On October 21, 2015 5:47:57 PM GMT+02:00, Carsten Agger
wrote:
>Ironically, the article you link to is behind a pay/login wall and I'm
>asked to choose if I want to "enter with Google+" or "Enter with
>Facebook".
>
>Another example of the encroaching colonization of the
dear Patrice,
On 12 October 2015 10:10:04 CEST, patrice wrote:
>The answer to this, dear Jaromil, is oeuf corse to simply 'do it' (the
>practical work on the ground and in the streets) - and not talk too
>much about it since it attracts all kinds of un-called for, time
Den 21-10-2015 kl. 17:15 skrev Jaromil:
<...>
I don't get what you mean, can you explain?
meanwhile:
http://ilmanifesto.info/maker-faire-alla-sapienza-violenta-carica-della-polizia-contro-gli-studenti/
protests escalated with 4 student arrests, 10 students armed
of which 2 with serious head
dear nettimers,
spot on the topic, in Rome's university La Sapienza yesterday researchers and
students were protesting with a peaceful sit-in... against the Maker Faire!
http://ilmanifesto.info/alla-sapienza-contestata-la-maker-faire-una-vetrina-per-il-business-sullinnovazione/
besides the fact
one of the many possible points of view:
http://www.artisopensource.net/network/artisopensource/2015/06/08/conflict-and-transgression/
together with the imagination for a new type of garden, we need a new
conception of gardner:
âit is hard to imagine which aspect these gardens
Nettimers,
My new essay in Aeon Magazine on 'The Gentrification of Hacking: How
yuppies hacked the hacker ethos' can be found here
[1]http://aeon.co/magazine/technology/how-yuppies-hacked-the-original-hacker-ethos/.
...
# distributed via nettime: no commercial use without permission
dear Brett,
your essay is brilliant and obvious at the same time. I did enjoy
reading it, but still feels like scratching the surface as it does not
dig into other historical examples of cultural gentrification.
It may go well along the read of Gambiarra by Felipe Fonseca
Hi all,
Johan Soderberg and I are writing this paper titled Repurposing the
hacker. Three temporalities of recuperation. We do adopt a deeper
historical framework while trying to understand how hacking has been
hacked, and try to answer a more general question on how to
analyze/avoid what