User account

Other Topics
The Architecture of Disaster
The Architecture of Disaster

Ines Weizman, Eyal Weizman

Before & After

History is increasingly presented as a series of catastrophes. The most common mode of this presentation is the before-and-after image—a juxtaposition of two photographs of the same place, at different times, before and after an event has taken its toll. Buildings seen intact in a “before” photograph have been destroyed in the one “after.” Neighborhoods bustling with activity in one image are in ruins or under a layer of foulwater in the next. Deforestations, contaminations, melting icebergs and drying rivers...
  • photography
  • History of photography
  • photographic images
  • war
  • forensic science
Arts
About ‘how we treat the others’

Artur Zmijewski

About ‘how we treat the others’

OPEN
ACCESS
DE
  • political aesthetics
  • National Socialism
  • concentration camp
  • propaganda
  • Poland
  • ethics
  • documenta
  • migration
  • gift
  • contemporary art
Born too late to see the war, too soon to forget it.
Born too late to see the war, too soon to forget it.

Reiner Schürmann

Origins

"This is a book about the power that a past War holds over a German growing up in the 1950s and 1960s: born too late to see that war and too early to forget it. The narrative shows how painfully public events — the shadows, rather, of events gone by — intrude upon a life and shape it. The English translation appears at a moment when most of the key issues have radically changed. Germany has signed what amounts to a...
  • 1968
  • memory
  • autobiography
  • emigration
  • homosexuality
Digital disrupture
Digital disrupture

Dieter Mersch

Digital Criticism

We really need an analysis of algorithmic conditions and their paradoxes and ambiguities that gives them an adequate framework and horizon. But instead we currently seem to be finding an algorithmic solution of the algorithmic, much as digital solutions are being offered for the problems of the digital public sphere, in the way that IT corporations, for example, use exclusively mathematical procedures to evaluate and delete “fake news,” inappropriate portrayals, or the violation of personal rights. This tends to result...
OPEN
ACCESS
DE
Discourse

Ute Holl

Dream, Clouds, Off, Exile

OPEN
ACCESS
  • monotheism
  • exile
  • Karl Marx
  • communism
  • film
Discourse
From xenolinguistics to cephalo­pods

From xenolinguistics to cephalo­pods

OPEN
ACCESS
  • communication media
  • communication
  • utopia
  • science fiction
  • linguistics
  • semiotics and semiology
The biggest bite out of the fruit of Knowledge
The biggest bite out of the fruit of Knowledge

Claus Pias (ed.)

Cybernetics

Although aspects of cybernetics can be traced back to various points in history, the proceedings of the so-called Macy Conferences, which have been edited for this volume, represent its modern foundational document. Held between 1946 and 1948 under the cumbersome title “Circular Causal and Feedback Mechanisms in Biological and Social Systems,” the papers delivered at these conferences were soon thereafter, at least as of 1949, referred to as contributions to cybernetics. Sponsored by the Josiah Macy, Jr. Foundation (which was...
  • epistemology
  • computational sciences
  • media theory
  • computer science
  • historic documents

 

We like !