![]() ![]() They sometimes are revealed in his reinterpretations, converted through various lit-erary tropes and schemes involving language, translation, wordplay and punning, or caught up in the frictions between image and narrative to produce a transitioning rhythm of historical narrative. The observation per-spective in Musquiqui Chihying’s work seems to originate from humorous encounters, from which the artist develops intriguing games. If we were to understand Jeet Kune Do as three steps – observation, reaction and action – “observation” would be the very first step that triggers a subsequent series of events. Collecting more Black facial recognition data is simply not the solution to the problem of discrimination as the original design and application could instead become a weapon that aids racial discrimination.(1) Perhaps, to deconstruct technological discriminality by starting with the history of image could better help us identify the prejudices of image.Īs a “reactive” martial art, Jeet Kune Do waits for the opponent’s imminent attack to make interception by ob-serving the opponent’s ideas and attacks, making interceptive counterattacks based on reaction, suppression and the physical body. The key here is how to construct and deconstruct our digital environment at the same time. Comparing to the circumstances today, however, as we positively create inclusivity of databases, we also need to face the reality of aggravating social discrimination, police violence, judicial injus-tice in the mixed environment of virtuality and reality. Inclusivity is a resistance strategy related to algorithmic prejudices as well as a crucial and fundamental work in database construction. Disregard and the right to access are interrelate-existing but unseen means one’s re-quests are no longer important. ![]() One must first be identified to enter, otherwise one’s translated data could not be analyzed. We define ourselves in the virtual world, drawing up the bounda-ries and choosing to enter a different world.Īs digital data application develops in our life, in order to speed up the complicated and labor-intensive identi-fication processes, facial recognition systems have been introduced as an integral instrument that assists us in sending and acknowledging requests of data groups (you and I) by gaining and analyzing backend data based on operation setups to grant permissions. The freedom to login begins when one’s account is named, which can subsequently be de-leted, modified, edited, reset or left unused. Upon entering and start interacting with the digital environment, we are required to set up a user account, for which one gets to pick one’s username and select labels according to one’s identity, temporarily putting aside statuses in real life. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |