data feedback loop
user generated content into context

biotechnology-nature
how technologies as visualisation can define what is for exmaple a body a real body,nature.

ginger: misfits 
clothing

formation of software..allow and defines your freedom autonomy online

what if we do not have abody anymore
==travelling in space

https://www.gnu.org/philosophy/free-sw.en.html

With these freedoms, the users (both individually and collectively) control the program and what it does for them.  When users don't control the program, we call it a “nonfree” or “proprietary” program.  The nonfree program controls the users, and the developer controls the program; this makes the program  an instrument of unjust power. 
A program is free software if the program's users have the four essential freedoms: 
*The freedom to run the program as you wish,       for any purpose (freedom 0).
*The freedom to study how the program works, and change it so it       does your computing as you wish (freedom 1). Access to the source       code is a precondition for this.   
*The freedom to redistribute copies so you can help your neighbor       (freedom 2).   
*The freedom to distribute copies of your modified versions       to others (freedom 3).  By doing this you can give the whole       community a chance to benefit from your changes.       Access to the source code is a precondition for this.   
A program is free software if it gives users adequately all of these freedoms.  Otherwise, it is nonfree.  While we can distinguish various nonfree distribution schemes in terms of how far they fall short of being free, we consider them all equally unethical.

software archeology mathew kierchenbaum; 
https://mkirschenbaum.wordpress.com/2014/04/24/new-essay-what-is-digital-humanities-and-why-are-they-saying-such-terrible-things-about-it/

malesurpression techniques applied to free software exclusion. 

queering of operating system
cynical of maker-culture naieve engaged with production...problematic position (timelab gent) re-produce what is already out there. social fabric its interesting

the sockertable; gendered female against male and a less full team in percentage misrepresentation.

http://www.gdtoolbox.eu/toolbox/what-does-a-gender-equal-project-environmental-look-like/master-suppression-techniques/

                                Master Suppression Techniques                                                                   
Master suppression techniques (also known as domination  techniques) are conscious and unconscious strategies used to assume  power over others. The concept of master suppression techniques  originated with a social analysis based on theories of gender and power.  It asserts that women and men are valued differently and that men, as a  group, generally have a higher status and more power economically,  politically and socially than women do as a group. In other words, the  analysis suggests the existence of social superiority and subordination.
There are seven suppression techniques:
*Making invisible
*Ridicule
*Withholding information
*Double binding
*Heaping blame and putting to shame
*Objectifying
*Force and threats of force.
Norwegian professor and politician Berit Ås defined these master  suppression techniques. They were originally formulated based on studies  of how female politicians were treated in an environment dominated by  male norms.
Those who use master suppression techniques exploit an advantage or  position of power they hold to either put or keep other people at a  disadvantage. Master suppression techniques are often used in connection  with insults or harassment related to gender, sexual orientation,  ethnicity or disability.
Master suppression techniques can be used man-against-woman,  man-against-man, woman-against-woman and woman-against-man. They  restrict victims’ ability to influence their situations and limit their  options for action. Feelings of being stupid, being invisible, not being  allowed to think whatever you like, not being able to express yourself  or choose how you will look, and not being allowed to believe in your  own abilities make it difficult for victims to defend themselves. If we  are aware of such techniques, there is a greater chance that we will  recognise them, react to and deal with them effectively at their source.


queer table: play in a different way to protect your players; not democratising, humaizing he soccor table.

kinectSTL
makerware
libfreenect, openNI

http://www.nlm.nih.gov/research/visible/visible_human.html

kinect time of flight scanning
photogrammatry

sizeusa


blender

my mother was 
biometric architecture