From 3d29579a6cb3be321296c12e27dfbf90fc9e26f9 Mon Sep 17 00:00:00 2001 From: Nick White Date: Sun, 14 Nov 2010 22:47:04 +0000 Subject: Add tests --- Makefile | 9 +- TODO | 1 - tests/html/bbcnewsleaks.html | 2206 +++++++++++++++++++++++++++++++++++ tests/html/bbcnewsleaks.html.simple | 354 ++++++ tests/html/riemenstext.html | 346 ++++++ tests/html/riemenstext.html.simple | 263 +++++ tests/html/wikireading.html | 468 ++++++++ tests/html/wikireading.html.simple | 176 +++ tests/runtest.sh | 26 + tests/showsimple.js | 6 + tests/surfuri_js.patch | 19 + 11 files changed, 3872 insertions(+), 2 deletions(-) create mode 100644 tests/html/bbcnewsleaks.html create mode 100644 tests/html/bbcnewsleaks.html.simple create mode 100644 tests/html/riemenstext.html create mode 100644 tests/html/riemenstext.html.simple create mode 100644 tests/html/wikireading.html create mode 100644 tests/html/wikireading.html.simple create mode 100755 tests/runtest.sh create mode 100644 tests/showsimple.js create mode 100644 tests/surfuri_js.patch diff --git a/Makefile b/Makefile index 9265680..5bfc273 100644 --- a/Makefile +++ b/Makefile @@ -47,6 +47,13 @@ crx: simplyread.js chromium/icon.svg chromium/manifest.json chromium/background. gpg -b < $(NAME)-$(VERSION).crx > $(NAME)-$(VERSION).crx.sig echo $(NAME)-$(VERSION).crx $(NAME)-$(VERSION).crx.sig -.PHONY: dist xpi crx +test: + for i in tests/html/*.html; do \ + sh tests/runtest.sh $$i $$i.simple 1>$$i.diff 2>/dev/null; \ + test $$? -eq 0 && echo $$i passed || echo "$$i failed (see $$i.diff)"; \ + test ! -s $$i.diff && rm $$i.diff; \ + done + +.PHONY: dist xpi crx test .SUFFIXES: ttl html png svg .SILENT: diff --git a/TODO b/TODO index d875f8d..a9c2d5b 100644 --- a/TODO +++ b/TODO @@ -1,2 +1 @@ chromium: is the script src=simplyread in background.html necessary? -make tests, which process sample html files and check the output diff --git a/tests/html/bbcnewsleaks.html b/tests/html/bbcnewsleaks.html new file mode 100644 index 0000000..e58ee64 --- /dev/null +++ b/tests/html/bbcnewsleaks.html @@ -0,0 +1,2206 @@ + + + + + + + + + + + + + + + + + + + + + BBC News - Huge Wikileaks release shows US 'ignored Iraq torture' + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ + + + +
+ + +
+
+ + +
+ +
+ + +
+ + +
+ +
+ +
+ + + + +
+ + + + + + + + + + + + + +
+
+ + + + + + +

Huge Wikileaks release shows US 'ignored Iraq torture'

+ + + + + + +
+ Hooded Iraqi men are arrested by US troops in Baghdad (2004) + + Some suspected insurgents held in Iraqi custody suffered abuse, according to the leaked records +
+

Wikileaks has released almost 400,000 secret US military logs, which suggest US commanders ignored evidence of torture by the Iraqi authorities.

+

The documents also suggest "hundreds" of civilians were killed at US military checkpoints after the invasion in 2003.

+

And the files show the US kept records of civilian deaths, despite previously denying it. The death toll was put at 109,000, of whom 66,081 were civilians.

+

The US criticised the largest leak of classified documents in its history.

+
+

Related stories

+ +
+

A US Department of Defense spokesman dismissed the documents published by the whistleblowing website as raw observations by tactical units, which were only snapshots of tragic, mundane events.

+

On allegations of abuse, he said it was policy always to report "potentially illegal abusive behaviour" so action could be taken.

+

At a news conference in London, Wikileaks founder Julian Assange said that those snapshots of everyday events offered a glimpse at the "human scale" of the conflict.

+

The deaths of one or two individuals made up the "overwhelming number" of people killed in Iraq, Mr Assange said.

+

The new documents and new deaths contained within them showed the range and frequency of the "small, relentless tragedies of this war" added John Sloboda of Iraq Body Count, which worked with Wikileaks.

+

Speaking to reporters in Washington on Friday, US Secretary of State Hillary Clinton said she condemned the disclosure and suggested the leaks put lives at risk.

+

However, Wikileaks said it was confident that the documents - published in a heavily censored form - contain "no information that could be harmful to any individual".

+

Wikileaks says it expects to launch legal proceedings as a result of information contained in the documents.

+

'Nothing new'

+

The 391,831 US army Sigacts (Significant Actions) reports published by Wikileaks on Friday describe the apparent torture of Iraqi detainees by the Iraqi authorities, sometimes using electrocution, electric drills and in some cases even executing detainees, says the BBC's Adam Brookes, who has examined some of the files.

+

The US military knew of the abuses, the documents suggest, but reports were sent up the chain of command marked "no further investigation", our correspondent adds.

+
+

Analysis

+ + + +

The documents number in the hundreds of thousands. They take the form of reports written by soldiers after vicious firefights with insurgents, or after a roadside bomb has gone off, or the bodies of a family have been found murdered in an abandoned factory. Their language is military - hard and attenuated.

+

We found, with relative ease, reports of horrible abuse committed by Iraqi security forces on detainees - beatings, electrocution, the use of an electric drill on a man's legs. The Americans were aware the abuse had taken place. On some, not all, of these reports was marked "no further investigation", suggesting that American forces took no action on learning of the abuse.

+

The true lessons contained in these documents will take months or years to emerge. But an early question they pose is: why do Iraqi security forces appear to be continuing practices that might have died with the fall of Saddam Hussein's regime? And what has the United States done to end them?

+ + +

One document shows the US military was given a video apparently showing Iraqi Army (IA) officers executing a prisoner in the northern town of Talafar.

+

"The footage shows the IA soldiers moving the detainee into the street, pushing him to the ground, punching him and shooting him," states the log, which also names at least one of the perpetrators.

+

In another case, US soldiers suspected army officers of cutting off a detainee's fingers and burning him with acid.

+

Pentagon spokesman Geoff Morrell told the BBC that if abuse by the Iraqi security forces was witnessed, or reports of it were received, US military personnel were instructed to inform their commanders.

+

"And at the appropriate level that information would then be shared with the Iraqi authorities and the military for them to take action."

+

The documents also reveal many previously unreported instances in which US forces killed civilians at checkpoints and during operations.

+

In one incident in July 2007, as many as 26 Iraqis were killed by a helicopter, about half of them civilians, according to the log.

+

Another record shows an Apache helicopter gunship fired on two men believed to have fired mortars at a military base in Baghdad in February 2007, even though they were attempting to surrender. The crew asked a lawyer whether they could accept the surrender, but were told they could not, "and are still valid targets". So they shot them.

+

The helicopter - with the callsign "Crazyhorse 18" - was also involved in another incident that July in which two journalists were killed and two children wounded.

+

There are also new indications of Iran's involvement in Iraq, with reports of insurgents being trained and using weapons provided by the Islamic Revolution Guards Corps (IRGC).

+

Finally, the documents appear to show that the US military did keep records of civilian deaths, despite earlier denials that any official statistics on the death toll were available.

+

The logs showed there were more than 109,000 violent deaths between 2004 and the end of 2009.

+ + + + + + + +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ + + +
+ +
+ + + + + + +

Hillary Clinton: "We should condemn in the most clear terms the disclosure"

+ +
+ + +

They included 66,081 civilians, 23,984 people classed as "enemy", 15,196 members of the Iraqi security forces, and 3,771 coalition troops.

+

Iraq Body Count, which collates civilian deaths using cross-checked media reports and other figures such as morgue records, said that based on an analysis of a sample of 860 logs, it estimated that around 15,000 previously unknown civilian deaths would be identified.

+

The UK's Guardian newspaper also reported that the US military appeared not to have recorded any civilian deaths during its two major offensives on the city of Falluja in 2004.

+

Mr Morrell, of the Pentagon, told the BBC that the leak was a "travesty" which provided enemies of the West with an "extraordinary database to figure out how we operate".

+

He said the cache of documents contained "nothing new" with regards to fundamental policy issues.

+ + + + + + + +
+
+ + + + + + + + + + + + + + + + + + + + + + + +
+ +
+ + +

And he once again asked Wikileaks to remove the documents from the web and return them to the Department of Defense.

+

US Defence Secretary Robert Gates suggested the whistle-blowing website had blood on its hands in July after it published more than 70,000 secret papers about the war in Afghanistan.

+

The investigation into the Afghan leak has focused on Bradley Manning, a US army intelligence analyst who is in custody and has been charged with providing Wikileaks with a video of the July 2007 attack by a helicopter with the callsign Crazyhorse 18.

+

The release of the documents comes as the US military prepares to withdraw all 50,000 remaining troops from Iraq by the end of 2011.

+

Violence in the country has declined sharply over the past two years, but near-daily bombings and shootings continue.

+ + +
+
+ +
+

More on This Story

+
+
+

Struggle for Iraq

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ +
+ + +
+

Related stories

+ +
+ + + +
+ + + + + + + + + + + + + + + + + + +
+

From other news sites

+ +
* May require registration or subscription
+
+ + + + + + +
+ + + + + + + +

The BBC is not responsible for the content of external Internet sites

+
+ + +
+ + + + + +
+ +
+ + + + + + +
+

More Middle East stories

+ RSS + + + + + + + + + + + +
+ + +
+ +
+
+ +
+ +
+ + + + + + +
+ +

Top Stories

+ + + + + + + + + + +
+ + + + +
+ +
+ + + + +
+ +

Features & Analysis

+ +
    + + + + + + + + +
  • + + + + + + + + + + + + + + +

    + File image of Thai foodFood fight +

    + +

    Can foreign chefs truly master Thai cuisine?

    + +
    +
  • + + +
  • + + + + + + + + + + + + + + +

    + Family living in a tent campAfter the flood +

    + +

    Brazilians try to rebuild their lives after June's disaster

    + +
    +
  • + + +
  • + + + + + + + + + + + + + + +

    + Canadian navy watches a Yemeni fishing boat, file imageDisarm, set free +

    + +

    Nato frustrated with Somali piracy mission

    + +
    +
  • + + +
  • + + + + + + + + + + + + + + +

    + GruffaloGruffalo dissected +

    + +

    What is this most celebrated of children’s books about?

    + +
    +
  • + + + + +
+
+ + + + + + + + +
+ + + +
+
+ +

Elsewhere on the BBC

+ +
    + + + +
  • + + + + + + + + + + + + + +

    + The Colossi of Memnon on the West Bank of LuxorNight train to Luxor +

    +

    BBC Travel rides the rails to Egypt's southern cultural treasure trove

    +
  • +
+ +
+ +
+ + +
+ + + +
+ + + +
+ +
+ + + +
+ + + +
+

Programmes

+ + + + +
    + + + +
  • + + + + + + + + + + + + + +

    + Voters in TexasWorld News America Watch +

    +

    'Ethnicity is everything.' Why race could be a decisive factor for mid-term voters in Texas

    + + +
    + +
    + + +
  • +
+
+ + +
+ + + +
+ + +
+ + +
+ +
+ + + + +

bbc.co.uk navigation

BBC © MMX The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ + + + + + + + + + + + + diff --git a/tests/html/bbcnewsleaks.html.simple b/tests/html/bbcnewsleaks.html.simple new file mode 100644 index 0000000..4b6043e --- /dev/null +++ b/tests/html/bbcnewsleaks.html.simple @@ -0,0 +1,354 @@ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

BBC News - Huge Wikileaks release shows US 'ignored Iraq torture'

+ + + + + + +

Huge Wikileaks release shows US 'ignored Iraq torture'

+ + + + + + +
+ Hooded Iraqi men are arrested by US troops in Baghdad (2004) + + Some suspected insurgents held in Iraqi custody suffered abuse, according to the leaked records +
+

Wikileaks has released almost 400,000 secret US military logs, which suggest US commanders ignored evidence of torture by the Iraqi authorities.

+

The documents also suggest "hundreds" of civilians were killed at US military checkpoints after the invasion in 2003.

+

And the files show the US kept records of civilian deaths, despite previously denying it. The death toll was put at 109,000, of whom 66,081 were civilians.

+

The US criticised the largest leak of classified documents in its history.

+
+ Continue reading the main story

Related stories

+ +
+

A US Department of Defense spokesman dismissed the documents published by the whistleblowing website as raw observations by tactical units, which were only snapshots of tragic, mundane events.

+

On allegations of abuse, he said it was policy always to report "potentially illegal abusive behaviour" so action could be taken.

+

At a news conference in London, Wikileaks founder Julian Assange said that those snapshots of everyday events offered a glimpse at the "human scale" of the conflict.

+

The deaths of one or two individuals made up the "overwhelming number" of people killed in Iraq, Mr Assange said.

+

The new documents and new deaths contained within them showed the range and frequency of the "small, relentless tragedies of this war" added John Sloboda of Iraq Body Count, which worked with Wikileaks.

+

Speaking to reporters in Washington on Friday, US Secretary of State Hillary Clinton said she condemned the disclosure and suggested the leaks put lives at risk.

+

However, Wikileaks said it was confident that the documents - published in a heavily censored form - contain "no information that could be harmful to any individual".

+

Wikileaks says it expects to launch legal proceedings as a result of information contained in the documents.

+

'Nothing new'

+

The 391,831 US army Sigacts (Significant Actions) reports published by Wikileaks on Friday describe the apparent torture of Iraqi detainees by the Iraqi authorities, sometimes using electrocution, electric drills and in some cases even executing detainees, says the BBC's Adam Brookes, who has examined some of the files.

+

The US military knew of the abuses, the documents suggest, but reports were sent up the chain of command marked "no further investigation", our correspondent adds.

+
+ Continue reading the main story

Analysis

+ + + +

The documents number in the hundreds of thousands. They take the form of reports written by soldiers after vicious firefights with insurgents, or after a roadside bomb has gone off, or the bodies of a family have been found murdered in an abandoned factory. Their language is military - hard and attenuated.

+

We found, with relative ease, reports of horrible abuse committed by Iraqi security forces on detainees - beatings, electrocution, the use of an electric drill on a man's legs. The Americans were aware the abuse had taken place. On some, not all, of these reports was marked "no further investigation", suggesting that American forces took no action on learning of the abuse.

+

The true lessons contained in these documents will take months or years to emerge. But an early question they pose is: why do Iraqi security forces appear to be continuing practices that might have died with the fall of Saddam Hussein's regime? And what has the United States done to end them?

+ + +

One document shows the US military was given a video apparently showing Iraqi Army (IA) officers executing a prisoner in the northern town of Talafar.

+

"The footage shows the IA soldiers moving the detainee into the street, pushing him to the ground, punching him and shooting him," states the log, which also names at least one of the perpetrators.

+

In another case, US soldiers suspected army officers of cutting off a detainee's fingers and burning him with acid.

+

Pentagon spokesman Geoff Morrell told the BBC that if abuse by the Iraqi security forces was witnessed, or reports of it were received, US military personnel were instructed to inform their commanders.

+

"And at the appropriate level that information would then be shared with the Iraqi authorities and the military for them to take action."

+

The documents also reveal many previously unreported instances in which US forces killed civilians at checkpoints and during operations.

+

In one incident in July 2007, as many as 26 Iraqis were killed by a helicopter, about half of them civilians, according to the log.

+

Another record shows an Apache helicopter gunship fired on two men believed to have fired mortars at a military base in Baghdad in February 2007, even though they were attempting to surrender. The crew asked a lawyer whether they could accept the surrender, but were told they could not, "and are still valid targets". So they shot them.

+

The helicopter - with the callsign "Crazyhorse 18" - was also involved in another incident that July in which two journalists were killed and two children wounded.

+

There are also new indications of Iran's involvement in Iraq, with reports of insurgents being trained and using weapons provided by the Islamic Revolution Guards Corps (IRGC).

+

Finally, the documents appear to show that the US military did keep records of civilian deaths, despite earlier denials that any official statistics on the death toll were available.

+

The logs showed there were more than 109,000 violent deaths between 2004 and the end of 2009.

+ + + + + + + +
+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + +
+ + + +
+ +
+ + + + + + +

Hillary Clinton: "We should condemn in the most clear terms the disclosure"

+ +
+ + +

They included 66,081 civilians, 23,984 people classed as "enemy", 15,196 members of the Iraqi security forces, and 3,771 coalition troops.

+

Iraq Body Count, which collates civilian deaths using cross-checked media reports and other figures such as morgue records, said that based on an analysis of a sample of 860 logs, it estimated that around 15,000 previously unknown civilian deaths would be identified.

+

The UK's Guardian newspaper also reported that the US military appeared not to have recorded any civilian deaths during its two major offensives on the city of Falluja in 2004.

+

Mr Morrell, of the Pentagon, told the BBC that the leak was a "travesty" which provided enemies of the West with an "extraordinary database to figure out how we operate".

+

He said the cache of documents contained "nothing new" with regards to fundamental policy issues.

+ + + + + + + +
+
+ + + + + + + + + + + + + + + + + + + + + + + +
+ +
+ + +

And he once again asked Wikileaks to remove the documents from the web and return them to the Department of Defense.

+

US Defence Secretary Robert Gates suggested the whistle-blowing website had blood on its hands in July after it published more than 70,000 secret papers about the war in Afghanistan.

+

The investigation into the Afghan leak has focused on Bradley Manning, a US army intelligence analyst who is in custody and has been charged with providing Wikileaks with a video of the July 2007 attack by a helicopter with the callsign Crazyhorse 18.

+

The release of the documents comes as the US military prepares to withdraw all 50,000 remaining troops from Iraq by the end of 2011.

+

Violence in the country has declined sharply over the past two years, but near-daily bombings and shootings continue.

+ + +
+ diff --git a/tests/html/riemenstext.html b/tests/html/riemenstext.html new file mode 100644 index 0000000..8bee907 --- /dev/null +++ b/tests/html/riemenstext.html @@ -0,0 +1,346 @@ + + + + +Riemens, Some Thoughts on the Idea of "Hacker Culture" + + + + + + + + + + + + + +
+ + + + +
+ + + + + + + + + + + + + + + + + + + + +
  
a
  
+
+
+

 

+
+

SOME + THOUGHTS ON THE IDEA OF "HACKER CULTURE"
+

+ Patrice + Riemens
+
+

+

"The + Theory of 'Free Software' as the seed of a post-capitalist society only + makes sense where it is understood as the exposure of those very contradictions + of the development of productive forces which are relevant to the process + of emancipation. It does not, however, make sense as a discovery of a + format for their deployment out of which would automatically spring forth + a better society. And it does not make sense either as the first stage + of a process that one ought to follow as if it were a blueprint." + ("Eight Theses on Liberation," Oekonux + mailing list)

+

As + the new information and communication technologies (ICT) entered our lives + and became increasingly important in our daily activities, so did all + kinds of knowledge, working habits and ways of thinking that were previously + the exclusive domain of "geeks" and computer experts. Even though + the vast majority of ICT users are passive consumers, a modicum of technological + know-how is more and more prevalent among non-professionals, and these + days, artists, intellectuals, and political activists have become fairly + visible as informed and even innovative actors in what has become known + as the public domain in cyberspace.

+

"Hackers," + also often, but inexactly referred to as "computer pirates" + or other derogatory term, constitute without doubt the first social movement + that was intrinsic to the electronic technology that spawned our networked + society. Hackers, both through their savyness and their actions, have + hit the imagination and have been in the news right from the onset of + the "information age," being either hyped up as bearers of an + independent and autonomous technological mastery, or demonized as potential + "cyber-terrorists" in the process. More recently they have been + hailed in certain "alternative" intellectual and cultural circles + as a countervailing power of sorts against the increasingly oppressive + onslaught of both monopolistic ICT corporations and regulation-obsessed + governments and their experts. Transformed into role-models as effective + resistance fighters against "the system," their garb has been + assumed with various degrees of (de)merit by a plethora of cultural and + political activists associated, closely or loosely, with the "counter-globalization + movement."

+

Yet, + whereas hackers (if we take a broad definition of the term) have been + pioneering the opening up of electronic channels of communication in the + South, in the North, they initially were held in suspicion by those same + circles. Political militants there hesitated for a long time before embarking + into computers and the new media, which they tended to view as "capitalist" + and hence "politically incorrect." By the mid-nineties, however, + "on-line activism" made rapid progress worldwide as more and + more groups adopted the new technologies as tools of action and information + exchange. The dwindling costs of equipment and communication, the (relative) + ease of use, the reliability and security, and the many options that were + offered by ICT were a boon to activists of all possible denominations. + All this was also a very bad surprise to the people at the helm of corporate + and political power, as they saw a swift, substantial, and many-pronged + breakdown of their stranglehold on communication and information taking + place. For some time, it looked like as if a level playing field between + hitherto dominators and dominated had come within sight.

+

The + Net, as a result, became not only one of the principal carriers of political + activism, but also one of its major locus and issue. Once they had overcome + their initial shock and surprise, the powers that be were bound to react + forcefully. And they did, beefing up the "protection" of so-called + intellectual property, erecting ever higher walls around expert knowledge + and techniques, and unlashing all-round measures of control and surveillance + on electronic communications. But resistance against this (re)subjugation + of the networks also got organized. Almost by necessity, more and more + activists became conversant with the new technologies, which in the given + circumstances had to be a hands-on learning process. This process saw + activists turning "techies" and "geeks" turning activists + and has resulted in activist circles (political, but also intellectual, + cultural, and artistic) becoming markedly, sometimes completely, ITC-driven. + However, as we will see, this does not ipso facto make them hackers.

+

But + it was equally within the domain of ICT itself that the exponential expansion + of both range and carrying capacity of the Internet, as well of that of + the related technologies, and all this within an increasingly aggressive + commercial environment made experts think again about the consequences + of these developments and even reconsider their methods, opinion, and + for quite a few of them, their position within the hitherto obtaining + order of things. Rejecting the new enclosures that are being imposed on + the dissemination of knowledge and techniques by commercial and/or state + interests, they are exploring new avenues of developing, spreading, and + also rewarding knowledge-building that are not exploitative and monopolistic + or even solely profit-oriented. Hence the flight taken by various software + programs, utilities and application modalities that have become known + under the generic name of Linux, Free Software, Open Source, and General + Public License (for definitions, see www.gnu.org).

+

De + prime abord, these developments suggest that given these technological + settings and socio-economic and political circumstances, convergence was + bound to take place between the actors involved, meaning a merger between + hackers and (political, cultural etc) activists since they were spreading + the same message, and operated in parallel ways under similar threats. + Unfortunately, this interpretation is as unwarranted in its optimism as + it is precipitate in its formulation. Following a line of reasoning aptly + called by the Dutch "the wish is the mother of the idea," such + interpretation is based on the assumed relation, not to say equivalence, + between individuals and groups, and between pursuits, motives, and methods + whose affinities and linkages, even when viewed under the designation + of "new social movements," are far from evident. In fact the + alleged congruence is inherently unstable since it is contingent, and + the supposedly common positions between those two groups are often absent + altogether, and sometimes even contradictory. Whereas it would be excessive + to portray hackers and activists in terms of "never shall the twins + met," the idea, asserted by many a political activist and certain + "public intellectuals," to the effect that their coalescence + is both natural and inevitable is equally outlandish. Not only does it + run roughshod of the sensibilities of "authentic" hackers - + and it does so unfortuitously - it also misrepresents reality hence giving + rise to erroneous hypothesizes and unwarranted expectations.

+

"Hacker + culture," a concept one often encounters these days among networked + activists, purports to represent this playful confluence between tech + wizardry and the moral high ground. Hence, "Open Source" is + fast becoming an omnibus framework and a near-universal tool-kit to tackle + very diverse social issues, such as artistic production, law, epistemology, + education, and a few others, which are but remotely - if at all - related + to the field of software research and development, and the social environments + from which it originates. There is little wrong in itself to this - imitation + being the best of compliments - but for the fact that it tends to obscure + a sticky problem. Between hackers and activists often looms a wide gap + in approach and attitude that is just too critical to be easily papered + away. And it is precisely this fundamental difference that is usually + being hushed up by the evangelists of what I call the "hackers-activists + bhai-bhai" gospel - phrased after the celebrated slogan mouthed by + Chinese and Indian Ministers in 1953: "Hindi-Chini Bhai-Bhai" + ("India and China are Brothers") nine years later, both countries + were at war. A good, if a contrario, example of a really occurring non-equivalence + between political activists applying ICT and hackers is provided by that + spurious hybrid known as "hacktivism." "Hacktivism" + was originally coined by the Boston-based hackers "Cult of the Dead + Cow" (www.cultdeadcow.com), whose tag-line read "We put the + hack in activism." It was all about using ICT skills to thwart attacks + on liberties by powerful institutions. The group later had to defend itself + of guilt by association with respect to recent manifestations of "hacktivism" + as Distributed Denial of Services (DoDS) attacks.

+

Behind + the so-called "Hacker Ethic" is the usual, daily activity of + hackers. To put it very simply, without going deeper into its precise + content, the hacker ethic runs strikingly parallel to the formula "l'art + pour l'art." What matters here, is the realization that, unlike activists, + hackers are focused on the pursuit of knowledge and the exercise of curiosity + for its own sake. Therefore, the obligations that derive from the hacker + ethic are perceived by genuine hackers as sovereign and not instrumental, + and always prevail above other aims or interests, whatever these may be + - and if there are any at all. This consequently makes the hackers movement + to be wary of any particular blueprint of society, however alternative, + and even adverse to embrace particular antagonism (some hackers, and not + minor ones, are for instance loath to demonize the Microsoft Corporation). + Hence the spread of political and philosophical opinions harbored by individual + hackers, without any loss of their feeling of identity and belonging to + the "movement" at large or even their particular group, is truly + astonishing, and very unlikely to obtain within any other "new social + movement." In fact, the militant defense of individual liberties + and a penchant for rather unegalitarian economic convictions one encounters + in tandem among a good many hackers has provided for bafflement among + networked political (i.e. left-leaning) activists coming to be better + acquainted with their "natural allies." Yet it is neither fortuitous + nor aberrant that the Californian transmutation of libertarianism enjoys + such widespread support among hackers.

+

The + existence of such "ideological" positions has its reflection + in the daily and usual activities of hackers, which are generally characterized + by an absence of preconceived ideas and positions. Despite the avowed + "end of the great narratives," this is not the case with political + activists, since they do have objectives and aims that precede their actions. + Hackers, on the other hand, are usually happy with the "mere," + but unrestricted, pursuit of knowledge, which reduces their "political + program," if that can be so called, to the freedom of learning and + enquiry, and thus would seem to fall very much short of demands for justice, + equality, emancipation, empowerment, etc that are formulated by political + militants. Yet they seem to be content with it, and there are good arguments + to think that such a program, as limited as it may sound, is essential, + not subsequent, to the achievement of the better society we all aspire + too.

+

This + being said, the points of convergence between the activities of hackers + and those of (political) activists are many, and they increase by the + day. It is becoming more and more evident that both groups face the same + threats, and the same adversaries. As expert technological knowledge - + especially of ITC - that sits outside the formally structured (and shielded) + domains of corporate or political power gets evermore vilified in the + shape of "(cyber)-terrorist" fantasies, paranoia, and finally, + repression, while at the same time this very expertise is increasingly + being mastered and put to use by the enemies of the neo-liberal "One + Idea System," stronger, if circumstantial, links are being welded + between hackers and activists. And these linkages are likely to deepen + and endure in the same measure as the hostility and risks both groups + are likely to encounter augment, it is worthwhile to analyze what unites + as well as what separates them.

+

"Hacktivist" + activities (and I am mostly referring here to the handywork of three groups, + Electronic Disturbance Theater, Electrohippies and RTMark), well advertised + by their authors, but also gleefully reported in the mainstream media, + are illustrative of the gap that parts activists from hackers. The former + usually view "hacktivism," which exploits the innumerable glitches + and weaknesses of ICT systems to destabilize the electronic communication + supports of "enemy organs" (government agencies, big corporations, + international financial institutions, "fascist" groups, etc.), + as a spectacular form of resistance and sabotage. The latter (generally) + take a much dimmer view, considering these activities as ineffective and + futile, and moreover, in most cases, technically inept as well. Such activities + (or antics) endanger the integrity of the network which hackers consider + to be theirs also. "Denial of Service" attacks, irrespective + of aims and targets, amount in their eyes to attacks on the freedom of + expression, which they seem to respect in a much more principled manner + than most political activists.

+

The + truth is, that by abetting "hacktivism," activists implicitly + admit that the net has become a mere corporate carrier, to which they + have only a subordinate, almost clandestine, access, as opposed to be + stakeholders in, and thus sharing responsibility for it. This constitutes + their fundamental divergence with hackers, and it is not easily remediable.

+

Political + activists are also, almost by definition, inclined to seek maximum media + exposure for their ideas and actions. Their activities, therefore, tend + to be public in all the acceptations of the term. The range of issues + that are covered by their ideals, and the variety of means and methods + to achieve the same make they need some form of organization, which is + often complex, because of and not despite the fact they strive for distribution + and horizontality. The result is that even in the most alternative of + circles, an apparatus and leaders appear, whose very informality obscures + rather than prevent hierarchies from arising. This does not suit well + the practice and the ethics of hackers, which Pekka Himanen has described + as "monastic" (www.hackersethic.org). The habitus may be monastic, + the behavior of hackers may however, perhaps be more suitably paralleled + with the "Slashta," the Polish gentry. There too, we see a desire + between equals, that is equals recognized as such beforehand, and hence + also elitist. Political activists on the other hand are much more opportunistic + when it comes to alliances and associations they engage in.

+

So + does the idea of "hacker culture" represent an effective way + to describe and define certain current modes of political activism, especially + when those do have a large ICT component? In many instances where the + term is being used, to the point of having become one of the "buzz-word + du jour," I do not believe so. In many cases, it is the romantic + appeal of what is perceived as hacker power and prowess that leads to + a superficial adoption of the "hacker attitude" moniker by the + cultural and political activists, but not of its underlying methods and + values. That does not mean that there exists an absolute incompatibility + between those two groups, and there are fortunately cases suggesting the + existence of a continuum - such as the Indymedia tech community's pairing + of expertise to a "serve the people" type of operation (tech.indymedia.org, + www.anarchogeek.com). But it should caution against a facile (and trendy) + assumption of an equivalence, and maybe against the confusion-inducing + use of the term "hacker culture" itself.

+


+ This article first + appeared in French in Multitudes, + Vol 2, No 8, March-April 2002, and in (an expanded) English translation + in Cryptome + on June 3, 2002.
+

+

+

about + Patrice Riemens >>

+
+
+
+


+

+
+
+

 

+

 

+ + + diff --git a/tests/html/riemenstext.html.simple b/tests/html/riemenstext.html.simple new file mode 100644 index 0000000..3020d90 --- /dev/null +++ b/tests/html/riemenstext.html.simple @@ -0,0 +1,263 @@ +

Riemens, Some Thoughts on the Idea of "Hacker Culture"

+

SOME + THOUGHTS ON THE IDEA OF "HACKER CULTURE"
+

+ Patrice + Riemens
+
+

+

"The + Theory of 'Free Software' as the seed of a post-capitalist society only + makes sense where it is understood as the exposure of those very contradictions + of the development of productive forces which are relevant to the process + of emancipation. It does not, however, make sense as a discovery of a + format for their deployment out of which would automatically spring forth + a better society. And it does not make sense either as the first stage + of a process that one ought to follow as if it were a blueprint." + ("Eight Theses on Liberation," Oekonux + mailing list)

+

As + the new information and communication technologies (ICT) entered our lives + and became increasingly important in our daily activities, so did all + kinds of knowledge, working habits and ways of thinking that were previously + the exclusive domain of "geeks" and computer experts. Even though + the vast majority of ICT users are passive consumers, a modicum of technological + know-how is more and more prevalent among non-professionals, and these + days, artists, intellectuals, and political activists have become fairly + visible as informed and even innovative actors in what has become known + as the public domain in cyberspace.

+

"Hackers," + also often, but inexactly referred to as "computer pirates" + or other derogatory term, constitute without doubt the first social movement + that was intrinsic to the electronic technology that spawned our networked + society. Hackers, both through their savyness and their actions, have + hit the imagination and have been in the news right from the onset of + the "information age," being either hyped up as bearers of an + independent and autonomous technological mastery, or demonized as potential + "cyber-terrorists" in the process. More recently they have been + hailed in certain "alternative" intellectual and cultural circles + as a countervailing power of sorts against the increasingly oppressive + onslaught of both monopolistic ICT corporations and regulation-obsessed + governments and their experts. Transformed into role-models as effective + resistance fighters against "the system," their garb has been + assumed with various degrees of (de)merit by a plethora of cultural and + political activists associated, closely or loosely, with the "counter-globalization + movement."

+

Yet, + whereas hackers (if we take a broad definition of the term) have been + pioneering the opening up of electronic channels of communication in the + South, in the North, they initially were held in suspicion by those same + circles. Political militants there hesitated for a long time before embarking + into computers and the new media, which they tended to view as "capitalist" + and hence "politically incorrect." By the mid-nineties, however, + "on-line activism" made rapid progress worldwide as more and + more groups adopted the new technologies as tools of action and information + exchange. The dwindling costs of equipment and communication, the (relative) + ease of use, the reliability and security, and the many options that were + offered by ICT were a boon to activists of all possible denominations. + All this was also a very bad surprise to the people at the helm of corporate + and political power, as they saw a swift, substantial, and many-pronged + breakdown of their stranglehold on communication and information taking + place. For some time, it looked like as if a level playing field between + hitherto dominators and dominated had come within sight.

+

The + Net, as a result, became not only one of the principal carriers of political + activism, but also one of its major locus and issue. Once they had overcome + their initial shock and surprise, the powers that be were bound to react + forcefully. And they did, beefing up the "protection" of so-called + intellectual property, erecting ever higher walls around expert knowledge + and techniques, and unlashing all-round measures of control and surveillance + on electronic communications. But resistance against this (re)subjugation + of the networks also got organized. Almost by necessity, more and more + activists became conversant with the new technologies, which in the given + circumstances had to be a hands-on learning process. This process saw + activists turning "techies" and "geeks" turning activists + and has resulted in activist circles (political, but also intellectual, + cultural, and artistic) becoming markedly, sometimes completely, ITC-driven. + However, as we will see, this does not ipso facto make them hackers.

+

But + it was equally within the domain of ICT itself that the exponential expansion + of both range and carrying capacity of the Internet, as well of that of + the related technologies, and all this within an increasingly aggressive + commercial environment made experts think again about the consequences + of these developments and even reconsider their methods, opinion, and + for quite a few of them, their position within the hitherto obtaining + order of things. Rejecting the new enclosures that are being imposed on + the dissemination of knowledge and techniques by commercial and/or state + interests, they are exploring new avenues of developing, spreading, and + also rewarding knowledge-building that are not exploitative and monopolistic + or even solely profit-oriented. Hence the flight taken by various software + programs, utilities and application modalities that have become known + under the generic name of Linux, Free Software, Open Source, and General + Public License (for definitions, see www.gnu.org).

+

De + prime abord, these developments suggest that given these technological + settings and socio-economic and political circumstances, convergence was + bound to take place between the actors involved, meaning a merger between + hackers and (political, cultural etc) activists since they were spreading + the same message, and operated in parallel ways under similar threats. + Unfortunately, this interpretation is as unwarranted in its optimism as + it is precipitate in its formulation. Following a line of reasoning aptly + called by the Dutch "the wish is the mother of the idea," such + interpretation is based on the assumed relation, not to say equivalence, + between individuals and groups, and between pursuits, motives, and methods + whose affinities and linkages, even when viewed under the designation + of "new social movements," are far from evident. In fact the + alleged congruence is inherently unstable since it is contingent, and + the supposedly common positions between those two groups are often absent + altogether, and sometimes even contradictory. Whereas it would be excessive + to portray hackers and activists in terms of "never shall the twins + met," the idea, asserted by many a political activist and certain + "public intellectuals," to the effect that their coalescence + is both natural and inevitable is equally outlandish. Not only does it + run roughshod of the sensibilities of "authentic" hackers - + and it does so unfortuitously - it also misrepresents reality hence giving + rise to erroneous hypothesizes and unwarranted expectations.

+

"Hacker + culture," a concept one often encounters these days among networked + activists, purports to represent this playful confluence between tech + wizardry and the moral high ground. Hence, "Open Source" is + fast becoming an omnibus framework and a near-universal tool-kit to tackle + very diverse social issues, such as artistic production, law, epistemology, + education, and a few others, which are but remotely - if at all - related + to the field of software research and development, and the social environments + from which it originates. There is little wrong in itself to this - imitation + being the best of compliments - but for the fact that it tends to obscure + a sticky problem. Between hackers and activists often looms a wide gap + in approach and attitude that is just too critical to be easily papered + away. And it is precisely this fundamental difference that is usually + being hushed up by the evangelists of what I call the "hackers-activists + bhai-bhai" gospel - phrased after the celebrated slogan mouthed by + Chinese and Indian Ministers in 1953: "Hindi-Chini Bhai-Bhai" + ("India and China are Brothers") … nine years later, both countries + were at war. A good, if a contrario, example of a really occurring non-equivalence + between political activists applying ICT and hackers is provided by that + spurious hybrid known as "hacktivism." "Hacktivism" + was originally coined by the Boston-based hackers "Cult of the Dead + Cow" (www.cultdeadcow.com), whose tag-line read "We put the + hack in activism." It was all about using ICT skills to thwart attacks + on liberties by powerful institutions. The group later had to defend itself + of guilt by association with respect to recent manifestations of "hacktivism" + as Distributed Denial of Services (DoDS) attacks.

+

Behind + the so-called "Hacker Ethic" is the usual, daily activity of + hackers. To put it very simply, without going deeper into its precise + content, the hacker ethic runs strikingly parallel to the formula "l'art + pour l'art." What matters here, is the realization that, unlike activists, + hackers are focused on the pursuit of knowledge and the exercise of curiosity + for its own sake. Therefore, the obligations that derive from the hacker + ethic are perceived by genuine hackers as sovereign and not instrumental, + and always prevail above other aims or interests, whatever these may be + - and if there are any at all. This consequently makes the hackers movement + to be wary of any particular blueprint of society, however alternative, + and even adverse to embrace particular antagonism (some hackers, and not + minor ones, are for instance loath to demonize the Microsoft Corporation). + Hence the spread of political and philosophical opinions harbored by individual + hackers, without any loss of their feeling of identity and belonging to + the "movement" at large or even their particular group, is truly + astonishing, and very unlikely to obtain within any other "new social + movement." In fact, the militant defense of individual liberties + and a penchant for rather unegalitarian economic convictions one encounters + in tandem among a good many hackers has provided for bafflement among + networked political (i.e. left-leaning) activists coming to be better + acquainted with their "natural allies." Yet it is neither fortuitous + nor aberrant that the Californian transmutation of libertarianism enjoys + such widespread support among hackers.

+

The + existence of such "ideological" positions has its reflection + in the daily and usual activities of hackers, which are generally characterized + by an absence of preconceived ideas and positions. Despite the avowed + "end of the great narratives," this is not the case with political + activists, since they do have objectives and aims that precede their actions. + Hackers, on the other hand, are usually happy with the "mere," + but unrestricted, pursuit of knowledge, which reduces their "political + program," if that can be so called, to the freedom of learning and + enquiry, and thus would seem to fall very much short of demands for justice, + equality, emancipation, empowerment, etc that are formulated by political + militants. Yet they seem to be content with it, and there are good arguments + to think that such a program, as limited as it may sound, is essential, + not subsequent, to the achievement of the better society we all aspire + too.

+

This + being said, the points of convergence between the activities of hackers + and those of (political) activists are many, and they increase by the + day. It is becoming more and more evident that both groups face the same + threats, and the same adversaries. As expert technological knowledge - + especially of ITC - that sits outside the formally structured (and shielded) + domains of corporate or political power gets evermore vilified in the + shape of "(cyber)-terrorist" fantasies, paranoia, and finally, + repression, while at the same time this very expertise is increasingly + being mastered and put to use by the enemies of the neo-liberal "One + Idea System," stronger, if circumstantial, links are being welded + between hackers and activists. And these linkages are likely to deepen + and endure in the same measure as the hostility and risks both groups + are likely to encounter augment, it is worthwhile to analyze what unites + as well as what separates them.

+

"Hacktivist" + activities (and I am mostly referring here to the handywork of three groups, + Electronic Disturbance Theater, Electrohippies and RTMark), well advertised + by their authors, but also gleefully reported in the mainstream media, + are illustrative of the gap that parts activists from hackers. The former + usually view "hacktivism," which exploits the innumerable glitches + and weaknesses of ICT systems to destabilize the electronic communication + supports of "enemy organs" (government agencies, big corporations, + international financial institutions, "fascist" groups, etc.), + as a spectacular form of resistance and sabotage. The latter (generally) + take a much dimmer view, considering these activities as ineffective and + futile, and moreover, in most cases, technically inept as well. Such activities + (or antics) endanger the integrity of the network which hackers consider + to be theirs also. "Denial of Service" attacks, irrespective + of aims and targets, amount in their eyes to attacks on the freedom of + expression, which they seem to respect in a much more principled manner + than most political activists.

+

The + truth is, that by abetting "hacktivism," activists implicitly + admit that the net has become a mere corporate carrier, to which they + have only a subordinate, almost clandestine, access, as opposed to be + stakeholders in, and thus sharing responsibility for it. This constitutes + their fundamental divergence with hackers, and it is not easily remediable.

+

Political + activists are also, almost by definition, inclined to seek maximum media + exposure for their ideas and actions. Their activities, therefore, tend + to be public in all the acceptations of the term. The range of issues + that are covered by their ideals, and the variety of means and methods + to achieve the same make they need some form of organization, which is + often complex, because of and not despite the fact they strive for distribution + and horizontality. The result is that even in the most alternative of + circles, an apparatus and leaders appear, whose very informality obscures + rather than prevent hierarchies from arising. This does not suit well + the practice and the ethics of hackers, which Pekka Himanen has described + as "monastic" (www.hackersethic.org). The habitus may be monastic, + the behavior of hackers may however, perhaps be more suitably paralleled + with the "Slashta," the Polish gentry. There too, we see a desire + between equals, that is equals recognized as such beforehand, and hence + also elitist. Political activists on the other hand are much more opportunistic + when it comes to alliances and associations they engage in.

+

So + does the idea of "hacker culture" represent an effective way + to describe and define certain current modes of political activism, especially + when those do have a large ICT component? In many instances where the + term is being used, to the point of having become one of the "buzz-word + du jour," I do not believe so. In many cases, it is the romantic + appeal of what is perceived as hacker power and prowess that leads to + a superficial adoption of the "hacker attitude" moniker by the + cultural and political activists, but not of its underlying methods and + values. That does not mean that there exists an absolute incompatibility + between those two groups, and there are fortunately cases suggesting the + existence of a continuum - such as the Indymedia tech community's pairing + of expertise to a "serve the people" type of operation (tech.indymedia.org, + www.anarchogeek.com). But it should caution against a facile (and trendy) + assumption of an equivalence, and maybe against the confusion-inducing + use of the term "hacker culture" itself.

+


+ This article first + appeared in French in Multitudes, + Vol 2, No 8, March-April 2002, and in (an expanded) English translation + in Cryptome + on June 3, 2002.
+

+

+

about + Patrice Riemens >>

+
+ diff --git a/tests/html/wikireading.html b/tests/html/wikireading.html new file mode 100644 index 0000000..a4ce070 --- /dev/null +++ b/tests/html/wikireading.html @@ -0,0 +1,468 @@ + + + +Slow reading - Wikipedia, the free encyclopedia + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
+ +
+ + + +
+ + +

Slow reading

+ + +
+ +
From Wikipedia, the free encyclopedia
+ + +
+ + +
+ Jump to: navigation, + search +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Slow reading is the intentional reduction in the speed of reading, carried out to increase comprehension or pleasure. The concept appears to have originated in the study of philosophy and literature as a technique to more fully comprehend and appreciate a complex text. More recently, there has been increased interest in slow reading as result of the slow movement and its focus on decelerating the pace of modern life.

+ + + + +
+
+

Contents

+
+ +
+ +

[edit] Related terms

+

The use of slow reading in literary criticism is sometimes referred to as close reading. Of less common usage is the term, "deep reading" (Birkerts, 1994). Slow reading is contrasted with speed reading which involves techniques to increase the rate of reading without adversely affecting comprehension, and contrasted with skimming which employs visual page cues to increase reading speed.

+

[edit] Philosophy and literature

+

The earliest reference to slow reading appears to be in Nietzsche's (1887) preface to Daybreak: "It is not for nothing that one has been a philologist, perhaps one is a philologist still, that is to say, a teacher of slow reading."[1]

+

Birkerts (1994) stated "Reading, because we control it, is adaptable to our needs and rhythms. We are free to indulge our subjective associative impulse; the term I coin for this is deep reading: the slow and meditative possession of a book." His statement speaks to the idea that slow reading is not merely about slowing down, but about controlling the pace of reading. Slow readers may speed up at times, and then slow down for the more difficult or pleasurable portions of a text.

+

The importance of personal control over the speed of reading is echoed by Pullman (2004) who argued that slow reading is needed to reinforce democracy in America. Part of its democratic nature is that the manner of reading is not determined by someone else: "we can skim, or we can read it slowly". A similar view was stated by Postman (1985) who noted the character of the ordinary citizen of the 19th century, a mind that could listen for hours on end to political orations clearly shaped by a culture favouring text. Postman warns that reading books is important for developing rational thinking and political astuteness.

+

Lindsay Waters, Executive Editor for the Humanities at Harvard University Press, declared a worldwide reading crisis resulting from our global push toward productivity. He asserts that young children are learning to read faster, skipping phonetics and diagramming sentences, and concludes that these children will not grow up to read Milton. He foresees the end of graduate English literature programs. "There is something similar between a reading method that focuses primarily on the bottom-line meaning of a story in a novel and the economic emphasis on the bottom line that makes automobile manufacturers speed up assembly lines." He advised re-introducing time into reading, "The mighty imperative is to speed everything up, but there might be some advantage in slowing things down. People are trying slow eating. Why not slow reading?" (2007).

+

[edit] Slow movement

+

Carl Honoré wrote the best-selling book about the slow movement, In Praise of Slow. Honoré's interest in the slow movement began one day in an airport when he saw a book called The One-Minute Bedtime Story. At first it struck him as brilliant — the cure to his nightly tug-of-war with his son’s demands for more stories — then the absurdity of his fast lifestyle called him to his senses. The slow movement acknowledges that "speed has helped to remake our world in ways that are wonderful and liberating" (2004) but our obsession with speed has turned into an addiction. "When you accelerate things that should not be accelerated, when you forget how to slow down, there is a price to pay." Slow reading is recommended as one of several practices to decelerate from the fast pace of modern life. Jennings (2005) also discussed the book.

+

Slow reading from this perspective is somewhat different from its tradition in philosophy and literature. As a practice for achieving balance, slow reading often involves reading light material at a relaxed pace for pleasure, and not just complex materials read slowly for insight. Also, the slow movement also has a strong theme of locality. Most notably, the slow food movement encourages buying local foods. With slow reading, this idea takes the form of encouraging local authors, micro-publishing of materials of local interest, and community building around local libraries and reading events.

+

[edit] Research

+

A number of research studies exist on the problematic aspects of involuntary slow reading. For example, Wimmer (1996) found that a slow reading rate in children indicates a lack of fluency and is a predictor of dyslexia. A few studies demonstrate the positive value of voluntary slow reading, the type of reading defined in this entry. Nell (1988) showed that there is substantial rate variability during natural reading, with most-liked pages being read significantly slower. Sherry Jr. and Schouten (2002) suggested that close reading could have commercial application as a research method for the use of poetry in marketing. Contrary to the claims of advocates of speed-reading, there is evidence that subvocalization has no observable negative effect on the reading process, and may in fact aid comprehension (Carver, 1990).

+

There is a fair body of literature in the area of bibliotherapy, a practice involving the selection of materials for therapeutic purposes. The process often involves emotional identification with reading material, and thoughtful discussion with a professional; as such it is a type of slow reading.

+

The Slow Book Movement was officially founded in Lebanon Springs, NY, in November, 2009, by novelist I. Alexander Olchowski. In the midst of becoming a nonprofit entity, this movement aims to actively promote the act of slowing down to read books. In addition to the Founding Director, Mr. Olchowski, The Slow Book Movement's Assistant Director is Amanda Giracca. [edit] See also +

+

[edit] References

+

[edit] Notes

+
+
    +
  1. ^ "Man ist nicht umsonst Philologe gewesen, man ist es vielleicht noch, das will sagen, ein Lehrer des langsamen Lesens: — endlich schreibt man auch langsam." - Friedrich Nietzsche, Morgenröte: Gedanken über die moralischen Vorurteile (1881)
  2. +
+
+

[edit] Bibliography

+
+
    +
  • Birkerts, Sven. (1994). The Gutenberg Elegies: The Fate of Reading in an Electronic Age. Boston: Faber and Faber. Selected passages, Open Book Systems
  • +
  • Carver, Ronald, P. (1990). Reading Rate: A Review of Research and Theory. San Diego: Academic Press.
  • +
  • Honoré, Carl (2004). In Praise of Slow: How a Worldwide Movement is Changing the Cult of Speed. Vintage Canada. About the book Litwin Books LLC.
  • +
  • Nell, V. (1988). The Psychology of Reading for Pleasure: Needs and Gratifications. Reading Research Quarterly, Vol. 23, No. 1 (Winter, 1988), pp. 6-50.
  • +
  • Nietzsche, Friedrich (1887). Daybreak: Thoughts on the Prejudices of Morality. 2nd Edition.
  • +
  • Postman, Neil (1985). Amusing Ourselves to Death: Public Discourse in the Age of Show Business. NY: Penguin.
  • +
  • Pullman, P. (2004). The War on Words. Guardian Review, November 6, 2004. On-line
  • +
  • Sherry, John F, Jr. and Schouten John W. (2002). A Role for Poetry in Consumer Research. Journal of Consumer Research, 29(2), 218-234.
  • +
  • Sire, James (1978). How to Read Slowly. Downers Grove, IL: InterVarsity Press.
  • +
  • Waters, Lindsay (2007), Time for Reading, Chronicle of Higher Education, 53(23). On-line (subscription required) * Wimmer, Heinz (1996). The Early Manifestation of Developmental Dyslexia: Evidence from German children. Reading and Writing, 8(2).
  • +
+
+

[edit] External links

+ + + + + + +
+Retrieved from "/wiki/Slow_reading"
+ + + +
+
+ +
+ + +
+ + +
+
Personal tools
+ +
+ + +
+ + +
+
Namespaces
+ +
+ + + + +
+
Variants
+ +
+ + +
+
+ + +
+
Views
+ +
+ + + + +
+
Actions
+ +
+ + + + + + + +
+
+ + +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
+
Languages
+
+ +
+
+ + +
+ + + + + + + + + + + diff --git a/tests/html/wikireading.html.simple b/tests/html/wikireading.html.simple new file mode 100644 index 0000000..1aa37d1 --- /dev/null +++ b/tests/html/wikireading.html.simple @@ -0,0 +1,176 @@ + + + + +

Slow reading - Wikipedia, the free encyclopedia

+ +
From Wikipedia, the free encyclopedia
+ + +
+ + +
+ Jump to: navigation, + search +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

Slow reading is the intentional reduction in the speed of reading, carried out to increase comprehension or pleasure. The concept appears to have originated in the study of philosophy and literature as a technique to more fully comprehend and appreciate a complex text. More recently, there has been increased interest in slow reading as result of the slow movement and its focus on decelerating the pace of modern life.

+ + + + +
+
+

Contents

+
+
    +
  • 1 Related terms
  • +
  • 2 Philosophy and literature
  • +
  • 3 Slow movement
  • +
  • 4 Research
  • +
  • 5 See also
  • +
  • 6 References +
      +
    • 6.1 Notes
    • +
    • 6.2 Bibliography
    • +
    +
  • +
  • 7 External links
  • +
+
+ +

[edit] Related terms

+

The use of slow reading in literary criticism is sometimes referred to as close reading. Of less common usage is the term, "deep reading" (Birkerts, 1994). Slow reading is contrasted with speed reading which involves techniques to increase the rate of reading without adversely affecting comprehension, and contrasted with skimming which employs visual page cues to increase reading speed.

+

[edit] Philosophy and literature

+

The earliest reference to slow reading appears to be in Nietzsche's (1887) preface to Daybreak: "It is not for nothing that one has been a philologist, perhaps one is a philologist still, that is to say, a teacher of slow reading."[1]

+

Birkerts (1994) stated "Reading, because we control it, is adaptable to our needs and rhythms. We are free to indulge our subjective associative impulse; the term I coin for this is deep reading: the slow and meditative possession of a book." His statement speaks to the idea that slow reading is not merely about slowing down, but about controlling the pace of reading. Slow readers may speed up at times, and then slow down for the more difficult or pleasurable portions of a text.

+

The importance of personal control over the speed of reading is echoed by Pullman (2004) who argued that slow reading is needed to reinforce democracy in America. Part of its democratic nature is that the manner of reading is not determined by someone else: "we can skim, or we can read it slowly". A similar view was stated by Postman (1985) who noted the character of the ordinary citizen of the 19th century, a mind that could listen for hours on end to political orations clearly shaped by a culture favouring text. Postman warns that reading books is important for developing rational thinking and political astuteness.

+

Lindsay Waters, Executive Editor for the Humanities at Harvard University Press, declared a worldwide reading crisis resulting from our global push toward productivity. He asserts that young children are learning to read faster, skipping phonetics and diagramming sentences, and concludes that these children will not grow up to read Milton. He foresees the end of graduate English literature programs. "There is something similar between a reading method that focuses primarily on the bottom-line meaning of a story in a novel and the economic emphasis on the bottom line that makes automobile manufacturers speed up assembly lines." He advised re-introducing time into reading, "The mighty imperative is to speed everything up, but there might be some advantage in slowing things down. People are trying slow eating. Why not slow reading?" (2007).

+

[edit] Slow movement

+

Carl Honoré wrote the best-selling book about the slow movement, In Praise of Slow. Honoré's interest in the slow movement began one day in an airport when he saw a book called The One-Minute Bedtime Story. At first it struck him as brilliant — the cure to his nightly tug-of-war with his son’s demands for more stories — then the absurdity of his fast lifestyle called him to his senses. The slow movement acknowledges that "speed has helped to remake our world in ways that are wonderful and liberating" (2004) but our obsession with speed has turned into an addiction. "When you accelerate things that should not be accelerated, when you forget how to slow down, there is a price to pay." Slow reading is recommended as one of several practices to decelerate from the fast pace of modern life. Jennings (2005) also discussed the book.

+

Slow reading from this perspective is somewhat different from its tradition in philosophy and literature. As a practice for achieving balance, slow reading often involves reading light material at a relaxed pace for pleasure, and not just complex materials read slowly for insight. Also, the slow movement also has a strong theme of locality. Most notably, the slow food movement encourages buying local foods. With slow reading, this idea takes the form of encouraging local authors, micro-publishing of materials of local interest, and community building around local libraries and reading events.

+

[edit] Research

+

A number of research studies exist on the problematic aspects of involuntary slow reading. For example, Wimmer (1996) found that a slow reading rate in children indicates a lack of fluency and is a predictor of dyslexia. A few studies demonstrate the positive value of voluntary slow reading, the type of reading defined in this entry. Nell (1988) showed that there is substantial rate variability during natural reading, with most-liked pages being read significantly slower. Sherry Jr. and Schouten (2002) suggested that close reading could have commercial application as a research method for the use of poetry in marketing. Contrary to the claims of advocates of speed-reading, there is evidence that subvocalization has no observable negative effect on the reading process, and may in fact aid comprehension (Carver, 1990).

+

There is a fair body of literature in the area of bibliotherapy, a practice involving the selection of materials for therapeutic purposes. The process often involves emotional identification with reading material, and thoughtful discussion with a professional; as such it is a type of slow reading.

+

The Slow Book Movement was officially founded in Lebanon Springs, NY, in November, 2009, by novelist I. Alexander Olchowski. In the midst of becoming a nonprofit entity, this movement aims to actively promote the act of slowing down to read books. In addition to the Founding Director, Mr. Olchowski, The Slow Book Movement's Assistant Director is Amanda Giracca. [edit] See also +

+

[edit] References

+

[edit] Notes

+
+
    +
  1. ^ "Man ist nicht umsonst Philologe gewesen, man ist es vielleicht noch, das will sagen, ein Lehrer des langsamen Lesens: — endlich schreibt man auch langsam." - Friedrich Nietzsche, Morgenröte: Gedanken über die moralischen Vorurteile (1881)
  2. +
+
+

[edit] Bibliography

+
+
    +
  • Birkerts, Sven. (1994). The Gutenberg Elegies: The Fate of Reading in an Electronic Age. Boston: Faber and Faber. Selected passages, Open Book Systems
  • +
  • Carver, Ronald, P. (1990). Reading Rate: A Review of Research and Theory. San Diego: Academic Press.
  • +
  • Honoré, Carl (2004). In Praise of Slow: How a Worldwide Movement is Changing the Cult of Speed. Vintage Canada. About the book Litwin Books LLC.
  • +
  • Nell, V. (1988). The Psychology of Reading for Pleasure: Needs and Gratifications. Reading Research Quarterly, Vol. 23, No. 1 (Winter, 1988), pp. 6-50.
  • +
  • Nietzsche, Friedrich (1887). Daybreak: Thoughts on the Prejudices of Morality. 2nd Edition.
  • +
  • Postman, Neil (1985). Amusing Ourselves to Death: Public Discourse in the Age of Show Business. NY: Penguin.
  • +
  • Pullman, P. (2004). The War on Words. Guardian Review, November 6, 2004. On-line
  • +
  • Sherry, John F, Jr. and Schouten John W. (2002). A Role for Poetry in Consumer Research. Journal of Consumer Research, 29(2), 218-234.
  • +
  • Sire, James (1978). How to Read Slowly. Downers Grove, IL: InterVarsity Press.
  • +
  • Waters, Lindsay (2007), Time for Reading, Chronicle of Higher Education, 53(23). On-line (subscription required) * Wimmer, Heinz (1996). The Early Manifestation of Developmental Dyslexia: Evidence from German children. Reading and Writing, 8(2).
  • +
+
+

[edit] External links

+ + + + + + +
+Retrieved from "/wiki/Slow_reading"
+ + + +
+
+ diff --git a/tests/runtest.sh b/tests/runtest.sh new file mode 100755 index 0000000..d3e8887 --- /dev/null +++ b/tests/runtest.sh @@ -0,0 +1,26 @@ +#!/bin/sh +# +# This test requires surf from http://surf.suckless.org, +# patched with surfuri_js.patch + +test $# -ne 2 && echo usage $0 testhtml expectedoutput && exit 1 + +testjs=tests/showsimple.js +htmlloadtime=2 +scriptloadtime=2 + +surf -x "file://./$1" > testxid 2>testoutput & +pid=$! +sleep $htmlloadtime +xid=`cat testxid` +xprop -id $xid -f _SURF_GO 8t -set _SURF_GO "javascript:`cat $testjs`" +sleep $scriptloadtime +kill $pid + +sed 's/^\*\* Message:[^<]*//g' < testoutput > testoutputbody + +diff "$2" testoutputbody +result=$? + +rm -f testxid testoutput testoutputbody +exit $result diff --git a/tests/showsimple.js b/tests/showsimple.js new file mode 100644 index 0000000..a994348 --- /dev/null +++ b/tests/showsimple.js @@ -0,0 +1,6 @@ +(function() { + stag = document.createElement("script"); + document.body.appendChild(stag).src="../simplyread.js"; + simplyread(); + console.log(document.body.innerHTML); +})(); diff --git a/tests/surfuri_js.patch b/tests/surfuri_js.patch new file mode 100644 index 0000000..bed2a46 --- /dev/null +++ b/tests/surfuri_js.patch @@ -0,0 +1,19 @@ +diff -r a62107a88a10 surf.c +--- a/surf.c Sun Aug 08 17:32:38 2010 +0100 ++++ b/surf.c Sun Nov 14 21:28:00 2010 +0000 +@@ -464,6 +464,15 @@ + + if(strcmp(uri, "") == 0) + return; ++ if(g_strrstr(uri, "javascript:")) { ++ JSStringRef jsscript; ++ JSValueRef exception = NULL; ++ jsscript = JSStringCreateWithUTF8CString(g_strdup(uri)); ++ WebKitWebFrame* frame = webkit_web_view_get_main_frame(c->view); ++ JSContextRef js = webkit_web_frame_get_global_context(frame); ++ JSEvaluateScript(js, jsscript, JSContextGetGlobalObject(js), NULL, 0, &exception); ++ return; ++ } + u = g_strrstr(uri, "://") ? g_strdup(uri) + : g_strdup_printf("http://%s", uri); + /* prevents endless loop */ -- cgit v1.2.3