5 research outputs found

    The Gravity dual of the Non-Perturbative N=2 N = 2 SUSY Yang-Mills Theory

    Full text link
    The anomalous Ward identity is derived for N=2N = 2 SUSY Yang-Mills theories, which is resulted out of Wrapping of D5D_5 branes on Supersymmetric two cycles. From the Ward identity One obtains the Witten-Dijkgraaf-Verlinde-Verlinde equation and hence can solve for the pre-potential. This way one avoids the problem of enhancon which maligns the non-perturbative behaviour of the Yang-Mills theory resulted out of Wrapped branes.Comment: 4 pages, LaTeX. Talk given at the IXth International Symposium on Particles, Strings and Cosmology PASCOS '03, Mumbai-India, January 3-8 2003. v2:some reference adde

    A genealogy of hacking

    Get PDF
    Hacking is now a widely discussed and known phenomenon, but remains difficult to define and empirically identify because it has come to refer to many different, sometimes incompatible, material practices. This paper proposes genealogy as a framework for understanding hacking by briefly revisiting Foucault’s concept of genealogy and interpreting its perspectival stance through the feminist materialist concept of the situated observer. Using genealogy as a theoretical frame a history of hacking will be proposed in four phases. The first phase is the ‘pre-history’ of hacking in which four core practices were developed. The second phase is the ‘golden age of cracking’ in which hacking becomes a self-conscious identity and community and is for many identified with breaking into computers, even while non-cracking practices such as free software mature. The third phase sees hacking divide into a number of new practices even while old practices continue, including the rise of serious cybercrime, hacktivism, the division of Open Source and Free Software and hacking as an ethic of business and work. The final phase sees broad consciousness of state-sponsored hacking, the re-rise of hardware hacking in maker labs and hack spaces and the diffusion of hacking into a broad ‘clever’ practice. In conclusion it will be argued that hacking consists across all the practices surveyed of an interrogation of the rationality of information techno-cultures enacted by each hacker practice situating itself within a particular techno-culture and then using that techno-culture to change itself, both in changing potential actions that can be taken and changing the nature of the techno-culture itself
    corecore