Convolutional Network, 1993

In 1988, Yann LeCun joined the Adaptive Systems Research Department at AT&T Bell Laboratories in Holmdel, New Jersey, United States, headed by Lawrence D. Jackel, where he developed a number of new machine learning methods, such as a biologically inspired model of image recognition called Convolutional Neural Networks, the “Optimal Brain Damage” regularization methods, and the Graph Transformer Networks method, which he applied to handwriting recognition and OCR. The bank check recognition system that he helped develop was widely deployed by NCR and other companies, reading over 10% of all the checks in the US in the late 1990s and early 2000s. Today LeCun is director of Facebook AI Research in New York City.
(edited from Wikipedia)

More demos on LeCun’s website.

Oscilloscope party

“Tennis for Two was first introduced on October 18, 1958, at one of the Lab’s annual visitors’ days. Two people played the electronic tennis game with separate controllers that connected to an analog computer and used an oscilloscope for a screen. The game’s creator, William Higinbotham, was a nuclear physicist who lobbied for nuclear nonproliferation as the first chair of the Federation of American Scientists.”

Read more

Geoff Cox, from Speaking Code to algorithms


Geoff Cox discussing the ecology of algorithms at the occasion of the launch of the Cqrrelations website.

“What would algorithms say if they could speak? We could say the same of data of course. If it was allowed to speak what would it say about itself? It probably wouldn’t say it is raw and unmediated. It would obviously give us a lot of detail on these processes of mediation.”

Download and listen

Algorithms before computers

Algorithms before computers

“The only way you could formulate a complete rule (in premodern sensibility): you had to foresee the exceptions, it is both specific and supple. The habit doesn’t simply enforce the rule, it embodies it, just like this spearbearer statue embodies the canon of male beauty. More than that the habit’s discretion is not supplementary to the rule, it is part of the rule. It is the leaden ruler that adjusts the straight iron ruler to the curves of the individual case.”

Watch Lorraine Daston on Algorithms before Computers(more…)

The Variability of Vision

LATE IN 1967 a book was published in England which is as charming as it must be fascinating to all who are interested in the theory and practice of interpretation. Its principal author is the Dutch naturalist and ethologist Niko Tinbergen, who combined with a friend and artist to photograph the tracks left in the sand of the dunes by a variety of creatures and to reconstruct the stories they reveal in word and in image. The illustration I selected (Figure 1) shows the tracks of an oyster catcher peacefully walking along over the dunes till something apparently alarmed it, the walk turned into a hop, leaving deeper imprints in the sand, and it took off on its wings. This is not all the naturalists could infer from the configuration of the sand. They know that a bird cannot take off except precisely against the wind. At the time of the event, therefore, the wind must have blown from the left of the picture. But if you observe the ripples of the sand, they were formed by a wind coming from the direction of the camera. Accordingly, the tracks correctly interpreted reveal another story of the past: there was a change of wind between the formation of the ripples and that of the footprints. Not all of the picture illustrated is a photograph. What the artist has done is to superimpose on it his reconstruction of the oyster catcher taking off. This is how it appears to his mind’s eye and how, he is sure, it would have looked to the camera if one had been present at the moment.

E. H. Gombrich, The Evidence of Images: I The Variability of Vision C.S. Singleton (ed), Interpretation: Theory and Practice, 1969, pp.35-68
[Trapp no.1969C.1]

Upside-down inversion goggles experiments

Living In A Reversed World documents an experiment by Erismann & Kohler during which the subjects were required to wear goggles transforming their perception, between six to 124 days. The film is narrated by James J. Gibson.
More on the experiment: http://www.awz.uni-wuerzburg.de/en/archive/film_photo_and_tone_archives/video_documents/th_erismann_ikohler

Every contact leaves a trace.

Both questioned document examination and computer forensics belong to a branch of forensic science known as “trace evidence,” which owes its existence to the work of the French investigator Edmond Locard. Locard’s famous Exchange Principle may be glossed as follows: “a cross-transfer of evidence takes place whenever a criminal comes into contact with a victim, an object, or a crime scene.” Locard, a professed admirer of Arthur Conan Doyle who worked out of a police laboratory in Lyons until his death in 1966, pioneered the study of hair, fibers, soil, glass, paint, and other small things forgotten, primarily through microscopic means. His life’s work is the cornerstone of the stark dictum underlying contemporary forensic science: “Every contact leaves a trace.” This is more, not less, true in the delicate reaches of computer systems. Much hacker and cracker lore is given over to the problem of covering one’s “footsteps” when operating on a system uninvited; conversely, computer security often involves uncovering traces of suspicious activity inadvertently left behind in logs and system records.
[…]
Marcos Novak asserts the following, for example: “Everything that is written and transmitted via electronic media is erasable and ephemeral unless stored or reinscribed (emphasis added).” My contention would be that the subordinating conjunction “unless” is called upon to do a great deal of unrealistic work. Practically speaking, most things that are written and transmitted via electronic media are stored and reinscribed. A simple e-mail message may leave a copy of itself on a half a dozen different servers and routers on the way to its destination, with the potential for further proliferation via mirrors and automated backup systems at each site. As storage costs continue to plummet, the trend will no doubt be to save more and more data so that the variety of ephemera routinely written to disk becomes ever more granular. Likewise, even the popular myth that RAM is always absolutely volatile, gone forever at the flip of a switch, proves false; there are at least experimental techniques for recovering data from RAM semiconductor memory. While it may be technically possible to create the conditions in which electronic writing can subsist without inscription and therefore vanish without a trace, those conditions are not the medium’s norm but the special case, artificially induced by an expert with the resources, skill, and motive to defeat an expert investigator.

Mechanisms, New Media and the Forensic Imagination, Matthew G. Kirschenbaum.

Deep addressability

[…] deep addressability would allow for the identification not only of things with mass but also of relations between things. Once again, each letter in the sentence you are reading right now could have an address, but your act of reading of each one of them, those immaterial relations between two things, it and you, could be addressed as well, and from this graph and set traces proliferate and become techniques of a new geography. One can address both a discrete thing and the abstract reverberating envelope of relations around it that could extend toward infinity. Put differently, deep addressability includes not only discrete entities but also multiple levels of abstraction, as well as the traces of those entities and in turn the abstractions we hold for those — not just addressable nouns but addressable verbs, events, and allegories. While it’s unlikely that I could exhaust 1028 addresses for familiar physical things over the course of my life span, I could easily exhaust that many relations of relations of relations of relations. I could spend all my addresses in an instant of we were to extend relationality all the way down into the abyss. The exhaustion of any full allocation of deep address exists therefore somewhere between never and instantaneously, and the measure of that vast middle ground is essential to the design brief of the Address layer of The Stack. Whereas the traditional Internet of Things situates a network of physical objects, the full Address layer would include all these but also concepts, events, procedures, and memes, addressable at a common level through a generic protocol. While there are real barriers to a global IPv6 implementation, some technological, others economic, and others political, we should assume that for The Stack, some platform for deep address will in time enumerate things and events at a similar or even more granular scale, giving way to disorienting associations between micro- and macrocosmos, linking, delinking, and blurring across natural scales.

The Stack, On Software and Sovereignty, Benjamin H. Bratton.

If all you have is duct tape, everything starts to look like a duct

From Perl, the first postmodern computer language, by the Practical Extraction and Reporting Language (Perl)‘s creator, Larry Wall.

“Or think about shell programming, and reductionism. How many times have we heard the mantra that a program should do one thing and do it well?

Well…Perl does one thing, and does it well. What it does well is to integrate all its features into one language. More importantly, it does this without making them all look like each other. Ducts shouldn’t look like girders, and girders shouldn’t look like ducts. Neither of those should look like water pipes, and it’s really important that water pipes not look like sewer pipes. Or smell like sewer pipes. Modernism says that we should make all these things look the same (and preferably invisible). Postmodernism says it’s okay for them to stick out, and to look different, because a duct ought to look like a duct, and a sewer pipe ought to look like a sewer pipe, and hammer ought to look like a hammer, and a telephone ought to look like either a telephone, or a Star Trek communicator. Things that are different should look different.

You’ve all heard the saying: If all you have is a hammer, everything starts to look like a nail. That’s actually a Modernistic saying. The postmodern version is: If all you have is duct tape, everything starts to look like a duct. Right. When’s the last time you used duct tape on a duct? “

Comparative Ways of Seeing

In the frame of Ways of Machine Seeing, a series of experiments in collaboration wit Geoff Cox on the the four episodes of the BBC documentary series Ways of Seeing. In this probe, the same algorithm runs an object detection script using two different training sets. For more information and more experiments, read the wiki page.