7 research outputs found
The Gravity dual of the Non-Perturbative SUSY Yang-Mills Theory
The anomalous Ward identity is derived for SUSY Yang-Mills theories,
which is resulted out of Wrapping of branes on Supersymmetric two cycles.
From the Ward identity One obtains the Witten-Dijkgraaf-Verlinde-Verlinde
equation and hence can solve for the pre-potential. This way one avoids the
problem of enhancon which maligns the non-perturbative behaviour of the
Yang-Mills theory resulted out of Wrapped branes.Comment: 4 pages, LaTeX. Talk given at the IXth International Symposium on
Particles, Strings and Cosmology PASCOS '03, Mumbai-India, January 3-8 2003.
v2:some reference adde
A genealogy of hacking
Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for understanding hacking by briefly revisiting Foucaultâs concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame a history of hacking will be proposed in four phases. The first phase is the âpre-historyâ of hacking in which four core practices were developed. The second phase is the âgolden age of crackingâ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad âcleverâ practice. In conclusion it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information techno-cultures enacted by each hacker practice situating itself within a particular techno-culture and then using that techno-culture to change itself, both in changing potential actions that can be taken and changing the nature of the techno-culture itself