Zeitschriftenartikel zum Thema „Serveur virtualisé“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Serveur virtualisé.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-24 Zeitschriftenartikel für die Forschung zum Thema "Serveur virtualisé" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Ulatowski, Bartłomiej, Marek Gróbarczyk und Zbigniew Łukasik. „Application of virtualisation environment for data security in operational data processing systems“. Journal of Automation, Electronics and Electrical Engineering 3, Nr. 1 (31.12.2021): 29–32. http://dx.doi.org/10.24136/jaeee.2021.004.

Der volle Inhalt der Quelle
Annotation:
This paper presents a concept, developed and tested by the authors, of a virtualisation environment enabling the protection of aggregated data through the use of high availability (HA) of IT systems. The presented solution allows securing the central database system and virtualised server machines by using a scalable environment consisting of physical servers and disk arrays. The authors of this paper focus on ensuring the continuity of system operation and on minimising the risk of failures related to the availability of the operational data analysis system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Armağan, Özgür, und Leyla Gören-Sümer. „Feedback control for multi-resource usage of virtualised database server“. Computers & Electrical Engineering 40, Nr. 5 (Juli 2014): 1683–702. http://dx.doi.org/10.1016/j.compeleceng.2014.04.017.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Dang, Weichao, und Jianchao Zeng. „State-control-limit-based rejuvenation modelling and optimisation of the virtualised cloud server“. International Journal of Reliability and Safety 12, Nr. 4 (2018): 406. http://dx.doi.org/10.1504/ijrs.2018.096071.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dang, Weichao, und Jianchao Zeng. „State-control-limit-based rejuvenation modelling and optimisation of the virtualised cloud server“. International Journal of Reliability and Safety 12, Nr. 4 (2018): 406. http://dx.doi.org/10.1504/ijrs.2018.10017234.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Escheikh, Mohamed, Kamel Barkaoui und Zayneb Tayachi. „Performability modelling and analysis of server virtualised systems subject to workload-dependent software aging“. International Journal of Critical Computer-Based Systems 9, Nr. 3 (2019): 248. http://dx.doi.org/10.1504/ijccbs.2019.10026133.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Escheikh, Mohamed, Zayneb Tayachi und Kamel Barkaoui. „Performability modelling and analysis of server virtualised systems subject to workload-dependent software aging“. International Journal of Critical Computer-Based Systems 9, Nr. 3 (2019): 248. http://dx.doi.org/10.1504/ijccbs.2019.104491.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Sowmia, D., und B. Muruganantham. „A survey on trade-off between storage and repair traffic in distributed storage systems“. International Journal of Engineering & Technology 7, Nr. 2.8 (19.03.2018): 379. http://dx.doi.org/10.14419/ijet.v7i2.8.10466.

Der volle Inhalt der Quelle
Annotation:
Distributed storage systems give dependable access to information through excess spread over independently unreliable hubs. Application scenarios incorporate server farms, distributed capacity frameworks, and capacity in remote systems. This paper gives a study on the cloud storage model of networked online storage where data is stored in virtualized pools of storage which are generally hosted by third parties. Hosting companies operate large data centersand people who require their data to be encouraged buy or lease accumulating limit from them. The server cultivate overseers, outside of anyone's ability to see, virtualize the advantages according to the necessities of the customer and reveal them as limit pools, which the customers would themselves have the capacity to use to store records or data objects. . The data is stored across various locations, when the user wants to retrieve them, it could be done by any of the encryption methods. At last, in view of existing procedures, promising future research bearings are recommended.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Sudhakar, E. P., und M. Saravanan. „An energy-efficient task and virtual machine placement in virtualised cloud server using FY-SFLA and RMMS-DLVQ“. International Journal of Networking and Virtual Organisations 29, Nr. 2 (2023): 144–67. http://dx.doi.org/10.1504/ijnvo.2023.134992.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Auberger, Romain. „L’image fonctionnelle, l’image objet dans les Arts Appliqués“. Figures de l'Art. Revue d'études esthétiques 11, Nr. 1 (2006): 179–85. http://dx.doi.org/10.3406/fdart.2006.1410.

Der volle Inhalt der Quelle
Annotation:
Discipline à géométrie variable, le design réfléchit aujourd'hui à sa possible virtualité, entraînant des évolutions dans la pratique des designers. Le philosophe François Dagognet affirme que contrairement à l’objet, l’image est souvent perçue comme fugitive, irréelle, alors qu’avec elle se pose la question de l’image objet face à l’objet réel. Comment ces images servent-elles une finalité qui se superpose à leur fonction première de représentation ? Comment l’objet lui-même pourrait se contenter de n’être qu’une image, le support d’une marque ou d’un concept, mettant en cause sa propre identité, et par conséquent sa propre matérialité ? Sommes nous en mesure de créer un monde plus simple où les objets s’effaceront pour ne délivrer que leur fonctionnalité sans occuper l’espace ? L’avenir de l’objet est-il dans sa dématérialisation ?
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Echeverría, Mauricio Ochoa, und Daniel Alejandro Soto Beltrán. „Interacción de los componentes del clúster Microsoft Hpc (High Performance Computing) Server 2008, con aplicaciones MPI“. I3+ 2, Nr. 1 (28.02.2015): 96. http://dx.doi.org/10.24267/23462329.76.

Der volle Inhalt der Quelle
Annotation:
La computación de alto rendimiento o HPC (High Performace Computing), hace referencia a la solución de problemas complejos por medio de un grupo de servidores, llamado clúster. El clúster en su totalidad se utiliza para la resolución de un problema individual o bien a la resolución de un grupo de problemas relacionados entre sí. Inicialmente, las soluciones facilitadas por HPC estaban limitadas a la investigación científica, pero debido a la reducción de costos y a las nuevas necesidades en los negocios, ya se puede aplicar HPC a centros de datos, simulaciones de software, procesamiento de transacciones y a cualquier resolución de problemas complejos para negocios. En relación a lo anterior la Universidad de Boyacá desarrolló el proyecto de investigación titulado “Interacción de los componentes del clúster Microsoft HPC (High Performance Computing) Server 2008 con aplicaciones MPI”. Se describe la forma en que se relacionan entre sí los componentes que hacen parte del clúster de procesamiento de información Microsoft HPC (High Performance Computing) Server 2008, para resolver un problema de alta complejidad con aplicaciones desarrolladas en MPI (Message Passing Interface, Interfaz de paso de mensajes). Para el desarrollo del proyecto un clúster de alto desempeño mediante el uso de Microsoft HPC Server 2008, utilizando máquinas virtuales, para observar su funcionamiento y determinar los reportes de rendimiento que estos sistemas ofrecen a los usuarios, para lo cual se utilizaron pruebas con aplicaciones desarrolladas en MPI. Este artículo describe: El clúster HP Server incluyendo los conceptos referentes a él (Clústeres, computación de alto desempeño y MPI), todos los requerimientos de infraestructura para el desarrollo del proyecto, el proceso de creación del clúster desde la virtualización de nodos, pasando por la creación del dominio hasta llegar a la implementación de los programas MPI y el análisis de los resultados obtenidos.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Ali, Hamisu Alhaji. „Cloud Computing Security: An Investigation into the Security Issues and Challenges Associated with Cloud Computing, for both Data Storage and Virtual Applications“. International Research Journal of Electronics and Computer Engineering 1, Nr. 2 (15.09.2015): 15. http://dx.doi.org/10.24178/irjece.2015.1.2.15.

Der volle Inhalt der Quelle
Annotation:
In recent years, cloud computing has developed from the promising business concept that it used to be, to one of Information Technology (IT) industry's most developing section. Now that the world economy was hit by recession, the victims of this tragedy continually understand that by just outsourcing or tapping the cloud resources, a package of virtualise, elastic, instant on-demand provision, and scalable; infrastructure, platform, and software can be access fast and easy inform of services at a negligible amount via the internet. However, as individuals and organizations embarked on the course of deploying their information and data into the cloud, anxieties are beginning to develop on whether the cloud environment is safe. This research provides an overview of the cloud deployment model, the services they offer and discusses the security issues and challenges of cloud computing in both data storage and virtual applications/servers.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Santa, José, Pedro Fernández, Jordi Ortiz, Ramon Sanchez-Iborra und Antonio Skarmeta. „SURROGATES: Virtual OBUs to Foster 5G Vehicular Services“. Electronics 8, Nr. 2 (22.01.2019): 117. http://dx.doi.org/10.3390/electronics8020117.

Der volle Inhalt der Quelle
Annotation:
Virtualization technologies are key enablers of softwarized 5G networks, and their usage in the vehicular domain can provide flexibility and reliability in real deployments, where mobility and processing needs may be an issue. Next-generation vehicular services, such as the ones in the area of urban mobility and, in general, those interconnecting on-board sensors, require continuous data gathering and processing, but current architectures are stratified in two-tier solutions in which data is collected by on-board units (OBU) and sent to cloud servers. In this line, intermediate cache and processing layers are needed in order to cover quasi-ubiquitous data-gathering needs of vehicles in scenarios of smart cities/roads considering vehicles as moving sensors. The SURROGATES solution presented in this paper proposes to virtualize vehicle OBUs and create a novel Multi-Access Edge Computing (MEC) layer with the aim of offloading processing from the vehicle and serving data-access requests. This deals with potential disconnection periods of vehicles, saves radio resources when accessing the physical OBU and improves data processing performance. A proof of concept has been implemented using OpenStack and Open Source MANO to virtualize resources and gather data from in-vehicle sensors, and a final traffic monitoring service has been implemented to validate the proposal. Performance results reveal a speedup of more than 50% in the data request resolution, with consequently great savings of network resources in the wireless segment. Thus, this work opens a novel path regarding the virtualization of end-devices in the Intelligent Transportation Systems (ITS) ecosystem.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Ally, Said, und Noorali Jiwaji. „Common inhibiting factors for technology shifting from physical to virtual computing“. Ethiopian Journal of Science and Technology 15, Nr. 2 (01.06.2022): 125–39. http://dx.doi.org/10.4314/ejst.v15i2.2.

Der volle Inhalt der Quelle
Annotation:
Due to the rapid growth of cloud computing demands and the high cost of managing traditional physical IT infrastructure, virtualization technique has emerged as a foremost and key success factor for technology adopters to attain the intended benefits. However, the transition from physical to virtual computing is confronted with overwhelming adoption inhibitors rarely known to adopters. This paper examines inhibiting factors which have triggered to low adoption rate of virtualized computing infrastructure despite being the fastest growing and globally accepted technology. Survey results from 24 companies indicate that lack of relevant virtualization skills, security uncertainties, low computing demands and change management issues are the utmost inhibitors. In public entities, the slowness in the adoption process is highly caused by the low computing demands, lack of virtualization coverage in ICT policies, resistance to change, choice of technology and the lack of virtualization project priority in the ICT master plans. On the other hand, the use of open-source hypervisors and support and maintenance are specific inhibitors affecting the private sectors. This paper is useful for adopters who have virtualized their server resources or have a plan to virtualize in the near future.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Zhang, Jiachen, Lixiao Cui, Peng Li, Xiaoguang Liu und Gang Wang. „Toward Virtual Machine Image Management for Persistent Memory“. ACM Transactions on Storage 17, Nr. 3 (31.08.2021): 1–24. http://dx.doi.org/10.1145/3450976.

Der volle Inhalt der Quelle
Annotation:
Persistent memory’s (PM) byte-addressability and high capacity will also make it emerging for virtualized environment. Modern virtual machine monitors virtualize PM using either I/O virtualization or memory virtualization. However, I/O virtualization will sacrifice PM’s byte-addressability, and memory virtualization does not get the chance of PM image management. In this article, we enhance QEMU’s memory virtualization mechanism. The enhanced system can achieve both PM’s byte-addressability inside virtual machines and PM image management outside the virtual machines. We also design pcow , a virtual machine image format for PM, which is compatible with our enhanced memory virtualization and supports storage virtualization features including thin-provisioning, base image, snapshot, and striping. Address translation is performed with the help of the Extended Page Table, thus much faster than image formats implemented in I/O virtualization. We also optimize pcow considering PM’s characteristics. We perform exhaustive performance evaluations on an x86 server equipping with Intel’s Optane DC persistent memory. The evaluation demonstrates that our scheme boosts the overall performance by up to 50× compared with qcow2, an image format implemented in I/O virtualization, and brings almost no performance overhead compared with the native memory virtualization. The striping feature can also scale-out the virtual PM’s bandwidth performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Kwon, Dongup, Wonsik Lee, Dongryeong Kim, Junehyuk Boo und Jangwoo Kim. „SmartFVM: A Fast, Flexible, and Scalable Hardware-based Virtualization for Commodity Storage Devices“. ACM Transactions on Storage 18, Nr. 2 (31.05.2022): 1–27. http://dx.doi.org/10.1145/3511213.

Der volle Inhalt der Quelle
Annotation:
A computational storage device incorporating a computation unit inside or near its storage unit is a highly promising technology to maximize a storage server’s performance. However, to apply such computational storage devices and take their full potential in virtualized environments, server architects must resolve a fundamental challenge: cost-effective virtualization . This critical challenge can be directly addressed by the following questions: (1) how to virtualize two different hardware units (i.e., computation and storage), and (2) how to integrate them to construct virtual computational storage devices, and (3) how to provide them to users. However, the existing methods for computational storage virtualization severely suffer from their low performance and high costs due to the lack of hardware-assisted virtualization support. In this work, we propose SmartFVM-Engine , an FPGA card designed to maximize the performance and cost-effectiveness of computational storage virtualization. SmartFVM-Engine introduces three key ideas to achieve the design goals. First, it achieves high virtualization performance by applying hardware-assisted virtualization to both computation and storage units. Second, it further improves the performance by applying hardware-assisted resource orchestration for the virtualized units. Third, it achieves high cost-effectiveness by dynamically constructing and scheduling virtual computational storage devices. To the best of our knowledge, this is the first work to implement a hardware-assisted virtualization mechanism for modern computational storage devices.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Cudco Pomagualli, Angel Geovanny. „Sistema de gestión de tutorías académicas para el CECIBEB 14 de Abril“. I2D Revista Científica 1, Nr. 1 (30.06.2021): 11–26. http://dx.doi.org/10.55204/i2drc.v1i1.2.

Der volle Inhalt der Quelle
Annotation:
Hoy en día el uso de la tecnología y específicamente los sistemas de información están cada vez más inmersos los diferentes aspectos de nuestras vidas. Uno de esos aspectos es la educación donde las instituciones educativas y los docentes usan diferentes programas con la finalidad de reforzar las clases presenciales mediante el uso de tecnologías digitales. Este tipo de tecnologías se conocen como entornos virtuales de aprendizaje y están soportados mediante sistemas de gestión de contenidos de aprendizaje que se encargan de facilitar a los docentes de las herramientas y recursos necesarios para planificar las clases online. En internet existen diferentes alternativas de código abierto y distribución gratuita, sin embargo, estas aplicaciones no cumplen al 100% con las expectativas de los usuarios y genera malestar y muchas veces se dan de baja. En el CECIBEB 14 de Abril se implementó un sistema de gestión de tutorías denominado SyTutor mediante el cual los docentes solicitan la aprobación de sus tutorías y complementar la enseñanza de las aulas mediante el uso del aplicativo. De manera similar los estudiantes con el uso de la aplicación mejoran sus conocimientos y destrezas mediante el uso de las tecnologías digitales. El desarrollo de la aplicación fue utilizando la metodología RUP en combinación con el enfoque del Diseño Centrado en los Usuarios, además se utilizó el framework Java Server Faces junto con la biblioteca de interfaz enriquecida Primefaces.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Tsvuura, Godfrey, Kudzai D. Mbawuya und Patrick Ngulube. „Creation and storage of records in the cloud by Zimbabwe Open University“. ESARBICA Journal: Journal of the Eastern and Southern Africa Regional Branch of the International Council on Archives 40 (06.11.2021): 1–20. http://dx.doi.org/10.4314/esarjo.v40i1.1.

Der volle Inhalt der Quelle
Annotation:
This study investigated the challenges and prospects of creating and storing records in the cloud by Zimbabwe Open University in Zimbabwe. Like other universities in Zimbabwe, the university adopted Education 5.0 advocated by the government in 2019. Consequently, the university came up with innovation hubs and industrial parks that became centres for records creation. Keeping all records in the computer without appropriate backups and servers has consequences such as losing vital records. Organisations around the world use cloud computing increasingly to address records storage and disposal. Adoption of cloud computing services carries with it cost implications, and legal and ownership challenges as the virtualised environments are hosted and managed by third parties. The objective of this study was to examine the management, operational, legal and technical issues surrounding the storage of records in the cloud, and the implications for their trustworthiness and authenticity. The study adopted a qualitative research design and drew data from interviews with key participants. Qualitative data were organised into broad themes and the content reported in narrative form. The study found that Zimbabwe Open University is not using cloud computing services effectively and is in the trial phase of cloud computing. It further found that there was a lack of collaboration between the information and communication technology and the records management units as the university decided to move to the cloud on a full-scale basis. The study recommends that the university should first address the management, operational, legal and technical issues surrounding the storage of records in the cloud before implementing the complete use of the cloud. The study deepens the understanding of cloud computing in the management of records at the university, and other state universities in Zimbabwe can use this study to deal with the management of records in the cloud.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Tsvuura, Godfrey, Kudzai D. Mbawuya und Patrick Ngulube. „Creation and storage of records in the cloud by Zimbabwe Open University“. ESARBICA Journal: Journal of the Eastern and Southern Africa Regional Branch of the International Council on Archives 40 (06.11.2021): 1–20. http://dx.doi.org/10.4314/esarjo.v40i.1.

Der volle Inhalt der Quelle
Annotation:
This study investigated the challenges and prospects of creating and storing records in the cloud by Zimbabwe Open University in Zimbabwe. Like other universities in Zimbabwe, the university adopted Education 5.0 advocated by the government in 2019. Consequently, the university came up with innovation hubs and industrial parks that became centres for records creation. Keeping all records in the computer without appropriate backups and servers has consequences such as losing vital records. Organisations around the world use cloud computing increasingly to address records storage and disposal. Adoption of cloud computing services carries with it cost implications, and legal and ownership challenges as the virtualised environments are hosted and managed by third parties. The objective of this study was to examine the management, operational, legal and technical issues surrounding the storage of records in the cloud, and the implications for their trustworthiness and authenticity. The study adopted a qualitative research design and drew data from interviews with key participants. Qualitative data were organised into broad themes and the content reported in narrative form. The study found that Zimbabwe Open University is not using cloud computing services effectively and is in the trial phase of cloud computing. It further found that there was a lack of collaboration between the information and communication technology and the records management units as the university decided to move to the cloud on a full-scale basis. The study recommends that the university should first address the management, operational, legal and technical issues surrounding the storage of records in the cloud before implementing the complete use of the cloud. The study deepens the understanding of cloud computing in the management of records at the university, and other state universities in Zimbabwe can use this study to deal with the management of records in the cloud.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

„Energy-Efficient Consolidation of Virtual Machines in Cloud Data Centers“. International Journal of Engineering and Advanced Technology 8, Nr. 6 (30.08.2019): 446–49. http://dx.doi.org/10.35940/ijeat.e7854.088619.

Der volle Inhalt der Quelle
Annotation:
The lightning increase in demand of computational power consumed by modern applications has made us to shift for Cloud Computing Model which has led to establish very largescaled virtualized Data Centers. Such Data Centers consumes huge amount of electrical power which results to high Operating cost and Carbon-di-oxide emission.The servers in Data Centers consume/waste a substantial amount of energy/power. Since servers are deployed and configured for peak capacity, performance, usually at the expense of efficiency. Such waste increases the capital and operational expenditure which can result in power and space being exhausted, which creates a situation where the organization may grow in data centers.Consolidating and Virtualizing servers can increase overall utilization of resources from 10% to 30%. The rapid reduction in capital and expenditure can motivate many organizations to virtualize the servers.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Olvera Gutiérrez, Claudia. „El diseño instruccional a través de los modelos ADDIE y ASSURE“. TEPEXI Boletín Científico de la Escuela Superior Tepeji del Río 2, Nr. 4 (05.07.2015). http://dx.doi.org/10.29057/estr.v2i4.1534.

Der volle Inhalt der Quelle
Annotation:
Los ambientes virtuales de aprendizaje, que son cada vez más utilizados en la educación, necesariamente deben ofrecer no solo el uso de tecnología educativa en sí misma, sino nuevos procedimientos, metodologías y modelos para promover el aprendizaje y formación efectiva del estudiante y la construcción de su propio conocimiento, por lo que deben ser perfectamente planeados para crear las condiciones pedagógicas y contextuales, donde el conocimiento y sus relaciones con los individuos son el factor principal para formar una "sociedad del conocimiento" (Fernández, Server, Cepero). De aquí la gran importancia de llevar a cabo un proceso de planeación, diseño, implementación y evaluación desde una visión cognitiva y constructivista que promueva el logro de metas y objetivos educativos; me refiero al Diseño Instruccional, el cual se presenta en este mapa a través de sus modelos ADDIE y ASSURE.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Morlans Giné, Gemma, und Maria del Mar Sánchez Contreras. „biblioteques públiques a Catalunya (2020-2021)“. Anuari de Biblioteques, Llibres i Lectura 7 (11.11.2022). http://dx.doi.org/10.1344/abll.2022.7.006.

Der volle Inhalt der Quelle
Annotation:
En aquest capítol es descriuen i s’analitzen els esdeveniments i les accions més rellevants duts a terme en l’àmbit de les biblioteques públiques de Catalunya durant el bienni 2020-2021. Sens dubte, el bienni ha estat marcat per la pandèmia de la COVID-19 i hem vist com les biblioteques han hagut de fer front al tancament dels equipaments i a adaptar els serveis i activitats a la nova situació. Després d’estabilitzar el sistema, es van impulsar diverses accions per pal·liar la manca d’obertura física, especialment en format virtual, però també per a persones amb risc de vulnerabilitat. Amb la reobertura, a poc a poc, els serveis es van recuperant, camí d’assolir els nivells anteriors a la pandèmia. Tot i la situació, l’activitat professional en jornades, congressos i esdeveniments no ha desaparegut i s’ha adaptat a formats virtuals o híbrids. En aquests dos anys també hi ha hagut canvis tècnics en processos com ara catalogació i canvis de programari, i s’ha materialitzat la interfície de petició de documents en préstec interbibliotecari de totes les biblioteques del Sistema de Lectura Pública de Catalunya. En definitiva, l’objectiu del capítol és mostrar una visió de conjunt de l’activitat de les biblioteques públiques catalanes per reflectir el moment actual i veure les tendències de futur.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Uhl, Magali. „Images“. Anthropen, 2020. http://dx.doi.org/10.17184/eac.anthropen.126.

Der volle Inhalt der Quelle
Annotation:
Image matérielle ou image mentale, émanation du geste humain ou production de l’esprit, artefact ou souvenir, l’image recouvre une multiplicité de formes et de significations qui vont des rêves aux dessins d’enfants, des ombres projetées aux peintures célébrées, des traces mnésiques aux images numériques. Tout autant confrontée à cette tension entre matérialité et virtualité, la connaissance anthropologique sur les images, comme les nombreux domaines du savoir qui lui sont associés (sociologie, sémiologie et études médiatiques, principalement) ont proposé des manières distinctes d’aborder les images, abandonnant toutefois aux sciences de l’esprit (psychanalyse et sciences cognitives) la dimension imaginative. Ainsi, deux voies se sont historiquement tracées pour intégrer les apports de la représentation imagée et se partagent, aujourd’hui encore, le domaine de l’anthropologie des images. D’un côté, l’image comme support au discours permet de questionner le potentiel culturel, politique et idéologique de l’image que les chercheurs vont déceler dans des corpus de représentations (publicités, images de la presse, cartes postales, selfies, snapshots et autres illustrations culturelles); de l’autre, l’image comme instrument de recherche dans laquelle la production visuelle des chercheurs (captations photographiques ou filmiques, tableaux, croquis, dessins et plans) est une manière d’accéder à leur terrain d’étude avec parfois pour ambition de proposer une visualisation de leurs résultats de recherche. Pour le dire avec Douglas Harper (1988), l’image peut aussi bien être un objet d’étude sur lequel on porte le regard qu’un instrument de recherche qui conduit ce regard. Si l’anthropologie s’est saisie dès le début du 20e siècle du potentiel expressif et cognitif de l’image avec les travaux photographiques de Margaret Mead et de Gregory Bateson sur les usages sociaux du corps dans la culture Balinaise (1942), et ceux, filmiques, de Robert Flaherty à travers son documentaire sur la population inuite de l’Arctique (1922), c’est l’iconologue et anthropologue Aby Warburg qui, à la même époque, a le plus insisté sur la complémentarité de ces deux formes d’images (matérielles et mentales) comme de ces deux postures de recherche (sur les images et avec les images). En effet, son projet d’un Atlas (2012) – composé de milliers de photographies et baptisé du nom de la déesse grecque de la mémoire, Mnemosyne – avait pour ambition de retracer, par la collecte et l’assemblage d’images, des invariants anthropologiques qui traverseraient les époques et les continents (de la Grèce antique à la Renaissance florentine; des Bacchantes romaines au peuple Hopi d’Arizona), et dont la mise en correspondance permettrait, par-delà les discours, une lecture visuelle de l’histoire culturelle. Dans cette méthode d’interprétation iconologique, les représentations matérielles et l’imagination sont intimement liées dans le processus de connaissance anthropologique : les images sont tout à la fois la source du savoir et son véhicule. Le terme de « formules de pathos » que Warburg propose, exprime, dès lors, le caractère idéal-typique du motif imaginaire qui se répète de représentation en représentation à travers les époques, les espaces et les cultures. La proposition qui, par ailleurs, est faite de mettre le détail au cœur de la démarche de recherche, en insistant sur l’attention aux motifs discrets mais persistants – comme la forme d’un drapé ou le tracé d’un éclair – retrouvera plus tard l’un des impératifs de l’anthropologie interprétative formulée par Geertz et l’effort ténu de description que sa mise en pratique exige (1973). Elle rejoindra également celui de l’anthropologie modale (Laplantine 2013) qui milite pour un mode mineur de la connaissance, à l’image des lucioles qui ne brillent la nuit que pour celles et ceux dont l’acuité sensible est mise au service de cette contemplation. Malgré sa radicalité, le parti pris de considérer les images comme la trame à partir de laquelle l’anthropologie se constitue comme savoir a ceci de fascinant qu’il inspire nombre de recherches actuelles. En effet, dans une société saturée par le visuel et dans laquelle les écrans forgent en partie le rapport au monde, cette voie originale trouve aujourd’hui un écho singulier dans plusieurs travaux d’envergure. Georges Didi-Huberman (2011 : 20) reprend, à son compte, le défi warburgien, autrement dit « le pari que les images, assemblées d’une certaine façon, nous offriraient la possibilité – ou, mieux, la ressource inépuisable – d’une relecture du monde ». De son côté, Hans Belting (2004 : 18) insiste sur le fait que « nous vivons avec des images et nous comprenons le monde en images. Ce rapport vivant à l’image se poursuit en quelque sorte dans la production extérieure et concrète d’images qui s’effectue dans l’espace social et qui agit, à l’égard des représentations mentales, à la fois comme question et réponse ». On le voit, l’héritage de l’iconologie a bel et bien traversé le 20e siècle pour s’ancrer dans le contemporain et ses nouveaux thèmes transversaux de prédilection. Les thèmes de l’expérience et de l’agentivité des images sont de ceux qui redéfinissent les contours de la réflexion sur le sujet en lui permettant de nuancer certains des épistémès qui lui ont préexisté. Désamorçant ainsi le partage épistémologique d’un savoir sur les images, qui témoignerait des représentations véhiculées par les artefacts visuels, et d’un savoir avec les images, qui les concevrait comme partenaires de recherche, on parle désormais de plus en plus d’agir des images aussi bien du côté de l’interprétation culturelle que l’on peut en faire, que du travail des chercheurs qui les captent et les mettent en récit. Par ailleurs, le fait que l’image est « le reflet et l’expression de son expérience et de sa pratique dans une culture donnée [et qu’à] ce titre, discourir sur les images n’est qu’une autre façon de jeter un regard sur les images qu’on a déjà intériorisées (Belting 2004 : 74) », relativise également cet autre partage historique entre image intérieure (mentale) et image extérieure (représentationnelle), image individuelle (idiosyncrasique) et image publique (collective) qui s’enracine dans une généalogie intellectuelle occidentale, non pas universelle, mais construite et située. L’agir des images est alors tout aussi bien l’expression de leur force auratique, autrement dit de leur capacité à présenter une réalité sensible, à faire percevoir une situation sociale, un prisme culturel ou un vécu singulier, mais aussi, celle de leur agentivité comme artefact dans l’espace public. Dans le premier ordre d’idées, l’historienne et artiste Safia Belmenouar, en collectant et en assemblant des centaines de cartes postales coloniales, qui étaient le support médiatique vernaculaire en vogue de 1900 à 1930, montre, à travers un livre (2007) et une exposition (2014), comment les stéréotypes féminins réduisant les femmes des pays colonisés en attributs exotiques de leur culture se construisent socialement, tout en questionnant le regard que l’on porte aujourd’hui sur ces images de femmes anonymes dénudées répondant au statut « d’indigène ». La performance de l’image est ici celle du dessillement que sa seule présentation, en nombre et ordonnée, induit. Dans le deuxième ordre d’idées, l’ethnologue Cécile Boëx (2013) n’hésite pas, dans ses contributions sur la révolte syrienne, à montrer de quelle manière les personnes en lutte contre le pouvoir se servent des représentations visuelles comme support de leur cause en s’appropriant et en utilisant les nouvelles technologies de l’image et l’espace virtuel d’Internet. Les images sont ici entendues comme les actrices des conflits auxquels elles prennent part. L’expérience des images, comme le montre Belting (2004) ou Laplantine (2013), est donc aussi celle dont nous faisons l’épreuve en tant que corps. Cette plongée somatique est, par exemple, au cœur du film expérimental Leviathan (2012), réalisé par les anthropologues Lucien Castaing-Taylor et Véréna Paravel. Partant des images d’une douzaine de caméras GoPro fixées sur le corps de marins de haute mer partis pêcher au large des côtes américaines de Cape Cod, le documentaire immersif fait vivre l’âpre expérience de ce métier ancestral. À l’ère des pratiques photographiques et filmiques amateures (selfies, captations filmiques et montages par téléphones cellulaires) et de l’explosion des environnements numériques de partage (Instagram, Snapchat) et de stockage des données (big data), le potentiel immersif de l’image passe désormais par des pratiques réinventées du quotidien où captation et diffusion sont devenues affaire de tous les corps, indépendamment de leur position dans le champ social et culturel. Critiquées pour leur ambiguïté, leur capacité de falsification et de manipulation, les images ont aussi ce potentiel de remise en cause des normes hégémoniques de genre, de classe et d’ethnicité. Prises, partagées et diffusées de manière de plus en plus massive, elles invitent à l’activité critique afin de concevoir la visualité dans la diversité de ses formes et de ses enjeux contemporains (Mirzoeff 2016). Si aujourd’hui, dans un monde traversé de part en part par les images, l’anthropologie de l’image est un domaine de recherche à part entière dont l’attention plus vive à l’expérience sensible et sensorielle qui la singularise est le prérequis (Uhl 2015), l’iconologie comme méthode anthropologique spécifique répondant aux nouveaux terrains et aux nouvelles altérités a encore du chemin à parcourir et des concepts à inventer afin de ne pas s’enfermer dans le registre instrumental auquel elle est trop souvent réduite. Pour penser l’image dans le contexte actuel de sa prolifération et de la potentielle désorientation qu’elle induit, la tentative d’une iconologie radicale, telle qu’initiée par Warburg, demeure d’une évidente actualité. <
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Allatson, Paul. „The Virtualization of Elián González“. M/C Journal 7, Nr. 5 (01.11.2004). http://dx.doi.org/10.5204/mcj.2449.

Der volle Inhalt der Quelle
Annotation:
For seven months in 1999/2000, six-year old Cuban Elián González was embroiled in a family feud plotted along rival national and ideological lines, and relayed televisually as soap opera across the planet. In Miami, apparitions of the Virgin Mary were reported after Elián’s arrival; adherents of Afro-Cuban santería similarly regarded Elián as divinely touched. In Cuba, Elián’s “kidnapping” briefly reinvigorated a torpid revolutionary project. He was hailed by Fidel Castro as the symbolic descendant of José Martí and Che Guevara, and of the patriotic rigour they embodied. Cubans massed to demand his return. In the U.S.A., Elián’s case was arbitrated at every level of the juridical system. The “Save Elián” campaign generated widespread debate about godless versus godly family values, the contours of the American Dream, and consumerist excess. By the end of 2000 Elián had generated the second largest volume of TV news coverage to that date in U.S. history, surpassed only by the O. J. Simpson case (Fasulo). After Fidel Castro, and perhaps the geriatric music ensemble manufactured by Ry Cooder, the Buena Vista Social Club, Elián became the most famous Cuban of our era. Elián also emerged as the unlikeliest of popular-cultural icons, the focus and subject of cyber-sites, books, films, talk-back radio programs, art exhibits, murals, statues, documentaries, a South Park episode, poetry, songs, t-shirts, posters, newspaper editorials in dozens of languages, demonstrations, speeches, political cartoons, letters, legal writs, U.S. Congress records, opinion polls, prayers, and, on both sides of the Florida Strait, museums consecrated in his memory. Confronted by Elián’s extraordinary renown and historical impact, John Carlos Rowe suggests that the Elián story confirms the need for a post-national and transdisciplinary American Studies, one whose practitioners “will have to be attentive to the strange intersections of politics, law, mass media, popular folklore, literary rhetoric, history, and economics that allow such events to be understood.” (204). I share Rowe’s reading of Elián’s story and the clear challenges it presents to analysis of “America,” to which I would add “Cuba” as well. But Elián’s story is also significant for the ways it challenges critical understandings of fame and its construction. No longer, to paraphrase Leo Braudy (566), definable as an accidental hostage of the mass-mediated eye, Elián’s fame has no certain relation to the child at its discursive centre. Elián’s story is not about an individuated, conscious, performing, desiring, and ambivalently rewarded ego. Elián was never what P. David Marshall calls “part of the public sphere, essentially an actor or, … a player” in it (19). The living/breathing Elián is absent from what I call the virtualizing drives that famously reproduced him. As a result of this virtualization, while one Elián now attends school in Cuba, many other Eliáns continue to populate myriad popular-cultural texts and to proliferate away from the states that tried to contain him. According to Jerry Everard, “States are above all cultural artefacts” that emerge, virtually, “as information produced by and through practices of signification,” as bits, bites, networks, and flows (7). All of us, he claims, reside in “virtual states,” in “legal fictions” based on the elusive and contested capacity to generate national identities in an imaginary bounded space (152). Cuba, the origin of Elián, is a virtual case in point. To augment Nicole Stenger’s definition of cyberspace, Cuba, like “Cyberspace, is like Oz — it is, we get there, but it has no location” (53). As a no-place, Cuba emerges in signifying terms as an illusion with the potential to produce and host Cubanness, as well as rival ideals of nation that can be accessed intact, at will, and ready for ideological deployment. Crude dichotomies of antagonism — Cuba/U.S.A., home/exile, democracy/communism, freedom/tyranny, North/South, godlessness/blessedness, consumption/want — characterize the hegemonic struggle over the Cuban nowhere. Split and splintered, hypersensitive and labyrinthine, guarded and hysterical, and always active elsewhere, the Cuban cultural artefact — an “atmospheric depression in history” (Stenger 56) — very much conforms to the logics that guide the appeal, and danger, of cyberspace. Cuba occupies an inexhaustible “ontological time … that can be reintegrated at any time” (Stenger 55), but it is always haunted by the prospect of ontological stalling and proliferation. The cyber-like struggle over reintegration, of course, evokes the Elián González affair, which began on 25 November 1999, when five-year old Elián set foot on U.S. soil, and ended on 28 June 2000, when Elián, age six, returned to Cuba with his father. Elián left one Cuba and found himself in another Cuba, in the U.S.A., each national claimant asserting virtuously that its other was a no-place and therefore illegitimate. For many exiles, Elián’s arrival in Miami confirmed that Castro’s Cuba is on the point of collapse and hence on the virtual verge of reintegration into the democratic fold as determined by the true upholders of the nation, the exile community. It was also argued that Elián’s biological father could never be the boy’s true father because he was a mere emasculated puppet of Castro himself. The Cuban state, then, had forfeited its claims to generate and host Cubanness. Succoured by this logic, the “Save Elián” campaign began, with organizations like the Cuban American National Foundation (CANF) bankrolling protests, leaflet and poster production, and official “Elián” websites, providing financial assistance to and arranging employment for some of Elián’s Miami relatives, lobbying the U.S. Congress and the Florida legislature, and contributing funds to the legal challenges on behalf of Elián at state and federal levels. (Founded in 1981, the CANF is the largest and most powerful Cuban exile organization, and one that regards itself as the virtual government-in-waiting. CANF emerged with the backing of the Reagan administration and the C.I.A. as a “private sector initiative” to support U.S. efforts against its long-time ideological adversary across the Florida Strait [Arboleya 224-5].) While the “Save Elián” campaign failed, the result of a Cuban American misreading of public opinion and overestimation of the community’s lobbying power with the Clinton administration, the struggle continues in cyberspace. CANF.net.org registers its central role in this intense period with silence; but many of the “Save Elián” websites constructed after November 1999 continue to function as sad memento moris of Elián’s shipwreck in U.S. virtual space. (The CANF website does provide links to articles and opinion pieces about Elián from the U.S. media, but its own editorializing on the Elián affair has disappeared. Two keys to this silence were the election of George W. Bush, and the events of 11 Sep. 2001, which have enabled a revision of the Elián saga as a mere temporary setback on the Cuban-exile historical horizon. Indeed, since 9/11, the CANF website has altered the terms of its campaign against Castro, posting photos of Castro with Arab leaders and implicating him in a world-wide web of terrorism. Elián’s return to Cuba may thus be viewed retrospectively as an act that galvanized Cuban-exile support for the Republican Party and their disdain for the Democratic rival, and this support became pivotal in the Republican electoral victory in Florida and in the U.S.A. as a whole.) For many months after Elián’s return to Cuba, the official Liberty for Elián site, established in April 2000, was urging visitors to make a donation, volunteer for the Save Elián taskforce, send email petitions, and “invite a friend to help Elián.” (Since I last accessed “Liberty for Elián” in March 2004 it has become a gambling site.) Another site, Elian’s Home Page, still implores visitors to pray for Elián. Some of the links no longer function, and imperatives to “Click here” lead to that dead zone called “URL not found on this server.” A similar stalling of the exile aspirations invested in Elián is evident on most remaining Elián websites, official and unofficial, the latter including The Sad Saga of Elian Gonzalez, which exhorts “Cuban Exiles! Now You Can Save Elián!” In these sites, a U.S. resident Elián lives on as an archival curiosity, a sign of pathos, and a reminder of what was, for a time, a Cuban-exile PR disaster. If such cybersites confirm the shipwrecked coordinates of Elián’s fame, the “Save Elián” campaign also provided a focus for unrestrained criticism of the Cuban exile community’s imbrication in U.S. foreign policy initiatives and its embrace of American Dream logics. Within weeks of Elián’s arrival in Florida, cyberspace was hosting myriad Eliáns on sites unbeholden to Cuban-U.S. antagonisms, thus consolidating Elián’s function as a disputed icon of virtualized celebrity and focus for parody. A sense of this carnivalesque proliferation can be gained from the many doctored versions of the now iconic photograph of Elián’s seizure by the INS. Still posted, the jpegs and flashes — Elián and Michael Jackson, Elián and Homer Simpson, Elián and Darth Vader, among others (these and other doctored versions are archived on Hypercenter.com) — confirm the extraordinary domestication of Elián in local pop-cultural terms that also resonate as parodies of U.S. consumerist and voyeuristic excess. Indeed, the parodic responses to Elián’s fame set the virtual tone in cyberspace where ostensibly serious sites can themselves be approached as send ups. One example is Lois Rodden’s Astrodatabank, which, since early 2000, has asked visitors to assist in interpreting Elián’s astrological chart in order to confirm whether or not he will remain in the U.S.A. To this end the site provides Elián’s astro-biography and birth chart — a Sagittarius with a Virgo moon, Elián’s planetary alignments form a bucket — and conveys such information as “To the people of Little Havana [Miami], Elian has achieved mystical status as a ‘miracle child.’” (An aside: Elián and I share the same birthday.) Elián’s virtual reputation for divinely sanctioned “blessedness” within a Cuban exile-meets-American Dream typology provided Tom Tomorrow with the target in his 31 January 2000, cartoon, This Modern World, on Salon.com. Here, six-year old Arkansas resident Allen Consalis loses his mother on the New York subway. His relatives decide to take care of him since “New York has much more to offer him than Arkansas! I mean get real!” A custody battle ensues in which Allan’s heavily Arkansas-accented father requires translation, and the case inspires heated debate: “can we really condemn him to a life in Arkansas?” The cartoon ends with the relatives tempting Allan with the delights offered by the Disney Store, a sign of Elián’s contested insertion into an American Dreamscape that not only promises an endless supply of consumer goods but provides a purportedly safe venue for the alternative Cuban nation. The illusory virtuality of that nation also animates a futuristic scenario, written in Spanish by Camilo Hernández, and circulated via email in May 2000. In this text, Elián sparks a corporate battle between Firestone and Goodyear to claim credit for his inner-tubed survival. Cuban Americans regard Elián as the Messiah come to lead them to the promised land. His ability to walk on water is scientifically tested: he sinks and has to be rescued again. In the ensuing custody battle, Cuban state-run demonstrations allow mothers of lesbians and of children who fail maths to have their say on Elián. Andrew Lloyd Weber wins awards for “Elián the Musical,” and for the film version, Madonna plays the role of the dolphin that saved Elián. Laws are enacted to punish people who mispronounce “Elián” but these do not help Elián’s family. All legal avenues exhausted, the entire exile community moves to Canada, and then to North Dakota where a full-scale replica of Cuba has been built. Visa problems spark another migration; the exiles are welcomed by Israel, thus inspiring a new Intifada that impels their return to the U.S.A. Things settle down by 2014, when Elián, his wife and daughter celebrate his 21st birthday as guests of the Kennedys. The text ends in 2062, when the great-great-grandson of Ry Cooder encounters an elderly Elián in Wyoming, thus providing Elián with his second fifteen minutes of fame. Hernández’s text confirms the impatience with which the Cuban-exile community was regarded by other U.S. Latino sectors, and exemplifies the loss of control over Elián experienced by both sides in the righteous Cuban “moral crusade” to save or repatriate Elián (Fernández xv). (Many Chicanos, for example, were angered at Cuban-exile arguments that Elián should remain in the U.S.A. when, in 1999 alone, 8,000 Mexican children were repatriated to Mexico (Ramos 126), statistical confirmation of the favored status that Cubans enjoy, and Mexicans do not, vis-à-vis U.S. immigration policy. Tom Tomorrow’s cartoon and Camilo Hernández’s email text are part of what I call the “What-if?” sub-genre of Elián representations. Another example is “If Elián Gonzalez was Jewish,” archived on Lori’s Mishmash Humor page, in which Eliat Ginsburg is rescued after floating on a giant matzoh in the Florida Strait, and his Florida relatives fight to prevent his return to Israel, where “he had no freedom, no rights, no tennis lessons”.) Nonetheless, that “moral crusade” has continued in the Cuban state. During the custody battle, Elián was virtualized into a hero of national sovereignty, an embodied fix for a revolutionary project in strain due to the U.S. embargo, the collapse of Soviet socialism, and the symbolic threat posed by the virtual Cuban nation-in-waiting in Florida. Indeed, for the Castro regime, the exile wing of the national family is virtual precisely because it conveniently overlooks two facts: the continued survival of the Cuban state itself; and the exile community’s forty-plus-year slide into permanent U.S. residency as one migrant sector among many. Such rhetoric has not faded since Elián’s return. On December 5, 2003, Castro visited Cárdenas for Elián’s tenth birthday celebration and a quick tour of the Museo a la batalla de ideas (Museum for the Battle of Ideas), the museum dedicated to Elián’s “victory” over U.S. imperialism and opened by Castro on July 14, 2001. At Elián’s school Castro gave a speech in which he recalled the struggle to save “that little boy, whose absence caused everyone, and the whole people of Cuba, so much sorrow and such determination to struggle.” The conflation of Cuban state rhetoric and an Elián mnemonic in Cárdenas is repeated in Havana’s “Plaza de Elián,” or more formally Tribuna Anti-imperialista José Martí, where a statue of José Martí, the nineteenth-century Cuban nationalist, holds Elián in his arms while pointing to Florida. Meanwhile, in Little Havana, Miami, a sun-faded set of photographs and hand-painted signs, which insist God will save Elián yet, hang along the front fence of the house — now also a museum and site of pilgrimage — where Elián once lived in a state of siege. While Elián’s centrality in a struggle between virtuality and virtue continues on both sides of the Florida Strait, the Cuban nowhere could not contain Elián. During his U.S. sojourn many commentators noted that his travails were relayed in serial fashion to an international audience that also claimed intimate knowledge of the boy. Coming after the O.J. Simpson saga and the Clinton-Lewinsky affair, the Elián story confirmed journalist Rick Kushman’s identification of a ceaseless, restless U.S. media attention shift from one story to the next, generating an “übercoverage” that engulfs the country “in mini-hysteria” (Calvert 107). But In Elián’s case, the voyeuristic media-machine attained unprecedented intensity because it met and worked with the virtualities of the Cuban nowhere, part of it in the U.S.A. Thus, a transnational surfeit of Elián-narrative options was guaranteed for participants, audiences and commentators alike, wherever they resided. In Cuba, Elián was hailed as the child-hero of the Revolution. In Miami he was a savior sent by God, the proof supplied by the dolphins that saved him from sharks, and the Virgins who appeared in Little Havana after his arrival (De La Torre 3-5). Along the U.S.A.-Mexico border in 2000, Elián’s name was given to hundreds of Mexican babies whose parents thought the gesture would guarantee their sons a U.S. future. Day by day, Elián’s story was propelled across the globe by melodramatic plot devices familiar to viewers of soap opera: doubtful paternities; familial crimes; identity secrets and their revelation; conflicts of good over evil; the reuniting of long-lost relatives; and the operations of chance and its attendant “hand of Destiny, arcane and vaguely supernatural, transcending probability of doubt” (Welsh 22). Those devices were also favored by the amateur author, whose narratives confirm that the delirious parameters of cyberspace are easily matched in the worldly text. In Michael John’s self-published “history,” Betrayal of Elian Gonzalez, Elián is cast as the victim of a conspiracy traceable back to the hydra-headed monster of Castro-Clinton and the world media: “Elian’s case was MANIPULATED to achieve THEIR OVER-ALL AGENDA. Only time will bear that out” (143). His book is now out of print, and the last time I looked (August 2004) one copy was being offered on Amazon.com for US$186.30 (original price, $9.95). Guyana-born, Canadian-resident Frank Senauth’s eccentric novel, A Cry for Help: The Fantastic Adventures of Elian Gonzalez, joins his other ventures into vanity publishing: To Save the Titanic from Disaster I and II; To Save Flight 608 From Disaster; A Wish to Die – A Will to Live; A Time to Live, A Time to Die; and A Day of Terror: The Sagas of 11th September, 2001. In A Cry for Help, Rachel, a white witch and student of writing, travels back in time in order to save Elián’s mother and her fellow travelers from drowning in the Florida Strait. As Senauth says, “I was only able to write this dramatic story because of my gift for seeing things as they really are and sharing my mystic imagination with you the public” (25). As such texts confirm, Elián González is an aberrant addition to the traditional U.S.-sponsored celebrity roll-call. He had no ontological capacity to take advantage of, intervene in, comment on, or be known outside, the parallel narrative universe into which he was cast and remade. He was cast adrift as a mere proper name that impelled numerous authors to supply the boy with the biography he purportedly lacked. Resident of an “atmospheric depression in history” (Stenger 56), Elián was battled over by virtualized national rivals, mass-mediated, and laid bare for endless signification. Even before his return to Cuba, one commentator noted that Elián had been consumed, denied corporeality, and condemned to “live out his life in hyper-space” (Buzachero). That space includes the infamous episode of South Park from May 2000, in which Kenny, simulating Elián, is killed off as per the show’s episodic protocols. Symptomatic of Elián’s narrative dispersal, the Kenny-Elián simulation keeps on living and dying whenever the episode is re-broadcast on TV sets across the world. Appropriated and relocated to strange and estranging narrative terrain, one Elián now lives out his multiple existences in the Cuban-U.S. “atmosphere in history,” and the Elián icon continues to proliferate virtually anywhere. References Arboleya, Jesús. The Cuban Counter-Revolution. Trans. Rafael Betancourt. Research in International Studies, Latin America Series no. 33. Athens, OH: Ohio Center for International Studies, 2000. Braudy, Leo. The Frenzy of Renown: Fame and Its History. New York and Oxford: Oxford UP, 1986. Buzachero, Chris. “Elian Gonzalez in Hyper-Space.” Ctheory.net 24 May 2000. 19 Aug. 2004: http://www.ctheory.net/text_file.asp?pick=222>. Calvert, Clay. Voyeur Nation: Media, Privacy, and Peering in Modern Culture. Boulder: Westview, 2000. Castro, Fidel. “Speech Given by Fidel Castro, at the Ceremony Marking the Birthday of Elian Gonzalez and the Fourth Anniversary of the Battle of Ideas, Held at ‘Marcello Salado’ Primary School in Cardenas, Matanzas on December 5, 2003.” 15 Aug. 2004 http://www.revolutionarycommunist.org.uk/fidel_castro3.htm>. Cuban American National Foundation. Official Website. 2004. 20 Aug. 2004 http://www.canf.org/2004/principal-ingles.htm>. De La Torre, Miguel A. La Lucha For Cuba: Religion and Politics on the Streets of Miami. Berkeley: U of California P, 2003. “Elian Jokes.” Hypercenter.com 2000. 19 Aug. 2004 http://www.hypercenter.com/jokes/elian/index.shtml>. “Elian’s Home Page.” 2000. 19 Aug. 2004 http://elian.8k.com>. Everard, Jerry. Virtual States: The Internet and the Boundaries of the Nation-State. London and New York, Routledge, 2000. Fernández, Damián J. Cuba and the Politics of Passion. Austin: U of Texas P, 2000. Hernández, Camilo. “Cronología de Elián.” E-mail. 2000. Received 6 May 2000. “If Elian Gonzalez Was Jewish.” Lori’s Mishmash Humor Page. 2000. 10 Aug. 2004 http://www.geocities.com/CollegePark/6174/jokes/if-elian-was-jewish.htm>. John, Michael. Betrayal of Elian Gonzalez. MaxGo, 2000. “Liberty for Elián.” Official Save Elián Website 2000. June 2003 http://www.libertyforelian.org>. Marshall, P. David. Celebrity and Power: Fame in Contemporary Culture. Minneapolis and London: U of Minnesota P, 1997. Ramos, Jorge. La otra cara de América: Historias de los inmigrantes latinoamericanos que están cambiando a Estados Unidos. México, DF: Grijalbo, 2000. Rodden, Lois. “Elian Gonzalez.” Astrodatabank 2000. 20 Aug. 2004 http://www.astrodatabank.com/NM/GonzalezElian.htm>. Rowe, John Carlos. 2002. The New American Studies. Minneapolis and London: U of Minnesota P, 2002. “The Sad Saga of Elian Gonzalez.” July 2004. 19 Aug. 2004 http://www.revlu.com/Elian.html>. Senauth, Frank. A Cry for Help: The Fantastic Adventures of Elian Gonzalez. Victoria, Canada: Trafford, 2000. Stenger, Nicole. “Mind Is a Leaking Rainbow.” Cyberspace: First Steps. Ed. Michael Benedikt. Cambridge, MA: MIT P, 1991. 49-58. Welsh, Alexander. George Eliot and Blackmail. Cambridge, MA: Harvard UP, 1985. Citation reference for this article MLA Style Allatson, Paul. "The Virtualization of Elián González." M/C Journal 7.5 (2004). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0411/16-allatson.php>. APA Style Allatson, P. (Nov. 2004) "The Virtualization of Elián González," M/C Journal, 7(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0411/16-allatson.php>.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Mackenzie, Adrian. „Making Data Flow“. M/C Journal 5, Nr. 4 (01.08.2002). http://dx.doi.org/10.5204/mcj.1975.

Der volle Inhalt der Quelle
Annotation:
Why has software code become an object of intense interest in several different domains of cultural life? In art (.net art or software art), in Open source software (Linux, Perl, Apache, et cetera (Moody; Himanen)), in tactical media actions (hacking of WEF Melbourne and Nike websites), and more generally, in the significance attributed to coding as work at the pinnacle of contemporary production of information (Negri and Hardt 298), code itself has somehow recently become significant, at least for some subcultures. Why has that happened? At one level, we could say that this happened because informatic interaction (websites, email, chat, online gaming, ecommerce, etc) has become mainstream to media production, organisational practice and indeed, quotidian life in developed and developing countries. As information production moves into the mainstream, working against mainstream control of flows of information means going upstream. For artists, tactical media groups and hackers, code seems to provide a way to, so to speak, reach over the shoulder of mainstream media channels and contest their control of information flows.1 A basic question is: does it? What code does We all see content flowing through the networks. Yet the expressive traits of the flows themselves are harder to grapple with, partly because they are largely infrastructural. When media and cultural theory discuss information-network society, cyberculture or new media, questions of flow specificity are usually downplayed in favour of high-level engagement with information as content. Arguably, the heightened attention to code attests to an increasing awareness that power relations are embedded in the generation and control of flow rather than just the meanings or contents that might be transported by flow. In this context, loops provide a really elementary and concrete way to explore how code participates in information flows. Loops structure almost every code object at a basic level. The programmed loop, a very mundane construct, can be found in any new media artist's or software engineer's coding toolkit. All programming languages have them. In popular programming and scripting languages such as FORTRAN, C, Pascal, C++, Java, Visual Basic, Perl, Python, JavaScript, ActionScript, etc, an almost identical set of looping constructs are found.2 Working with loops as material and as instrument constitutes an indispensable part of producing code-based objects. On the one hand, the loop is the most basic technical element of code as written text. On the other hand, as process executed by CPUs, and in ways that are not immediately obvious even to programmers themselves, loops of various kinds underpin the generative potential of code.3 Crucially, code is concerned with operationality rather than meaning (Lash 203). Code does not directly create meaning. It circulates, transforms, and reproduces messages and patterns of widely varying semantic and contextual richness. By definition, flow is something continuous. In the case of information, what flows are not things but patterns which can be rendered perceptible in different ways—as image, text, sound—on screen, display, and speaker. While the patterns become perceptible in a range of different spatio-temporal modes, their circulation is serialised. They are, as we know, composed of sequences of modulations (bits). Loops control the flow of patterns. Lev Manovich writes: programming involves altering the linear flow of data through control structures, such as 'if/then' and 'repeat/while'; the loop is the most elementary of these control structures (Manovich 189). Drawing on these constructs, programming or coding work gain traction in flows. Interactive looping Loops also generate flows by multiplying events. The most obvious example of how code loops generate and control flows comes from the graphic user interfaces (GUIs) provided by typical operating systems such as Windows, MacOs or one of the Linux desktop environments. These operating systems configure the visual space of millions of desktop screen according to heavily branded designs. Basically they all divide the screen into different framing areas—panels, dividing lines, toolbars, frames, windows—and then populate those areas with controls and indicators—buttons, icons, checkboxes, dropdown lists, menus, popup menus. Framing areas hold content—text, tables, images, video. Controls, usually clustered around the edge of the frame, transform the content displayed in the framed areas in many different ways. Visual controls are themselves hooked up via code to physical input devices such as keyboard, mouse, joystick, buttons and trackpad. The highly habituated and embodied experience of interacting with contemporary GUIs consists of moving in and out, within and between different framing areas, using visual controls that respond either to pointing (with the mouse) or keyboard command to change what is displayed, how it is displayed or indeed to move that content elsewhere (onto disk, across a network). Beneath the highly organised visual space of the GUI, lie hundreds if not thousands of loops. The work of coding these interfaces involves making loops, splicing loops together, and nesting loops within loops. At base, the so-called event loop means that the GUI in principle stands ready at any time to accept input from the physical interface devices. Depending on what that input is, it may translate into direct changes within the framed areas (for instance, keystrokes appear in a text field as letters) or changes affecting the controls (for instance, Control-Enter might signal send the text as an email). What we usually understand by interactivity stems from the way that a loop constantly accepts signals from the physical inputs, queues the signals as events, and deals with them one by one as discrete changes in what appears on screen. Within the GUI's basic event loop, many other loops are constantly starting and finishing. They are nested and unnested. They often affect some or other of the dozens of processes running at any one time within the operating system. Sometimes a command coming from the keyboard or a signal arriving from some other peripheral interface (the network interface card, the printer, a scanner, etc) will trigger the execution of a new process, itself composed of manifold loops. Hence loops often transiently interact with each other during execution of code. At base, the GUI shows something important, something that extends well beyond the domain of the GUI per se: the event loop generates and controls informations flows at the same time. People type on keyboards or manipulate game controllers. A single keypress or mouse click itself hardly constitutes a flow. Yet the event loop can amplify it into a cascade of thousands of events because it sets other loops in process. What we call information flow springs from the multiplicatory effect of loops. A typology of looping Information flows don't come from nowhere. They always go somewhere. Perhaps we could generalise a little from the mundane example of the GUI and say that the generation and control of information flows through loops is itself regulated by bounding conditions. A bounding condition determines the number of times and the sequence of operations carried out by a loop. They often come from outside the machine (interfaces of many different kinds) and from within it (other processes running at the same time, dependent on the operating system architecture and the hardware platform). Their regulatory role suggests the possibility of classifying loops according to boundary conditions.4 The following table classifies loops based on bounding conditions: Type of loop Bounding condition Typical location Simple & indefinite No bounding conditions Event loops in GUIs, servers ... Simple & definite Bounding conditions determined by a finite set of elements Counting, sorting, input and output Nested & definite Multiple bounding conditions Transforming grid and table structures Recursive Depth of possible recursion (memory or time) Searching and sorting of tree or network structures Result controlled Loop ends when some goal has been reached Goal-seeking algorithms Interactive and indefinite Bounding conditions change during the course of the loop User interfaces or interaction Although it risks simplifying something that is quite intricate in any actually executing process, this classification does stress that the distinguishing feature of loops may well be their bounding conditions. In practical terms, within program code, a bounding condition takes the form of some test carried out before, during or after each iteration of a loop. The bounding conditions for some loops relate to data that the code expects to come from other places—across networks, from the user interface, or some other devices. For other loops, the bounding conditions continually emerge in the course of the loop itself—the result of a calculation, finding some result in the course of searching a collection or receiving some new input in a flow of data from an interface or network connection. Based on the classification, we could suggest that loops not only generate flows, but they generate those flows within particular spatio-temporal manifolds. Put less abstractly, if we accept that flows don't come from nowhere, we then need to say what kind of places they do come from. The classification shows that they do not come from homogeneous spaces. In fact they relate to different topologies, to the hugely diverse orderings of signs and gestures within mediatic cultures. To take a mundane example, why has the table become such an important element in the HTML coding of webpages? Clearly tables provide an easy way to organise a page. Tables as classifying and visual ordering devices are nothing new. Along with lists, they have been used for centuries. However, the table as onscreen spatial entity also maps very directly onto a nested loop: the inner loop generates the horizontal row contents; the outer loop places the output of the inner loop in vertical order. As web-designers quickly discovered during the 1990s, HTML tables are rendered quickly by browsers and can easily position different contents—images, headings, text, lines, spaces—in proximity. In shorts, nested loops can quickly turn a table into a serial flow or quickly render a table out of a serial flow. Implications We started with the observation that artists, writers, hackers and media activists are working with code in order to reposition themselves in relation to information flows. Through technical elements such as loops, they reappropriate certain facets of the production of information and communication. Working with these and other elements, they look for different points of entry into the flows, attempting to move upstream of the heavily capitalised sites of mainstream production such as the Windows GUI, eCommerce websites or blockbuster game titles. The proliferation of information objects in music, in visual culture, in database and net-centred forms of interactivity ranging from computer games to chat protocols, suggests that the coding work can trigger powerful shifts in the cultures of circulation. Analysis of loops also suggests that the notion of data or information flow, understood as the continuous gliding of bits through systems of communication, needs revision. Rather than code simply controlling flow, code generates flows as well. What might warrant further thought is just how different kinds of bounding conditions generate different spatio-temporal patterns and modes of inclusion within flows. The diversity of loops within information objects imply a variety of topologically complicated places. It would be possible to work through the classification describing how each kind of loop maps into different spatial and temporal orderings. In particular, we might want to focus on how more complicated loops—result controlled, recursive, or interactive and indefinite types—map out more topologically complicated spaces and times. For my purposes, the important point is that bounding conditions not only regulate loops, they bring different kinds of spatio-temporal manifold into the seriality of flow. They imprint spatial and temporal ordering. Here the operationality of code begins to display a generative dimension that goes well beyond merely transporting or communicating content. Notes 1. At a more theoretical level, for a decade or so fairly abstract notions of virtuality have dominated media and cultural studies approaches to new media. While that domination has been increasingly contested by more fine grained studies of how the Internet is enmeshed with different places (Miller and Slater), attention to code is justified on the grounds that it constitutes an increasingly important form of expression within information flows. 2. Detailed discussion of these looping constructs can be found in any programming textbook or introductory computer science course, so I will not be going through them in any detail. 3. For instance, the cycles of the clock chip are absolutely irreducible. Virtually all programs implicitly rely on a clock chip to regulate execution of their instructions. 4. A classification can act as a symptomatology, that is, as something that sets out the various signs of the existence of a particular condition (Deleuze 368), in this case, the operationality of code. References Appadurai, Arjun. Modernity at Large: Cultural Dimensions of Globalization. Minneapolis: U of Minnesota P, 1996. Deleuze, Gilles. The Brain is the Screen. An Interview with Gilles Deleuze. The Brain is the Screen. Deleuze and the Philosophy of Cinema. Ed Gregory Flaxman. Minneapolis: U of Minnesota P, 2000. 365-68. Hardt, Michael and Antonio Negri. Empire. Cambridge, MA: Harvard U P, 2000. Himanen, Pekka. The Hacker Ethic and the Spirit of the Information Age. London: Secker and Warburg, 2001. Lash, Scott. Critique of Information. London: Sage, 2002. Manovich, Lev. What is Digital Cinema? Ed. Peter Lunenfeld. The Digital Dialectic: New Essays on New Media. Cambridge, MA: MIT, 1999. 172-92. Miller, Daniel, and Don Slater. The Internet: An Ethnographic Approach. Oxford: Berg, 2000. Moody, Glyn. Rebel Code: Linux and the Open Source Revolution. Middlesworth: Penguin, 2001. Citation reference for this article MLA Style Mackenzie, Adrian. "Making Data Flow" M/C: A Journal of Media and Culture 5.4 (2002). [your date of access] < http://www.media-culture.org.au/mc/0208/data.php>. Chicago Style Mackenzie, Adrian, "Making Data Flow" M/C: A Journal of Media and Culture 5, no. 4 (2002), < http://www.media-culture.org.au/mc/0208/data.php> ([your date of access]). APA Style Mackenzie, Adrian. (2002) Making Data Flow. M/C: A Journal of Media and Culture 5(4). < http://www.media-culture.org.au/mc/0208/data.php> ([your date of access]).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie