Academic literature on the topic 'Alessandro Sardi'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Alessandro Sardi.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Alessandro Sardi"

1

D'Agostini, Monica. "La strutturazione del potere seleucidico in Anatolia. Il caso di Acheo il Vecchio e Alessandro di Sardi." ERGA-LOGOI - Rivista di storia, letteratura, diritto e culture dell’antichità, no. 1 (June 2013): 87–106. http://dx.doi.org/10.7358/erga-2013-001-dago.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Murgia, Gisella. "Sardegna tra leggenda e realtà: ‘Sa femmina accabadora’, colei che dà la buona morte, nelle immagini e nelle parole di alcuni autori sardi." Italianistica Debreceniensis 24 (December 1, 2018): 77–84. http://dx.doi.org/10.34102/italdeb/2018/4662.

Full text
Abstract:
The term accabadora refers to a woman entrusted with the task of facilitating the passing of the dying people. She killed for pity, called by the families of the patients to relieve their sufferings on their own deathbed. Basically, she practiced a sort of ante litteram euthanasia. But that carried out by the woman was also a necessary action for the survival of relatives who, most of the time, did not have the necessary resources to alleviate the sufferings of the kinsmen. Furthermore, in small towns, the doctor was often several days away on horseback. While the accabadora took life away, on the other hand, she gave it back, helping the women of her community to give birth. Everyone in the village knew the activity of these women but all of them were silent. They were convinced that the work of the accabadora was a meritorious work because it took the burden of putting an end to the sufferings of the patient. They implicitly recognized in it a social utility. After outlining the figure of 'sa fèmmina practica', this report analyses some works by Sardinian authors who are interested in it. Above all, we will mention the novel by Michela Murgia, Accabadora (Campiello prize 2010); the film by Enrico Pau, L'accabadora; the novels L’ultima agabbadòra by Sebastiano Depperu and L'agabbadora. La morte invocata by Giovanni Murineddu; the short film Deu ci sia by Gianluca Tarditi, winner of the 2011 Golden Globe at 48th New York Film Festival; Ho visto agire s’accabadora by Dolores Turchi; Eutanasia ante litteram in Sardegna. Sa femmina accabadora by Alessandro Bucarelli and Carlo Lubrano and S’accabadora e la sacralità del femminino of Maria Antonella Arras.
APA, Harvard, Vancouver, ISO, and other styles
3

Vioque, Guillermo Galán. "Literature - (L.) Floridi Stratone di Sardi. Epigrammi. Alessandria: Edizioni dell' Orso, 2007. €60. 9788876949678." Journal of Hellenic Studies 128 (November 2008): 200–201. http://dx.doi.org/10.1017/s0075426900000379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Faulkner, Andrew. "Strato - (L.) Floridi (ed., trans.) Stratone di Sardi: Epigrammi. (Hellenica 24.) Pp. xiv + 492. Alessandria: Edizioni dell'Orso, 2007. Paper, €60. ISBN: 978-88-7694-967-8." Classical Review 59, no. 1 (March 11, 2009): 95–97. http://dx.doi.org/10.1017/s0009840x0800200x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

DI Iorio, M., C. Cook, K. Vanni, N. Patel, K. D’silva, X. Fu, J. Wang, et al. "POS1234 DMARD DISRUPTION, INCREASED DISEASE ACTIVITY, AND PROLONGED SYMPTOM DURATION AFTER ACUTE COVID-19 AMONG PATIENTS WITH RHEUMATIC DISEASE: A PROSPECTIVE STUDY." Annals of the Rheumatic Diseases 81, Suppl 1 (May 23, 2022): 949.2–950. http://dx.doi.org/10.1136/annrheumdis-2022-eular.2718.

Full text
Abstract:
BackgroundSystemic autoimmune rheumatic disease (SARD) patients may be at risk for disease flare and prolonged symptom duration after COVID-19, perhaps related to DMARD disruption and immune activation.ObjectivesTo describe DMARD disruption and identify differences in SARD activity among patients with and without prolonged COVID-19 symptom duration.MethodsWe identified all SARD patients with confirmed COVID-19 at the Mass General Brigham healthcare system in Boston, USA; prospective recruitment is ongoing. Surveys were used to collect demographics, clinical characteristics, DMARD disruption, COVID-19 course, and SARD disease activity before and after COVID-19. The survey included validated instruments measuring disease activity, pain, fatigue, functional status, and respiratory quality of life. Prolonged symptom duration was defined as COVID-19 symptoms lasting ≥28 days. We compared differences in patient-reported measures between those with and without prolonged symptoms.ResultsWe analyzed survey responses from 174 COVID-19 survivors with SARDs (mean age 52±16 years, 81% female, 80% White). The most common SARDs were RA (40%) and SLE (14%). Fifty-one percent of the 127 respondents on any DMARD reported a disruption to their regimen at COVID-19 onset (Figure 1). Among individual DMARDs, 56-77% were reported to have any change, except for hydroxychloroquine (23%) and rituximab (46%). SARD flare after COVID-19 was reported by 41% of respondents (Table 1). Patient global assessment of SARD activity was worse after COVID-19 (mean 7.6±2.3 before vs. 6.6±2.9 after COVID-19, p<0.001). Prolonged symptom duration was reported by 45% of participants. Those with prolonged symptoms had a higher initial COVID-19 symptom count (median 7 vs. 4, p<0.001) and were more likely to be hospitalized for COVID-19 (28% vs. 17%, p=0.001). Respondents experiencing prolonged symptom duration had higher disease activity on RAPID3 (p=0.007) as well as more pain (p<0.001) and fatigue (p=0.03) compared to those without prolonged symptoms.Table 1.Acute COVID-19 course, SARD flare/activity, and patient-reported outcomes among COVID-19 survivors with SARDs.All COVID-19 survivors with SARDs (n=174)Prolonged symptom duration ≥28 days (n=78)No prolonged symptom duration/(n=96)p-value (prolonged vs. not)Acute COVID-19 courseCOVID-19 symptom duration, days, median [IQR]14 [9, 29]46 [30, 65]11 [7, 14]<0.0001Initial symptom count, median [IQR]6 [3, 8]7 [6, 9]4 [2, 7]<0.001Hospitalized, n (%)38 (22)22 (28)16 (17)0.001SARD flare/activitySelf-reported SARD flare after COVID-19, n (%)71 (41)38 (49)33 (34)0.15Disease activity by RAPID3, median [IQR]9 [4, 14]11.2 [6, 16]7 [3, 13]0.0067RAPID3 categorical score, n (%)0.13Remission (0)11 (7)4 (5)7 (7)Near remission (0.3-1.0)23 (14)5 (7)18 (19)Low severity (1.3-2.0)26 (15)10 (14)16 (17)Moderate severity (2.3-4.0)55 (33)27 (36)28 (29)High severity (4.3-10.0)54 (32)28 (38)26 (27)Patient-reported outcomesPain by SF-MPQ, median [IQR]2 [1, 2]2 [1, 2]1 [0, 2]0.0008Fatigue by FSI, median [IQR]53 [27, 84]66 [31, 91.5]43 [26, 76]0.031mHAQ, median [IQR]0.125 [0, 0.38]0.25 [0, 0.75]0.125 [0, 0.38]0.11Respiratory quality of life by SGRQ, global [IQR]15 [4, 29]16 [4, 36]10 [4, 26]0.49RAPID3, Routine Assessment of Patient Index Data 3; SF-MPQ, Short-form McGill Pain Questionnaire; FSI, Fatigue Symptom Inventory; mHAQ, modified Health Assessment Questionnaire; SGRQ, Saint George’s Respiratory Questionnaire.Figure 1.Frequency of baseline DMARD use and proportion with any disruption at COVID-19 onset.ConclusionDMARD disruption, SARD flare, and prolonged symptoms were common in this prospective study of COVID-19 survivors with SARDs. Those with prolonged COVID-19 symptom duration, defined as ≥28 days, had higher SARD activity, more pain, and more fatigue compared to those without prolonged symptoms. These findings suggest that post-acute sequelae of COVID-19 may have a large impact on underlying SARD activity and quality of life.Disclosure of InterestsMichael Di Iorio: None declared, Claire Cook: None declared, Kathleen Vanni: None declared, Naomi Patel Consultant of: Receives consulting fees from FVC Health unrelated to this work., Kristin D’Silva: None declared, Xiaoqing Fu: None declared, Jiaqi Wang: None declared, Lauren Prisco: None declared, Emily Kowalski: None declared, Alessandra Zaccardelli: None declared, Lily Martin: None declared, Grace Qian: None declared, Tiffany Hsu: None declared, Zachary Wallace Consultant of: Receives consulting fees from Viela Bio, Zenas BioPharma, and MedPace unrelated to this work., Grant/research support from: Receives research support from Bristol-Myers Squibb and Principia/Sanofi., Jeffrey Sparks Consultant of: Receives consultant fees from AbbVie, Amgen, Boehringer Ingelheim, Bristol Myers Squibb, Gilead, Inova Diagnostics, Janssen, Optum, and Pfizer unrelated to this work., Grant/research support from: Receives research support from Bristol Myers Squibb.
APA, Harvard, Vancouver, ISO, and other styles
6

Barker, Jeremy. "(Europe Section Alessandro Volta Award) The Journey Towards the Large-Scale Commercialization of Low-Cost and High Energy Density Na-ion Batteries." ECS Meeting Abstracts MA2022-02, no. 6 (October 9, 2022): 2494. http://dx.doi.org/10.1149/ma2022-0262494mtgabs.

Full text
Abstract:
Na-ion batteries based on non-aqueous electrolytes represent an inexpensive and sustainable alternative to their Li-ion counterparts [1,2]. The cost advantage is particularly apparent at the present time as the prices of battery grade Li and Co precursor salts have spiraled upwards in the last 18 months. Faradion Limited is a UK-based company, founded in 2011 and from December 2021, part of Reliance Industries Limited of India*. It is commercializing its Na-ion battery technology in a number of large format applications. It has identified and developed a wide range of inexpensive and proprietary active materials and non-aqueous electrolyte systems which offer low manufacturing costs as well as outstanding electrochemical performance and intrinsic safety. Over the past 10 years the company has incorporated these materials into full-scale Na-ion cells to a point where battery performance characteristics such as energy density, rate capability and cycle life are competitive with commercial Li-ion technologies. The Faradion Na-ion prototype cells demonstrate low-capacity fade on cycling, coupled to low polarization and excellent columbic and energy (round-trip) efficiency and may be configured for both energy and power applications. The use of Al for both current collectors serves as an additional and significant cost and safety benefit and allows the cells to be stored and transported at 0 V (i.e. physically shorted) [3]. The Faradion Na-ion cells are manufactured on commercial Li-ion production lines using proven battery designs [4,5]. Pouch, cylindrical and prismatic cell designs have all been demonstrated successfully [6]. Faradion has worked with its commercial partners to scale-up its Na-ion cell chemistry to the 40 Wh and 90 Wh pouch cell level – see for example, figure 1. These cells deliver a cell level specific energy of over 150 Wh/kg and have been incorporated into a range of demonstrator energy storage applications, including E-bike, residential, renewables, telecoms and automotive [6]. Faradion’s technology roadmap indicates that a specific energy in excess of 190 Wh/kg will be accessible in the near future. Other key attributes such as low precursor costs, material sustainability and excellent temperature range, confirm that Faradion’s Na-ion battery technology will prove commercially successful in a range of large format applications [7]. Reference s: [1] J. Barker, M.Y. Saidi and J. Swoyer, Electrochem. Solid-State Chem. 6 (2003) A1 [2] K. Kubota and S. Komaba, J. Electrochem. Soc., 162 (2015) A2538. doi.org/10.1149/2.0151514jes [3] (a) A. Rudola, C.J. Wright and J. Barker, Energy Materials Advances, 2021 Article ID 9798460. doi.org/10.34133/2021/9798460 (b) J. Barker and C.J. Wright, Assignee: Faradion Limited. US Patent #11159027 [4] A. Bauer, J. Song, S. Vail, W. Pan, J. Barker and Y. Lu, Adv. Energy Materials, 1 2018, 1702869. doi.org/10.1002/aenm.201702869 [5] For example, J. Barker and R.J. Heap, Assignee: Faradion Limited, US Patent#9774035, US Patent #9917307, US Patent #1019628, US Patent #10115966, US Patent #10050271, US Patent #10399863 [6] (a) American Chemical Society, Chemical & Engineering News, July 20, 2015, Vol. 93, Issue 29. (b) American Chemical Society, Chemical & Engineering News, May 24, 2022, Vol. 100, Issue 19 [7] A. Rudola et al. J. Mater Chem A, 2021, 9, 8279-8302. doi.org/10.1039/D1TA00376C Footnote: [*] In late 2021, Faradion Limited was acquired by Reliance New Energy Systems Limited (RNESL), a wholly owned subsidiary of Reliance Industries Limited (RIL) of India. Figure 1
APA, Harvard, Vancouver, ISO, and other styles
7

Ferrer, Prof Dr Eduardo Blasco. "Maria Giuseppina Cossu, Unità e variabilità fonetiche delle parlate sarde meridionali (Lingua, cultura, territorio, 46), Alessandria, Edizioni dell’Orso, 2013, 215 p. + CD." Zeitschrift für romanische Philologie 131, no. 3 (January 1, 2015). http://dx.doi.org/10.1515/zrp-2015-0065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gnerre, Guest Editors: Paola, and Giuseppe Di Pasquale. "Lo scompenso cardiaco a 360 gradi." Italian Journal of Medicine, August 24, 2021. http://dx.doi.org/10.4081/itjm.q.2021.2.

Full text
Abstract:
M. Meschi, P. Gnerre, A. Casola G. Di Pasquale Il paziente con scompenso cardiaco come paradigma del paziente complesso: il corretto uso dei diuretici ed il blocco sequenziale del nefroneA. Cinque, C. Tarsia, A.G. Posteraro, S. Bianchi, A. Gaspardone Scompenso cardiaco: differenze di genere?R. Falzone, L. Lenzi, C. Politi Opportunità terapeutiche nel paziente con scompenso cardiaco cronico a frazione d’eiezione depressaA. Navazio, M. Piepoli, G.Q. Villani, G. Halasz, G. Tortorella Opportunità terapeutiche nel paziente con scompenso cardiaco diastolicoA. Cabassi, G. Regolisti Scompenso cardiaco: rivalutazione della terapia in fase di ospedalizzazioneF. Corradi, I. Lamberti, G. Gelati, S. Massini I peptidi natriuretici nella diagnosi e nella stratificazione del rischio nei pazienti con scompenso cardiacoA. Montagnani, L. Luschi, F. Pirrotta, A. Palazzuoli L’educazione terapeutica nel paziente scompensatoM.D. Corbo, E. Vitale, M. Correale, N.D. Brunetti, M. Iacoviello Il modello del disease management nella gestione dello scompenso cardiacoO. Para Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza dell’AO Ordine Mauriziano di TorinoC. Norbiato, L. Arnaldi, S. Marengo, M. Tricarico, M. Daddea, C. Garza, E. Irene, P. Paolì Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza dell’ASST RhodenseS.A. Berra Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza di PalmanovaC. Battello Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza dell’AUSL di BolognaS. Urbinati, M. Ongari Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza delle Aziende USL della ToscanaA. Fortini, G. Tintori, M. Alessandri Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza marchigianaN. Tarquinio Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza savonese. Il progetto PONTEP. Gnerre, M. Pivari, E. Monaco, M.C. Pistone, M. Basso, P. Bellone, A. Visconti, B. Sardo, B. Zanella, A.M. Saccone, A. Piras, A. Santo, F. Bernardi, S. Lapponia, E. Montanari, R. Rapetti, R. Tassara, L. Parodi Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza campanaF. Gallucci Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza puglieseF. Mastroianni, G. Larizza, F. D’Onofrio, A. Belfiore, M.V. Palma, S. Cataldi Modelli a confronto nei percorsi gestionali dello scompenso cardiaco: l’esperienza di Sassari. Il progetto LEAPC.A. Usai, F.L. Bandiera Il ruolo delle cure palliative nello scompenso cardiaco end-stageC. Santini, M.S. Fiore
APA, Harvard, Vancouver, ISO, and other styles
9

Dieter, Michael. "Amazon Noir." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2709.

Full text
Abstract:
There is no diagram that does not also include, besides the points it connects up, certain relatively free or unbounded points, points of creativity, change and resistance, and it is perhaps with these that we ought to begin in order to understand the whole picture. (Deleuze, “Foucault” 37) Monty Cantsin: Why do we use a pervert software robot to exploit our collective consensual mind? Letitia: Because we want the thief to be a digital entity. Monty Cantsin: But isn’t this really blasphemic? Letitia: Yes, but god – in our case a meta-cocktail of authorship and copyright – can not be trusted anymore. (Amazon Noir, “Dialogue”) In 2006, some 3,000 digital copies of books were silently “stolen” from online retailer Amazon.com by targeting vulnerabilities in the “Search inside the Book” feature from the company’s website. Over several weeks, between July and October, a specially designed software program bombarded the Search Inside!™ interface with multiple requests, assembling full versions of texts and distributing them across peer-to-peer networks (P2P). Rather than a purely malicious and anonymous hack, however, the “heist” was publicised as a tactical media performance, Amazon Noir, produced by self-proclaimed super-villains Paolo Cirio, Alessandro Ludovico, and Ubermorgen.com. While controversially directed at highlighting the infrastructures that materially enforce property rights and access to knowledge online, the exploit additionally interrogated its own interventionist status as theoretically and politically ambiguous. That the “thief” was represented as a digital entity or machinic process (operating on the very terrain where exchange is differentiated) and the emergent act of “piracy” was fictionalised through the genre of noir conveys something of the indeterminacy or immensurability of the event. In this short article, I discuss some political aspects of intellectual property in relation to the complexities of Amazon Noir, particularly in the context of control, technological action, and discourses of freedom. Software, Piracy As a force of distribution, the Internet is continually subject to controversies concerning flows and permutations of agency. While often directed by discourses cast in terms of either radical autonomy or control, the technical constitution of these digital systems is more regularly a case of establishing structures of operation, codified rules, or conditions of possibility; that is, of guiding social processes and relations (McKenzie, “Cutting Code” 1-19). Software, as a medium through which such communication unfolds and becomes organised, is difficult to conceptualise as a result of being so event-orientated. There lies a complicated logic of contingency and calculation at its centre, a dimension exacerbated by the global scale of informational networks, where the inability to comprehend an environment that exceeds the limits of individual experience is frequently expressed through desires, anxieties, paranoia. Unsurprisingly, cautionary accounts and moral panics on identity theft, email fraud, pornography, surveillance, hackers, and computer viruses are as commonplace as those narratives advocating user interactivity. When analysing digital systems, cultural theory often struggles to describe forces that dictate movement and relations between disparate entities composed by code, an aspect heightened by the intensive movement of informational networks where differences are worked out through the constant exposure to unpredictability and chance (Terranova, “Communication beyond Meaning”). Such volatility partially explains the recent turn to distribution in media theory, as once durable networks for constructing economic difference – organising information in space and time (“at a distance”), accelerating or delaying its delivery – appear contingent, unstable, or consistently irregular (Cubitt 194). Attributing actions to users, programmers, or the software itself is a difficult task when faced with these states of co-emergence, especially in the context of sharing knowledge and distributing media content. Exchanges between corporate entities, mainstream media, popular cultural producers, and legal institutions over P2P networks represent an ongoing controversy in this respect, with numerous stakeholders competing between investments in property, innovation, piracy, and publics. Beginning to understand this problematic landscape is an urgent task, especially in relation to the technological dynamics that organised and propel such antagonisms. In the influential fragment, “Postscript on the Societies of Control,” Gilles Deleuze describes the historical passage from modern forms of organised enclosure (the prison, clinic, factory) to the contemporary arrangement of relational apparatuses and open systems as being materially provoked by – but not limited to – the mass deployment of networked digital technologies. In his analysis, the disciplinary mode most famously described by Foucault is spatially extended to informational systems based on code and flexibility. According to Deleuze, these cybernetic machines are connected into apparatuses that aim for intrusive monitoring: “in a control-based system nothing’s left alone for long” (“Control and Becoming” 175). Such a constant networking of behaviour is described as a shift from “molds” to “modulation,” where controls become “a self-transmuting molding changing from one moment to the next, or like a sieve whose mesh varies from one point to another” (“Postscript” 179). Accordingly, the crisis underpinning civil institutions is consistent with the generalisation of disciplinary logics across social space, forming an intensive modulation of everyday life, but one ambiguously associated with socio-technical ensembles. The precise dynamics of this epistemic shift are significant in terms of political agency: while control implies an arrangement capable of absorbing massive contingency, a series of complex instabilities actually mark its operation. Noise, viral contamination, and piracy are identified as key points of discontinuity; they appear as divisions or “errors” that force change by promoting indeterminacies in a system that would otherwise appear infinitely calculable, programmable, and predictable. The rendering of piracy as a tactic of resistance, a technique capable of levelling out the uneven economic field of global capitalism, has become a predictable catch-cry for political activists. In their analysis of multitude, for instance, Antonio Negri and Michael Hardt describe the contradictions of post-Fordist production as conjuring forth a tendency for labour to “become common.” That is, as productivity depends on flexibility, communication, and cognitive skills, directed by the cultivation of an ideal entrepreneurial or flexible subject, the greater the possibilities for self-organised forms of living that significantly challenge its operation. In this case, intellectual property exemplifies such a spiralling paradoxical logic, since “the infinite reproducibility central to these immaterial forms of property directly undermines any such construction of scarcity” (Hardt and Negri 180). The implications of the filesharing program Napster, accordingly, are read as not merely directed toward theft, but in relation to the private character of the property itself; a kind of social piracy is perpetuated that is viewed as radically recomposing social resources and relations. Ravi Sundaram, a co-founder of the Sarai new media initiative in Delhi, has meanwhile drawn attention to the existence of “pirate modernities” capable of being actualised when individuals or local groups gain illegitimate access to distributive media technologies; these are worlds of “innovation and non-legality,” of electronic survival strategies that partake in cultures of dispersal and escape simple classification (94). Meanwhile, pirate entrepreneurs Magnus Eriksson and Rasmus Fleische – associated with the notorious Piratbyrn – have promoted the bleeding away of Hollywood profits through fully deployed P2P networks, with the intention of pushing filesharing dynamics to an extreme in order to radicalise the potential for social change (“Copies and Context”). From an aesthetic perspective, such activist theories are complemented by the affective register of appropriation art, a movement broadly conceived in terms of antagonistically liberating knowledge from the confines of intellectual property: “those who pirate and hijack owned material, attempting to free information, art, film, and music – the rhetoric of our cultural life – from what they see as the prison of private ownership” (Harold 114). These “unruly” escape attempts are pursued through various modes of engagement, from experimental performances with legislative infrastructures (i.e. Kembrew McLeod’s patenting of the phrase “freedom of expression”) to musical remix projects, such as the work of Negativland, John Oswald, RTMark, Detritus, Illegal Art, and the Evolution Control Committee. Amazon Noir, while similarly engaging with questions of ownership, is distinguished by specifically targeting information communication systems and finding “niches” or gaps between overlapping networks of control and economic governance. Hans Bernhard and Lizvlx from Ubermorgen.com (meaning ‘Day after Tomorrow,’ or ‘Super-Tomorrow’) actually describe their work as “research-based”: “we not are opportunistic, money-driven or success-driven, our central motivation is to gain as much information as possible as fast as possible as chaotic as possible and to redistribute this information via digital channels” (“Interview with Ubermorgen”). This has led to experiments like Google Will Eat Itself (2005) and the construction of the automated software thief against Amazon.com, as process-based explorations of technological action. Agency, Distribution Deleuze’s “postscript” on control has proven massively influential for new media art by introducing a series of key questions on power (or desire) and digital networks. As a social diagram, however, control should be understood as a partial rather than totalising map of relations, referring to the augmentation of disciplinary power in specific technological settings. While control is a conceptual regime that refers to open-ended terrains beyond the architectural locales of enclosure, implying a move toward informational networks, data solicitation, and cybernetic feedback, there remains a peculiar contingent dimension to its limits. For example, software code is typically designed to remain cycling until user input is provided. There is a specifically immanent and localised quality to its actions that might be taken as exemplary of control as a continuously modulating affective materialism. The outcome is a heightened sense of bounded emergencies that are either flattened out or absorbed through reconstitution; however, these are never linear gestures of containment. As Tiziana Terranova observes, control operates through multilayered mechanisms of order and organisation: “messy local assemblages and compositions, subjective and machinic, characterised by different types of psychic investments, that cannot be the subject of normative, pre-made political judgments, but which need to be thought anew again and again, each time, in specific dynamic compositions” (“Of Sense and Sensibility” 34). This event-orientated vitality accounts for the political ambitions of tactical media as opening out communication channels through selective “transversal” targeting. Amazon Noir, for that reason, is pitched specifically against the material processes of communication. The system used to harvest the content from “Search inside the Book” is described as “robot-perversion-technology,” based on a network of four servers around the globe, each with a specific function: one located in the United States that retrieved (or “sucked”) the books from the site, one in Russia that injected the assembled documents onto P2P networks and two in Europe that coordinated the action via intelligent automated programs (see “The Diagram”). According to the “villains,” the main goal was to steal all 150,000 books from Search Inside!™ then use the same technology to steal books from the “Google Print Service” (the exploit was limited only by the amount of technological resources financially available, but there are apparent plans to improve the technique by reinvesting the money received through the settlement with Amazon.com not to publicise the hack). In terms of informational culture, this system resembles a machinic process directed at redistributing copyright content; “The Diagram” visualises key processes that define digital piracy as an emergent phenomenon within an open-ended and responsive milieu. That is, the static image foregrounds something of the activity of copying being a technological action that complicates any analysis focusing purely on copyright as content. In this respect, intellectual property rights are revealed as being entangled within information architectures as communication management and cultural recombination – dissipated and enforced by a measured interplay between openness and obstruction, resonance and emergence (Terranova, “Communication beyond Meaning” 52). To understand data distribution requires an acknowledgement of these underlying nonhuman relations that allow for such informational exchanges. It requires an understanding of the permutations of agency carried along by digital entities. According to Lawrence Lessig’s influential argument, code is not merely an object of governance, but has an overt legislative function itself. Within the informational environments of software, “a law is defined, not through a statue, but through the code that governs the space” (20). These points of symmetry are understood as concretised social values: they are material standards that regulate flow. Similarly, Alexander Galloway describes computer protocols as non-institutional “etiquette for autonomous agents,” or “conventional rules that govern the set of possible behavior patterns within a heterogeneous system” (7). In his analysis, these agreed-upon standardised actions operate as a style of management fostered by contradiction: progressive though reactionary, encouraging diversity by striving for the universal, synonymous with possibility but completely predetermined, and so on (243-244). Needless to say, political uncertainties arise from a paradigm that generates internal material obscurities through a constant twinning of freedom and control. For Wendy Hui Kyong Chun, these Cold War systems subvert the possibilities for any actual experience of autonomy by generalising paranoia through constant intrusion and reducing social problems to questions of technological optimisation (1-30). In confrontation with these seemingly ubiquitous regulatory structures, cultural theory requires a critical vocabulary differentiated from computer engineering to account for the sociality that permeates through and concatenates technological realities. In his recent work on “mundane” devices, software and code, Adrian McKenzie introduces a relevant analytic approach in the concept of technological action as something that both abstracts and concretises relations in a diffusion of collective-individual forces. Drawing on the thought of French philosopher Gilbert Simondon, he uses the term “transduction” to identify a key characteristic of technology in the relational process of becoming, or ontogenesis. This is described as bringing together disparate things into composites of relations that evolve and propagate a structure throughout a domain, or “overflow existing modalities of perception and movement on many scales” (“Impersonal and Personal Forces in Technological Action” 201). Most importantly, these innovative diffusions or contagions occur by bridging states of difference or incompatibilities. Technological action, therefore, arises from a particular type of disjunctive relation between an entity and something external to itself: “in making this relation, technical action changes not only the ensemble, but also the form of life of its agent. Abstraction comes into being and begins to subsume or reconfigure existing relations between the inside and outside” (203). Here, reciprocal interactions between two states or dimensions actualise disparate potentials through metastability: an equilibrium that proliferates, unfolds, and drives individuation. While drawing on cybernetics and dealing with specific technological platforms, McKenzie’s work can be extended to describe the significance of informational devices throughout control societies as a whole, particularly as a predictive and future-orientated force that thrives on staged conflicts. Moreover, being a non-deterministic technical theory, it additionally speaks to new tendencies in regimes of production that harness cognition and cooperation through specially designed infrastructures to enact persistent innovation without any end-point, final goal or natural target (Thrift 283-295). Here, the interface between intellectual property and reproduction can be seen as a site of variation that weaves together disparate objects and entities by imbrication in social life itself. These are specific acts of interference that propel relations toward unforeseen conclusions by drawing on memories, attention spans, material-technical traits, and so on. The focus lies on performance, context, and design “as a continual process of tuning arrived at by distributed aspiration” (Thrift 295). This later point is demonstrated in recent scholarly treatments of filesharing networks as media ecologies. Kate Crawford, for instance, describes the movement of P2P as processual or adaptive, comparable to technological action, marked by key transitions from partially decentralised architectures such as Napster, to the fully distributed systems of Gnutella and seeded swarm-based networks like BitTorrent (30-39). Each of these technologies can be understood as a response to various legal incursions, producing radically dissimilar socio-technological dynamics and emergent trends for how agency is modulated by informational exchanges. Indeed, even these aberrant formations are characterised by modes of commodification that continually spillover and feedback on themselves, repositioning markets and commodities in doing so, from MP3s to iPods, P2P to broadband subscription rates. However, one key limitation of this ontological approach is apparent when dealing with the sheer scale of activity involved, where mass participation elicits certain degrees of obscurity and relative safety in numbers. This represents an obvious problem for analysis, as dynamics can easily be identified in the broadest conceptual sense, without any understanding of the specific contexts of usage, political impacts, and economic effects for participants in their everyday consumptive habits. Large-scale distributed ensembles are “problematic” in their technological constitution, as a result. They are sites of expansive overflow that provoke an equivalent individuation of thought, as the Recording Industry Association of America observes on their educational website: “because of the nature of the theft, the damage is not always easy to calculate but not hard to envision” (“Piracy”). The politics of the filesharing debate, in this sense, depends on the command of imaginaries; that is, being able to conceptualise an overarching structural consistency to a persistent and adaptive ecology. As a mode of tactical intervention, Amazon Noir dramatises these ambiguities by framing technological action through the fictional sensibilities of narrative genre. Ambiguity, Control The extensive use of imagery and iconography from “noir” can be understood as an explicit reference to the increasing criminalisation of copyright violation through digital technologies. However, the term also refers to the indistinct or uncertain effects produced by this tactical intervention: who are the “bad guys” or the “good guys”? Are positions like ‘good’ and ‘evil’ (something like freedom or tyranny) so easily identified and distinguished? As Paolo Cirio explains, this political disposition is deliberately kept obscure in the project: “it’s a representation of the actual ambiguity about copyright issues, where every case seems to lack a moral or ethical basis” (“Amazon Noir Interview”). While user communications made available on the site clearly identify culprits (describing the project as jeopardising arts funding, as both irresponsible and arrogant), the self-description of the artists as political “failures” highlights the uncertainty regarding the project’s qualities as a force of long-term social renewal: Lizvlx from Ubermorgen.com had daily shootouts with the global mass-media, Cirio continuously pushed the boundaries of copyright (books are just pixels on a screen or just ink on paper), Ludovico and Bernhard resisted kickback-bribes from powerful Amazon.com until they finally gave in and sold the technology for an undisclosed sum to Amazon. Betrayal, blasphemy and pessimism finally split the gang of bad guys. (“Press Release”) Here, the adaptive and flexible qualities of informatic commodities and computational systems of distribution are knowingly posited as critical limits; in a certain sense, the project fails technologically in order to succeed conceptually. From a cynical perspective, this might be interpreted as guaranteeing authenticity by insisting on the useless or non-instrumental quality of art. However, through this process, Amazon Noir illustrates how forces confined as exterior to control (virality, piracy, noncommunication) regularly operate as points of distinction to generate change and innovation. Just as hackers are legitimately employed to challenge the durability of network exchanges, malfunctions are relied upon as potential sources of future information. Indeed, the notion of demonstrating ‘autonomy’ by illustrating the shortcomings of software is entirely consistent with the logic of control as a modulating organisational diagram. These so-called “circuit breakers” are positioned as points of bifurcation that open up new systems and encompass a more general “abstract machine” or tendency governing contemporary capitalism (Parikka 300). As a consequence, the ambiguities of Amazon Noir emerge not just from the contrary articulation of intellectual property and digital technology, but additionally through the concept of thinking “resistance” simultaneously with regimes of control. This tension is apparent in Galloway’s analysis of the cybernetic machines that are synonymous with the operation of Deleuzian control societies – i.e. “computerised information management” – where tactical media are posited as potential modes of contestation against the tyranny of code, “able to exploit flaws in protocological and proprietary command and control, not to destroy technology, but to sculpt protocol and make it better suited to people’s real desires” (176). While pushing a system into a state of hypertrophy to reform digital architectures might represent a possible technique that produces a space through which to imagine something like “our” freedom, it still leaves unexamined the desire for reformation itself as nurtured by and produced through the coupling of cybernetics, information theory, and distributed networking. This draws into focus the significance of McKenzie’s Simondon-inspired cybernetic perspective on socio-technological ensembles as being always-already predetermined by and driven through asymmetries or difference. As Chun observes, consequently, there is no paradox between resistance and capture since “control and freedom are not opposites, but different sides of the same coin: just as discipline served as a grid on which liberty was established, control is the matrix that enables freedom as openness” (71). Why “openness” should be so readily equated with a state of being free represents a major unexamined presumption of digital culture, and leads to the associated predicament of attempting to think of how this freedom has become something one cannot not desire. If Amazon Noir has political currency in this context, however, it emerges from a capacity to recognise how informational networks channel desire, memories, and imaginative visions rather than just cultivated antagonisms and counterintuitive economics. As a final point, it is worth observing that the project was initiated without publicity until the settlement with Amazon.com. There is, as a consequence, nothing to suggest that this subversive “event” might have actually occurred, a feeling heightened by the abstractions of software entities. To the extent that we believe in “the big book heist,” that such an act is even possible, is a gauge through which the paranoia of control societies is illuminated as a longing or desire for autonomy. As Hakim Bey observes in his conceptualisation of “pirate utopias,” such fleeting encounters with the imaginaries of freedom flow back into the experience of the everyday as political instantiations of utopian hope. Amazon Noir, with all its underlying ethical ambiguities, presents us with a challenge to rethink these affective investments by considering our profound weaknesses to master the complexities and constant intrusions of control. It provides an opportunity to conceive of a future that begins with limits and limitations as immanently central, even foundational, to our deep interconnection with socio-technological ensembles. References “Amazon Noir – The Big Book Crime.” http://www.amazon-noir.com/>. Bey, Hakim. T.A.Z.: The Temporary Autonomous Zone, Ontological Anarchy, Poetic Terrorism. New York: Autonomedia, 1991. Chun, Wendy Hui Kyong. Control and Freedom: Power and Paranoia in the Age of Fibre Optics. Cambridge, MA: MIT Press, 2006. Crawford, Kate. “Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks.” Media International Australia 114 (2005): 30-39. Cubitt, Sean. “Distribution and Media Flows.” Cultural Politics 1.2 (2005): 193-214. Deleuze, Gilles. Foucault. Trans. Seán Hand. Minneapolis: U of Minnesota P, 1986. ———. “Control and Becoming.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 169-176. ———. “Postscript on the Societies of Control.” Negotiations 1972-1990. Trans. Martin Joughin. New York: Columbia UP, 1995. 177-182. Eriksson, Magnus, and Rasmus Fleische. “Copies and Context in the Age of Cultural Abundance.” Online posting. 5 June 2007. Nettime 25 Aug 2007. Galloway, Alexander. Protocol: How Control Exists after Decentralization. Cambridge, MA: MIT Press, 2004. Hardt, Michael, and Antonio Negri. Multitude: War and Democracy in the Age of Empire. New York: Penguin Press, 2004. Harold, Christine. OurSpace: Resisting the Corporate Control of Culture. Minneapolis: U of Minnesota P, 2007. Lessig, Lawrence. Code and Other Laws of Cyberspace. New York: Basic Books, 1999. McKenzie, Adrian. Cutting Code: Software and Sociality. New York: Peter Lang, 2006. ———. “The Strange Meshing of Impersonal and Personal Forces in Technological Action.” Culture, Theory and Critique 47.2 (2006): 197-212. Parikka, Jussi. “Contagion and Repetition: On the Viral Logic of Network Culture.” Ephemera: Theory & Politics in Organization 7.2 (2007): 287-308. “Piracy Online.” Recording Industry Association of America. 28 Aug 2007. http://www.riaa.com/physicalpiracy.php>. Sundaram, Ravi. “Recycling Modernity: Pirate Electronic Cultures in India.” Sarai Reader 2001: The Public Domain. Delhi, Sarai Media Lab, 2001. 93-99. http://www.sarai.net>. Terranova, Tiziana. “Communication beyond Meaning: On the Cultural Politics of Information.” Social Text 22.3 (2004): 51-73. ———. “Of Sense and Sensibility: Immaterial Labour in Open Systems.” DATA Browser 03 – Curating Immateriality: The Work of the Curator in the Age of Network Systems. Ed. Joasia Krysa. New York: Autonomedia, 2006. 27-38. Thrift, Nigel. “Re-inventing Invention: New Tendencies in Capitalist Commodification.” Economy and Society 35.2 (2006): 279-306. Citation reference for this article MLA Style Dieter, Michael. "Amazon Noir: Piracy, Distribution, Control." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/07-dieter.php>. APA Style Dieter, M. (Oct. 2007) "Amazon Noir: Piracy, Distribution, Control," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/07-dieter.php>.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Alessandro Sardi"

1

Eilat, Galit. "Sandi Hilal and Alessandro Petti." In Entry Points, 118–23. Duke University Press, 2016. http://dx.doi.org/10.2307/j.ctv11cw85m.18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

"Sandi Hilal and Alessandro Petti Campus in Camps." In Entry Points, 118–23. Duke University Press, 2020. http://dx.doi.org/10.1515/9780822373957-014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Villani, Stefano. "In Search of Patronage." In Making Italy Anglican, 49–59. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197587737.003.0003.

Full text
Abstract:
This chapter reconstructs the vicissitudes of the Italian Alessandro Amidei, who moved to England in 1656. He apparently taught Hebrew at Oxford and Cambridge Universities, and it is certain that he was professor on the same topic in Edinburgh. A singular figure with a shifting and elusive identity, Amidei presented himself as a Catholic ecclesiastic converted to Protestantism on his arrival in England but in following years professed to be a Jew converted to Christianity. In the late 1660s, Amidei made a manuscript copy of an Italian translation of the Book of Common Prayer, posting as its author. Apart from this manuscript, all his other known works for which he claimed his authorship—published and unpublished—were not actually penned by him. So the possibility cannot be excluded that Amidei’s manuscript incorporates elements of someone else’s translation, possibly the one done by Bedell and Sarpi in 1608.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography