resourceful minds can do to all kinds of new or old
technical/conceptual/devices. ("good" examples are found under criminal
records and drug trafficking techniques). networking and collaborating
with programmers trying to develop a way to interface place, location
and trajectory with audiovisual representations...so called "real-time
mapping":


urls:


http://co.lab.cohete.net/index.htm (and all the embedded links) +:
http://free.freespeech.org/10ochokpies/MathurinMilan/ways.html
http://co.lab.cohete.net/OPENSur/index.html
http://locative.net/blog/mixreality/archives/15#comment-19 (in process)
http://www.dorkbot.org/dorkbotmde/

alicia

Down, down, down. Would the fall never come to an end? "I wonder how many miles I've fallen by this time?" she said aloud. "I must be getting somewhere near the centre of the earth. Let me see: that would be four thousand miles down, I think-" (for, you see, Alice had learnt several things of this sort in her lessons in the school-room, and though this was not a very good opportunity for showing off her knowledge, as there was no one to listen to her, still it was good practice to say it over) "-- yes that's about the right distance -- but then I wonder what Latitude or Longitude I've got to?" (Alice had not the slightest idea what Latitude was, or Longitude either, but she thought they were nice grand words to say.)

7.25.2005

borges

Jorge Luis Borges ya aseguraba que era posible imaginar un mundo sin espacio, pero no un mundo sin tiempo.

7.12.2005

o como exportar la explotacion

Offshoring can be defined as relocation of business processes (including production/manufacturing) to a lower cost location, usually overseas.

Offshoring can be seen in the context of either production offshoring or services offshoring. After its accession to the WTO, China emerged as a prominent destination for production offshoring. After technical progress in telecomunnications improved the possibilities of trade in services, India is a country that tries to focus on this domain.

que es lo real en la realidad fantastica

como bien se sabe la realidad fantastica no es algo que se da de la fantasia sino de la realidad misma cuando se hace imposible de comprender...

en el terreno de la realidad mixta, de la realidad aumentada, o de la realidad virtual el papel que juega la realidad fantastica es para el arte la via hacia una experiencia del ser en dichos ambientes.

como entonces mirar hacia el componente real de la "realidad fantastica" latinoamericana para inspirar esos cruces de realidades biotecnologicas?

7.11.2005

OSC no OSCC (la comunidad que no viene)

k2o=>QtVr )) ??

acerca de los niveles de señal de las tarjetas wireless

dragorn: for kismet to get signal levels the drivers have to include a per-frame signal header before the 802.11 frame
dragorn: to the best of my knowledge, the bcom binary drivers in the wrt don't.
alcazam: can you point me at the relevant code in your source ?
dragorn: I know they don't in managed+rfmon
dragorn: pcapsource.cc
dragorn: it's all in there. wrt is a mix of inheritance of a few things though.
alcazam: thanks
dragorn: pulling it from the OS layer isn't very reliable at all
nevola: but the readme file says that wrt54 is supported :?
dragorn: sure
alcazam: so is it the new version wrt or the previous as well
dragorn: doesn't mean signal levels are, however
dragorn: no version I've ever seen supports per-frame signal levels
dragorn: I have no code to handle per frame signal levels on the wrt, in any case, so if it doesn't send them exactly the same way as other drivers, it'll come out as complete garbage
dragorn: Many drivers don't report signal levels
***: Zero_Chaos (ujrbltd@68-71-34-255.pittpa.adelphia.net) has joined the channel
dragorn: Signal levels in rfmon are, in a large part, crap anyhow
alcazam: oh ,i see
dragorn: which is part of why I don't consider not having signal levels really critical
***: halcazar has quit IRC (Read error: 110 (Connection timed out))
***: halcazar (~newmail@208.138.23.114) has joined the channel
halcazar: is the info on the header (signal level) available?
dragorn: there is no signal level header on wrt.
dragorn: that i've ever seen anyhow
halcazar: yes, i mean for other hardware/drivers
dragorn: yes, they're all documented in various places. I don't know of any single central repository
halcazar: thanks man, you have cleared the darkness for me!
dragorn: google, ethereal, or the kismet source has some info
dragorn: though I don't try to document all the options as much as just use them
halcazar: there is a musatcha site that says they have windows software that works with wrt but i cant get signal streghth with it either
alejoo: dragorn do u know if the ipw2100 reports signal levels in kismet?
dragorn: alejoo: not 1.0.4
alejoo: (
dragorn: alejoo: if you dig around on the mailing list archives for 2100 you can find a prism2avs header patch
dragorn: which gives a fair amount of info and some signal levels
alejoo: k, merci
dragorn: I don't believe full stats will happen until the kernel gets standard signal headers
dragorn: which is hopefully in the works

7.10.2005

acerca de un post...hacker ethic



Aputsiaq Janussen escribio unos comentarios acerca de la etica hacker, aca pego unos apartes del email plus los links a algunas de las referencias...como este blog pretende no dar creditos a nadie hago la exepcion de dejar el nombre de Janussen ya que en mi opinion el tb hace las veces del Dj. en este post hago un test de como insertar una imagen. salud!



THE HACKER ETHIC
================

Ethic is about right and wrong, good and bad; it has to do with
character, it has to do with codes and principles for behaviour. The
hacker ethic, then, is about the hacker‚s conceptions of right and
wrong, about ethical hacker‚s character-traits, their codes and
principles of behaviour. In order to present any account of the hacker
ethic, we need to know what a hacker is.

'hack' is:


1. an article or project without constructive end;

2. work undertaken on bad self-advice;

3. an entropy booster;

4. to produce, or attempt to produce, a hack.


- you don‚t have to associate hackers with computers - you can hack in any
medium; i.e. you can hack philosophy, hack physics, hack driving cars,
hack while eating Chinese food (as for example: a famous hacker once
managed to eat with 6 chopsticks at once).


The hacker ethic argues that:

1. Freedom weighs more than money.

2. Hacking irrational, unjust systems can turn them into rational,
just systems.

3. Inclusive networks are more efficient than excluding networks.

http://ocw.mit.edu/
http://catb.org/jargon/html/index.html
http://tmrc.mit.edu/

los usuarios anteriores no deben restringir las capacidades de los presentes usuarios

"previous users should not restrict present users capabilities"

esta cita deberia estar escrita en casi todos los lugares y objetos que usamos a diario, desde el inodoro hasta el lapicero. aplica especialmente bien al uso de la tecnologia y a ello se debe su aparicion. pretende dar todas las libertades en lugar de llenar de reglas y restricciones referentes al uso de determinado equipo o instrumento.