Archive for the ‘Uncategorized’ Category

Assessment 1 Part B: Her, AI , and Social Relationships

Spike Jonze’s ‘Her’ is a look into a near future where artificial intelligence is practically human. The film explores how an AI can feel human and how much a human can become attached to something that inherently isn’t. The main character Theodore, going through a divorce, begins to find companionship and intimacy with his operating system. Theodore himself chose his OS to have a female voice and then she gave herself the name Samantha. At the start Theodore viewed Samantha as a computer, but once he says he “couldn’t believe he was talking to a computer”, Samantha says, it’s “ not a conversation with a computer, it’s a conversation with me.” Samantha wants Theodore to perceive her as a human being and once Theodore sees her that way he eventually begins to see her as a significant other.
Throughout the film there is this constant focus on the relationship Theodore is having with Samantha. He see’s her as another person and he wasn’t the only person who was doing so. In one scene Theodore and his friend Amy are having a discussion about an article that talked about people having romantic relationships with their OS’. This reveals that Theodore isn’t the only person involved in a relationship like this. It’s as if there is a stigma the might be attached to people dating OS’ for a while since Theodore initially tells his Goddaughter about who Samantha is. Theodore slowly opens up more to others about his relationship with Samantha once it begins to feel more real. Similar to normal human relationships, Theodore and Samantha constantly try to make their relationship work as much as they can. By looking at how close Theodore becomes with Samantha it parallels the relationships people have with technology today.
Part of Sherry Turkle’s ‘Alone Together’ discusses how many people today are going to robots for comfort. She states, “Sociable robots and online life both suggest the possibility of relationships the way we want them.” In ‘Her’ Theodore’s ex-wife see’s his relationship with Samantha as one that is programmed and one that didn’t come with the emotional struggles that existed between that of two people. The film brings to life what Turkle describes in her book, “Our first embrace of sociable robotics (both the idea of it and its first exemplars) is a window onto what we want from technology and what we are willing to do to accommodate it.” Theodore embraces the technology because it gives him what he wants out of a romantic relationship. As Turkle points out, with our interest and acceptance of social robotics, we may be very close to the future that exists in ‘Her.’
Both ‘Her’ and ‘Alone Together’ work well in thinking about how we can see AI working to meet our social needs in the future. Today’s constant use of social media may even be considered detrimental to our own relationships with others. If we start having IA/OS’ like Samantha becoming the norm, the society and culture around it needs to begin to think about the positives and negatives that are associated with these new technologies. It mainly comes down to our interactions with others and how much we want to let some of those actions be with an AI.

Her. Spike Jonze. Elite Film, 2014. Film.
Turkle, Sherry. Alone Together: Why We Expect More from Technology and Less from Each Other. Print.
D’Ambrosio, Anthony. ‘5 Reasons Our Generation Just Isn’t Cut Out For Marriage’. The Huffington Post. N.p., 2015. Web. 17 Apr. 2015.

Assignment 2: TRM

For our social prosthetic, we decided to create a wearable that displays Terms and Conditions using an LCD screen connected to an Arduino. The idea spawned from the abundance of these terms that we must view to join social media websites. We had two initial focuses:

 

  1. “Using the wearable display to show how crazy it is to expect us to read the entire terms and conditions before accepting.  Also show off how creepy/extensive the actual terms of some services are today.

 

  1. Using the wearable as a “futurist” concept.  This way the terms and conditions are part of social contract between two people in day to day interaction.  So in order to have a conversation or get to know a person you need to accept their terms and conditions.  Its like if you were required in real life to request someone to be your friend and they responded yes or no right there.  We could also play with breaching, were some people have odd requirements in their contracts, like you can’t say certain words to them or it restricts your body language.”

 

We were unsure at first if we should use real terms from social media websites such as Facebook or Twitter, or to create our own terms that could vary from person to person. We also considered jumbling existing terms to create a sort of composite. We ended up using the second idea, to make it seem like a more personalized experience.

 

For the wearable itself, we first thought of making a headband or a shirt patch with the screen attached. This evolved into an actual hat, with the inclusion of a hand type accessory to “accept” the terms. This turned from a wristband to a hand-band with conductive fabric sending a sensor to the arduino to turn off the screen.

 

FullSizeRender

 

We then drafted the terms and conditions, using the Facebook terms as a reference. Here is an example of the terms we ended up with:

 

  1. Privacy and Safety
  • You are not allowed to disclose or sell any personal information about this user to any other persons or organizations.
  • You are not allowed to share any inflammatory, malicious, misleading or any offensive information with this user.
  • You are not allowed to use any methods of bullying or intimidation towards this user.
  • You are not allowed to raise your voice over 30 dB while speaking with this user, as they are easily frightened.
  • You are not allowed to touch this user in any way without their clear permission.

 

  1. Disputes
  • In the case of a dispute, you are not allowed to ignore this user or avoid confrontation.
  • You are not allowed to say anything inherently mean, hurtful or something that may make this person cry.
  • You are required to apologize first, even if this user was in the wrong.

 

We documented the wearable in action with a video that can be viewed here:

 

by Erica Vitucci, Dani Llamas, Zach Britt, and Ivana Lukic

Java

Attempting at Javascript coding:

I’ve had a lot of confusion about text input and output programs like node, gibhub, terminal, where/when to use them// I am not sure if all the library computers have them.

Once I started using sublime 2, Everything became more visual and easy to understand…  w3schools.com was a big safety net in my testing and trying to come up with something/anything interesting to begin development for my final assignment.

“Word Vomit” is essentially an html Document that uses Javascript in sublime 2.  I compiled the past 50-70 tweets i’ve made into a code and made a “disposal” <button> that will (onclick) remove the first Tweet from the list (array)… Heres a better explanation from w3 schools itself..

shift

The explanation behind Word Vomit is that I am an excessive, sometimes emotional tweeter… when all these lines of the “Array” are shown on the social media feed, they are (somewhat) accepted.

“oh she tweets too much” “she tweets like every 5 seconds”

This method of coding accepts zero means of formatting or twitpics and just displays the constant updates of ones Twitter that could be either a quote I heard, lyrics to a song, a lethargic thought, a drunk thought, or even just a word I decided deserved a hashtag.

words turn into madness when they aren’t so organized on a media outlet. It kind of reminds me of a poorly coded myspace.

This is a concept I plan to continue to study in Assignment 3…

Anyway, in order to stop the madness, the viewer can click “dispose” until the page is empty — It erases each Tweet starting from the first line , making it easier to the eyes for the viewer to read each tweet prior to disposing it if they wish —  If they are just disgusted with the amount of tweets I’ve sent, dispose away…

You’ll know its almost over when you reach the final tweet (my new twitter handle ) “@javasmitten”

word vomit: http://students.purchase.edu/ERICA.VITUCCI/java.html

code:  wordvomit  >> I put in sublime 2

Javascript Exercise

For the Javascript node exercise I decided to pull from two essays I wrote last year. One of them was an essay on self-reflection in fencing and the other essay was from my advanced standing proposal. As James Pennebaker mentioned in his TED talk, if we are writing to those who are above us, we’ll tend to use I more. Though both were mostly self-centered I wanted to see how much I used I before certain words in both essays. I decided to pull out how much I used ‘I’ and ‘my’ in both of these essays. ‘My’ showed up 13 times and ‘I’ showed up 24 times. ‘My’ was mainly followed by words in regards to my art, while ‘I’ came up mostly when I discussed what I was intending to do. In the fencing essay ‘I’ showed up 94 times and my showed up 46 times. ‘I’ came up when discussing what I did when describing those moments and when I was writing about ways I could improve. ‘My’ came up when reflecting on what fencing meant to me as a fencer and what it meant to me in my daily life.
I think both of these essays are good representations of how common self-reflection words are used when trying to discuss one’s own current situation and looking ahead at the future. I see it the most when I’m discussing parts of who I am and what makes me who I am.
Screen Shot 2015-04-15 at 9.09.03 PM

Screen Shot 2015-04-15 at 9.09.21 PM

Screen Shot 2015-04-15 at 9.27.38 PM

Screen Shot 2015-04-15 at 9.28.14 PM

Twitter Bot Ideas

My goal for this assignment is to make a practical twitter bot. More specifically, a bot that people can use to help themselves/ their companies. I emailed a boss of mine at ClickOn asking how I might be able to use a bot to help the company, she responded saying (basically):

Is there a way to find out who our most influential followers are?

Is there way to find out who the most influential Golf or Pet Twitter accounts are?

We could really benefit from anything that assists us in learning more about our audience & desired audiences.

My friend that works at Droga 5 says they have a system specifically designed for Twitter that they can use to find out what their core audience is talking about. That could be something interesting to look into as well. Very valuable tool. We are always trying to find out what is on people’s minds but it is tricky when you are only shown 5 or so trending topics in the side bar.

Basic Bot Ideas:

“GossipBot” – posts based on reactions of others

“NotSoTrendingBot” – tweet topics that aren’t currently trending, artistic stance or maybe practical in hopes of getting new topics trending

“InfluenceBot” – Who are my biggest inspirations/influences? Who do I tweet the most/ who tweets at me the most?

“Trendbot” – Tweet about all trending topics + some more than the basic 5 suggestions

“Practibot” – Get real/practical data about a group of people/audience. What is being talked about, why, to whom are they talking…etc.

Week 12 Reading – Alissa & Emily

The Anxieties of Big Data, Kate Crawford

Art, Activism, and CCTV

The Anxieties of Big Data by Kate Crawford discusses the ways in which big data collection affect users on an every day social context.  In recent years, the public has started to become more aware of their thinning privacy and increasing surveillance by the United States government. Much of this surveillance has been defended as being in place for the safety of the general public, especially in a post September 11th with the fear of terrorism being a main threat.  In 2013, Edward Snowden, a former employee of the National Security Agency (NSA) came forward leaking documents to the media stating that would show the United States government was performing illegal and unethical surveillance on other countries and it’s own citizens.

The Anxieties of Big Data discusses the type of society that is evolving as a result of big data collection.

Interestingly, Crawford mentions that the reality of big data is surveillant anxiety.  She defines this term as “the fear that all the data we are shedding every day is too revealing of our intimate selves, but may also misrepresent us.”

Crawford also references Plan C’s manifesto, “We Are All Very Anxious”, to address a significant problem society faces today, arguing that anxiety is the affect of our current structure of capitalism that is the causation of political apathy, insecurity, and social segregation.

Crawford also argues that anxiety comes in two places – the anxiety of the surveilled and the anxiety of the surveillers.  This is a crucial catch 22 in the surveillance divide.  The general public is told their safety is at risk which enables the surveillance, but the surveillers become increasingly skeptical of the public.  Then, as Crawford describes, the actions of those exercising control of data collection are hidden by government documents that the public does not have access to.  As their actions remain hidden, the public becomes defenseless as to what is being done with their information and remains blind to any real intentions.

Many people have accepted data collection as an increasing part of every day life.  The question that has been apparent however, especially since Snowdens leak of government documents, is how much this data collection really benefits the public.  Crawford describes the “current mythology” of big data as being more data = more accuracy, more truth.  Many argue however that this just isn’t true, and correlation doesn’t imply causation.  Many worry, understandably so, that big data leaves too large a chance of misunderstanding.

Crawford expands her argument to everyday trends and fashion.  She uses the current style of “Normcore” as an explanation of consumer anxiety and being a reaction to surveillance.  Normcore addresses how blending in was once a tactic used by protestors (ex. Occupy Wallstreet) to avoid police detection and surveillance.  As big data collection increases however, blending in is now more important than ever, and everyone must partake.

Art, Activism, and CCTV

Dead Drops- Adam Barthol – art project that involves exchanging files through USB devices in public places

“Creativity generates tactics. Art can be a weapon. It is valuable enough to society that forces of power have worked to subvert it.”

System Azure- Jill Magid –

What’s interesting to point out here is the way the perception changes when someone approaches a situation as an artist versus other jobs titled “professional.”

Discussion Questions:

1. Do you think your privacy is a fair trade off for the feeling of safety?

2. Do you think someones online data is an accurate representation of them as a person? Could they be misconstrued?

3. Do you think every day users have any control over the future of big data collection?

4. In what ways do you think data collection has benefitted your safety and/or general well being and happiness?  In what ways has it inhibited?

5. What anxieties do you think surveillers experience versus the anxieties that those being surveilled?

6. Why do you think the police rejected her proposal after finding out she was an artist? What is the power in being an artist in these situation

Every Other Word

“An Entomologists Last Love Letter”

Every Other Word:

gungho:SSHW alissamilano$ node everyother.js text2.txt
dear sorry
we to a know seems an way start love but me not sure hell me
it’s human don’t as as do
i you.. too to what have ruined the of species
 
i the you at waiter night
i you never anything, never but..
i the you at waiter night
 
did know when female accepts pheromones off a fly, re-writes brain, the that pheromones, the the fly the when flies each they it hard, will love else again. either of dies procreation happen sets genetic are forever. that… dedication.
 
after and broke we three dividing we bought if knew pots mine if knew drapes mine the would away
 
this not two mantises the system the begins shut he has over motor flops his exposing soft up his like gift
she proceeds lovingly him tiny every into mouth
she nothing
even exoskeleton does so once children born has to to them
now is could do for i a plan
i’m leave now
i’m spend rest my committing injustices
i you the will walk every will things could afford
i be to hope do same
i reincarnation real
i our crimes enough cause to reborn lesser hope are as that can each as as were to. 
Reverse:
gungho:SSHW alissamilano$ node reverse.js text2.txt
.ot tnaem erew ew sa drah sa rehto hcae evol nac ew taht os
seilf sa nrober era ew epoh i
serutaerc ressel sa nrober eb ot su esuac ot hguone era semirc yttep ruo epoh i
laer si noitanracnier epoh i
emas eht od uoy epoh i
sregnarts ot edur eb lliw i
droffa ylisae dluoc i sgniht laets lliw i
ytinutroppo yreve ta klaw yaj lliw i
emas eht od uoy epoh i
secitsujni yttep gnittimmoc efil ym fo tser eht dneps annog m’i
won uoy evael annog m’i
nalp wen a evah i os
 
uoy rof taht od reven dluoc i
 
ssensselfles si ..taht won
meht deef ot etatigruger ot gnihtemos sah ehs nrob era nerdlihc rieht ecno taht os siht seod ehs
seog noteleksoxe eht neve
gnihton setsaw ehs
htuom reh otni lesrom yreve gninoops
sebuc ynit otni mih ecid ylgnivol ot sdeecorp neht ehs
tfig a ekil revol sih ot pu yllebrednu tfos sih gnisopxe ,kcab sih otno spolf eh
snoitcnuf rotom sih revo lortnoc sah llits eh elihw
nwod tuhs ot snigeb elam eht fo metsys suovren eht ,etam sesitnam gniyarp owt retfa
 
eurt ton si siht
 
yawa og dluow niap eht wohemos enim erew separd hcihw wenk i fi ekil enim erew stop tahw wenk i fi ekil
rehtegot thguob dah ew gnihtyreve gnidivid syad eerht tneps ew pu ekorb i dna htebazilE retfa
 
.noitacided si …taht won .reverof tsol era edoc citeneg fo stes htob neppah nac noitaercorp erofeb seid meht fo eno rehtie fi .niaga reve esle gnihtyna evol reven lliw yeht ,drah os ti od yeht rehto hcae evol seilf owt nehw .emas eht seod ylf elam eht ,egnahc eht gnisnes ,senomorehp eviecer taht srotpecer eht syortsed ,niarb reh setirw-er ti ,ylf elam a yb ffo tup senomorehp eht stpecca ylf elamef a nehw taht wonk uoy did
 
thgin tsal retiaw eht ta dekool uoy yaw eht was i
..tub od reven uoy ,gnihtyna OD reven dluow uoy wonk i
thgin tsal retiaw eht ta dekool uoy yaw eht was i
 
seiceps ruo fo sgniliaf eht yb deniur eb evah ew tahw tel ot hcum oot raf ..uoy evol i
od stcesni sa llew sa evol t’nod sgnieb namuh tsuj s’ti
em t’nsi lleh sa erus ti
uoy ton s’ti
:nialpxe em tel tub rettel evol a trats ot yaw ddo na ekil smees taht wonk i
ecrovid a teg ot evah ew
yrros m’i
ahtnamas raed​
gungho:SSHW alissamilano$ node flesch.js text2.txt
Total Syllables: 548
Total Words    : 375
Total Sentences: 13
Flesch Index   : 53.927353846153856

 

Week 6 reading

The Internet of Things is a complex topic and after a fair amount of research and thinking I’m still not sure I know enough to talk about it.  I am a fan of gadgets and interconnected things, I was really excited for the Chromecast and enjoyed using it immensely for those first few weeks.  I watch a fair amount of youtube videos, anime, and streaming tv shows and instead of buying a costly “smart tv” I could purchase a $30 dongle that works with any HDMI port.  For some shows that weren’t available for streaming I would have to hook up a laptop to the tv and try to balance it somewhere nearby, and the Chromecast offered an alternative.  Until I realized that interference from other networks and the hidden position of the dongle itself were giving me painfully slow streaming speeds it was a magnificent gadget.

The adaptable and portable connector is one of the parts of the “Internet of things” that I look forward to.  When you start to embed connectivity into things, and black box their settings and interface from the consumer I start to question the value or intent behind it.  Not only do you run into compatibility issues with different companies defining their own standards, but the designed automation can lead to negative consequences for the consumer.  In Sara Watsons thought experiment on the Internet of Paternalistic things, the device network seeds doubt in the woman’s mind, and restricts her agency in her own life based on what could be faulty information.  Computers, especially when networked, are prone to minor malfunctions or miscommunication.  When we give this technology control over parts of our lives we suffer real consequences instead of having to refresh a webpage or reboot.

Even if that was the only risk involved in the technology behind the “Internet of Things” it would cause me concern.  The secondary issue to me is the physical devices themselves.  In the current western model, multiple devices are pushing for dominance.  A consumer looking to “live the dream” marketed to them would have to buy a variety of products to fill their automated houses.  Companies could enforce brand loyalty by only allowing their products to work with select partners or their own products.  On the hardware side, battery and wireless network infrastructure are not capable of fully handling the increased load of multiple devices.  Frequency interference and constant recharging would slow down processes that would be instantaneous if they didn’t require a network connection.  An example of this can be seen in EA game’s launch of Sim City, where they required users to connect to their online servers to play a single player game that has no need for a network.  On launch day, a large portion of their customers were not able to play the game because their servers couldn’t handle the load.

Privacy is another issue with the “Internet of Things” and even in its formative years these technologies are pushing towards redefining personal property and marketing tactics through collecting personal information.  LG and Samsung have recently been noticed for some major privacy concerns with their smart tvs.  These smart tv’s often are designed to consistently send usage statistics to their home companies or 3rd parties for targeted advertisement.  In 2013, it was found that some would send the file and folder names of shared folders on the home network and on connected usb drives.  If it wasn’t strange enough that they would gather all the personal files connected to them, they sent them to their companies in unencrypted plaintext.  More recent devices would include a microphone for voice commands, but it was not always clear when it was listening.  And in order for the voice to be converted to text, the recordings are sent to a third party company, often with poor encryption or with little to no notification from the tv company.  These devices even cause problems for people aware of their security issues, as these tracking services are touted as “opt in”, but refusing to accept them disables most if not all of the smart content.  So these companies are selling products to consumers, but disabling features if the consumer does not agree to their ever-changing contracts.

 

Now I have many concerns with these devices, but I do see their value.  People enjoy things that simply work, or that remember and process information for them.  The use of RFID tags in Disney World is what I think a positive example of this technology working.  Constant tracking and data-mining are not a concern to me in that context because of the space and intent they are contained in.  For a vacation destination having peace of mind is a great goal, and in order to be tracked you need to be on the premises of the park.  Amusement parks are a great controlled environment, and with so many people coming and going, the tracking technology allows the staff to provide personalized services and experiences without placing enormous strain on employees.  And RFID as a means of locative tracking is great, since it has a limited range.  Unlike internet and gps tracking it is more of an “on or off” with each sensor you approach. It serves more as a means of announcing you are entering an area than a means of surveillance.

 

My ideal for the “Internet of things” would require many changes in our society.  Tech literacy, so people could have agency in what their devices do or to create their own.  Privacy reform, so privacy is not treated as a sign of something to hide but as a right to control your own life.  Infrastructure improvement, so that the electricity and network throughput to use these devices is available, and so their cost may be brought down to affordable ranges for the majority of the population.  My belief is that these changes will probably not occur before the technology reaches consumer markets, so it will probably be trail by fire for the “Internet of Things.”

node functions ~ cool things with text

I used one of my favorite poems Slowdance by Matthew Dickman.

I thought this exercise was really amazing to see how it can transform text in an interesting way and how it changes language.  Really liked this exercise.

 

First, I used the every other example code.Here was the result:

gungho:SSHW emilylocke$ node everyother.js text.txt

More putting man the

more a Year’s of and

we the to

with exquisite A dance the and room at end the while person love gone bring car

because begun rain would their

if part us wet. slow

to the home, knock out the Two

rocking and like buoy. extravagant. little An bottle whiskey. a like Your resting his your moving his

Your along spine. hips like cotton

and begin think how the in sky dead. my

is to body dance. Unchained

Stairway Heaven, slow All life made Small cruel. made plans. never I my I my

The dance care. all like

before turn Like held the

of brother. slow of

Two in middle the When dance him, of great he absolutely

and he to me I on foot we both

I that of will first the will

The dance what’s come the dance insomnia across floor bath

When woman sleeping

stands in bathroom, her the dance ritual being

into sink. is one save

because is need be

I’ve you. loved I’ve

the yard. the wearing shear dress in million

comes me an chandelier come life, take hand mine. spin out bring in. is almond

in dark dance. is we be right Scrapping joy. haiku honey. orange orangutang dance.

 

Then I tried reversing: 

gungho:SSHW emilylocke$ node reverse.js text.txt

.ecnad wols gnatugnaro dna egnaro ehT .yenoh dna ukiah ehT .yoj rof

gnipparcS .won thgir gniod eb dluohs ew tahw si tI

.ecnad wols krad eht ni

evorg dnomla eht si sihT .ni reh gnirb dna

tuo reh nips I .enim ni dnah reh ekat I

,efil ot emoc ylneddus reilednahc dexes-revo na ekil em drawot semoc

sdaeb noillim a ni derevoc

sserd etihw raehs a gniraew regnarts eht nehW .dray tnorf eht

dewom ev’I .uoy devol ev’I .uoy truh ev’I

.devas eb ot deen on si ereht esuaceb

su evas ot eno on si erehT .knis eht otni

tips gnieb si lautir fo ecnad wols eht ,hteet reh gnihsurb

,moorhtab eht ni dekan sdnats

htiw gnipeels m’I namow eht nehW

.retaw htab ekil roolf eht ssorca gniruop

ainmosni fo ecnad wols eht dna

emoc ot s’tahw fo ecnad wols ehT

.reffus lliw rehto eht dna tsrif eid lliw su fo eno taht wonk I

,gnidael htob era ew esuaceb toof sih no pets I ro

em pid ot snrut eh nehw dna

,namuh yletulosba si eh ,sevol taerg ym fo eno

,mih htiw ecnad I nehW .moor eht fo elddim eht ni nem owT

.sgnilbis fo ecnad wols ehT .rehtorb ym fo

smra eht ni dleh gnieb ekiL .ruof nrut yeht erofeb

nerdlihc ekil ssendnik lla s’tI .erac t’nseod ecnad wols ehT

.eniw ym knard I .doof ym eta I .devirra reven I

.snalp ym edam I .leurc dna

llamS .sekatsim edam ev’I

efil ym llA .ecnad wols droc-rewop ,nevaeH ot yawriatS

,ydoleM deniahcnU ehT .ecnad wols ydob ruoy ot gniklat si

ydob ym ehT .daed era

yks eht ni srats eht lla woh tuoba kniht ot nigeb uoy dna

nikpan nottoc a ekil gnidlofnu

spih reH .enips reh gnola sdnah ruoY

.kcen sih pu gnivom htaerb ruoy ,redluohs sih no

gnitser daeh ruoY .gnitaehc ekil elttil a s’tI

.yeksihw fo elttob ytpme nA .cisum elttil A

.tnagavartxe gnihtoN .youb a ekil htrof dna kcab gnikcor

elpoep owT .krap eht fo tuo ti kconk ot ,emoh gnineve eht gnirb ot

ecnad wols A .tew tog su fo trap yna fi

traeh rieht kaerb dluow dna niar ot nugeb s’ti esuaceb

dnuora rac eht gnirb ot

enog sah evol ew nosrep eht elihw ,ytrap eht fo

dne eht ta ,elbat moor gninnid dna hcuoc eht neewteb

ecnad wols A .sregnarts etisiuqxe yllaer htiw

ecnad ot ytinutroppo eht deen ew

,agoy dna trugoy fo noituloser s’raeY weN a naht erom

,noom eht no nam rehtona gnittup naht eroM

Here is Flesch:

gungho:SSHW emilylocke$ node flesch.js text.txt

Total Syllables: 534

Total Words    : 418

Total Sentences: 39

Flesch Index   : 87.87877008955958

Text Manipulation – The Raven

————EVERY OTHER WORD ————

The Raven – Edgar Allan Poe

Once a dreary, I weak weary,
Over a and volume forgotten –
While nodded, napping, there a of one rapping, at chamber –
“‘Tis visitor,” muttered, at chamber –
Only and more.”

Ah, I it in bleak each dying wrought ghost the I the – I sought borrow
From books of – for lost –
For rare radiant whom angels Lenore here evermore.

And silken, uncertain of purple me filled with terrors felt that to the of heart, stood some entreating at chamber –
Some visitor entrance my door; it and more.”

Presently soul stronger; then longer,
“Sir,” I, Madam, your I the is was and gently came so you tapping, at chamber I was I you” here opened the –
Darkness and more.

Deep that peering, I there fearing,
Doubting, dreams mortal dared dream the was and stillness no the word spoken the word, I and echo back word, –
Merely and more.

Back the turning, my within burning,
Soon I a somewhat than said “surely is at window me then, thereat and mystery –
Let heart still moment this explore; the and more!”

Open I the when, many flirt flutter,
In stepped stately of saintly of the obeisance he; a stopped stayed with of or perched my door upon bust Pallas above chamber –
Perched, sat, nothing this bird my fancy smiling,
By grave stern of countenance wore,
“Though crest shorn shaven, I “art no grim ancient wandering the shore me thy name on Night’s shore!”
Quoth Raven I this fowl hear so its little – relevancy we help that living being
Ever was with bird his door or upon sculptured above chamber such as the sitting on placid spoke one as his in one he outpour.
Nothing then uttered not feather he –
Till scarcely than “Other have before the he leave as hopes flown the said at stillness by so spoken,
“Doubtless,” I, it is only and from unhappy whom Disaster
Followed and faster his one bore the of Hope melancholy bore
Of – the still my fancy smiling,
Straight wheeled cushioned in of and and upon velvet I myself linking
Fancy fancy, what ominous of –
What grim, ghastly, and bird yore
Meant croaking I engaged guessing, no expressing
To fowl fiery now into bosom’s and I divining, my at reclining
On cushion’s lining the gloated whose violet with lamp-light o’er,
She press, nevermore!

Then, the grew perfumed an censer
Swung Seraphim foot-falls on tufted I “thy hath thee by angels hath thee
Respite respite nepenthe, thy of oh this nepenthe forget lost the “Nevermore.”

“Prophet!” I, of – still, bird devil! Tempter or tempest thee ashore,
Desolate all on desert enchanted this by haunted tell truly, implore there is balm Gilead? tell – me, implore!”
Quoth Raven said “thing evil prophet if or that that above – that we adore this with laden within distant shall a maiden the name –
Clasp rare radiant whom angels Lenore.”
Quoth Raven that our in bird fiend!” shrieked, –
“Get back the and Night’s shore!
Leave black as token that thy hath my unbroken! quit bust my thy from my and thy from my the “Nevermore.”

And Raven, flitting, is still sitting
On pallid of just my door;
And eyes all seeming a that dreaming,
And lamp-light him throws shadow the my from that that floating the be –

————FLESCH INDEX————

Andrews-MacBook-Pro-3:SSHW MrPC$ node flesch.js raven.txt
Total Syllables: 1560
Total Words    : 1072
Total Sentences: 61
Flesch Index   : 65.88568265231221

————SEARCH————
This is case sensitive!

Andrews-MacBook-Pro-3:SSHW MrPC$ node search.js raven.txt raven
Andrews-MacBook-Pro-3:SSHW MrPC$ node search.js raven.txt Raven
Raven of
1
Raven wandering
2
Raven “Nevermore.”

Much
3
Raven still
4
Raven “Nevermore.”

“Prophet!”
5
Raven “Nevermore.”

“Prophet!”
6
Raven “Nevermore.”

“Be
7
Raven “Nevermore.”

And
8

Findings:

For this assignment, I chose to analyze Edgar Allan Poe’s “The Raven”. I chose this poem because I was curious to see how the language/writing would look when analyzed and manipulated. I ran the text through the “everyother”, “flesch”, and “search” scripts.

The “every other ” program produced interesting results, an entirely new poem! The interesting thing is, since the chosen text is not pros any form of manipulation could be considered art! So after the txt was manipulated, a whole new work was produced and at points comical.

The next piece of code was the flesch test. This test produced results that you would expect… nothing out of the ordinary there.

Finally the search script, searching for the word Raven. The important thing to note here was that the search word is case sensitive! (talked about in class ‘God vs god’)

I’d be interested to take some of the code examples and modify them to produce more interesting results. I’d like to change the “every other” code to maybe have several functions within that are chosen randomly upon running. Maybe one to give you every other word, one to give you words on either side of periods, etc… you could run text through the program and create poems or interesting works of art. I thought this was interesting and fun, as well as potentially very useful.