Critical Programming: Toward a Philosophy of Computing

Total Page:16

File Type:pdf, Size:1020Kb

Critical Programming: Toward a Philosophy of Computing University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2015 Critical Programming: Toward a Philosophy of Computing John Bork University of Central Florida Part of the Philosophy Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Doctoral Dissertation (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Bork, John, "Critical Programming: Toward a Philosophy of Computing" (2015). Electronic Theses and Dissertations, 2004-2019. 1356. https://stars.library.ucf.edu/etd/1356 CRITICAL PROGRAMMING TOWARD A PHILOSOPHY OF COMPUTING by JOHN ROBERT BORK B.A University of Houston, 1993 B.S. Bowling Green State University, 1999 M.I.T. Bowling Green State University, 2005 A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Texts and Technology in the College of Arts and Humanities at the University of Central Florida Orlando, Florida Fall Term 2015 Major Professor: Bruce Janz © 2015 John Robert Bork version 20151108 ii ABSTRACT Beliefs about the relationship between human beings and computing machines and their destinies have alternated from heroic counterparts to conspirators of automated genocide, from apocalyptic extinction events to evolutionary cyborg convergences. Many fear that people are losing key intellectual and social abilities as tasks are offloaded to the 'everyware' of the built environment, which is developing a mind of its own. If digital technologies have contributed to forming a dumbest generation and ushering in a robotic moment, we all have a stake in addressing this collective intelligence problem. While digital humanities continue to flourish and introduce new uses for computer technologies, the basic modes of philosophical inquiry remain in the grip of print media, and default philosophies of computing prevail, or experimental ones propagate false hopes. I cast this as-is situation as the post-postmodern network dividual cyborg, recognizing that the rational enlightenment of modernism and regressive subjectivity of postmodernism now operate in an empire of extended mind cybernetics combined with techno- capitalist networks forming societies of control. Recent critical theorists identify a justificatory scheme foregrounding participation in projects, valorizing social network linkages over heroic individualism, and commending flexibility and adaptability through life long learning over stable career paths. It seems to reify one possible, contingent configuration of global capitalism as if it was the reflection of a deterministic evolution of commingled technogenesis and synaptogenesis. To counter this trend I offer a theoretical framework to focus on the phenomenology of software and code, joining social critiques with textuality and media studies, the former proposing that theory be done iii through practice, and the latter seeking to understand their schematism of perceptibility by taking into account engineering techniques like time axis manipulation. The social construction of technology makes additional theoretical contributions dispelling closed world, deterministic historical narratives and requiring voices be given to the engineers and technologists that best know their subject area. This theoretical slate has been recently deployed to produce rich histories of computing, networking, and software, inform the nascent disciplines of software studies and code studies, as well as guide ethnographers of software development communities. I call my syncretism of these approaches the procedural rhetoric of diachrony in synchrony, recognizing that multiple explanatory layers operating in their individual temporal and physical orders of magnitude simultaneously undergird post-postmodern network phenomena. Its touchstone is that the human-machine situation is best contemplated by doing, which as a methodology for digital humanities research I call critical programming. Philosophers of computing explore working code places by designing, coding, and executing complex software projects as an integral part of their intellectual activity, reflecting on how developing theoretical understanding necessitates iterative development of code as it does other texts, and how resolving coding dilemmas may clarify or modify provisional theories as our minds struggle to intuit the alien temporalities of machine processes. iv TABLE OF CONTENTS LIST OF FIGURES......................................................................................................................viii LIST OF TABLES..........................................................................................................................ix CHAPTER 1: INTRODUCTION....................................................................................................1 From Automated Genocide to the Dumbest Generation.............................................................1 A Collective Intelligence Problem..............................................................................................7 Societies of Control................................................................................................................9 The Quintessential Postmodern Object................................................................................11 Foss Hopes............................................................................................................................13 Default Philosophies of Computing.....................................................................................16 Digital Humanities Solutions....................................................................................................19 Not to Use Old Tools for New Problems..............................................................................19 Scholarship Requires a Cybersage.......................................................................................21 Digital Humanities Projects..................................................................................................24 Critical Programming Studies..............................................................................................26 CHAPTER 2: POST-POSTMODERN NETWORK DIVIDUAL CYBORG...............................31 Post-Postmodern Subjectivity...................................................................................................34 Modernism and Postmodernism...........................................................................................35 Regressive Subjectivity........................................................................................................41 Inventing the Posthuman in Heidegger's America...............................................................58 Network Dividual Cyborg.........................................................................................................63 v Closed World Cybernetics....................................................................................................65 Cyborg Embodiment............................................................................................................77 Techno-capitalist Networks..................................................................................................90 Dividual Cyborg.................................................................................................................103 CHAPTER 3: THEORETICAL FRAMEWORK AND METHODOLOGY..............................120 Theoretical Framework...........................................................................................................122 Critical Theory....................................................................................................................124 Textuality Studies...............................................................................................................134 Media Studies.....................................................................................................................146 Social Construction of Technology....................................................................................157 Histories of Computing, Software and Networking...........................................................167 Psycho-Social Studies of Computer Programmers.............................................................185 Philosophers of Computing Technologies..........................................................................201 Software Studies.................................................................................................................229 Code Studies.......................................................................................................................264 Procedural Rhetorics of Diachrony in Synchrony..............................................................296 Methodology...........................................................................................................................320 Philosophical Programmers................................................................................................321 Working Code Places..........................................................................................................324 Programming Philosophers................................................................................................340
Recommended publications
  • The Road Ahead for Computing Systems
    56 JANUARY 2019 HiPEAC conference 2019 The road ahead for Valencia computing systems Monica Lam on keeping the web open Alberto Sangiovanni Vincentelli on building tech businesses Koen Bertels on quantum computing Tech talk 2030 contents 7 14 16 Benvinguts a València Monica Lam on open-source Starting and scaling a successful voice assistants tech business 3 Welcome 30 SME snapshot Koen De Bosschere UltraSoC: Smarter systems thanks to self-aware chips 4 Policy corner Rupert Baines The future of technology – looking into the crystal ball 33 Innovation Europe Sandro D’Elia M2DC: The future of modular microserver technology 6 News João Pita Costa, Ariel Oleksiak, Micha vor dem Berge and Mario Porrmann 14 HiPEAC voices 34 Innovation Europe ‘We are witnessing the creation of closed, proprietary TULIPP: High-performance image processing for linguistic webs’ embedded computers Monica Lam Philippe Millet, Diana Göhringer, Michael Grinberg, 16 HiPEAC voices Igor Tchouchenkov, Magnus Jahre, Magnus Peterson, ‘Do not think that SME status is the final game’ Ben Rodriguez, Flemming Christensen and Fabien Marty Alberto Sangiovanni Vincentelli 35 Innovation Europe 18 Technology 2030 Software for the big data era with E2Data Computing for the future? The way forward for Juan Fumero computing systems 36 Innovation Europe Marc Duranton, Madeleine Gray and Marcin Ostasz A RECIPE for HPC success 23 Technology 2030 William Fornaciari Tech talk 2030 37 Innovation Europe Solving heterogeneous challenges with the 24 Future compute special Heterogeneity Alliance
    [Show full text]
  • Rhetorical Code Studies Revised Pages
    Revised Pages rhetorical code studies Revised Pages Sweetland Digital rhetoric collaborative Series Editors: Anne Ruggles Gere, University of Michigan Naomi Silver, University of Michigan The Sweetland Digital Rhetoric Collaborative Book Series publishes texts that investigate the multiliteracies of digitally mediated spaces both within academia as well as other contexts. Rhetorical Code Studies: Discovering Arguments in and around Code Kevin Brock Developing Writers in Higher Education: A Longitudinal Study Anne Ruggles Gere, Editor Sites of Translation: What Multilinguals Can Teach Us about Digital Writing and Rhetoric Laura Gonzales Rhizcomics: Rhetoric, Technology, and New Media Composition Jason Helms Making Space: Writing, Instruction, Infrastrucure, and Multiliteracies James P. Purdy and Dànielle Nicole DeVoss, Editors Digital Samaritans: Rhetorical Delivery and Engagement in the Digital Humanities Jim Ridolfo diGitalculturebooks, an imprint of the University of Michigan Press, is dedicated to publishing work in new media studies and the emerging field of digital humanities. Revised Pages Rhetorical Code Studies discovering arguments in and around code Kevin Brock University of Michigan Press ann arbor Revised Pages Copyright © 2019 by Kevin Brock Some rights reserved This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Note to users: A Creative Commons license is only valid when it is applied by the person or entity that holds rights to the licensed work. Works may contain components (e.g., photo- graphs, illustrations, or quotations) to which the rightsholder in the work cannot apply the license. It is ultimately your responsibility to independently evaluate the copyright status of any work or component part of a work you use, in light of your intended use.
    [Show full text]
  • Fog Computing: a Platform for Internet of Things and Analytics
    Fog Computing: A Platform for Internet of Things and Analytics Flavio Bonomi, Rodolfo Milito, Preethi Natarajan and Jiang Zhu Abstract Internet of Things (IoT) brings more than an explosive proliferation of endpoints. It is disruptive in several ways. In this chapter we examine those disrup- tions, and propose a hierarchical distributed architecture that extends from the edge of the network to the core nicknamed Fog Computing. In particular, we pay attention to a new dimension that IoT adds to Big Data and Analytics: a massively distributed number of sources at the edge. 1 Introduction The “pay-as-you-go” Cloud Computing model is an efficient alternative to owning and managing private data centers (DCs) for customers facing Web applications and batch processing. Several factors contribute to the economy of scale of mega DCs: higher predictability of massive aggregation, which allows higher utilization with- out degrading performance; convenient location that takes advantage of inexpensive power; and lower OPEX achieved through the deployment of homogeneous compute, storage, and networking components. Cloud computing frees the enterprise and the end user from the specification of many details. This bliss becomes a problem for latency-sensitive applications, which require nodes in the vicinity to meet their delay requirements. An emerging wave of Internet deployments, most notably the Internet of Things (IoTs), requires mobility support and geo-distribution in addition to location awareness and low latency. We argue that a new platform is needed to meet these requirements; a platform we call Fog Computing [1]. We also claim that rather than cannibalizing Cloud Computing, F. Bonomi R.
    [Show full text]
  • Structured Programming - Retrospect and Prospect Harlan D
    University of Tennessee, Knoxville Trace: Tennessee Research and Creative Exchange The aH rlan D. Mills Collection Science Alliance 11-1986 Structured Programming - Retrospect and Prospect Harlan D. Mills Follow this and additional works at: http://trace.tennessee.edu/utk_harlan Part of the Software Engineering Commons Recommended Citation Mills, Harlan D., "Structured Programming - Retrospect and Prospect" (1986). The Harlan D. Mills Collection. http://trace.tennessee.edu/utk_harlan/20 This Article is brought to you for free and open access by the Science Alliance at Trace: Tennessee Research and Creative Exchange. It has been accepted for inclusion in The aH rlan D. Mills Collection by an authorized administrator of Trace: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. mJNDAMNTL9JNNEPTS IN SOFTWARE ENGINEERING Structured Programming. Retrospect and Prospect Harlan D. Mills, IBM Corp. Stnuctured program- 2 ' dsger W. Dijkstra's 1969 "Struc- mon wisdom that no sizable program Ste red .tured Programming" articlel could be error-free. After, many sizable ming haxs changed ho w precipitated a decade of intense programs have run a year or more with no programs are written focus on programming techniques that has errors detected. since its introduction fundamentally alteredhumanexpectations and achievements in software devel- Impact of structured programming. two decades ago. opment. These expectations and achievements are However, it still has a Before this decade of intense focus, pro- not universal because of the inertia of lot of potentialfor gramming was regarded as a private, industrial practices. But they are well- lot of fo puzzle-solving activity ofwriting computer enough established to herald fundamental more change.
    [Show full text]
  • Printed Program
    rd International Conference 43 on Software Engineering goes Virtual PROGRAM May 25th –28th 2021 Co-located events: May 17th –May 24th Workshops: May 24th , May 29th –June 4th https://conf.researchr.org/home/icse-2021 @ICSEconf Table of Contents Conference overviews ............................................................... 3 Sponsors and Supporters ......................................................... 11 Welcome letter ........................................................................ 13 Keynotes ................................................................................. 18 Technical Briefings ................................................................. 28 Co-located events .................................................................... 35 Workshops .............................................................................. 36 New Faculty Symposium ........................................................ 37 Doctoral Symposium .............................................................. 39 Detailed Program - Tuesday, May 25th .................................................... 42 - Wednesday, May 26th ............................................... 53 - Thursday, May 27th .................................................. 66 - Friday, May 28th ....................................................... 80 Awards .................................................................................... 91 Social and Networking events ................................................. 94 Organizing Committee ........................................................
    [Show full text]
  • 122520182414.Pdf
    Archive of SID University of Tabriz-Iran Journal of Philosophical Investigations ISSN (print): 2251-7960/ (online): 2423-4419 Vol. 12/ No. 24/ fall 2018 Postmodernism, Philosophy and Literature* Hossein Sabouri** Associate Professor, University of Tabriz, Iran Abstract No special definite definition does exist for postmodernism however it has had an inordinate effect on art, architecture, music, film, literature, philosophy, sociology, communications, fashion, and technology. The main body of this work can be seen as an admiration and reverence for the values and ideals associated with postmodern philosophy as well as postmodern literature. , I have argued that postmodern has mainly influenced philosophy and literature and they are recognized and praised for their multiplicity. Postmodernism might seem exclusive in its work, its emphasis on multiplicity and the decentered subject makes very uncomfortable reading for traditional theorists or philosophers. It rejects western values and beliefs as only small part of the human experience and it rejects such ideas, beliefs, culture and norms of the western. Integrity is fragmented apart into unharmonious narratives which lead to a shattering of identity and an overall breakdown of any idea of the self. Relativism and Self- reflexivity have replaced self-confidence due to the postmodern belief that all representation distorts reality. I have also referred that in a sense; postmodernism is a part of modernism we find the instantaneous coexistence of these two methods of expression and thinking, especially in visual arts and literature. Key words: Postmodernism, modernism, Philosophy, Literature, self, relativism, * Received date: 2018/07/15 Accepted date: 2018/09/26 ** E-mail: [email protected] www.SID.ir Archive of SID272/ Philosophical Investigations, Vol.
    [Show full text]
  • The Palgrave Handbook of Posthumanism in Film and Television the Palgrave Handbook of Posthumanism in Film and Television
    The Palgrave Handbook of Posthumanism in Film and Television The Palgrave Handbook of Posthumanism in Film and Television Edited by Michael Hauskeller University of Exeter, UK Thomas D. Philbeck World Economic Forum, Switzerland Curtis D. Carbonell Khalifa University of Science, Technology and Research, UAE Selection and editorial matter © Michael Hauskeller, Thomas D. Philbeck and Curtis D. Carbonell 2015 Individual chapters © Respective authors 2015 Softcover reprint of the hardcover 1st edition 2015 978-1-137-43031-1 All rights reserved. No reproduction, copy or transmission of this publication may be made without written permission. No portion of this publication may be reproduced, copied or transmitted save with written permission or in accordance with the provisions of the Copyright, Designs and Patents Act 1988, or under the terms of any licence permitting limited copying issued by the Copyright Licensing Agency, Saffron House, 6–10 Kirby Street, London EC1N 8TS. Any person who does any unauthorized act in relation to this publication may be liable to criminal prosecution and civil claims for damages. The authors have asserted their rights to be identified as the authors of this work in accordance with the Copyright, Designs and Patents Act 1988. First published 2015 by PALGRAVE MACMILLAN Palgrave Macmillan in the UK is an imprint of Macmillan Publishers Limited, registered in England, company number 785998, of Houndmills, Basingstoke, Hampshire RG21 6XS. Palgrave Macmillan in the US is a division of St Martin’s Press LLC, 175 Fifth Avenue, New York, NY 10010. Palgrave Macmillan is the global academic imprint of the above companies and has companies and representatives throughout the world.
    [Show full text]
  • Programmed Moves: Race and Embodiment in Fighting and Dancing Videogames
    UC Berkeley UC Berkeley Electronic Theses and Dissertations Title Programmed Moves: Race and Embodiment in Fighting and Dancing Videogames Permalink https://escholarship.org/uc/item/5pg3z8fg Author Chien, Irene Y. Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California Programmed Moves: Race and Embodiment in Fighting and Dancing Videogames by Irene Yi-Jiun Chien A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Film and Media and the Designated Emphasis in New Media in the Graduate Division of the University of California, Berkeley Committee in charge: Professor Linda Williams, Chair Professor Kristen Whissel Professor Greg Niemeyer Professor Abigail De Kosnik Spring 2015 Abstract Programmed Moves: Race and Embodiment in Fighting and Dancing Videogames by Irene Yi-Jiun Chien Doctor of Philosophy in Film and Media Designated Emphasis in New Media University of California, Berkeley Professor Linda Williams, Chair Programmed Moves examines the intertwined history and transnational circulation of two major videogame genres, martial arts fighting games and rhythm dancing games. Fighting and dancing games both emerge from Asia, and they both foreground the body. They strip down bodily movement into elemental actions like stepping, kicking, leaping, and tapping, and make these the form and content of the game. I argue that fighting and dancing games point to a key dynamic in videogame play: the programming of the body into the algorithmic logic of the game, a logic that increasingly organizes the informatic structure of everyday work and leisure in a globally interconnected information economy.
    [Show full text]
  • Debates in the Digital Humanities This Page Intentionally Left Blank DEBATES in the DIGITAL HUMANITIES
    debates in the digital humanities This page intentionally left blank DEBATES IN THE DIGITAL HUMANITIES Matthew K. Gold editor University of Minnesota Press Minneapolis London Chapter 1 was previously published as “What Is Digital Humanities and What’s It Doing in English Departments?” ADE Bulletin, no. 150 (2010): 55– 61. Chap- ter 2 was previously published as “The Humanities, Done Digitally,” The Chron- icle of Higher Education, May 8, 2011. Chapter 17 was previously published as “You Work at Brown. What Do You Teach?” in #alt- academy, Bethany Nowviskie, ed. (New York: MediaCommons, 2011). Chapter 28 was previously published as “Humanities 2.0: Promises, Perils, Predictions,” PMLA 123, no. 3 (May 2008): 707– 17. Copyright 2012 by the Regents of the University of Minnesota all rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Published by the University of Minnesota Press 111 Third Avenue South, Suite 290 Minneapolis, MN 55401- 2520 http://www.upress.umn.edu library of congress cataloging-in-publication data Debates in the digital humanities / [edited by] Matthew K. Gold. ISBN 978-0-8166-7794-8 (hardback)—ISBN 978-0-8166-7795-5 (pb) 1. Humanities—Study and teaching (Higher)—Data processing. 2. Humanities —Technological innovations. 3. Digital media. I. Gold, Matthew K.. AZ182.D44 2012 001.3071—dc23 2011044236 Printed in the United States of America on acid- free paper The University of Minnesota is an equal- opportunity educator and employer.
    [Show full text]
  • A Dynamic Cloud Computing Platform for Ehealth Systems
    A Dynamic Cloud Computing Platform for eHealth Systems Mehdi Bahrami 1 and Mukesh Singhal 2 Cloud Lab University of California Merced, USA Email: 1 IEEE Senior Member, [email protected]; 2 IEEE Fellow, [email protected] Abstract— Cloud Computing technology offers new Application Programming Interface (API) could have some opportunities for outsourcing data, and outsourcing computation issue when the application transfer to a cloud computing system to individuals, start-up businesses, and corporations in health that needs to redefine or modify the security functions of the API care. Although cloud computing paradigm provides interesting, in order to use the cloud. Each cloud computing system offer and cost effective opportunities to the users, it is not mature, and own services to using the cloud introduces new obstacles to users. For instance, vendor lock-in issue that causes a healthcare system rely on a cloud Security Issue: Data security refers to accessibility of stored vendor infrastructure, and it does not allow the system to easily data to only authorized users, and network security refers to transit from one vendor to another. Cloud data privacy is another accessibility of transfer of data between two authorized users issue and data privacy could be violated due to outsourcing data through a network. Since cloud computing uses the Internet as to a cloud computing system, in particular for a healthcare system part of its infrastructure, stored data on a cloud is vulnerable to that archives and processes sensitive data. In this paper, we both a breach in data and network security. present a novel cloud computing platform based on a Service- Oriented cloud architecture.
    [Show full text]
  • Michel Foucault, Philosopher? a Note on Genealogy and Archaeology1 Rudi Visker
    PARRHESIA NUMBER 5 • 2008 • 9-18 MICHEL FOUCAULT, PHILOSOPHER? A NOTE ON GENEALOGY AND ARCHAEOLOGY1 Rudi Visker My title formulates a question that is mainly addressed to myself. Less elliptically formulated, it would read as follows: please explain why you, a professor in philosophy, have published over the years so many pages in which you kept referring to the work of someone who has authored a series of historical works on topics which, at first sight, have hardly any bearing on the discipline which your institution pays you to do research in. Whence this attraction to studies on madness, crime or sexuality? Wasn’t one book enough to make you realize that however enticing a reading such works may be, they bring little, if anything, for philosophy as such? I imagine my inquisitor wouldn’t rest if I were to point out to him that he seems badly informed and apparently unaware of the fact that Foucault by now has come to be accepted as an obvious part of the philosophical canon for the past century. Should I manage to convince him to take up a few of the books presenting his thought to philosophers, he would no doubt retort that what he had been reading mainly consisted of summaries of the aforementioned histories, and for the rest of exactly the kind of arguments that gave rise to his suspicion: accusations of nihilism, relativism, self-contradiction, critique without standards… And worse, if I were honest, I would have to agree that for all the fascination that it exerted on us philosophers, Foucault’s work also put us before a deep, and by now familiar embarrassment.
    [Show full text]
  • X86 Disassembly Exploring the Relationship Between C, X86 Assembly, and Machine Code
    x86 Disassembly Exploring the relationship between C, x86 Assembly, and Machine Code PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 07 Sep 2013 05:04:59 UTC Contents Articles Wikibooks:Collections Preface 1 X86 Disassembly/Cover 3 X86 Disassembly/Introduction 3 Tools 5 X86 Disassembly/Assemblers and Compilers 5 X86 Disassembly/Disassemblers and Decompilers 10 X86 Disassembly/Disassembly Examples 18 X86 Disassembly/Analysis Tools 19 Platforms 28 X86 Disassembly/Microsoft Windows 28 X86 Disassembly/Windows Executable Files 33 X86 Disassembly/Linux 48 X86 Disassembly/Linux Executable Files 50 Code Patterns 51 X86 Disassembly/The Stack 51 X86 Disassembly/Functions and Stack Frames 53 X86 Disassembly/Functions and Stack Frame Examples 57 X86 Disassembly/Calling Conventions 58 X86 Disassembly/Calling Convention Examples 64 X86 Disassembly/Branches 74 X86 Disassembly/Branch Examples 83 X86 Disassembly/Loops 87 X86 Disassembly/Loop Examples 92 Data Patterns 95 X86 Disassembly/Variables 95 X86 Disassembly/Variable Examples 101 X86 Disassembly/Data Structures 103 X86 Disassembly/Objects and Classes 108 X86 Disassembly/Floating Point Numbers 112 X86 Disassembly/Floating Point Examples 119 Difficulties 121 X86 Disassembly/Code Optimization 121 X86 Disassembly/Optimization Examples 124 X86 Disassembly/Code Obfuscation 132 X86 Disassembly/Debugger Detectors 137 Resources and Licensing 139 X86 Disassembly/Resources 139 X86 Disassembly/Licensing 141 X86 Disassembly/Manual of Style 141 References Article Sources and Contributors 142 Image Sources, Licenses and Contributors 143 Article Licenses License 144 Wikibooks:Collections Preface 1 Wikibooks:Collections Preface This book was created by volunteers at Wikibooks (http:/ / en.
    [Show full text]