{"id":336,"date":"2013-03-17T14:04:05","date_gmt":"2013-03-17T14:04:05","guid":{"rendered":"http:\/\/asc-cybernetics.org\/2013\/?page_id=336"},"modified":"2013-04-16T13:35:00","modified_gmt":"2013-04-16T13:35:00","slug":"post-conference","status":"publish","type":"page","link":"https:\/\/asc-cybernetics.org\/2013\/?page_id=336","title":{"rendered":"Post-Conference (2Aug-3Aug)"},"content":{"rendered":"<p>The Post-conference (Friday 02-Aug to Saturday 03-Aug-2013) provides a chance for conferees to reflect together on the conference, on what has been and what might be learnt. It also provides a chance for us move forward: if we have found new questions, we may begin to find answers for them. This may lead to some distinct and identifiable outcome: the <a href=\"http:\/\/www.asc-cybernetics.org\/2010\" target=\"new\">2010 conference in Troy, NY<\/a> lead to the publication of a <a href=\"http:\/\/blog.litra-design.com\/2013\/02\/ID-1418\/\" target=\"new\">book &#8220;Trojan Horses&#8221; (ed R. Glanville)<\/a>, <a href=\"http:\/\/www.echoraum.at\/edition\/index.htm\" target=\"new\">Vienna, echoraum|WISDOM, 2013<\/a> and the creation of a video that may be viewed through this link <a href=\"http:\/\/vimeo.com\/15303452\" target=\"new\">C:ADM2010 by Lev Ledit and Judy Lombardi<\/a>.<\/p>\n<p>Often, conferees leave conferences with complaints that there were few chances to consider what we learnt, either individually or in a group. The Post-conference is an attempt to alleviate this, so that we can better move forward.<\/p>\n<p>To registered conferees there is no charge for attending the Post-conference.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Post-conference (Friday 02-Aug to Saturday 03-Aug-2013) provides a chance for conferees to reflect together on the conference, on what has been and what might be learnt. It also provides a chance for us move forward: if we have found new questions, we may begin to find answers for them. This may lead to some &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/asc-cybernetics.org\/2013\/?page_id=336\">Continue reading<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":61,"menu_order":150,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-336","page","type-page","status-publish","hentry","nodate","item-wrap"],"_links":{"self":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=336"}],"version-history":[{"count":11,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/336\/revisions"}],"predecessor-version":[{"id":579,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/336\/revisions\/579"}],"up":[{"embeddable":true,"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=\/wp\/v2\/pages\/61"}],"wp:attachment":[{"href":"https:\/\/asc-cybernetics.org\/2013\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}