In lieu of an abstract, here is a brief excerpt of the content:

The reason is that he claims that differing 'philosophies' are really merely differing vocabularies, in which different descriptions can be found. Everyone has his or her own vocabulary, and we cannot get outside ourselves to judge reality from some God's-eye view. Vocabularies are opposed by other vocabularies and descriptions by other descriptions. If this diminishes the role of the traditional philosopher, it enlarges the role of the artist. THE CUCKOO'S EGG: TRACKING A Spy THROUGH A MAzE OF COMPUTER ESPIONAGE by Clifford Stoll. Simon and Schuster, New York, NY, U.S.A., 1989. 356 pp. Paper. ISBN: 0-671-72688-9. Reviewed lJy RogerF. Malina, Center far EUVAstrophysics, University of California, Berkeley, CA 94720, U.S.A. This is a true story of the tracking PERIODICALS AdvancedImaging Reviewed lJy Elizabeth Crumley, Leonardo, 2030 Addison Street, Suite 400, Berkeley, CA 94704, U.S.A. Published monthly by Industrial Photography Magazine, AdvancedImaging covers specialized photographic and electronic imaging concepts and methods. The journal publishes articles concerning imaging techniques, including high-speed motion analysis, electronic image enhancement, nonsilver imaging, optical memories and thermal, sonic or other non-light imaging . The journal welcomes readers' comments and article submissions from scientists, engineers, researchers and others. For more information contact: IndustrialPhotography, 50 West 23rd Street, New York, NY 10010, U.S.A. down of a German spy who infiltrated the worldwide computer networks to retrieve information stored on computers in government and military laboratories and centers. The story makes a thrilling read while providing an excellent insight into the world of computer networks. In this case the spy did not destroy or alter information in the datafiles that he entered, but the potential for mischief is awesome . The book is written by programmer and astronomer Clifford Stoll who, on his own initiative, set out to track down the source of a minor accounting inconsistency in the computer billing statements. Initially he was unable to obtain much interest from governmental and police agencies ; their interest grew as Stoll was able to demonstrate that the spy was gaining access to sensitive information . As the vulnerability of computer networks to unauthorized access has become understood, computer system designers have begun to build in various security features. Artists often have mixed feelings about unIl . Publications Computers and Art: Issuesof Content Special issue of ArtJournal, 49, No.3 (Fall 1990). Terry Gips, Guest Editor. Reviewed lJy RogerF. Malina, Center far EUVAstrophysics, University of California, Berkeley, CA 94720, U.S.A. This is a special issue of the quarterly ArtJournalpublished by the College Art Association and guest edited by Terry Gips. Articles include "The Quickening of Galatea: Virtual Creation Without Tools or Media" by Timothy Binkley, "Is There Love in the Telematic Embrace?" by Roy Ascott, "The Digital Revolution: Art in the Computer Age" by Cynthia Goodman, "Computer Art as Conceptual Art" by Christine Tamblyn, "Art, Technology and Postmodernism: Paradigms , Parallels and Paradoxes" by Margot Lovejoy, "Image, Language and Belief in Synthesis" by George Legrady , "The Image in the Black Box" by Deborah Sokolove, "Signal to Noise: A Computer-Based Artist's Book" by Craig Hickman, and "A Selected Chronology of Computer Art, Exhibitions, Publications and Technology" by Copper Giloth and Lynn Pocock-Williams. authorized use of computer networks (often called 'hacking'). Most artists do not work at institutions connected to computer networks, and do not have the resources to purchase authorized access. Some visionaries conjure up a vision of computer networks as being 'highways of information ' open for the use of all as are the road systems. In this view the computer networks have the potential to be democratising influences opening up information to access by a broad segment of the public. Government agencies, vendors of data products, on the other hand, see the computer networks as private means of communication to be controlled and protected . This book, as well as being a fascinating story, raises a number of very specific issues concerning the future of the worldwide computer network , the protection of privacy of information on accessible data bases and the social and human aspects of online communities. I am pleased to see the College Art Association paying attention to the issue of computer art. These articles...

pdf

Share