To see the other types of publications on this topic, follow the link: Forking Point.

Journal articles on the topic 'Forking Point'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 26 journal articles for your research on the topic 'Forking Point.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Bowden, Calum. "Forking in Time." A Peer-Reviewed Journal About 7, no. 1 (July 6, 2018): 140–50. http://dx.doi.org/10.7146/aprja.v7i1.116061.

Full text
Abstract:
This article focuses on the way blockchains construct time and the implications that has on governance, paying particular attention to the original Bitcoin network. Blockchains enforce succession through consensus, and for this reason, the philosopher Nick Land argues that “The Blockchain solves the problem of spacetime”. The article uses Land’s argument as a starting point for understanding the crucial role time plays in the governance of blockchain networks. It asks if the technology can, in fact, be understood to solve the problem of absolute succession, to investigate ways in which forking, both a byproduct of distributed consensus and the mechanism through which blockchains are upgraded, breaks the power concentrating around Land’s definite article Blockchain.
APA, Harvard, Vancouver, ISO, and other styles
2

Lieberman, Michael, Jiří Rosický, and Sebastien Vasey. "Forking independence from the categorical point of view." Advances in Mathematics 346 (April 2019): 719–72. http://dx.doi.org/10.1016/j.aim.2019.02.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mendes da Silva, Bruno. "Forking Paths' Interactive Films." Interactive Film & Media Journal 2, no. 3 (June 23, 2022): 128–41. http://dx.doi.org/10.32920/ifmj.v2i3.1508.

Full text
Abstract:
The Forking Paths, a project developed by the Research Center for Arts and Communication (CIAC), focuses on different types and models of interactive films, both from a theoretical and a practical perspective. The platform includes the films produced for the project: Cadavre Exquis (2019), Valsa (2016), The Book of the Dead (2015) and Haze (2014). The aim of this project is to conduct original research targeting the discovery of potential new knowledge, namely through practice and through the results of this practice. Having The Forking Paths project as a starting point, this paper endeavours to analyze the different models and levels of film interactivity. Through this analysis, we seek to trace possible evolutionary paths for audiovisual language and, simultaneously, we look for answers to an ultimate question: is there a true interaction between film and spectator?
APA, Harvard, Vancouver, ISO, and other styles
4

Feodorov, Aleksandar. "Peirce’s garden of forking metaphors." Sign Systems Studies 46, no. 2/3 (November 19, 2018): 188–215. http://dx.doi.org/10.12697/sss.2018.46.2-3.01.

Full text
Abstract:
The philosophic system of the founder of pragmatism Charles Sanders Peirce is rarely grasped from the point of view of its metaphoric usage. However, some of his most original yet often misunderstood and contested ideas such as those of ‘matter as effete mind’ and ‘the play of musement’ are metaphoric representations. In the present paper I am offering a new way to discuss the role of metaphors in Peirce’s philosophy by taking a twofold approach to the problem. On the one hand, metaphor itself becomes an object of inquiry. I touch upon the appearances of metaphoric thinking at the level of his classes of signs and metaphor’s relation to abductive inference. I trace those appearances in the process of their becoming from the spontaneity of Firstness towards the actuality of Secondness via the generalizing effects of Thirdness. Then I propose a flexible graphic model of metaphor that is parallel to Peirce’s inherent evolutionism. This model is seen as a “gentle” methodological tool for deriving meaning. To illustrate its applicability I include a playful nod to the literary works of Jorge Luis Borges to show how hard logical thought and aesthetic beauty complement each other.
APA, Harvard, Vancouver, ISO, and other styles
5

Karin Lévai, Ruth. "Subject to the Law of Reason while Belonging to the World of Sense: the Inevitable Randomness of Human Experience in The Brothers Karamazov and ‘The Garden of Forking Paths'." Comparative Critical Studies 18, no. 2-3 (October 2021): 209–23. http://dx.doi.org/10.3366/ccs.2021.0403.

Full text
Abstract:
Taking as its starting point the tension between the human condition as subject to the law of reason while belonging to the world of sense in establishing the categorical imperative as described by Kant, this article explores how belonging to the world of sense may be equated with randomness and the temporal as the presupposition for morality in Dostoevsky's The Brothers Karamazov and Borges's ‘The Garden of Forking Paths'. The article also discusses the two authors' views of time and eternity as expressed in their nonfiction.
APA, Harvard, Vancouver, ISO, and other styles
6

Gao, Haoyu, Leixiao Li, Xiangyang Chang, Jianxiong Wan, Jie Li, Jinze Du, and Xiaoxu Zhang. "BlockchainBot: A Novel Botnet Infrastructure Enhanced by Blockchain Technology and IoT." Electronics 11, no. 7 (March 28, 2022): 1065. http://dx.doi.org/10.3390/electronics11071065.

Full text
Abstract:
Although the traditional P2P botnet has significant resilience against termination, its dependence on neighbor lists (NL) has left it vulnerable to infiltration and destruction. In addition, it is not sufficient in protecting the botmaster’s identity. To overcome these weaknesses, we proposed BlockchainBot, a botnet model that leveraged IoT devices as maintainers, and integrated blockchain, also known as distributed ledger technology (DLT). The BlockchainBot was able to fully deploy bots on public blockchains. It was versatile for multiple botnet applications and eliminated the dependence on NL. In addition, we further introduced a novel method, the forking of a channel, to kick out spy nodes that infiltrate a botnet. To further enforce the resistance against a single point of failure (SPoF), we introduced bot-cluster dispersing to prevent clustering around full nodes and more evenly scatter bots to prevent hostile takeovers. The analysis of the security of BlockchainBot indicated that it had strong resilience against DDoS attacks, Sybil attacks, and forensic investigations. Furthermore, the security of the forking of the channel and bot-cluster dispersing were also shown to be effective. The robustness of the BlockchainBot against the Sybil attack was also briefly discussed. Experimental results authenticated the effectiveness and performance of the BlockchainBot, as compared to previous models.
APA, Harvard, Vancouver, ISO, and other styles
7

Chang, Seunghwan, Hyang-Sook Lee, Juhee Lee, and Seongan Lim. "Security Analysis of a Certificateless Signature from Lattices." Security and Communication Networks 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/3413567.

Full text
Abstract:
Tian and Huang proposed a lattice-based CLS scheme based on the hardness of the SIS problem and proved, in the random oracle model, that the scheme is existentially unforgeable against strong adversaries. Their security proof uses the general forking lemma under the assumption that the underlying hash function H is a random oracle. We show that the hash function in the scheme is neither one-way nor collision-resistant in the view of a strong Type 1 adversary. We point out flaws in the security arguments and present attack algorithms that are successful in the strong Type 1 adversarial model using the weak properties of the hash function.
APA, Harvard, Vancouver, ISO, and other styles
8

Wesche, Christine, Olaf Eisen, Hans Oerter, Daniel Schulte, and Daniel Steinhage. "Surface topography and ice flow in the vicinity of the EDML deep-drilling site, Antarctica." Journal of Glaciology 53, no. 182 (2007): 442–48. http://dx.doi.org/10.3189/002214307783258512.

Full text
Abstract:
AbstractInterpretation of ice-core records requires accurate knowledge of the past and present surface topography and stress–strain fields. The European Project for Ice Coring in Antarctica (EPICA) drilling site (75.0025° S, 0.0684° E; 2891.7 m) in Dronning Maud Land, Antarctica, is located in the immediate vicinity of a transient and forking ice divide. A digital elevation model is determined from the combination of kinematic GPS measurements with the GLAS12 datasets from the ICESat. Based on a network of stakes, surveyed with static GPS, the velocity field around the drilling site is calculated. The annual mean velocity magnitude of 12 survey points amounts to 0.74 m a–1. Flow directions mainly vary according to their distance from the ice divide. Surface strain rates are determined from a pentagonshaped stake network with one center point close to the drilling site. The strain field is characterized by along-flow compression, lateral dilatation and vertical layer thinning.
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Kun, Xian-Fu Li, Xiao-Li Tong, and Qing-Hua Cai. "A new species of Siphlonurus Eaton, 1868 (Ephemeroptera, Siphlonuridae) from Yunnan, China." ZooKeys 1166 (June 8, 2023): 121–39. http://dx.doi.org/10.3897/zookeys.1166.102847.

Full text
Abstract:
Siphlonurus dongxi Li & Tong, sp. nov. from Shangri-La City, Yunnan Province, China, is described based on egg, nymph, and winged stages. The new species is closely related to S. davidi (Navás, 1932), and can be distinguished by the colour of the imago, the forking point of MP, the penis, posterolateral spines of tergum IX of imagoes, and first abdominal terga nymph, as well as the structure of the egg. The new species and S. davidi have the same morphological and structural characteristics, such as the long cubital area with many intercalaries, cross veins between C, Sc, RA, and RSa1 surrounded with distinct pigments, the strong curvature of vein CuP in the forewing, the broad expansion of the hindwing, the membranous penis lobes fused without teeth, supporting the proposition of a new species complex, the Siphlonurus davidi group. The structures of the penis and the egg of the new species could help understand the origin and evolution of the genus Siphlonurus.
APA, Harvard, Vancouver, ISO, and other styles
10

LANGLOIS, RICHARD N. "Fission, forking and fine tuning." Journal of Institutional Economics 14, no. 6 (September 19, 2017): 1049–70. http://dx.doi.org/10.1017/s1744137417000455.

Full text
Abstract:
AbstractDoes innovation proceed from the top down or the bottom up? This is a crucial question for those who think about the sources of economic growth and especially for those who think about policies and institutions to promote innovation. The answer lies in part with the structure of the existing system of production and the array of assets that an innovation would displace, especially on the extent of complementarity and modularity in that structure. But it also depends on institutions. This paper argues for the centrality of decision rights to the process of innovation. Especially if it takes place in a systemic, non-modular way, innovation may require unified decision rights, often implying integrated control of complementary stages of production, in order to overcome the dynamic transaction costs of change. But the processes of subdivision, differentiation, and learning – the processes of fission, forking, and fine tuning – may also require changes in decision rights in order to overcome dynamic transaction costs. I illustrate these points with a case study of three generations of an American family of inventor-entrepreneurs in electricity and electronics.
APA, Harvard, Vancouver, ISO, and other styles
11

Wicaksono, Soetam Rizky. "FORKING DALAM GITHUB, DILEMA DALAM IMPLEMENTASI HAK KEKAYAAN INTELEKTUAL PERANGKAT LUNAK." IBLAM LAW REVIEW 1, no. 3 (September 30, 2021): 45–54. http://dx.doi.org/10.52249/ilr.v1i3.26.

Full text
Abstract:
Protection of software has been protected in the 2014 copyright law, particularly in article 45. However, the recognized copyright is an existing computer program as well as a copy of the program itself. This protection is not fully guaranteed, because in software, the elements that make up the product can consist of various source code (program listings). Because it could be that a registered computer program is the result of forking from Github or the result of a clone which is then modified. For non-programmers, this activity may be sentenced as a frontal copyright infringement, but in fact, it has become a new habit for programmers. But on the other hand, there are still many forked software which are later claimed to be new products, even registered as new copyrights. The Copyright Law itself does not specifically regulate the provisions for program listings, as well as the ITE Law. Therefore, this article describes different points of view on the protection of software intellectual property rights, especially for the forking process. So that the ambiguity of the forking results can be minimized and the programmers can be aware of which ones are eligible to become new copyrights. There should also be a revision of the Copyright Law and there must be more jangintensive socialization to the programmer community so that they are aware and understand about the risks of forking and what must be protected from their work.
APA, Harvard, Vancouver, ISO, and other styles
12

Бычкова, Ольга Анатольевна, and Александра Валерьевна Никитина. "INTERACTIVE LITERATURE GENRES IN THE ASPECT OF MODERN CULTURE AND VIDEO GAMES PRACTICE." Bulletin of the Chuvash State Pedagogical University named after I Y Yakovlev, no. 4(113) (December 30, 2021): 19–26. http://dx.doi.org/10.37972/chgpu.2021.113.4.003.

Full text
Abstract:
В статье рассмотрены жанры современной литературы, основанные на принципах компьютерной игры, такие как книга-игра, книга-квест и т. п. Исследуются истоки формирования подобных жанров в «докомпьютерную» эпоху, а также их развитие в практике современных видеоигр. Логика работы предполагает обращение к наиболее показательным текстам литературы предшествующего периода, таким как «Сад расходящихся тропок» Х. Л. Борхеса, «Игра в классики» Х. Кортасара, а также упоминание широкого круга подобных книг прошлого, заключающих потенциал для видеоигр с интерактивным сюжетом, вовлекающих читателя-игрока в процесс сотворчества. Авторы подробно анализируют современные игры-квесты «Симбионт», «Пандемия. Дорога домой» с точки зрения технологии их создания. Отдельному изучению подверглась экспериментальная книга Б. Акунина «Квест», созданная по законам интерактивных жанров. Кроме того, была изучена «визуальная новелла» как гибридный жанр, в котором соединились текст и визуальные образы видеоигры.В заключении делается вывод о том, что интерактивные жанры литературы не теряют своей актуальности во многом благодаря внедрению в компьютерное игровое пространство, где автор выступает на равных с читателем-игроком в процессе создания текста. The article examines the genres of modern literature based on the principles of computer games, such as game-book, quest-book, etc. The origins of the formation of such genres in the “pre-computer” era are investigated, as well as their development in the practice of modern video games. The logic of the work involves referring to the most revealing texts of literature of the previous period, such as “The Garden of Forking Paths” by J. L. Borges, “The Game of Classics” by H. Cortazar, as well as mentioning a wide range of similar books of the past, revealing the potential for video games with an interactive plot, involving the reader-player in the process of co-creation. The authors analyze in detail the modern game-quests “Symbiont”, “Pandemic: The Road Home” from the point of view of the technique of creation. The experimental book “Quest” by B. Akunin created according to the laws of interactive genres, was also considered. In addition, the “visual novel” was studied as a hybrid genre in which the text and visual images of a video game were combined. As a result, it is concluded that interactive genres of literature do not lose their relevance, largely due to the introduction into the computer gaming space, where the author acts on an equal footing with the reader-player in the process of creating a text.
APA, Harvard, Vancouver, ISO, and other styles
13

Salluh, Jorge I. F., and Pedro Póvoa. "Biomarkers as end points in clinical trials of severe sepsis: A garden of forking paths*." Critical Care Medicine 38, no. 8 (August 2010): 1749–51. http://dx.doi.org/10.1097/ccm.0b013e3181e941f6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Burrough, Xtine, Owen Gallagher, and Eduardo Navas. "Forking Paths in New Media Art Practices: Investigating Remix." Media-N 17, no. 1 (January 5, 2021). http://dx.doi.org/10.21900/j.median.v17i1.809.

Full text
Abstract:
This special issue of Media-N on contemporary approaches to remix was inspired by Jorge Luis Borges’s short story, “The Garden of Forking Paths,” a recurring point of reference in the development of media culture. Prior to terms such as new media, digital art, media art, and remix, Borges’s narrative exploration of bifurcation as a means of reflecting on the possibility of multiple simultaneous realities with no clear beginning or end has offered a literary and philosophical model for creative uses of emerging technology throughout the twentieth century. The essays included in this special issue provide a glimpse into the relation of Borgesian multiplicity and remix as an interdisciplinary methodology.
APA, Harvard, Vancouver, ISO, and other styles
15

Barnet, Belinda. "In the Garden of Forking Paths." M/C Journal 1, no. 5 (December 1, 1998). http://dx.doi.org/10.5204/mcj.1727.

Full text
Abstract:
"Interactivity implies two agencies in conversation, playfully and spontaneously developing a mutual discourse" -- Sandy Stone (11) I. On Interactivity The difference between interactivity as it is performed across the page and the screen, maintains Sandy Stone, is that virtual texts and virtual communities can embody a play ethic (14). Inserted like a mutation into the corporate genome, play ruptures the encyclopaedic desire to follow seamless links to a buried 'meaning' and draws us back to the surface, back into real-time conversation with the machine. Hypertext theorists see this as a tactic of resistance to homogenisation. As we move across a hypertextual reading space, we produce the text in this unfolding now, choosing pathways which form a map in the space of our own memories: where we have been, where we are, where we might yet be. Play is occupying oneself with diversions. II. Space, Time and Composition Reading in time, we create the text in the space of our own memories. Hypertext theorists maintain that the choices we make around every corner, the spontaneity and contingency involved in these choices, are the bringing into being of a (constantly replaced) electronic palimpsest, a virtual geography. The dislocation which occurs as we engage in nodal leaps draws us back to the surface, rupturing our experience of the narrative and bringing us into a blissful experience of possibility. III. War against the Line There is the danger, on the one hand, of being subsumed by the passive subject position demanded by infotainment culture and the desire it encourages to seek the satisfaction of closure by following seamless links to a buried 'meaning'. On the other hand, we risk losing efficiency and control over the unfolding interaction by entering into an exchange which disorientates us with infinite potential. We cannot wildly destratify. The questions we ask must seek to keep the conversation open. In order to establish a new discursive territory within which to understand this relationship, we should view the interface not simply as a transparency which enables interaction with the machine as 'other', but as a text, a finely-wrought behavioural map which "exists at the intersection of political and ideological boundary lands" (Selfe & Selfe 1). As we write, so are we written by the linguistic contact zones of this terrain. Hypertext is thus a process involving the active translation of modes of being into possible becomings across the interface. The geographic 'space' we translate into a hypertext "is imaginational... . We momentarily extend the linear reading act into a third dimension when we travel a link" (Tolva 4). A literal spatial representation would break from the realm of hypertext and become a virtual reality. Thus, the geographic aspect is not inherent to the system itself but is partially translated into the geometry of the medium via our experience and perception (the 'map'), a process describing our 'line of flight' as we evolve in space. Directional flows between time and its traditional subordination to space in representation implode across the present-tense of the screen and time literally surfaces. Our experience of the constantly-replaced electronic palimpsest is one of temporal surrender: "we give in to time, we give way to time, we give in with time"(Joyce 219). In other words, the subject of hypertext subverts the traditional hierarchy and writes for space, producing the 'terrain' in the unfolding now in the Deleuzian sense, not in space as desired by the State. Johnson-Eilola aligns the experience of hypertext with the Deleuzian War Machine, a way of describing the speed and range of virtual movement created when the animal body splices into the realm of technology and opens an active plane of conflict.. The War Machine was invented by the nomads -- it operates by continual deterritorialisation in a tension-limit with State science, what we might call the command-control drive associated with geometric, dynamic thought and the sedentary culture of the Line. It "exemplifies" the avant-garde mentality that hypertext theorists have been associating with the electronic writing space (Moulthrop, "No War Machine" 1). Playing outside. The State desires an end to the resistance to totalisation promulgated by contingent thought and its thermodynamic relationship to space: the speed which assumes a probabilistic, vortical motion, actually drawing smooth space itself. The war machine is thus an open system opposed to classical mechanics via its grounding in active contingencies and spatio-temporal production. The nomad reads and writes for space, creating the temporal text in the space of her own memory, giving way to time and allowing existent points to lapse before the trajectory of flight. Nomad thought is not dependent on any given theory of relationship with the medium, but works via disruption and (re)distribution, the gaps, stutterings and gasp-like expressions experienced when we enter into conversation with the hypertext. The danger is that the war machine might be appropriated by the State, at which point this light-speed communication becomes of the utmost importance in the war against space and time. As speed and efficient retrieval replace real-space across the instantaneity and immediacy of the terminal, the present-time sensory faculties of the individual are marginalised as incidental and she becomes "the virtual equivalent of the well-equipped invalid" (Virilio 5). In other words, as the frame of real-space and present-time disappears, the text of the reader/writer becomes "sutured" into the discourse of the State, the only goal to gain "complete speed, to cover territory in order for the State to subdivide and hold it through force, legislation or consent" (Virilio, qtd. in Johnson-Eilola). This is when the predetermined geometry of hypertext becomes explicit. The progressive subsumption (or "suturing") of the multiple, nomadic self into the discourse of the computer occurs when "the terms of the narrative are heightened, as each 'node' in the hypertext points outwards to other nodes [and] readers must compulsively follow links to arrive at the 'promised plenitude' at the other end of the link" (Johnson-Eilola 391). When we no longer reflect on the frame and move towards complete speed and efficiency, when we stop playing on the surface and no longer concern ourselves with diversion, the war machine has been appropriated by the State. In this case, there is no revolutionary 'outside' to confront in interaction, as all has been marshalled towards closure. Keeping the conversation open means continuously reflecting on the frame. We cannot wildly destratify and lose control entirely by moving in perpetual bewilderment, but we can see the incompleteness of the story, recognising the importance of local gaps and spaces. We can work with the idea that the "dyad of smooth/striated represents not a dialectic but a continuum" (Moulthrop, "Rhizome" 317) that can be turned more complex in its course. Contingency and play reside in the intermezzo, the "dangerous edges, fleeting, attempting to write across the boundaries between in-control and out-of-control" (Johnson-Eilola 393). The war machine exists as at once process and product, the translation between smooth-striated moving in potentia: the nomadic consciousness can recognise this process and live flux as reality itself, or consistency. In sum, we avoid subsumption and appropriation by holding open the function of the text as process in our theorising, in our teaching, in our reading and writing across the hypertextual environment. We can either view hypertext as a tool or product which lends itself to efficient, functional use (to organise information, to control and consume in an encyclopaedic fashion), or we can view it as a process which lends itself to nomadic thought and resistance to totalisation in syncopated flows, in cybernetic fits and starts. This is our much-needed rhetoric of activity. IV. An Alternative Story No matter their theoretical articulation, such claims made for hypertext are fundamentally concerned with escaping the logocentric geometry of regulated time and space. Recent explorations deploying the Deleuzian smooth/striated continuum make explicit the fact that the enemy in this literary 'war' has never been the Line or linearity per se, but "the nonlinear perspective of geometry; not the prison-house of time but the fiction of transcendence implied by the indifferent epistemological stance toward time" (Rosenberg 276). Although the rhizome, the war machine, the cyborg and the nomad differ in their particularities and composition, they all explicitly play on the dislocated, time-irreversible processes of chaos theory, thermodynamics and associated 'liberatory' topological perspectives. Rosenberg's essay makes what I consider to be a very disruptive point: hypertext merely simulates the 'smooth', contingent thought seen to be antithetical to regulated space-time and precise causality due to its fundamental investment in a regulated, controlled and (pre)determined geometry. Such a deceptively smooth landscape is technonarcissistic in that its apparent multiplicity actually prescribes to a totality of command-control. Hypertext theorists have borrowed the terms 'multilinear', 'nonlinear' and 'contingency' from physics to articulate hypertext's resistance to the dominant determinist episteme, a framework exemplified by the term 'dynamics', opposing it to "the irreversible laws characteristic of statistical approximations that govern complex events, exemplified by the term, 'thermodynamics'" (Rosenberg 269). This resistance to the time-reversible, non-contingent and totalised worldview has its ideological origins in the work of the avant-garde. Hypertext theorists are fixated with quasi-hypertextual works that were precursors to the more 'explicitly' revolutionary texts in the electronic writing space. In the works of the avant-garde, contingency is associated with creative freedom and subversive, organic logic. It is obsessively celebrated by the likes of Pynchon, Joyce, Duchamp and Cage. Hypertext theorists have reasoned from this that 'nonlinear' or 'multilinear' access to information is isomorphic with such playful freedom and its contingent, associative leaps. Theorists align this nonsequential reasoning with a certain rogue logic: the 'fluid nature of thought itself' exemplified by the explicitly geographic relationship to space-time of the Deleuzian rhizome and the notion of contingent, probabilistic 'becomings'. Hypertext participates fully in the spatio-temporal dialectic of the avant-garde. As Moulthrop observes, the problem with this is that from a topological perspective, 'linear' and 'multilinear' are identical: "lines are still lines, logos and not nomos, even when they are embedded in a hypertextual matrix" ("Rhizome" 310). The spatio-temporal dislocations which enable contingent thought and 'subversive' logic are simply not sustained through the reading/writing experience. Hypertextual links are not only reversible in time and space, but trace a detached path through functional code, each new node comprising a carefully articulated behavioural 'grammar' that the reader adjusts to. To assume that by following 'links' and engaging in disruptive nodal leaps a reader night be resisting the framework of regulated space-time and determinism is "to ignore how, once the dislocation occurs, a normalcy emerges ... as the hypertext reader acclimates to the new geometry or new sequence of lexias" (Rosenberg 283). Moreover, the searchpath maps which earlier theorists had sensed were antithetical to smooth space actually exemplify the element of transcendent control readers have over the text as a whole. "A reader who can freeze the text, a reader who is aware of a Home button, a reader who can gain an instant, transcendent perspective of the reading experience, domesticates contingencies" (Rosenberg 275). The visual and behavioural grammar of hypertext is one of transcendent control and determined response. Lines are still lines -- regulated, causal and not contingent -- even when they are 'constructed' by an empowered reader. Hypertext is thus invested (at least in part) in a framework of regularity, control and precise function. It is inextricably a part of State apparatus. The problem with this is that the War Machine, which best exemplifies the avant-garde's insurgency against sedentary culture, must be exterior to the State apparatus and its regulated grid at all times. "If we acknowledge this line of critique (which I think we must), then we must seriously reconsider any claims about hypertext fiction as War Machine, or indeed as anything en avant" (Moulthrop, "No War Machine" 5). Although hypertext is not revolutionary, it would be the goal of any avant-garde use of hypertext to find a way to sustain the experience of dislocation that would indicate liberation from the hegemony of geometry. I would like to begin to sketch the possibility of 'contingent interaction' through the dislocations inherent to alternative interfaces later in this story. For the time being, however, we must reassess all our liberation claims. If linearity and multilinearity are identical in terms of geometric relations to space-time, "why should they be any different in terms of ideology", asks Moulthrop ("Rhizome" 310). V. On Interactivity Given Rosenberg's critique against any inherently revolutionary qualities, we must acknowledge that hypermedia "marks not a terminus but a transition," Moulthrop writes ("Rhizome" 317). As a medium of exchange it is neither smooth nor striated, sophist nor socratic, 'work' nor 'text': it is undergoing an increasingly complex phase transition between such states. This landscape also gives rise to stray flows and intensities, 'Unspecified Enemies' which exist at the dangerous fissures and edges. We must accept that we will never escape the system, but we are presented with opportunities to rock the sedentary order from within. As a group of emerging electronic artists see it, the dis-articulation of the point'n'click interface is where interaction becomes reflection on the frame in fits and starts. "We believe that the computer, like everything else, is composed in conflict," explain the editors of electronic magazine I/O/D. "If we are locked in with the military and with Disney, they are locked in not just with us, but with every other stray will-to-power" (Fuller, Interview 2). Along with Adelaide-based group Mindflux, these artists produce hypertext interfaces that involve sensory apparatus and navigational skills that have been marginalised as incidental in the disabling interactive technologies of mainstream multimedia. Sound, movement, proprioception, an element of randomness and assorted other sensory circuits become central to the navigational experience. By enlisting marginalised senses, "we are not proposing to formulate a new paradigm of multimedial correctness," stresses Fuller, "but simply exploring the possibility of more complicated feedback arrangements between the user and the machine" (Fuller, qtd. in Barnet 48). The reader must encounter the 'lexias' contained in the system via the stray flows, intensities, movements, stratas and organs that are not proper to the system but shift across the interface and the surface of her body. In Fuller's electronic magazine, the reader is called upon to converse with the technology outside of the domesticated circuits of sight, dislocating the rigorous hierarchy of feedback devices which privilege the sight-machine and disable contingent interaction in a technonarcissistic fashion. The written information is mapped across a 'fuzzy' sound-based interface, sensitive at every moment to the smallest movements of the reader's fingers on the keys and mouse: the screen itself is black, its swarm of links and hotspots dead to the eye. The reader's movements produce different bleeps and beats, each new track opening different entrances and exits through the information in dependence upon the fluctuating pitch and tempo of her music. Without the aid of searchpaths and bright links, she must move in a state of perpetual readjustment to the technology, attuned not to the information stored behind the interface, but to the real-time sounds her movements produce. What we are calling play, Fuller explains, "is the difference between something that has a fixed grammar on the one hand and something that is continually and openly inventing its own logic on the other" (Fuller & Pope 4). The electronic writing space is not inherently liberatory, and the perpetual process of playing with process across the interface works to widen the 'fissures across the imperium' only for a moment. According to Fuller and Joyce, the 'process of playing with process' simply means complicating the feedback arrangements between the user's body and the machine. "We need to find a way of reading sensually ... rather than, as the interactive artist Graham Weinbren puts it, descending 'into the pit of so-called multimedia, with its scenes of unpleasant 'hotspots,' and 'menus' [that] leaves no room for the possibility of a loss of self, of desire in relation to the unfolding'" remarks Joyce (11). Interactivity which calls upon a mind folded everywhere within the body dislocates the encyclopaedic organisation of data that "preserves a point of privilege from where the eye can frame objects" by enlisting itinerant, diffuse desires in an extended period of readjustment to technology (Fuller & Pope 3). There are no pre-ordained or privileged feedback circuits as the body is seen to comprise a myriad possible elements or fragments of a desiring-machine with the potential to disrupt the flow, to proliferate. Mainstream multimedia's desire for 'informational hygiene' would have us transcend this embodied flux and bureaucratise the body into organs. Information is fed through the circuits of sight in a Pavlovian field of buttons and bright links: interactivity is misconceived as choice-making, when 'response' is a more appropriate concept. When the diffuse desire which thrives on disruption and alternative paradigms is written out in favour of informational hygiene, speed and efficient retrieval replace embodied conversation. "Disembodied [interaction] of this kind is always a con... . The entropic, troublesome flesh that is sloughed off in these fantasies of strongly male essentialism is interwoven with the dynamics of self-processing cognition and intentionality. We see computers as embodied culture, hardwired epistemology" (Fuller 2). Avant-garde hypertext deepens the subjective experience of the human-computer interface: it inscribes itself across the diffuse, disruptive desires of the flesh. Alternative interfaces are not an ideological overhaul enabled by the realm of technê, but a space for localised break-outs across the body. Bifurcations are enacted on the micro level by desiring-machines, across an interface which seeks to dislocate intentionality in conjunction with the marginalised sensory apparatus of the reader, drawing other minds, other organs into localised conversation with command-control. "The user learns kinesthetically and proprioceptively that the boundaries of self are defined less by the skin than by the [local] feedback loops connecting body and simulation in a techno-bio-integrated circuit" (Hayles 72). She oscillates between communication and control, play and restraint: not a nomad but a "human Deserter assuming the most diverse forms" (ATP, 422). VI. Desire Working from across the territory we have covered, we might say that electronic interaction 'liberates' us from neither the Line nor the flesh: at its most experimental, it is nothing less than reading embodied. References Barnet, Belinda. "Storming the Interface: Mindvirus, I/O/D and Deceptive Interaction." Artlink: Australian Contemporary Art Quarterly 17:4 (1997). Deleuze, Gilles, and Felix Guattari. A Thousand Plateaus: Capitalism & Schizophrenia. Minneapolis: U of Minnesota P, 1987. Fuller, Matt and Simon Pope. "Warning: This Computer Has Multiple Personality Disorder." 1993. 11 Dec. 1998 <http://www.altx.com/wordbombs/popefuller.php>. ---, eds. I/O/D2. Undated. 11 Dec. 1998 <http://www.pHreak.co.uk/i_o_d/>. Hayles, Katherine N. "Virtual Bodies and Flickering Signifiers" October Magazine 66 (Fall 1993): 69-91. Johnson-Eilola, Johndan. "Control and the Cyborg: Writing and Being Written in Hypertext." Journal of Advanced Composition 13:2 (1993): 381-99. Joyce, Michael. Of Two Minds: Hypertext, Pedagogy and Poetics. Ann Arbor: U of Michigan P, 1995. Moulthrop, Stuart. "No War Machine." 1997. 11 Dec. 1998 <http://raven.ubalt.edu/staff/moulthrop/essays/war_machine.php>. ---. "Rhizome and Resistance: Hypertext and the Dreams of a New Culture." Hyper/Text/Theory. Ed. George P. Landow. Baltimore: Johns Hopkins UP, 1994. 299-319. Rosenberg, Martin E. "Physics and Hypertext: Liberation and Complicity in Art and Pedagogy." Hyper/Text/Theory. Ed. George Landow. Baltimore: Johns Hopkins UP, 1994. 268-298. Selfe, Cynthia L., and Richard J. Selfe. "The Politics of the Interface: Power and Its Exercise in Electronic Contact Zones." College Composition and Communication 45.4: 480-504. Stone, Allucquére Roseanne. The War of Desire and Technology. London: MIT Press, 1996. Tolva, John. "Ut Pictura Hyperpoesis: Spatial Form, Visuality, and the Digital Word." 1993. 11 Dec. 1998 <http://www.cs.unc.edu/~barman/HT96/P43/pictura.htm>. Virilio, Paul. "The Third Interval: A Critical Transition." Rethinking Technologies. Ed. Verena Conley. London: U of Minnesota P, 1993. 3-12. Citation reference for this article MLA style: Belinda Barnet. "In the Garden of Forking Paths: Contingency, Interactivity and Play in Hypertext." M/C: A Journal of Media and Culture 1.5 (1998). [your date of access] <http://www.uq.edu.au/mc/9812/garden.php>. Chicago style: Belinda Barnet, "In the Garden of Forking Paths: Contingency, Interactivity and Play in Hypertext," M/C: A Journal of Media and Culture 1, no. 5 (1998), <http://www.uq.edu.au/mc/9812/garden.php> ([your date of access]). APA style: Belinda Barnet. (1998) In the garden of forking paths: contingency, interactivity and play in hypertext. M/C: A Journal of Media and Culture 1(5). <http://www.uq.edu.au/mc/9812/garden.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
16

D'Alessandro, Desiree. "Borges on Bifurcation: Remix at the Interstices of Art and Life." Media-N 17, no. 1 (January 5, 2021). http://dx.doi.org/10.21900/j.median.v17i1.509.

Full text
Abstract:
This paper utilizes “The Garden of Forking Paths” as a starting point to explore Borges’s concept of bifurcation and how the act of decision-making in everyday life is closely associated with similar theoretical themes in the Deleuzean notion of multiplicities. These topics then scaffold a self-reflective review of major events from D’Alessandro’s life that have shaped her past, present, and likely future. The personal and transformational experiences featured in this case study demonstrate how remix can be embraced as a broad definition and philosophy for life.
APA, Harvard, Vancouver, ISO, and other styles
17

"A Empirical Analysis of Inferences from commit, fork and branch rates of top GitHub Projects." International Journal of Open Source Software and Processes 13, no. 1 (January 2022): 0. http://dx.doi.org/10.4018/ijossp.300751.

Full text
Abstract:
GitHub repositories have been used to understand some important parameters related to quantitative growth of software projects. The rate at which fork, commits and branches have been done in different repositories which are supposed to be the topmost ones when it comes to the number of contributors is the main point of study in this paper. The desirable goal is to find out some sort of similarity in the trends of all these software projects. Similar trends tend to lead to interesting inferences regarding the quantitative growth and even the quality of these software projects. Is the rate of forking, branching, committing anything to do with the success of software projects? The authors have taken up this question in the current study.
APA, Harvard, Vancouver, ISO, and other styles
18

McAdams, Daniel A., and Wei Li. "A Novel Method to Design and Optimize Flat-Foldable Origami Structures Through a Genetic Algorithm." Journal of Computing and Information Science in Engineering 14, no. 3 (June 2, 2014). http://dx.doi.org/10.1115/1.4026509.

Full text
Abstract:
As advantages of foldable or deployable structures have been established, origami artists and engineers have started to study the engineering applications of origami structures. Methods of computational origami design that serve different types of origami have already been developed. However, most of the existing design methods focus on automatically deriving the crease pattern to realize a given folded finished shape, without actually designing the finished shape itself. To include final shape design into the computational origami design and optimization process, this paper presents a genetic algorithm that aims to develop origami structures featuring optimal geometric, functional, and foldability properties. In accordance with origami, the genetic algorithm is adapted both in the aspects the individual encoding method and the evolutionary operators. To compliment the Genetic algorithms (GA), a new origami crease pattern representation scheme is created. The crease pattern is analogous to the ice-cracks on a frozen lake surface, where each crack is equivalent to a crease and each forking point to a vertex. Thus to form the creases and vertices in an “ice-cracking”-like origami crease pattern, we pick one vertex as the starting location, and let the rest of the creases and vertices grow in the same manner that cracks extend and fork form in ice. In this research, the GA encodes the geometric information of forming the creases and vertices according to the development sequence through the ice-cracking process. Meanwhile, we adapt the evolutionary operators and introduce auxiliary mechanisms for the GA, so as to balance the preservation of both elitism and diversity and accelerate the emergence of optimal design outcomes through the evolutionary design process.
APA, Harvard, Vancouver, ISO, and other styles
19

Gao, Qinghang, Jianmao Xiao, Yuanlong Cao, Shuiguang Deng, Chuying Ouyang, and Zhiyong Feng. "Blockchain-based collaborative edge computing: efficiency, incentive and trust." Journal of Cloud Computing 12, no. 1 (May 8, 2023). http://dx.doi.org/10.1186/s13677-023-00452-4.

Full text
Abstract:
AbstractThe rise of 5G technology has driven the development of edge computing. Computation offloading is the key and challenging point in edge computing, which investigates offloading resource-intensive computing tasks from the user side to the cloud or edge side for processing. More consideration needs to be given to load balancing, user variability, and the heterogeneity of edge facilities in relevant research. In addition, most of the research around edge collaboration also revolves around cloud-side collaboration, which pays relatively little attention to the collaboration process between edge nodes, and the incentive and trust issues of the collaboration process need to be addressed. In this paper, we consider the impact of the user demand variability and the edge facility heterogeneity, then propose a method based on Vickrey-Clarke-Groves (VCG) auction theory to accommodate the edge demand response (EDR) process where the number of users and service facilities do not match. The method makes users’ bidding rules satisfy the Nash equilibrium and weakly dominant strategy, which can improve the load balancing of edge nodes, has positive significance in improving the edge resource utilization and reducing the system energy consumption. In particular, combined with blockchain, we further optimize the incentive and trust mechanism of edge collaboration and consider three scenarios: no collaboration, internal collaboration, and incentive collaboration. We also consider the impact of the user task’s transmission distance on the quality of experience (QoE). In addition, we illustrate the possible forking attack of blockchain in collaborative edge computing and propose a solution. We test the performance of the proposed algorithm on a real-world dataset, and the experimental results verify the algorithm’s effectiveness and the edge collaboration’s necessity.
APA, Harvard, Vancouver, ISO, and other styles
20

Martinez, Inez. "Ego Readings vs. Reading for Psyche." Journal of Jungian Scholarly Studies 5 (June 1, 2009). http://dx.doi.org/10.29173/jjs65s.

Full text
Abstract:
Jung claims that visionary imaginative literature, because its source is the collective unconscious, helps the collective psyche self-regulate. Proving Jung’s claim is difficult since shifts in collective consciousness have many causes, but an instance of literature’s playing a part in such a shift is Robert Browning’s The Ring and the Book which contributed to collective realization of the inherent limitations of point of view. Sometimes literature contributes to collective consciousness through tales bringing into focus a collective crisis, such as Jorge Luis Borges’s stories “The Garden of Forking Paths,” “The Library of Babel,” and “The Secret Miracle” which convey the modern dilemma of loss of absolute transcendent truths. Literature, however, cannot bring unconscious contents to consciousness if readers read with rigid ego boundaries, what I call ego readings. Slipping free from ego readings is more likely if one becomes aware that one is so reading. If readers already have experience of psyche beyond ego, they are more likely to be able to read for psyche. Still, even if readers do not have such experience, literature itself can initiate one into the existence of psyche as my reading of Mark Twain’s The Mysterious Stranger initiated me. One can become aware of performing ego readings through clues such as habitually discovering in the text what one already thinks, reading for plot, becoming angry at a text, discovering that one has been in denial about a text, and reading to find support for an argument. This latter practice characterizes literary criticism, as illustrated by Jacques Lacan’s, Jacques Derrida’s, and Barbara Johnson’s responses to Edgar Allen Poe’s “The Purloined Letter.” Paradoxically, the professional response to literature may obstruct reading literature for psyche. If one can overcome ego resistance to a text, as I suggest through my experience of reading D.H. Lawrence’s “The Rocking Horse Winner,” one can garner a story’s psychological riches. Still, resistance may arise from ethical concerns, including responsibility to oneself, so that the relationship between self and text requires conscious and conscientious negotiation, an unsettling process as I detail in reference to my reading of Roberto Bolano’s 2666. Once readers are aware of performing ego readings, they can attempt to loosen their ego boundaries through focused attention (an insight emerging from reading Virginia Woolf’s “Kew Gardens”), particularly toward numinous moments for characters in a text or numinous responses in themselves. Reading for psyche also is furthered through re-reading, conscious intention, and reflection. For the institutions of literary criticism and of teaching to help readers be open to the contents of the unconscious psyche in literature, teachers and critics need to be aware of the difference between ego readings and reading for psyche. Jungian literature teachers and literary critics can take the lead.
APA, Harvard, Vancouver, ISO, and other styles
21

BHARATI, R. C. "Unequal Probability Scheme for Fruit Count in a Guava Tree." Journal of AgriSearch 3, no. 4 (December 8, 2016). http://dx.doi.org/10.21921/jas.v3i4.6713.

Full text
Abstract:
Data on fruit count corresponding to primary, secondary and tertiary branches of a randomly selected guava CV. Allahabad Safeda were recorded from the guava orchard of Horticultural Research Station, Birauli. The proposed sampling scheme in which the selection probabilities are based on length of braches between two forking points was compared with equal probability(PE), probability proportional to the number of branches(PPN), probability proportional to the cross sectional area (PPA) and probability proportional to volume (PPV) method of sampling and found to be more efficient.
APA, Harvard, Vancouver, ISO, and other styles
22

Fouilloux, Anne, Federica Foglini, and Elisa Trasatti. "FAIR Research Objects for realizing Open Science with RELIANCE EOSC project." Research Ideas and Outcomes 8 (August 25, 2022). http://dx.doi.org/10.3897/rio.8.e93940.

Full text
Abstract:
The H2020 Reliance project delivers a suite of innovative and interconnected services that extend European Open Science Cloud (EOSC)’s capabilities to support the management of the research lifecycle within Earth Science Communities and Copernicus Users. The project has delivered 3 complementary technologies: Research Objects (ROs), Data Cubes and AI-based Text Mining. RoHub is a Research Object management platform that implements these 3 technologies and enables researchers to collaboratively manage, share and preserve their research work. RoHub implements the full RO model and paradigm: resources associated to a particular research work are aggregated into a single FAIR digital object, and metadata relevant for understanding and interpreting the content is represented as semantic metadata that are user and machine readable. The development of RoHub is co-designed and validated through multidisciplinary and thematic real life use cases led by three different Earth Science communities: Geohazards, Sea Monitoring and Climate Change communities. A RO commonly starts its life as an empty Live RO. ROs aggregate new objects through their whole lifecycle. This means, a RO is filled incrementally by aggregating new relevant resources such as workflows, datasets, documents according to its typology that are being created, reused or repurposed. These resources can be modified at any point in time. We can copy and keep ROs in time through snapshots which reflect their status at a given point in time. Snapshots can have their own identifiers (DOIs) which facilitates tracking the evolution of a research. At some point in time, a RO can be published and archived (so called Archived RO) with a permanent identifier (DOI). New Live ROs can be derived based on an existing Archived RO, for instance by forking it. To guide researchers, different types of Research Objects can be created: Bibliography-centric: includes manuals, anonymous interviews, publications, multimedia (video, songs) and/or other material that support research; Data-centric: refers to datasets which can be indexed, discovered and manipulated; Executable: includes the code, data and computational environment along with a description of the research object and in some cases a workflow. This type of ROs can be executed and is often used for scripts and/or Jupyter Notebooks; Software-centric: also known as “Code as a Research Object”. Software-centric ROs include source codes and associated documentation. They often include sample datasets for running tests. Workflow-centric: contains workflow specifications, provenance logs generated when executing the workflows, information about the evolution of the workflow (version) and its components elements, and additional annotations for the workflow as a whole. Basic: can contain anything and is used when the other types do not cover the need. Bibliography-centric: includes manuals, anonymous interviews, publications, multimedia (video, songs) and/or other material that support research; Data-centric: refers to datasets which can be indexed, discovered and manipulated; Executable: includes the code, data and computational environment along with a description of the research object and in some cases a workflow. This type of ROs can be executed and is often used for scripts and/or Jupyter Notebooks; Software-centric: also known as “Code as a Research Object”. Software-centric ROs include source codes and associated documentation. They often include sample datasets for running tests. Workflow-centric: contains workflow specifications, provenance logs generated when executing the workflows, information about the evolution of the workflow (version) and its components elements, and additional annotations for the workflow as a whole. Basic: can contain anything and is used when the other types do not cover the need. To ease the understanding and the reuse of the ROs, each type of RO (except Basic RO) has a template folder structure that we recommend researchers to select. For instance an executable RO has 4 folders: 'biblio' where researchers can aggregate documentations, scientific papers that øed to the development of the software/tool that is aggregated in the tool folder; 'input' where all the input datasets required for executing the RO are aggregated; 'output' where some or all the results generated by executing the RO are aggregated; 'tool' where the executable tool is aggregated. Typically, we aggregate Jupyter Notebook and/or executable workflows (Galaxy or snakemake workflows). 'biblio' where researchers can aggregate documentations, scientific papers that øed to the development of the software/tool that is aggregated in the tool folder; 'input' where all the input datasets required for executing the RO are aggregated; 'output' where some or all the results generated by executing the RO are aggregated; 'tool' where the executable tool is aggregated. Typically, we aggregate Jupyter Notebook and/or executable workflows (Galaxy or snakemake workflows). In addition to the different types of ROs and associated template structures, researchers can select the type of resources that constitutes the main entity of a RO: for instance, a Jupyter Notebook can be selected as the main entity of an executable RO. As shown on Fig. 1, this additional metadata is then visible to everyone (and machine readable) to ease reuse. Examples of Bibliography-centric and Data-centric Research Objects are shown on Fig. 2: the overall overview of any types of Research Object is always the same with mandatory metadata information such as the title, description, authors & collaborators, sketch (featured plots/images), the content of the RO (with different structures depending on the type of ROs). Additional information is displayed on the right panel such as number of downloads, additional discovered metadata (automatically discovered from the Reliance text enrichment service), free keywords (added by end-users) and citation. The 'toolbox' and 'share' sections allows end-users to download, snapshot and archive the RO and/or share it. Any Research Object in RoHub is a FAIR digital object that is for instance findable in OpenAire, including Live ROs. In our presentation, we will showcase different types of ROs for the 3 Earth Science communities represented in Reliance to highlight how the scientists in our respective disciplines changed their working methodology towards Open Science.
APA, Harvard, Vancouver, ISO, and other styles
23

Lee, Chong M., Guanshi Wang, Alexandros Pertsinidis, and Kenneth J. Marians. "Topoisomerase III Acts at the Replication Fork To Remove Precatenanes." Journal of Bacteriology 201, no. 7 (January 7, 2019). http://dx.doi.org/10.1128/jb.00563-18.

Full text
Abstract:
ABSTRACTThe role of DNA topoisomerase III (Topo III) in bacterial cells has proven elusive. Whereas eukaryotic Top IIIα homologs are clearly involved with homologs of the bacterial DNA helicase RecQ in unraveling double Holliday junctions, preventing crossover exchange of genetic information at unscheduled recombination intermediates, and Top IIIβ homologs have been shown to be involved in regulation of various mRNAs involved in neuronal function, there is little evidence for similar reactions in bacteria. Instead, most data point to Topo III playing a role supplemental to that of topoisomerase IV in unlinking daughter chromosomes during DNA replication. In support of this model, we show thatEscherichia coliTopo III associates with the replication forkin vivo(likely via interactions with the single-stranded DNA-binding protein and the β clamp-loading DnaX complex of the DNA polymerase III holoenzyme), that the DnaX complex stimulates the ability of Topo III to unlink both catenated and precatenated DNA rings, and that ΔtopBcells show delayed and disorganized nucleoid segregation compared to that of wild-type cells. These data argue that Topo III normally assists topoisomerase IV in chromosome decatenation by removing excess positive topological linkages at or near the replication fork as they are converted into precatenanes.IMPORTANCETopological entanglement between daughter chromosomes has to be reduced to exactly zero every time anE. colicell divides. The enzymatic agents that accomplish this task are the topoisomerases.E. colipossesses four topoisomerases. It has been thought that topoisomerase IV is primarily responsible for unlinking the daughter chromosomes during DNA replication. We show here that topoisomerase III also plays a role in this process and is specifically localized to the replisome, the multiprotein machine that duplicates the cell’s genome, in order to do so.
APA, Harvard, Vancouver, ISO, and other styles
24

Maddox, Alexia, and Luke J. Heemsbergen. "Digging in Crypto-Communities’ Future-Making." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2755.

Full text
Abstract:
Introduction This article situates the dark as a liminal and creative space of experimentation where tensions are generative and people tinker with emerging technologies to create alternative futures. Darkness need not mean chaos and fear of violence – it can mean privacy and protection. We define dark as an experimental space based upon uncertainties rather than computational knowns (Bridle) and then demonstrate via a case study of cryptocurrencies the contribution of dark and liminal social spaces to future(s)-making. Cryptocurrencies are digital cash systems that use decentralised (peer-to-peer) networking to enable irreversible payments (Maurer, Nelms, and Swartz). Cryptocurrencies are often clones or variations on the ‘original’ Bitcoin payment systems protocol (Trump et al.) that was shared with the cryptographic community through a pseudonymous and still unknown author(s) (Nakamoto), creating a founder mystery. Due to the open creation process, a new cryptocurrency is relatively easy to make. However, many of them are based on speculative bubbles that mirror Bitcoin, Ethereum, and ICOs’ wealth creation. Examples of cryptocurrencies now largely used for speculation due to their volatility in holding value are rampant, with online clearing houses competing to trade hundreds of different assets from AAVE to ZIL. Many of these altcoins have little to no following or trading volume, leading to their obsolescence. Others enjoy immense popularity among dedicated communities of backers and investors. Consequently, while many cryptocurrency experiments fail or lack adoption and drop from the purview of history, their constant variation also contributes to the undertow of the future that pulls against more visible surface waves of computational progress. The article is structured to first define how we understand and leverage ‘dark’ against computational cultures. We then apply thematic and analytical tactics to articulate future-making socio-technical experiments in the dark. Based on past empirical work of the authors (Maddox "Netnography") we focus on crypto-cultures’ complex emancipatory and normative tensions via themes of construction, disruption, contention, redirection, obsolescence, and iteration. Through these themes we illustrate the mutation and absorption of dark experimental spaces into larger social structures. The themes we identify are not meant as a complete or necessarily serial set of occurrences, but nonetheless contribute a new vocabulary for students of technology and media to see into and grapple with the dark. Embracing the Dark: Prework & Analytical Tactics for Outside the Known To frame discussion of the dark here as creative space for alternative futures, we focus on scholars who have deeply engaged with notions of socio-technical darkness. This allows us to explore outside the blinders of computational light and, with a nod to Sassen, dig in the shadows of known categories to evolve the analytical tactics required for the study of emerging socio-technical conditions. We understand the Dark Web to usher shifting and multiple definitions of darkness, from a moral darkness to a technical one (Gehl). From this work, we draw the observation of how technologies that obfuscate digital tracking create novel capacities for digital cultures in spaces defined by anonymity for both publisher and user. Darknets accomplish this by overlaying open internet protocols (e.g. TCP/IP) with non-standard protocols that encrypt and anonymise information (Pace). Pace traces concepts of darknets to networks in the 1970s that were 'insulated’ from the internet’s predecessor ARPANET by air gap, and then reemerged as software protocols similarly insulated from cultural norms around intellectual property. ‘Darknets’ can also be considered in ternary as opposed to binary terms (Gehl and McKelvey) that push to make private that which is supposed to be public infrastructure, and push private platforms (e.g. a Personal Computer) to make public networks via common bandwidth. In this way, darknets feed new possibilities of communication from both common infrastructures and individual’s platforms. Enabling new potentials of community online and out of sight serves to signal what the dark accomplishes for the social when measured against an otherwise unending light of computational society. To this point, a new dark age can be welcomed insofar it allows an undecided future outside of computational logics that continually define and refine the possible and probable (Bridle). This argument takes von Neumann’s 1945 declaration that “all stable processes we shall predict. All unstable processes we shall control” (in Bridle 21) as a founding statement for computational thought and indicative of current society. The hope expressed by Bridle is not an absence of knowledge, but an absence of knowing the future. Past the computational prison of total information awareness within an accelerating information age (Castells) is the promise of new formations of as yet unknowable life. Thus, from Bridle’s perspective, and ours, darkness can be a place of freedom and possibility, where the equality of being in the dark, together, is not as threatening as current privileged ways of thinking would suggest (Bridle 15). The consequences of living in a constant glaring light lead to data hierarchies “leaching” (Bridle) into everything, including social relationships, where our data are relationalised while our relations are datafied (Maddox and Heemsbergen) by enforcing computational thinking upon them. Darkness becomes a refuge that acknowledges the power of unknowing, and a return to potential for social, equitable, and reciprocal relations. This is not to say that we envision a utopian life without the shadow of hierarchy, but rather an encouragement to dig into those shadows made visible only by the brightest of lights. The idea of digging in the shadows is borrowed from Saskia Sassen, who asks us to consider the ‘master categories’ that blind us to alternatives. According to Sassen (402), while master categories have the power to illuminate, their blinding power keeps us from seeing other presences in the landscape: “they produce, then, a vast penumbra around that center of light. It is in that penumbra that we need to go digging”. We see darkness in the age of digital ubiquity as rejecting the blinding ‘master category’ of computational thought. Computational thought defines social/economic/political life via what is static enough to predict or unstable enough to render a need to control. Otherwise, the observable, computable, knowable, and possible all follow in line. Our dig in the shadows posits a penumbra of protocols – both of computational code and human practice – that circle the blinding light of known digital communications. We use the remainder of this short article to describe these themes found in the dark that offer new ways to understand the movements and moments of potential futures that remain largely unseen. Thematic Resonances in the Dark This section considers cryptocultures of the dark. We build from a thematic vocabulary that has been previously introduced from empirical examples of the crypto-market communities which tinker with and through the darkness provided by encryption and privacy technologies (Maddox "Netnography"). Here we refine these future-making themes through their application to events surrounding community-generated technology aimed at disrupting centralised banking systems: cryptocurrencies (Maddox, Singh, et al.). Given the overlaps in collective values and technologies between crypto-communities, we find it useful to test the relevance of these themes to the experimental dynamics surrounding cryptocurrencies. We unpack these dynamics as construction, rupture and disruption, redirection, and the flip-sided relationship between obsolescence and iteration leading to mutation and absorption. This section provides a working example for how these themes adapt in application to a community dwelling at the edge of experimental technological possibilities. The theme of construction is both a beginning and a materialisation of a value field. It originates within the cyberlibertarians’ ideological stance towards using technological innovations to ‘create a new world in the shell of the old’ (van de Sande) which has been previously expressed through the concept of constructive activism (Maddox, Barratt, et al.). This libertarian ideology is also to be found in the early cultures that gave rise to cryptocurrencies. Through their interest in the potential of cryptography technologies related to social and political change, the Cypherpunks mailing list formed in 1992 (Swartz). The socio-cultural field surrounding cryptocurrencies, however, has always consisted of a diverse ecosystem of vested interests building collaborations from “goldbugs, hippies, anarchists, cyberpunks, cryptographers, payment systems experts, currency activists, commodity traders, and the curious” (Maurer, Nelms, and Swartz 262). Through the theme of construction we can consider architectures of collaboration, cooperation, and coordination developed by technically savvy populations. Cryptocurrencies are often developed as code by teams who build in mechanisms for issuance (e.g. ‘mining’) and other controls (Conway). Thus, construction and making of cryptocurrencies tend to be collective yet decentralised. Cryptocurrencies arose during a time of increasing levels of distrust in governments and global financial instability from the Global Financial Crisis (2008-2013), whilst gaining traction through their usefulness in engaging in illicit trade (Saiedi, Broström, and Ruiz). It was through this rupture in the certainties of ‘the old system’ that this technology, and the community developing it, sought to disrupt the financial system (Maddox, Singh, et al.; Nelms et al.). Here we see the utility of the second theme of rupture and disruption to illustrate creative experimentation in the liminal and emergent spaces cryptocurrencies afford. While current crypto crazes (e.g. NFTs, ICOs) have their detractors, Cohen suggests, somewhat ironically, that the momentum for change of the crypto current was “driven by the grassroots, and technologically empowered, movement to confront the ills perceived to be powered and exacerbated by market-based capitalism, such as climate change and income inequality” (Cohen 739). Here we can start to envision how subterranean currents that emerge from creative experimentations in the dark impact global social forces in multifaceted ways – even as they are dragged into the light. Within a disrupted environment characterised by rupture, contention and redirection is rife (Maddox "Disrupting"). Contention and redirection illustrate how competing agendas bump and grind to create a generative tension around a deep collective desire for social change. Contention often emerges within an environment of hacks and scams, of which there are many stories in the cryptocurrency world (see Bartlett for an example of OneCoin, for instance; Kavanagh, Miscione, and Ennis). Other aspects of contention emerge around how the technology works to produce (mint) cryptocurrencies, including concern over the environmental impact of producing cryptocurrencies (Goodkind, Jones, and Berrens) and the production of non-fungible tokens for the sale of digital assets (Howson). Contention also arises through the gendered social dynamics of brogramming culture skewing inclusive and diverse engagement (Bowles). Shifting from the ideal of inclusion to the actual practice of crypto-communities begs the question of whose futures are being made. Contention and redirections are also evidenced by ‘hard forks’ in cryptocurrency. The founder mystery resulted in the gifting of this technology to a decentralised and leaderless community, materialised through the distributed consensus processes to approve software updates to a cryptocurrency. This consensus system consequently holds within it the seeds for governance failures (Trump et al.), the first of which occurred with the ‘hard forking’ of Bitcoin into Bitcoin cash in 2017 (Webb). Hard forks occur when developers and miners no longer agree on a proposed change to the software: one group upgraded to the new software while the others operated on the old rules. The resulting two separate blockchains and digital currencies concretised the tensions and disagreements within the community. This forking resulted initially in a shock to the market value of, and trust in, the Bitcoin network, and the dilution of adoption networks across the two cryptocurrencies. The ongoing hard forks of Bitcoin Cash illustrate the continued contention occurring within the community as crypto-personalities pit against each other (Hankin; Li). As these examples show, not all experiments in cryptocurrencies are successful; some become obsolete through iteration (Arnold). Iteration engenders mutations in the cultural framing of socio-technical experiments. These mutations of meaning and signification then facilitate their absorption into novel futures, showing the ternary nature of how what happens in the dark works with what is known by the light. As a rhetorical device, cryptocurrencies have been referred to as a currency (a payment system) or a commodity (an investment or speculation vehicle; Nelms et al. 21). However, new potential applications for the underlying technologies continue emerge. For example, Ethereum, the second-most dominant cryptocurrency after Bitcoin, now offers smart contract technology (decentralised autonomous organisations, DAO; Kavanagh, Miscione, and Ennis) and is iterating technology to dramatically reduce the energy consumption required to mine and mint the non-fungible tokens (NFTs) associated with crypto art (Wintermeyer). Here we can see how these rhetorical framings may represent iterative shifts and meaning-mutation that is as pragmatic as it is cultural. While we have considered here the themes of obsolescence and iteration threaded through the technological differentiations amongst cryptocurrencies, what should we make of these rhetorical or cultural mutations? This cultural mutation, we argue, can be seen most clearly in the resurgence of Dogecoin. Dogecoin is a cryptocurrency launched in 2013 that takes its name and logo from a Shiba Inu meme that was popular several years ago (Potts and Berg). We can consider Dogecoin as a playful infrastructure (Rennie) and cultural product that was initially designed to provide a low bar for entry into the market. Its affordability is kept in place by the ability for miners to mint an unlimited number of coins. Dogecoin had a large resurgence of value and interest just after the meme-centric Reddit community Wallstreetbets managed to drive the share price of video game retailer GameStop to gain 1,500% (Potts and Berg). In this instance we see the mutation of a cryptocurrency into memecoin, or cultural product, for which the value is a prism to the wild fluctuations of internet culture itself, linking cultural bubbles to financial ones. In this case, technologies iterated in the dark mutated and surfaced as cultural bubbles through playful infrastructures that intersected with financial systems. The story of dogecoin articulates how cultural mutation articulates the absorption of emerging techno-potentials into larger structures. Conclusion From creative experiments digging in the dark shadows of global socio-economic forces, we can see how the future is formed beneath the surface of computational light. Yet as we write, cryptocurrencies are being absorbed by centralising and powerful entities to integrate them into global economies. Examples of large institutions hoarding Bitcoin include the crypto-counterbalancing between the Chinese state through its digital currency DCEP (Vincent) and Facebook through the Libra project. Vincent observes that the state-backed DCEP project is the antithesis of the decentralised community agenda for cryptocurrencies to enact the separation of state and money. Meanwhile, Facebook’s centralised computational control of platforms used by 2.8 billion humans provide a similarly perverse addition to cryptocurrency cultures. The penumbra fades as computational logic shifts its gaze. Our thematic exploration of cryptocurrencies highlights that it is only in their emergent forms that such radical creative experiments can dwell in the dark. They do not stay in the dark forever, as their absorption into larger systems becomes part of the future-making process. The cold, inextricable, and always impending computational logic of the current age suffocates creative experimentations that flourish in the dark. Therefore, it is crucial to tend to the uncertainties within the warm, damp, and dark liminal spaces of socio-technical experimentation. References Arnold, Michael. "On the Phenomenology of Technology: The 'Janus-Faces' of Mobile Phones." Information and Organization 13.4 (2003): 231-56. Bartlett, Jamie. "Missing Cryptoqueen: Why Did the FCA Drop Its Warning about the Onecoin Scam?" BBC News 11 Aug. 2020. 19 Feb. 2021 <https://www.bbc.com/news/technology-53721017>. Bowles, Nellie. "Women in Cryptocurrencies Push Back against ‘Blockchain Bros’." New York Times 25 Feb. 2018. 21 Apr. 2021 <https://www.nytimes.com/2018/02/25/business/cryptocurrency-women-blockchain-bros.html>. Bridle, James. New Dark Age: Technology, Knowledge and the End of the Future. London: Verso, 2018. Castells, Manuel. The Information Age: Economy, Society and Culture. 2nd ed. Oxford: Blackwell, 2000. Cohen, Boyd. "The Rise of Alternative Currencies in Post-Capitalism." Journal of Management Studies 54.5 (2017): 739-46. Conway, Luke. "The 10 Most Important Cryptocurrencies Other than Bitcoin." Investopedia Jan. 2021. 19 Feb. 2021 <https://www.investopedia.com/tech/most-important-cryptocurrencies-other-than-bitcoin/>. Gehl, Robert, and Fenwick McKelvey. "Bugging Out: Darknets as Parasites of Large-Scale Media Objects." Media, Culture & Society 41.2 (2019): 219-35. Goodkind, Andrew L., Benjamin A. Jones, and Robert P. Berrens. "Cryptodamages: Monetary Value Estimates of the Air Pollution and Human Health Impacts of Cryptocurrency Mining." Energy Research & Social Science 59 (2020): 101281. Hankin, Aaron. "What You Need to Know about the Bitcoin Cash ‘Hard Fork’." MarketWatch 13 Nov. 2018. 21 Apr. 2021 <https://www.marketwatch.com/story/what-you-need-to-know-about-the-bitcoin-cash-hard-fork-2018-11-13>. Howson, Peter. "NFTs: Why Digital Art Has Such a Massive Carbon Footprint." The Conversation April 2021. 21 Apr. 2021 <https://theconversation.com/nfts-why-digital-art-has-such-a-massive-carbon-footprint-158077>. Kavanagh, Donncha, Gianluca Miscione, and Paul J. Ennis. "The Bitcoin Game: Ethno-Resonance as Method." Organization (2019): 1-20. Li, Shine. "Bitcoin Cash (Bch) Hard Forks into Two New Blockchains Following Disagreement on Miner Tax." Blockchain.News Nov. 2020. 19 Feb. 2021 <https://blockchain.news/news/bitcoin-cash-bch-hard-forks-two-new-blockchains-disagreement-on-miner-tax>. Maddox, Alexia. "Disrupting the Ethnographic Imaginarium: Challenges of Immersion in the Silk Road Cryptomarket Community." Journal of Digital Social Research 2.1 (2020): 31-51. ———. "Netnography to Uncover Cryptomarkets." Netnography Unlimited: Understanding Technoculture Using Qualitative Social Media Research. Eds. Rossella Gambetti and Robert V. Kozinets. London: Routledge, 2021: 3-23. Maddox, Alexia, Monica J. Barratt, Matthew Allen, and Simon Lenton. "Constructive Activism in the Dark Web: Cryptomarkets and Illicit Drugs in the Digital ‘Demimonde’." Information Communication and Society 19.1 (2016): 111-26. Maddox, Alexia, and Luke Heemsbergen. "The Electrified Social: A Policing and Politics of the Dark." Continuum (forthcoming). Maddox, Alexia, Supriya Singh, Heather Horst, and Greg Adamson. "An Ethnography of Bitcoin: Towards a Future Research Agenda." Australian Journal of Telecommunications and the Digital Economy 4.1 (2016): 65-78. Maurer, Bill, Taylor C. Nelms, and Lana Swartz. "'When Perhaps the Real Problem Is Money Itself!': The Practical Materiality of Bitcoin." Social Semiotics 23.2 (2013): 261-77. Nakamoto, Satoshi. "Bitcoin: A Peer-to-Peer Electronic Cash System." Bitcoin.org 2008. 21 Apr. 2021 <https://bitcoin.org/bitcoin.pdf>. Nelms, Taylor C., et al. "Social Payments: Innovation, Trust, Bitcoin, and the Sharing Economy." Theory, Culture & Society 35.3 (2018): 13-33. Pace, Jonathan. "Exchange Relations on the Dark Web." Critical Studies in Media Communication 34.1 (2017): 1-13. Potts, Jason, and Chris Berg. "After Gamestop, the Rise of Dogecoin Shows Us How Memes Can Move Market." The Conversation Feb. 2021. 21 Apr. 2021 <https://theconversation.com/after-gamestop-the-rise-of-dogecoin-shows-us-how-memes-can-move-markets-154470>. Rennie, Ellie. "The Governance of Degenerates Part II: Into the Liquidityborg." Medium Nov. 2020. 21 Apr. 2021 <https://ellierennie.medium.com/the-governance-of-degenerates-part-ii-into-the-liquidityborg-463889fc4d82>. Saiedi, Ed, Anders Broström, and Felipe Ruiz. "Global Drivers of Cryptocurrency Infrastructure Adoption." Small Business Economics (Mar. 2020). Sassen, Saskia. "Digging in the Penumbra of Master Categories." British Journal of Sociology 56.3 (2005): 401-03. Swartz, Lana. "What Was Bitcoin, What Will It Be? The Techno-Economic Imaginaries of a New Money Technology." Cultural Studies 32.4 (2018): 623-50. Trump, Benjamin D., et al. "Cryptocurrency: Governance for What Was Meant to Be Ungovernable." Environment Systems and Decisions 38.3 (2018): 426-30. Van de Sande, Mathijs. "Fighting with Tools: Prefiguration and Radical Politics in the Twenty-First Century." Rethinking Marxism 27.2 (2015): 177-94. Vincent, Danny. "'One Day Everyone Will Use China's Digital Currency'." BBC News Sep. 2020. 19 Feb. 2021 <https://www.bbc.com/news/business-54261382>. Webb, Nick. "A Fork in the Blockchain: Income Tax and the Bitcoin/Bitcoin Cash Hard Fork." North Carolina Journal of Law & Technology 19.4 (2018): 283-311. Wintermeyer, Lawrence. "Climate-Positive Crypto Art: The Next Big Thing or NFT Overreach." Forbes 19 Mar. 2021. 21 Apr. 2021 <https://www.forbes.com/sites/lawrencewintermeyer/2021/03/19/climate-positive-crypto-art-the-next-big-thing-or-nft-overreach/>.
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Runchao. "Object-Oriented Diaspora Sensibilities, Disidentification, and Ghostly Performance." M/C Journal 23, no. 5 (October 7, 2020). http://dx.doi.org/10.5204/mcj.1685.

Full text
Abstract:
Neither mere flesh nor mere thing, the yellow woman, straddling the person-thing divide, applies tremendous pressures on politically treasured notions of agency, feminist enfleshment, and human ontology. — Anne Anlin Cheng, OrnamentalismIn this (apparently) very versatile piece of clothing, she [Michelle Zauner] smokes, sings karaoke, rides motorcycles, plays a killer guitar solo … and much more. Is there anything you can’t do in a hanbok?— Li-Wei Chu, commentary, From the Intercom IntroductionAnne Anlin Cheng describes the anomaly of being “the yellow woman”, women of Asian descent in Western contexts, by underlining the haunting effects of this artificial identity on multiple politically valent forms, especially through Asian women’s conceived ambivalent relations to subject- and object-hood. Due to the entangled constructiveness conjoining Asiatic identities with objects, things, and ornaments, Cheng calls for new ways to “accommodate the deeper, stranger, more intricate, and more ineffable (con)fusion between thingness and personness instantiated by Asiatic femininity and its unpredictable object life” (14). Following this call, this essay articulates a creative combination of José Esteban Muñoz’s disidentification and Avery Gordon’s haunting theory to account for some hauntingly disidentificatory ways that the performance of diaspora sensibilities reimagines Asian American life and femininity.This essay considers “Everybody Wants to Love You” (2016) (EWLY), the music video of Michelle Zauner’s solo musical project Japanese Breakfast, as a ghostly performance, which features a celebration of the Korean culture and identity of Zauner (Song). I analyse it as a site for identifying the confrontational moments and haunting effects of the diaspora sensibilities performed by Zauner who is in fact Jewish-Korean-American. Directed by Zauner and Adam Kolodny, the music video of EWLY features the persona that I call the Korean woman orchestrated by Zauner, singing in a restroom cubicle, eating a Dunkin Donuts sandwich, shotgunning a beer, shredding a Fender electric guitar on the hood of a truck, riding a motorcycle with her queer lover, and partying with a crowd all in the traditional Korean attire hanbok that used to belong to her late mother. The story ends with Zauner waking up on a bench with a hangover and fleeing from the scene, conjuring up a journey of self-discovery, self-healing, and self-liberation through multiple sites and scenes of everyday life.What I call a ghostly performance is concerned with Avery Gordon’s creative intervention of haunting as a method of social analysis to study the intricate lingering impact of ghostly matters from the past on the present. Jacques Derrida develops hauntology to describe how Marxism continues to haunt Western societies even after its so-called failure. It refers to a status that something is neither present nor absent. Gordon develops haunting as a way of knowing and a method of knowledge production, “forcing a confrontation, forking the future and the past” (xvii). A ghostly performance is thus where ghostly matters are mobilised in “confrontational moments”:when things are not in their assigned places, when the cracks and rigging are exposed, when the people who are meant to be invisible show up without any sign of leaving, when disturbed feelings cannot be put away, when something else, something different from before, seems like it must be done. (xvi)The interstitiality that transgresses and reconfigures the geographical and temporal borders of nation, culture, and Eurocentric discourses of progression is important for understanding the diverse experiences of diaspora sensibilities as critical double consciousness (Dayal 48, 53). As Gordon suggests, confrontational moments force us to confront and expose the interstitial state of objects, subjects, feelings, and conditions. Hence, to understand this study identifies the confrontational moments in Zauner’s performance as a method to identify and deconstruct the triggering moments of diaspora sensibilities.While deconstructing the ghostly performances of diaspora sensibilities, the essay also adopts an object-oriented approach to serve as a focused entry point. Not only does this approach designate a more focused scope with regard to applying Gordon’s hauntology and Muñoz’s disidentification theory, it also taps into a less attended territory of object theories such as Graham Harman’s and Ian Bogost’s object-oriented ontology due to the overlooking of the relationship between objects and racialisation that is much explored in Asian American and critical race and ethnic studies (Shomura). Moreover, while diaspora as, or not as, an object of study has been a contested topic (e.g., Axel; Cho), the objects of diaspora have been less studied.This essay elaborates on two ghostly matters: the hanbok and the manicured nails. It uncovers two haunting effects throughout the analysis: the conjuring-up of the Korean diaspora and the troubling of everyday post-racial America. By defying the objectification of Asian bodies with objects of diaspora and refusing to assimilate into the American nightlife, Zauner’s Korean woman persona haunts a multiculturalist post-racial America that fails to recognise the specificities and historicity of Korean America and performs an alternative reality. Disidentificatory ghostly performance therefore, I suggest, thrives on confrontations between the past and the present while gesturing toward the futurities of alternative Americas. Mobilising the critical lenses of disidentification and ghostly performance, finally, I aver that disidentificatory ghostly performances have great potential for envisioning a better politics of performing and representing Asian bodies through the ghostly play of haunting objects/ghostly matters.The Embodied (Objects) and the Disembodied (Ghosts) of DisidentificationThe sonic-visual lifeworld constructed in the music video of EWLY is, first of all, a cultural public sphere, through which social norms are contested, reimagined, and reconfigured. A cultural public sphere reveals the imbricated relations between the political, the public, and the personal as contested through affective (aesthetic and emotional) communications (McGuigan 15). Considering the sonic-visual landscape as a cultural public sphere foregrounds two dimensions of Gordon’s hauntology theory: the psychological and the sociopolitical states. The emphasis on its affective communicative capacities enables the psychological reach of a cultural production. Meanwhile, the multilayered articulation of the political, the public, and the personal shows the inner-network of acts of haunting even when they happen chiefly on the sociopolitical level. What is crucial about cultural public spheres for minoritarian subjects is the creative space offered for negotiating one’s position in capacious and flexible ways that non-cultural publics may not allow. One of the ways is through imagination and disputation (McGuigan 16). The idea that imagination and disputation may cause a temporal and spatial disjunction with the present is important for Muñoz’s theorisation of disidentification. With such disjunction, Muñoz believes, queer of colour performances create future-oriented visions and coterminous temporality of the present and the future. These future-oriented visions and the coterminous temporality can be thought through disidentifications, which Muñoz identifies asa performative mode of tactical recognition that various minoritarian subjects employ in an effort to resist the oppressive and normalizing discourse of dominant ideology. Disidentification resists the interpellating call of ideology that fixes a subject within the state power apparatus. It is a reformatting of self within the social. It is a third term that resists the binary of identification and counteridentification. (97)Disidentification offers a method to identify specific moments of imagination and disputation and moments of temporal and spatial disjunction. The most distinct example of the co-nature of imagination and disputation residing in the EWLY lifeworld is the persona of the Korean woman orchestrated by Zauner, as she intrudes into the everyday field of American life in a hanbok, such as a bar, a basketball court, and a convenience store. Gordon would call these moments “confrontational moments” (xvi). When performers don’t perform in ways they are supposed to perform, when they don’t operate objects in ways they are supposed to operate, when they don’t mobilise feelings in ways they are supposed to feel, they resist and disidentify with “the oppressive and normalizing discourse of dominant ideology” (Muñoz 97).In addition to Muñoz’s disidentification and Gordon’s confrontational moments, I adopt an object-oriented approach to guide my analysis of disidentificatory ghostly performances. Object theory departs from objects and matters to rediscover identity and experience. My object-oriented approach follows new materialism more closely than object-oriented ontology because it is less about debating the ontology of Asian American experiences through the lens of objects. Instead, it is more about how re-orienting our attention towards the formation and operation of objecthood reveals and reconfigures the vexed articulation between Asian American experiences and racialised objectification. To this end, my oriented-object approach aligns particularly well with politically engaged frameworks such as Jane Bennett’s vital materialism and Eunjung Kim’s ethics of objects.Taking an object-oriented approach in inquiring Asian American identities could be paradoxically intervening because “Asian Americans have been excluded, exploited, and treated as capital because they have been more closely associated to nonhuman objects than to human subjects” (Shomura). Furthermore, this objectification is doubly performed onto the bodies of Asian American women due to the Orientalist conflations of Asia as feminine (Huang 187). Therefore, applying object theory in the case of EWLY requires special attention to the interplay between subject- and object-hood and the line between objecthood and objectification. To avoid the risk of objectification when exploring the objecthood of ghostly matters, I caution against an objects-define-subjects chain of signification and instead suggest a subjects-operate-objects route of inquiry by attending to both the haunting effects of objects and how subjects mobilise such haunting effects in their performance. From a new materialist perspective, it is also important to disassociate problems of objectification from exploration of objecthood (Kim) while excavating the world-making abilities of objects (Bennett). For diasporic peoples, it means to see objects as affective and nostalgic vessels, such as toys, food, family photos, attire, and personal items (e.g., Oum), where traumas of displacement can be stored and rehearsed (Turan 54).What is revealing from a racialised subject-object relationship is what Christopher Bush calls “the ethnicity of things”: things can have ethnicity, an identification that hinges on the articulation that “thingliness can be constituted in ways analogous and related to structures of racialization” (85). This object-oriented approach to inquiry can expose the artificial nature of the affinity between Asian bodies and certain objects, behind which is a confession of naturalised racial order of signification. One way to disrupt this chain of signification is to excavate the haunting objects that disidentify with the norms of the present, that conjure up what the present wants to be done. This “something-to-be-done” characteristic is critical to acts of haunting (Gordon xvii). Such disruptive performances are what I term as “disidentificatory ghostly performances”, connecting the embodied objects with Gordon’s disembodied ghosts through the lens of Muñoz’s disidentificatory reading with a two-fold impact: first exposing such artificial affinity and then suggesting alternative ways of knowing.In what follows, I expand upon two haunting objects/ghostly matters: the manicured nails and the hanbok. I contend that Zauner operates these haunting objects to embody the “something-to-be-done” characteristic by curating uncomfortable, confrontational moments, where the constituted affinity between Koreanness/Asianness and anomaly is instantiated and unsettled in multiple snippets of the mundane post-racial, post-globalisation world.What Can the Korean Woman (Not) Do with Those Nails and in That Hanbok?The hanbok that Zauner wears throughout the music video might be the single most powerful haunting object in the story. This authentic hanbok belonged to Zauner’s late mother who wore it to her wedding. Dressing in the hanbok while navigating the nightlife, it becomes a mediated, trans-temporal experience for both Zauner and her mother. A ghostly journey, you could call it. The hanbok then becomes a ghostly matter that haunts both the Orientalist gaze and the grieving Zauner. This journey could be seen as a process of dealing with personal loss, a process of “reckoning with ghosts” (Gordon 190). The division between the personal and the public, the historical and the present cease to exist as linear and clear-cut forces. The important role of ghosts in the performance are the efforts of historicising and specifying the persona of the Korean woman, which is a strategy for minoritarian performers to resist “the pull of reductive multicultural pluralism” (Muñoz 147). These ghostly matters haunt a pluralist multiculturalist post-racial America that refuses to see minor specificities and historicity.The Korean woman in an authentic hanbok, coupled with other objects of Korean roots, such as a traditional hairdo and seemingly exotic makeup, may invite the Orientalist gaze or the assumption that Zauner is self-commodifying and self-fetishising Korean culture, risking what Cheng calls “Oriental female objectification” operating through “the lenses of commodity and sexual fetishism” (14). However, she “fails” to do any of these. The ways Zauner acts in the hanbok manifests a self-negotiation with her Korean identity through disidentificatory sensibilities with racial fetishism. For example, in various scenes, the Korean woman appears to be drunk in a bar, gorging a sandwich, shotgunning a beer, smoking in a restroom cubicle, messing with strangers in a basketball court, rocking on a truck, and falling asleep on a bench. Some may describe what she does as abnormal, discomforting, and even disgusting in a traditional Korean garment which is usually worn on formal occasions. The Korean woman not only subverts her traditional Koreanness but also disidentifies with what the Asian fetish requires of Asian bodies: obedient, well-behaved model minority or the hypersexualised dragon lady (e.g., Hsu; Shimizu). Zauner’s performance foregrounds the sentimental, the messy, the frenetic, the aggressive, and the carnivalesque as essential qualities and sensibilities of the Korean woman. These rarely visible figurations of Asian femininities speak to the normalised public disappearance of “unwanted” sides of Asian bodies.Wavering public disappearance is a crucial haunting effect. The public disappearance is an “organized system of repression” (Gordon 72) and a “state-sponsored procedure for producing ghosts to harrowingly haunt a population into submission” (115). While the journey of EWLY evolves through ups and downs, the Korean woman does not maintain the ephemeral joy and takes offence at the people and surroundings now and then, such as at an arcade in the bar, at some basketball players, or at the audience or the camera operator. The performed disaffection and the conflicts substantiate a theory of “positive perversity” through which Asian American women claim the representation of their sexuality and desires (Shimizu), engendering a strong and visible presence of the ghostly matters operated by the Korean woman. This noticeable arrival of bodies disorients how things are arranged (Ahmed 163), revealing and disrupting whiteness, which functions as a habit and a background to actions (149). The confrontational performances of the encounters between Zauner and others cast a critique of the racial politics of disappearing by reifying disappearing into confrontational moments in the everyday post-racial world.What is also integral to Zauner’s antagonistic performance of wavering public disappearing and failure of “Oriental female objectification” is a punk strategy of negativity through an aesthetic of nihilism and a mediation of performing objects. For example, in addition to the traditional hairdo that goes with her makeup, Zauner also wears a nose ring; in addition to partying with a crowd, she adopts a moshing style of dancing, being carried over people’s heads in the hanbok. All these, in addition to her disaffectionate, aggressive, and impolite body language, express a negative punk aesthetics. Muñoz describes such a negative punk aesthetics as an energy that can be described “as chaotic, as creating a life without rhyme or reason, as quintessentially self-destructive” (97). What lies at the heart of this punk dystopia is the desire for “something else”, something “not the present time or place” (Muñoz). Through this desire for impossible time and place, utopian is reimagined, a race riot, in Mimi Thi Nguyen’s term.On the other hand, the manicured fingernails are also a major operating force, reminiscent of Korean American immigrant history along with the racialised labor relations that have marked Korean bodies as an alien anomaly (Liu). With “Japanese Breakfast” being written on the screen in neon pink with some dazzling effect, the music video begins in a warm tone. The story begins with Zauner selecting EWLY with her finger on a karaoke operation screen, the first of many shots on her carefully manicured nails, decorated with transparent nail extensions, sparkly ornaments, and hanging fine chains. These nails conjure up the nail salon business in the US that heavily depended on immigrant labor and Korean women immigrants have made significant economic contributions through the manicure business. In particular, differently from Los Angeles where nail salons have been predominantly Vietnamese and Chinese owned, Korean women immigrants in the 1980s were the first ones to open nail salons in New York City and led to the rapid growth of the business (Kang 51). The manicured nails first of all conjure up these recent histories associated with the nail salon business.Moreover, these fingernails haunt post-racial and post-globalisation America by revealing and subverting the invisible, normalised racial and ethnic nature of the labor and objects associated with fingernails cosmetic treatment. Ghostly matters inform “a method of knowledge production and a way of writing that could represent the damage and the haunting of the historical alternatives” (Gordon xvii). They function as a reminder of the damage that seems forgotten or normalised in modern societies and as an alternative embodiment of what modern societies could have become. In the universe of EWLY, the fingernails become a forceful ghostly matter by reminding us of the damage done onto Korean bodies by fixing them as service performers instead customers. The nail salon business as performed by immigrant labor has been a business of “buying and selling of deference and attentiveness”, where white customers come to exercise their privilege while not wanting anything associated with Koreaness or Otherness (Kang 134). However, as a haunting force, the fingernails subvert such labor relations by acting as a versatile agent operating varied objects, such as a karaoke machine, cigarettes, a sandwich, a Fender guitar, and a can of beer. Through such operating, an alternative labor relation is formed. This alternative is not entirely without roots. As promoted in Japanese Breakfast’s Instagram (@jbrekkie), Zauner’s look was styled by a nail artist who appears to be a white female, Celeste Marie Welch from the DnA Salon based in Philadelphia. This is a snippet of a field that is now a glocalised industry, where the racial and gender makeup is more diverse. It is increasingly easier to see non-Asian and non-female nail salon workers, among whom white nail salon workers outnumbered any other non-Asian racial/ethnic groups (Preeti et al. 23). EWLY’s alternative worldmaking is not only a mere reflection of the changing makeup of an industry but also calling out the societal tendency of forgetting histories. To be haunted, as Gordon explains, is to be “tied to historical and social effects” (190). The ghostly matters of the manicure industry haunt its workers, artists, consumers, and businesspeople of a past that prescribes racialised labor divisions, consumption relations, and the historical and social effects inflicted on the Othered bodies. Performing with the manicured nails, Zauner challenges now supposedly multicultural manicure culture by fusing oppositional, trans-temporal identities into the persona of the Korean woman. Not only does she conjure up the racialised labor relations as the child of a Korean mother, she also disidentifies with the worker identity of early Korean women immigrants as a consumer who receives service from an artist who would otherwise never perform such labor in the past.Conclusion: Toward a Disidentificatory Ghostly PerformanceThis essay suggests seeing the disidentificatory ghostly performance of the Korean woman as an artistic incarnation of her lived Othering experience, which Zauner may or may not navigate on an everyday basis. As Zauner lives through what looks like a typical Friday night in an American town, the journey represents an interrogation of the present and the past. When the ghostly matters move through public spaces – when she drinks in a bar, walks down the street, and parties with a crowd – the Korean woman neither conforms to what she is expected to do in a hanbok nor does she get fully assimilated into this American nightlife.Derrida avers that haunting, repression, and hegemony are structurally interlocked and that “haunting belongs to the structure of every hegemony” because “hegemony still organizes the repression” (46). This is why the creative capacity of disidentificatory performances is crucial for acts of haunting and for historically repressed groups of people. Conjoining the future-oriented performative mode of disidentification and the forking of the past and the present by ghostly performances, disidentificatory ghostly performances enable not only people of colour but also particularly diasporic populations of colour to challenge racial chains of signification and orchestrate future-oriented visions, where time is of the most compassion, at its utmost capacity.ReferencesAhmed, Sara. “A Phenomenology of Whiteness.” Feminist Theory 8.2 (2007): 149–168.Axel, Brian Keith. “Time and Threat: Questioning the Production of the Diaspora as an Object of Study.” History and Anthropology 9.4 (1996): 415–443.Bennett, Jane. Vibrant Matter: A Political Ecology of Things. Durham: Duke UP, 2010.Bogost, Ian. Alien Phenomenology, or, What It’s Like to Be a Thing. Minneapolis: U of Minnesota P, 2012.Bush, Christopher. “The Ethnicity of Things in America’s Lacquered Age.” Representations 99.1 (2007): 74–98. Cheng, Anne Anlin. Ornamentalism. New York: Oxford UP, 2019.Cho, Lily. “The Turn to Diaspora.” Topia: Canadian Journal of Cultural Studies 17 (2007): 11–30.Chu, Li-Wei. “MV Throwback: Japanese Breakfast – ‘Everybody Wants to Love You’.” From the Intercom, 23 Aug. 2018. <https://fromtheintercom.com/mv-throwback-japanese-breakfast-everybody-wants-to-love-you/>.Dayal, Samir. “Diaspora and Double Consciousness.” The Journal of the Midwest Modern Language Association 29.1 (1996): 46–62. Derrida, Jacques. Specters of Marx: The State of the Debt, the Work of Mourning, and the New International. London: Routledge, 1994.Gordon, Avery. Ghostly Matters: Haunting and the Sociological Imagination. Minneapolis: U of Minnesota P, 2008. Harman, Graham. Prince of Networks: Bruno Latour and Metaphysics. Melbourne: re.press, 2009.Hsu, Madeline Yuan-yin. The Good Immigrants: How the Yellow Peril Became the Model Minority. Princeton, New Jersey: Princeton UP, 2015.Huang, Vivian L. “Inscrutably, Actually: Hospitality, Parasitism, and the Silent Work of Yoko Ono and Laurel Nakadate.” Women & Performance: A Journal of Feminist Theory 28.3 (2018): 187–203.Japanese Breakfast. “Japanese Breakfast – Everybody Wants to Love You (Official Video).” YouTube, 20 Sep. 2016. <http://www.youtube.com/watch?v=KNT7wuqaykc>.Kang, Miliann. The Managed Hand: Race, Gender, and the Body in Beauty Service Work. Berkeley: U of California P, 2010.Kim, E. “Unbecoming Human: An Ethics of Objects.” GLQ: A Journal of Lesbian and Gay Studies 21.2–3 (2015): 295–320.Liu, Runchao. “Retro Objects, Alien Objects.” In Media Res. 12 Dec. 2018. <http://mediacommons.org/imr/content/retro-objects-alien-objects>.McGuigan, Jim. Cultural Analysis. Los Angeles, CA: SAGE, 2010.Muñoz, José Esteban. Disidentifications: Queers of Color and the Performance of Politics. Minneapolis: U of Minnesota P, 1999.———. “‘Gimme Gimme This ... Gimme Gimme That’: Annihilation and Innovation in the Punk Rock Commons.” Social Text 31.3 (2013): 95–110.Nguyen, Mimi Thi. “Riot Grrrl, Race, and Revival.” Women & Performance: A Journal of Feminist Theory 22.2–3 (2012): 173–196. Oum, Young Rae. “Authenticity and Representation: Cuisines and Identities in Korean-American Diaspora.” Postcolonial Studies 8.1 (2005): 109–125.Sharma, Preeti, et al. “Nail File: A Study of Nail Salon Workers and Industry in the United States.” UCLA Labor Center and California Healthy Nail Salon Collaborative, 2018.Shimizu, Celine Parrenas. The Hypersexuality of Race: Performing Asian/American Women on Screen and Scene. Durham, NC: Duke UP, 2007.Shomura, Chad. “Object Theory and Asian American Literature.” Oxford Research Encyclopedia of Literature. New York: Oxford UP, 2020.Song, Sandra. “Japanese Breakfast Is the Korean-American Songwriter Empowering Everyone to Overcome.” Teen Vogue. 14 July 2017. <http://www.teenvogue.com/story/japanese-breakfast-songwriter-empowering-everyone-overcome>.Turan, Zeynep. “Material Objects as Facilitating Environments: The Palestinian Diaspora.” Home Cultures 7.1 (2010): 43–56.
APA, Harvard, Vancouver, ISO, and other styles
26

Shiloh, Ilana. "A Vision of Complex Symmetry." M/C Journal 10, no. 3 (June 1, 2007). http://dx.doi.org/10.5204/mcj.2674.

Full text
Abstract:
The labyrinth is probably the most universal trope of complexity. Deriving from pre-Greek labyrinthos, a word denoting “maze, large building with intricate underground passages”, and possibly related to Lydian labrys, which signifies “double-edged axe,” symbol of royal power, the notion of the labyrinth primarily evokes the Minoan Palace in Crete and the myth of the Minotaur. According to this myth, the Minotaur, a monster with the body of a man and the head of a bull, was born to Pesiphae, king Minos’s wife, who mated with a bull when the king of Crete was besieging Athens. Upon his return, Minos commanded the artist Daedalus to construct a monumental building of inter-connected rooms and passages, at the center of which the King sought to imprison the monstrous sign of his disgrace. The Minotaur required human sacrifice every couple of years, until it was defeated by the Athenian prince Theuseus, who managed to extricate himself from the maze by means of a clue of thread, given to him by Minos’s enamored daughter, Ariadne (Parandowski 238-43). If the Cretan myth establishes the labyrinth as a trope of complexity, this very complexity associates labyrinthine design not only with disorientation but also with superb artistry. As pointed out by Penelope Reed Doob, the labyrinth is an inherently ambiguous construct (39-63). It presumes a double perspective: those imprisoned inside, whose vision ahead and behind is severely constricted, are disoriented and terrified; whereas those who view it from outside or from above – as a diagram – admire its structural sophistication. Labyrinths thus simultaneously embody order and chaos, clarity and confusion, unity (a single structure) and multiplicity (many paths). Whereas the modern, reductive view equates the maze with confusion and disorientation, the labyrinth is actually a signifier with two contradictory signifieds. Not only are all labyrinths intrinsically double, they also fall into two distinct, though related, types. The paradigm represented by the Cretan maze is mainly derived from literature and myth. It is a multicursal model, consisting of a series of forking paths, each bifurcation requiring new choice. The second type is the unicursal maze. Found mainly in the visual arts, such as rock carvings or coin ornamentation, its structural basis is a single path, twisting and turning, but entailing no bifurcations. Although not equally bewildering, both paradigms are equally threatening: in the multicursal construct the maze-walker may be entrapped in a repetitious pattern of wrong choices, whereas in the unicursal model the traveler may die of exhaustion before reaching the desired end, the heart of the labyrinth. In spite of their differences, the basic similarities between the two paradigms may explain why they were both included in the same linguistic category. The labyrinth represents a road-model, and as such it is essentially teleological. Most labyrinths of antiquity and of the Middle Ages were designed with the thought of reaching the center. But the fact that each labyrinth has a center does not necessarily mean that the maze-walker is aware of its existence. Moreover, reaching the center is not always to be desired (in case it conceals a lurking Minotaur), and once the center is reached, the maze-walker may never find the way back. Besides signifying complexity and ambiguity, labyrinths thus also symbolically evoke the danger of eternal imprisonment, of inextricability. This sinister aspect is intensified by the recursive aspect of labyrinthine design, by the mirroring effect of the paths. In reflecting on the etymology of the word ‘maze’ (rather than the Greek/Latin labyrinthos/labyrinthus), Irwin observes that it derives from the Swedish masa, signifying “to dream, to muse,” and suggests that the inherent recursion of labyrinthine design offers an apt metaphor for the uniquely human faculty of self-reflexitivity, of thought turning upon itself (95). Because of its intriguing aspect and wealth of potential implications, the labyrinth has become a category that is not only formal, but also conceptual and symbolic. The ambiguity of the maze, its conflation of overt complexity with underlying order and simplicity, was explored in ideological systems rooted in a dualistic world-view. In the early Christian era, the labyrinth was traditionally presented as a metaphor for the universe: divine creation based on a perfect design, perceived as chaotic due to the shortcomings of human comprehension. In the Middle-Ages, the labyrinthine attributes of imprisonment and limited perception were reflected in the view of life as a journey inside a moral maze, in which man’s vision was constricted because of his fallen nature (Cazenave 348-350). The maze was equally conceptualized in dynamic terms and used as a metaphor for mental processes. More specifically, the labyrinth has come to signify intellectual confusion, and has therefore become most pertinent in literary contexts that valorize rational thought. And the rationalistic genre par excellence is detective fiction. The labyrinth may serve as an apt metaphor for the world of detective fiction because it accurately conveys the tacit assumptions of the genre – the belief in the existence of order, causality and reason underneath the chaos of perceived phenomena. Such optimistic belief is ardently espoused by the putative detective in Paul Auster’s metafictional novella City of Glass: He had always imagined that the key to good detective work was a close observation of details. The more accurate the scrutiny, the more successful the results. The implication was that human behavior could be understood, that beneath the infinite façade of gestures, tics and silences there was finally a coherence, an order, a source of motivation. (67) In this brief but eloquent passage Auster conveys, through the mind of his sleuth, the central tenets of classical detective fiction. These tenets are both ontological and epistemological. The ontological aspect is subsumed in man’s hopeful reliance on “a coherence, an order, a source of motivation” underlying the messiness and blood of the violent deed. The epistemological aspect is aptly formulated by Michael Holquist, who argues that the fictional world of detective stories is rooted in the Scholastic principle of adequatio rei et intellectus, the adequation of mind to things (157). And if both human reality and phenomenal reality are governed by reason, the mind, given enough time, can understand everything. The mind’s representative is the detective. He is the embodiment of inquisitive intellect, and his superior powers of observation and deduction transform an apparent mystery into an incontestable solution. The detective sifts through the evidence, assesses the relevance of data and the reliability of witnesses. But, first of foremost, he follows clues – and the clue, the most salient element of the detective story, links the genre with the myth of the Cretan labyrinth. For in its now obsolete spelling, the word ‘clew’ denotes a ball of thread, and thus foregrounds the similarity between the mental process of unraveling a crime mystery and the traveler’s progress inside the maze (Irwin 179). The chief attributes of the maze – circuitousness, enclosure, and inextricability – associate it with another convention of detective fiction, the trope of the locked room. This convention, introduced in Poe’s “The Murders in the Rue Morgue,” a text traditionally regarded as the first analytic detective story, establishes the locked room as the ultimate affront to reason: a hermetically sealed space which no one could have penetrated or exited and in which a brutal crime has nevertheless been committed. But the affront to reason is only apparent. In Poe’s ur-text of the genre, the violent deed is committed by an orangutan, a brutal and abused beast that enters and escapes from the seemingly locked room through a half-closed window. As accurately observed by Holquist, in the world of detective fiction “there are no mysteries, there is only incorrect reasoning” (157). And the correct reasoning, dubbed by Poe “ratiocination”, is the process of logical deduction. Deduction is an enchainment of syllogisms, in which a conclusion inevitably follows from two valid premises; as Dupin elegantly puts it, “the deductions are the sole proper ones and … the suspicion arises inevitably from them as a single result” (Poe 89). Applying this rigorous mental process, the detective re-arranges the pieces of the puzzle into a coherent and meaningful sequence of events. In other words – he creates a narrative. This brings us back to Irwin’s observation about the recursive aspect of the maze. Like the labyrinth, detective fiction is self-reflexive. It is a narrative form which foregrounds narrativity, for the construction of a meaningful narrative is the protagonist’s and the reader’s principal task. Logical deduction, the main activity of the fictional sleuth, does not allow for ambiguity. In classical detective fiction, the labyrinth is associated with the messiness and violence of crime and contrasted with the clarity of the solution (the inverse is true of postmodernist detective mysteries). The heart of the labyrinth is the solution, the vision of truth. This is perhaps the most important aspect of the detective genre: the premise that truth exists and that it can be known. In “The Murders in the Rue Morgue,” the initially insoluble puzzle is eventually transformed into a coherent narrative, in which a frantic orangutan runs into the street escaping the abuse of its master, climbs a rod and seeks refuge in a room inhabited by two women, brutally slashes them in confusion, and then flees the room in the same way he penetrated it. The sequence of events reconstructed by Dupin is linear, unequivocal, and logically satisfying. This is not the case with the ‘hard boiled’, American variant of the detective genre, which influenced the inception of film noir. Although the novels of Hammett, Chandler or Cain are structured around crime mysteries, these works problematize most of the tacit premises of analytic detective fiction and re-define its narrative form. For one, ‘hard boiled’ fiction obliterates the dualism between overt chaos and underlying order, between the perceived messiness of crime and its underlying logic. Chaos becomes all-encompassing, engulfing the sleuth as well as the reader. No longer the epitome of a superior, detached intellect, the detective becomes implicated in the mystery he investigates, enmeshed in a labyrinthine sequence of events whose unraveling does not necessarily produce meaning. As accurately observed by Telotte, “whether [the] characters are trying to manipulate others, or simply hoping to figure out how their plans went wrong, they invariably find that things do not make sense” (7). Both ‘hard-boiled’ fiction and its cinematic progeny implicitly portray the dissolution of social order. In film noir, this thematic pursuit finds a formal equivalent in the disruption of traditional narrative paradigm. As noted by Bordwell and Telotte, among others, the paradigm underpinning classical Hollywood cinema in the years 1917-1960 is characterized by a seemingly objective point of view, adherence to cause-effect logic, use of goal-oriented characters and a progression toward narrative closure (Bordwell 157, Telotte 3). In noir films, on the other hand, the devices of flashback and voice-over implicitly challenge conventionally linear narratives, while the use of the subjective camera shatters the illusion of objective truth (Telotte 3, 20). To revert to the central concern of the present paper, in noir cinema the form coincides with the content. The fictional worlds projected by the ‘hard boiled’ genre and its noir cinematic descendent offer no hidden realm of meaning underneath the chaos of perceived phenomena, and the trope of the labyrinth is stripped of its transcendental, comforting dimension. The labyrinth is the controlling visual metaphor of the Coen Brothers’ neo-noir film The Man Who Wasn’t There (2001). The film’s title refers to its main protagonist: a poker-faced, taciturn barber, by the name of Ed Crane. The entire film is narrated by Ed, incarcerated in a prison cell. He is writing his life story, at the commission of a men’s magazine whose editor wants to probe the feelings of a convict facing death. Ed says he is not unhappy to die. Exonerated of a crime he committed and convicted of a crime he did not, Ed feels his life is a labyrinth. He does not understand it, but he hopes that death will provide the answer. Ed’s final vision of life as a bewildering maze, and his hope of seeing the master-plan after death, ostensibly refer to the inherent dualism of the labyrinth, the notion of underlying order manifest through overt chaos. They offer the flicker of an optimistic closure, which subscribes to the traditional Christian view of the universe as a perfect design, perceived as chaos due to the shortcomings of human comprehension. But this interpretation is belied by the film’s final scene. Shot in blindingly white light, suggesting the protagonist’s revelation, the screen is perfectly empty, except for the electric chair in the center. And when Ed slowly walks towards the site of his execution, he has a sudden fantasy of the overhead lights as the round saucers of UFOs. The film’s visual metaphors ironically subvert Ed’s metaphysical optimism. They cast a view of human life as a maze of emptiness, to borrow the title of one of Borges’s best-known stories. The only center of this maze is death, the electric chair; the only transcendence, faith in God and in after life, makes as much sense as the belief in flying saucers. The Coen Brothers thus simultaneously construct and deconstruct the traditional symbolism of the labyrinth, evoking (through Ed’s innocent hope) its promise of underlying order, and subverting this promise through the images that dominate the screen. The transcendental dimension of the trope of the labyrinth, its promise of a hidden realm of meaning and value, is consistently subverted throughout the film. On the level of plot, the film presents a crisscrossed pattern of misguided intentions and tragi-comic misinterpretations. The film’s protagonist, Ed Crane, is estranged from his own life; neither content nor unhappy, he is passive, taking things as they come. Thus he condones Doris’s, his wife’s, affair with her employer, Big Dave, reacting only when he perceives an opportunity to profit from their liason. This opportunity presents itself in the form of Creighton Tolliver, a garrulous client, who shares with Ed his fail-proof scheme of making big money from the new invention of dry cleaning. All he needs to carry out his plan, confesses Creighton, is an investment of ten thousand dollars. The barber decides to take advantage of this accidental encounter in order to change his life. He writes an anonymous extortion letter to Big Dave, threatening to expose his romance with Doris and wreck his marriage and his financial position (Dave’s wife, a rich heiress, owns the store that Dave runs). Dave confides in Ed about the letter; he suspects the blackmailer is a con man that tried to engage him in a dry-cleaning scheme. Although reluctant to part with the money, which he has been saving to open a new store to be managed by Doris, Big Dave eventually gives in. Obviously, although unbeknownst to Big Dave, it is Ed who collects the money and passes it to Creighton, so as to become a silent partner in the dry cleaning enterprise. But things do not work out as planned. Big Dave, who believes Creighton to be his blackmailer, follows him to his apartment in an effort to retrieve the ten thousand dollars. A fight ensues, in which Creighton gets killed, not before revealing to Dave Ed’s implication in his dry-cleaning scheme. Furious, Dave summons Ed, confronts him with Creighton’s story and physically attacks him. Ed grabs a knife that is lying about and accidentally kills Big Dave. The following day, two policemen arrive at the barbershop. Ed is certain they came to arrest him, but they have come to arrest Doris. The police have discovered that she has been embezzling from Dave’s store (Doris is an accountant), and they suspect her of Dave’s murder. Ed hires Freddy Riedenschneider, the best and most expensive criminal attorney, to defend his wife. The attorney is not interested in truth; he is looking for a version that will introduce a reasonable doubt in the minds of the jury. At some point, Ed confesses that it is he who killed Dave, but Riedenschneider dismisses his confession as an inadequate attempt to save Doris’s neck. He concocts a version of his own, but does not get the chance to win the trial; the case is dismissed, as Doris is found hanged in her cell. After his wife’s death, Ed gets lonely. He takes interest in Birdy, the young daughter of the town lawyer (whom he initially approached for Doris’s defense). Birdy plays the piano; Ed believes she is a prodigy, and wants to become her agent. He takes her for an audition to a French master pianist, who decides that the girl is nothing special. Disenchanted, they drive back home. Birdy tells Ed, not for the first time, that she doesn’t really want to be a pianist. She hasn’t been thinking of a career; if at all, she would like to be a vet. But she is very grateful. As a token of her gratitude, she tries to perform oral sex on Ed. The car veers; they have an accident. When he comes to, Ed faces two policemen, who tell him he is arrested for the murder of Creighton Tolliver. The philosophical purport of the labyrinth metaphor is suggested in a scene preceding Doris’s trial, in which her cocky attorney justifies his defense strategy. To support his argument, he has recourse to the theory of some German scientist, called either Fritz or Werner, who claimed that truth changes with the eye of the beholder. Science has determined that there is no objective truth, says Riedenschneider; consequently, the question of what really happened is irrelevant. All a good attorney can do, he concludes, is present a plausible narrative to the jury. Freddy Riedenschneider’s seemingly nonchalant exposition is a tongue-in-cheek reference to Heisenberg’s uncertainty principle. Succinctly put, the principle postulates that the more precisely the position of a subatomic particle is determined, the less precisely its momentum is known in this instant, and vice versa. What follows is that concepts such as orbits of electrons do not exist in nature unless and until we measure them; or, in Heisenberg’s words, “the ‘path’ comes into existence only when we observe it” (qtd. in Cassidy). Heisenberg’s discovery had momentous scientific and philosophical implications. For one, it challenged the notion of causality in nature. The law of causality assumes that if we know the present exactly, we can calculate the future; in this formulation, suggests Heisenberg, “it is not the conclusion that is wrong, but the premises” (qtd. in Cassidy). In other words, we can never know the present exactly, and on the basis of this exact knowledge, predict the future. More importantly, the uncertainty principle seems to collapse the distinction between subjective and objective reality, between consciousness and the world of phenomena, suggesting that the act of perception changes the reality perceived (Hofstadter 239). In spite of its light tone, the attorney’s confused allusion to quantum theory conveys the film’s central theme: the precarious nature of truth. In terms of plot, this theme is suggested by the characters’ constant misinterpretation: Big Dave believes he is blackmailed by Creighton Tolliver; Ed thinks Birdy is a genius, Birdy thinks that Ed expects sex from her, and Ann, Dave’s wife, puts her faith in UFOs. When the characters do not misjudge their reality, they lie about it: Big Dave bluffs about his war exploits, Doris cheats on Ed and Big Dave cheats on his wife and embezzles from her. And when the characters are honest and tell the truth, they are neither believed nor rewarded: Ed confesses his crime, but his confession is impatiently dismissed, Doris keeps her accounts straight but is framed for fraud and murder; Ed’s brother in law and partner loyally supports him, and as a result, goes bankrupt. If truth cannot be known, or does not exist, neither does justice. Throughout the film, the wires of innocence and guilt are constantly crossed; the innocent are punished (Doris, Creighton Tolliver), the guilty are exonerated of crimes they committed (Ed of killing Dave) and convicted of crimes they did not (Ed of killing Tolliver). In this world devoid of a metaphysical dimension, the mindless processes of nature constitute the only reality. They are represented by the incessant, pointless growth of hair. Ed is a barber; he deals with hair and is fascinated by hair. He wonders how hair is a part of us and we throw it to dust; he is amazed by the fact that hair continues to grow even after death. At the beginning of the film we see him docilely shave his wife’s legs. In a mirroring scene towards the end, the camera zooms in on Ed’s own legs, shaved before his electrocution. The leitmotif of hair, the image of the electric chair, the recurring motif of UFOs – all these metaphoric elements convey the Coen Brothers’ view of the human condition and build up to Ed’s final vision of life as a labyrinth. Life is a labyrinth because there is no necessary connection between cause and effect; because crime is dissociated from accountability and punishment; because what happened can never be ascertained and human knowledge consists only of a maze of conflicting, or overlapping, versions. The center of the existential labyrinth is death, and the exit, the belief in an after-life, is no more real than the belief in aliens. The labyrinth is an inherently ambiguous construct. Its structural attributes of doubling, recursion and inextricability yield a wealth of ontological and epistemological implications. Traditionally used as an emblem of overt complexity concealing underlying order and symmetry, the maze may aptly illustrate the tacit premises of the analytic detective genre. But this purport of the maze symbolism is ironically inverted in noir and neo-noir films. As suggested by its title, the Coen Brothers’ movie is marked by absence, and the absence of the man who wasn’t there evokes a more disturbing void. That void is the center of the existential labyrinth. References Auster, Paul. City of Glass. The New York Trilogy. London and Boston: Faber and Faber, 1990. 1-132. Bordwell, David. Narration in the Fiction Film. Madison: Wisconsin UP, 1985. Cassidy, David. “Quantum Mechanics, 1925-1927.” Werner Heisenberg (1901-1978). American Institute of Physics, 1998. 5 June 2007 http://www.aip.org/history/heisenberg/p08c.htm>. Cazenave, Michel, ed. Encyclopédie des Symboles. Paris: Le Livre de Poche, 1996. Coen, Joel, and Ethan Coen, dirs. The Man Who Wasn’t There. 2001. Doob, Penelope Reed. The Idea of the Labyrinth. Ithaca: Cornell UP, 1992. Hofstadter, Douglas. I Am a Strange Loop. New York: Basic Books, 2007. Holquist, Michael. “Whodunit and Other Questions: Metaphysical Detective Stories in Post-War Fiction.” The Poetics of Murder. Eds. Glenn W. Most and William W. Stowe. New York: Harcourt Brace Jovanovich, 1983. 149-174. Irwin, John T. The Mystery to a Solution: Poe, Borges and the Analytic Detective Story. Baltimore and London: Johns Hopkins UP, 1994. Parandowski, Jan. Mitologia. Warszawa: Czytelnik, 1960. Poe, Edgar Allan. “The Murders in the Rue Morgue.” Edgar Allan Poe: The Complete Illustrated Stories and Poems. London: Chancellor Press, 1994. 103-114. Telotte, J.P. Voices in the Dark: The Narrative Patterns of Film Noir. Urbana: Illinois UP, 1989. Citation reference for this article MLA Style Shiloh, Ilana. "A Vision of Complex Symmetry: The Labyrinth in The Man Who Wasn’t There." M/C Journal 10.3 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0706/09-shiloh.php>. APA Style Shiloh, I. (Jun. 2007) "A Vision of Complex Symmetry: The Labyrinth in The Man Who Wasn’t There," M/C Journal, 10(3). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0706/09-shiloh.php>.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography