Journal articles on the topic 'Microsoft Windows Identity Foundation'

To see the other types of publications on this topic, follow the link: Microsoft Windows Identity Foundation.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 45 journal articles for your research on the topic 'Microsoft Windows Identity Foundation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Oriji, Boniface A., and Iribhogbe Silas Aire. "Model Approach to Analytically Identify Stuck Pipe and Its Mechanism in Wellbore." European Journal of Engineering and Technology Research 5, no. 3 (March 31, 2020): 387–94. http://dx.doi.org/10.24018/ejeng.2020.5.3.1845.

Full text
Abstract:
Stuck pipe incidents translate to non-productive time. There is a need to mitigate stuck pipe incidents which can be achieved by conforming to recommended practices. Also, quick diagnosis is necessary in order to free a stuck pipe. Trial-and-error method can further complicate the situation. This work aims at diagnosing stuck pipe mechanisms and recommend practices to free a stuck pipe. spANALYZE also estimates the axial force and torque needed to free a stuck pipe caused by differential sticking. spANALYZE is a thick desktop client application developed in C# using the Microsoft Visual Studio 2019 development environment. It is an object-oriented .NET application that utilizes the Windows Presentation Foundation (WPF) architecture for its user interface. Each of the analyzers within spANALYZE were implemented generically as a list of nodes, representing the concept of a flow chart. New analyzers can easily be added simply by programmatically defining each node in the flow chart. Each node has a node identifier, a node type, node text, and the node identifiers of each answer – yes, no and restricted. spANALYZE presents the following benefits: quick and early detection of stuck pipe mechanisms, propose recommended action steps to free pipe, calculate stuck pipe depth, compute the torque and axial force needed to free a stuck string.
APA, Harvard, Vancouver, ISO, and other styles
2

Oriji, Boniface A., and Iribhogbe Silas Aire. "A Model Approach to Analytically Identify Stuck Pipe and Its Mechanism in Wellbore." European Journal of Engineering Research and Science 5, no. 3 (March 31, 2020): 387–94. http://dx.doi.org/10.24018/ejers.2020.5.3.1845.

Full text
Abstract:
Stuck pipe incidents translate to non-productive time. There is a need to mitigate stuck pipe incidents which can be achieved by conforming to recommended practices. Also, quick diagnosis is necessary in order to free a stuck pipe. Trial-and-error method can further complicate the situation. This work aims at diagnosing stuck pipe mechanisms and recommend practices to free a stuck pipe. spANALYZE also estimates the axial force and torque needed to free a stuck pipe caused by differential sticking. spANALYZE is a thick desktop client application developed in C# using the Microsoft Visual Studio 2019 development environment. It is an object-oriented .NET application that utilizes the Windows Presentation Foundation (WPF) architecture for its user interface. Each of the analyzers within spANALYZE were implemented generically as a list of nodes, representing the concept of a flow chart. New analyzers can easily be added simply by programmatically defining each node in the flow chart. Each node has a node identifier, a node type, node text, and the node identifiers of each answer – yes, no and restricted. spANALYZE presents the following benefits: quick and early detection of stuck pipe mechanisms, propose recommended action steps to free pipe, calculate stuck pipe depth, compute the torque and axial force needed to free a stuck string.
APA, Harvard, Vancouver, ISO, and other styles
3

Safonov, Vladimir O. "Microsoft Windows communication foundation." ACM SIGSOFT Software Engineering Notes 35, no. 3 (May 11, 2010): 40. http://dx.doi.org/10.1145/1764810.1764835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Castillo, Manuel P., Ali G. Mamaclay, and Jose Arsenio R. Adriano. "The Accountancy Fresh Graduates of Wesleyan University – Philippines in the Light of the Skills Expectations of Industry Partners." Advances in Social Sciences Research Journal 8, no. 10 (October 21, 2021): 146–57. http://dx.doi.org/10.14738/assrj.810.10993.

Full text
Abstract:
Employers consider a graduate's achievements in the relevant discipline to be required but not sufficient for them to be hired. It is essential that we fully understand what future employers will accept and needed. In the past, a graduate degree would ensure the welfare of a student's future. Today, something more different. A mere college diploma is inadequate for an individual to secure a promising future. This study aims to determine the fresh graduates' professional accounting skills and technology skills needed by the company and demonstrated by the accounting graduates. Results of study analysis comprised twenty (20) companies showed that computing techniques, written communication, reporting skills, measurement skills, professionalism, and oral communication are what employers seek. Moreover, companies observed that accounting graduates are more knowledgeable in reporting, research, measurement, finance, strategic and critical thinking skills, and problem-solving skills. Regarding technology skills, companies seek employees knowledgeable in spreadsheet packages, accounting packages (SAP, Pastel, QuickBooks), word processing packages, communication software (Skype, Outlook, Slack), electronic commerce, and the worldwide web. However, accounting graduates possess word processing packages, communication software (skype, outlook, slack), world wide web, electronic commerce, and windows. It was revealed that students must be well-versed in Microsoft Office Applications, as this was the employers' primary skills needed both professional accounting skills and technology skills. These results provide the academicians with useful information. Building fundamentals, becoming competitive and continual development of abilities in accounting needs a tough knowledge foundation. Specializing in a specific area of accounting, such as financial reporting, taxation, or auditing, helps an individual become a highly sought-after professional. In a more distinct framework and profound lens, this study will convey collaborations on how Nueva Ecija industries search to hire new accounting professionals. In detail, the foregoing survey purposes were addressed: to determine the required skills the employers seek from accounting graduates, to identify the more important accountancy graduates' skills, to examine if do companies treat the professional accounting skills similar to technological skills, and to discover if there were any difference on the requirements of employers and the skills demonstrated by accounting graduates.
APA, Harvard, Vancouver, ISO, and other styles
5

Diao, Jie Tao, Jing Guo, Hong Qi Yu, Zhao Lin Sun, Hai Jun Liu, and Hong Shan Nie. "The Implementation of a RAM Disk." Applied Mechanics and Materials 198-199 (September 2012): 672–77. http://dx.doi.org/10.4028/www.scientific.net/amm.198-199.672.

Full text
Abstract:
RAM disk uses the memory of a computer to construct a high speed, high reliable storage space. Though it is useful, there is little information on the development of RAM disk, especially on Microsoft Windows platform. On Windows platform, RAM disk has to be realized though writing Windows drivers. Implement drivers for Windows is a challenging task that only a small group of programmer can handle for many years. Now, with the new Windows Driver Foundation (WDF), this task is much easier. In this paper, Microsoft’s skeleton RAM disk driver in Windows Driver Kit (WDK) was analyzed and modified. At last, a full function, resizable RAM disk driver was got.
APA, Harvard, Vancouver, ISO, and other styles
6

Medhi, Subhash, Abhijit Bora, and Tulshi Bezboruah. "Security Impact on e-ATM Windows Communication Foundation Services using Certificate based Authentication and Protection." International Journal of Information Retrieval Research 6, no. 3 (July 2016): 37–51. http://dx.doi.org/10.4018/ijirr.2016070103.

Full text
Abstract:
The authors proposed to design and implement a prototype research electronic automated teller machine service using Windows Communication Foundation to study the performance and scalability of implementing Web Service Security policy. The software chosen for building the service are C# programming language, Internet Information Service web server, Microsoft Structured Query Language database server and Visual Studio.NET Integrated Design Environment as development toolkits. To evaluate the different performance metrics, the Windows Communication Foundation Service has been tested by using testing tool Mercury LoadRunner, version 8.1. In this paper, the authors will present the architecture of the service, its testing procedures, and statistical analysis of the system performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Ejin, and Hyoung-Kee Choi. "Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild." Security and Communication Networks 2021 (July 23, 2021): 1–13. http://dx.doi.org/10.1155/2021/6245306.

Full text
Abstract:
Windows Hello is a Fast IDentity Online- (FIDO-) based new login system for Windows 10, which provides a single sign-on (SSO) service to diverse online applications. Hardware protection is essential for Window Hello’s security. This paper aims to examine the security of Windows Hello on a device where hardware protection is unavailable. We present the first detailed analysis of Windows Hello’s security. The results show that, on a hardware-unsupported device, the authentication data for Windows Hello is not properly protected. We propose a migration attack to compromise Windows Hello’s security. In the proposed attack, an attacker extracts authentication data from a device to impersonate a victim in his or her Microsoft online account. We consider the possibility of such an attack to be serious and harmful to our society and demand immediate attention for remediation.
APA, Harvard, Vancouver, ISO, and other styles
8

Arboleda Molina, Orlando, and Steven Sotelo. "Construcción de aplicativos de programación por restricciones en Microsoft Solver Foundation y Windows Azure." Scientia et technica 21, no. 4 (December 30, 2016): 336. http://dx.doi.org/10.22517/23447214.11571.

Full text
Abstract:
A nivel empresarial y académico se requiere la construcción de aplicativos para resolver problemas de optimización de restricciones, y que estos puedan ser ofrecidos como servicios en la nube. En el presente artículo se modela y resuelve un problema de optimización de restricciones, correspondiente al problema de transporte, usando para su modelamiento y posterior publicación como servicio en la nube, solo tecnología .Net, aplicable a problemas computacionalmente complejos de restricciones, usando Microsoft Solver Foundation que permite la construcción de poderosos aplicativos genéricos de pocas líneas de código, los cuales pueden ser fácilmente publicados como servicios web en Windows Azure.
APA, Harvard, Vancouver, ISO, and other styles
9

Xi, Cheng, Tan Chao, and Ling Lu. "Designation of Monitoring System with Multi-Touch Based on Configuration Software and Windows Presentation Foundation." Advanced Materials Research 756-759 (September 2013): 218–22. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.218.

Full text
Abstract:
The monitoring system developed by traditional configuration software is extensively used in the industrial field, and application of keyboard & mouse and single-touch is the main operation mode. The multi-touch is a fresh human-computer interaction mode, which can provide the user with safer and more convenient operation experience. This design takes configuration software ControlEase (INSPEC) based on .Net framework in WINDOWS7 as development platform, and next-generation Microsoft graphics system development software WPF (Windows Presentation Foundation) is selected as development tools. WPF multi-touch control is realized based on .NET 4.0, which can be appropriately embedded in various kinds of the configuration software that run on different platforms. WPF multi-touch software frame is accomplished, which can combine with varieties of configuration software to make common configuration software in industrial application creatively own multi-touch functions.
APA, Harvard, Vancouver, ISO, and other styles
10

Ledesma, Sergio, Gustavo Cerda-Villafana, Donato Hernández Fusilier, and Miguel Torres Cisneros. "An OOP Approach to Simplify MDI Application Development." Acta Universitaria 19, no. 1 (April 1, 2009): 51–60. http://dx.doi.org/10.15174/au.2009.120.

Full text
Abstract:
The Multiple Document Interface (MDI) is a Microsoft Windows specification that allows managing multiple documents using a single graphic interface application. An MDI application allows opening several documents simultaneously. Only one document is active at a particular time. MDI applications can be deployed using Win32 or Microsoft Foundation Classes (MFC). Programs developed using Win32 are faster than those using MFC. However, Win32applications are difficult to implement and prone to errors. It should be mentioned that, learning how to properly use MFC to deploy MDI applications is not simple, and performance is typically worse than that of Win32 applications. A method to simplify the development of MDI applications using Object-Oriented Programming (OOP) is proposed. Subsequently, it is shown that this method generates compact code that is easier to read and maintain than other methods (i.e., MFC). Finally, it is demonstrated that the proposed method allowsthe rapid development of MDI applications without sacrificing application performance.
APA, Harvard, Vancouver, ISO, and other styles
11

Medhi, Subhash, Abhijit Bora, and Tulshi Bezboruah. "Investigations On Some Aspects of Reliability of Content Based Routing SOAP based Windows Communication Foundation Services." International Journal of Information Retrieval Research 7, no. 1 (January 2017): 17–31. http://dx.doi.org/10.4018/ijirr.2017010102.

Full text
Abstract:
The web services have emerged as a web based matured and popular technology paradigm. Due to increasing popularity, the reliability assurance and prediction have acquired more attentions to the developers, researchers and service providers. In this paper, the authors propose to design, develop and implement a service oriented prototype research electronic automated teller machine service using Windows Communication Foundation technology to study and predict some reliability aspects of web services. One master service is designed to authenticate a particular user to access services that is acting as a service broker and redirects the query to content service executing agents, acting as a service provider. The system has been implemented using C# programming language, Visual Studio.NET framework, Internet Information Service web server and Microsoft Structured Query Language database server. The authors present here the novel prototype architecture, testing procedures, HTTP transactional status and reliability analysis of the system under massive stress of consumers.
APA, Harvard, Vancouver, ISO, and other styles
12

Qur'ana, Tri Wahyu, Al Fath Riza Kholdani, and Hayati Noor. "Pelatihan Merakit dan Instalasi Laptop/Komputer pada Santri Yayasan Pendidikan Islam Pondok Pesantren Wali Songo Banjarbaru." PengabdianMu: Jurnal Ilmiah Pengabdian kepada Masyarakat 5, no. 4 (September 26, 2020): 383–87. http://dx.doi.org/10.33084/pengabdianmu.v5i4.1270.

Full text
Abstract:
Assembling a computer is a stage of bringing together the components needed to run correctly. To understand the correct computer assembly process, an understanding of computer hardware is required both logically and physically. Meanwhile, so that the computer can be operated according to its function, it is necessary to install it. Computer installation is installing a program (software) into a computer. All software (e.g., Microsoft Windows, Microsoft Office, and others) apart from that, also install functions to match the program with the tools installed on the computer and parse the compressed files. The expertise in assembling and installing laptops/computers can make a creative economy business field based on information technology. The Islamic Education Foundation of Wali Songo Islamic Boarding School is an Islamic religious, educational institution. Santri, as the nation's next-generation youth, needs to understand and have skills in assembling and installing laptops/computers, not only as passive users but also being active, the other side can also be used as part of driving the creative economy.
APA, Harvard, Vancouver, ISO, and other styles
13

Manusmare, Rutuja Pramod, and Tulasiprasad Sariki. "XTREAMS TOOLKIT UI DEVELOPMENT ON MICROSOFT WPF TECHNOLOGY." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 449. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.20508.

Full text
Abstract:
This project is a software application that runs with the station controller. When an error appears at the station controller it triggers a response flow checklist (RFC). An RFC is a troubleshooting procedure that helps you fix problems in manufacturing. A RFC is a series of instructions you define to help a manufacturing technician troubleshoot an equipment-related problem while processing. Trigger is a combination of micro-conditions. When a trigger occurs XTREAMS system automatically, it retrieves the RFC associated with that trigger. Authoring is the process of creating RFCs using the XTREAMS authoring tool. One can use the XTREAMS authoring tool to create RFC flow diagrams that the XTREAMS execution tool will display as step-by-step instructions for the RFC user. During running of a tool if the equipment is not ok, there could be multiple reasons or causes (C1, C2). These causes could be isolated by running a pre-defined checklist, that is, RFC. After the RFC and the triggers than are associated are approved using the XTREAMS Authoring Application the contents are send over to the various Intel Sites which are XTREAMS enabled. The toolkit that is provided with XTREAMS product provides one a unique capability to translate the received RFC contents to geo-specific languages so that the RFCs are relevant for the users of that particular geo. The aim here is the XTREAMS toolkit UI development on Microsoft Windows Presentation Foundation Technology so as to make it even more efficient and reliable, also which will set it free for unit tests to be performed appropriately. The MVVM framework has been followed for the purpose of development.
APA, Harvard, Vancouver, ISO, and other styles
14

Jha, Rohitkumar, Donald Laishram, Nishma Kamat, Om Panchal, and Prof Salabha Jacob. "Implementing SIEM(Security Information and Environment Management) in Microsoft Azure." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 5608–16. http://dx.doi.org/10.22214/ijraset.2024.61367.

Full text
Abstract:
Abstract: In an increasingly interconnected and digital world, the need for robust cybersecurity measures is paramount. Cyberattacks can therefore occur upon any device at any moment of time in order to steal the sensitive information of the user or can result in identity theft and cyberbullying. There are varieties of attacks that may occur without the user being aware about the same that their computer has been attacked and the hacker has overall access of their data. Also, a user cannot sit in front of their device throughout their life to monitor and protect any type of cyberattack. Therefore, in order to solve the following problems and to enhance the overall security and accuracy of safeguarding the device and its data, we implement our project Security Information and Environment Management (SIEM) system within the Microsoft Azure cloud ecosystem. SIEM plays a critical role in monitoring, detecting, and responding to security threats, making it a crucial component of any organization's cybersecurity strategy. To view the notification of the attack for a user and all its details, we therefore connect the SIEM implementations and logs over Microsoft Azure platform, and generate the same with the help of a command-shell Windows PowerShell.
APA, Harvard, Vancouver, ISO, and other styles
15

Paventhan, A., Kenji Takeda, Simon J. Cox, and Denis A. Nicole. "Federated Database Services for Wind Tunnel Experiment Workflows." Scientific Programming 14, no. 3-4 (2006): 173–84. http://dx.doi.org/10.1155/2006/729069.

Full text
Abstract:
Enabling the full life cycle of scientific and engineering workflows requires robust middleware and services that support effective data management, near-realtime data movement and custom data processing. Many existing solutions exploit the database as a passive metadata catalog. In this paper, we present an approach that makes use of federation of databases to host data-centric wind tunnel application workflows. The user is able to compose customized application workflows based on database services. We provide a reference implementation that leverages typical business tools and technologies: Microsoft SQL Server for database services and Windows Workflow Foundation for workflow services. The application data and user's code are both hosted in federated databases. With the growing interest in XML Web Services in scientific Grids, and with databases beginning to support native XML types and XML Web services, we can expect the role of databases in scientific computation to grow in importance.
APA, Harvard, Vancouver, ISO, and other styles
16

Tahir, Fouad Sh, Ayad M. Salman, Jabbar K. Mohammed, and Wahab K. Ahmed. "Data Acquisition System for Wind Speed, Direction and Temperature Measurements." Journal of Engineering 18, no. 11 (July 22, 2023): 1229–41. http://dx.doi.org/10.31026/j.eng.2012.11.03.

Full text
Abstract:
This paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation classes (MFC) is the fundamental tool for windows programming. It has been used to build a Man-Machine Interface (MMI), which was used for processing and monitoring acquisition data from environment weather.
APA, Harvard, Vancouver, ISO, and other styles
17

Rosita, Yesy Diah, Ronny Makkhfuddin Akbar, Mimin Fatchiyatur Rohmah, and Luki Ardiantoro. "PENINGKATAN SKILL GURU UNTUK PEMBUATAN GOOD PRESENTATION DI YAYASAN PENDIDIKAN MAMBAUL ULUM, KABUPATEN MOJOKERTO." SELAPARANG: Jurnal Pengabdian Masyarakat Berkemajuan 6, no. 2 (June 5, 2022): 784. http://dx.doi.org/10.31764/jpmb.v6i2.8443.

Full text
Abstract:
ABSTRAKPeran guru di dunia pendidikan sangat penting dalam masa depan bangsa. Guru tidak hanya mengajar namun juga mendidik siswa untuk menjadi pribadi yang tidak hanya cerdas namun memiliki akhlak yang baik. Adanya pandemi covid-19 memberikan dampak positif bagi guru meskipun juga memiliki dampak negatif dengan banyak jumlah korban yang meninggal akibat Covid-19 sejak tahun 2020. Dampak positifnya bagi guru adalah secara tidak langsung memaksa guru untuk lebih kreatif dalam penyajian materi pembelajaran kepada siswa. Aplikasi pembuatan materi pembelajaran sangatlah variatif namun masing-masing memiliki kelemahan dan kelebihannya. Aplikasi Micosoft Power Point merupakan aplikasi yang paling umum dan hampir tersedia di seluruh sistem operasi Windows. Guru SMK Grafika di Yayasan Pendidikan Mambaul Ulum Kabupaten Mojokerto bekerjasama dengan Program Studi Teknik Informatika-Universitas Islam Majapahit untuk mengadakan kegiatan workshop tentang pembuatan materi pembelajaran yang memiliki nilai good presentation dalam rangka upaya untuk meningkatkan pengetahuan guru dan keahlian (skill) dalam hal tersebut. Berdasarkan hasil pre-test dan post-test serta produk materi pembelajaran yang dihasilkan tingkat pengetahuan para guru SMK Grafika tentang penggunaan Micorosoft Power Point dalam pembuatan materi pembelajaran mencapai 56.43% dan produk yang dihasilkan dalam kategori baik. Hal ini menunjukkan bahwa dengan adanya workshop dapat membantu menyelesaikan permasalahan yang dihadapi oleh para guru SMK Grafika. Kata kunci: covid-19; materi pembelajaran; microsoft power point. ABSTRACTThe role of teachers in education is very important in the future of the nation. Teachers not only teach but also educate students to become individuals who are not only intelligent but have good morals. The existence of the covid-19 pandemic has had a positive impact on teachers although it also has a negative impact with a large number of victims who have died from Covid-19 since 2020. The positive impact for teachers is that it indirectly forces teachers to be more creative in presenting learning materials to students. Applications for making learning materials are very varied, but each has its advantages and disadvantages. The Microsoft Power Point application is the most common application and is almost available on all Windows operating systems. Graphics Vocational School teachers at the Mambaul Ulum Education Foundation, Mojokerto Regency in collaboration with the Informatics Engineering Study Program-Majapahit Islamic University to hold a workshop on making learning materials that have good presentation values in an effort to increase teacher knowledge and skills in this regard. Based on the results of the pre-test and post-test as well as the learning material products produced, the level of knowledge of the Graphic Vocational High School teachers about the use of Microsoft Power Point in making learning materials reached 56.43% and the resulting product was in a good category. This shows that the existence of a workshop can help solve the problems faced by the Graphic Vocational High School teachers. Keywords: covid-19; learning materials; microsoft power point.
APA, Harvard, Vancouver, ISO, and other styles
18

Isman, Reza Kamaluddin, Desi Dyah Sulistyarini, and Prihatin Oktivasari. "RANCANG BANGUN APLIKASI BARANG JASA MENGGUNAKAN C#, WPF, DAN SQL SERVER 2012." Jurnal Teknologi Informasi dan Terapan 4, no. 1 (March 13, 2019): 53–60. http://dx.doi.org/10.25047/jtit.v4i1.22.

Full text
Abstract:
Barang Jasa is an application that used for Divisi Pengadaan Barang dan Jasa. Barang Jasa serves to record every purchase of goods and services used to meet the needs of both fleet and crew in the long term. Barang Jasa also serves to make the Nota Dinas to be processed by Divisi Keuangan on the purchase of goods and services that have been performed. This application was created by using Windows Presentation Foundation (WPF), which is a Microsoft technology to create desktop applications. This application was made using the method protoyping development,C# as a programming language, WPF as a interface design technology, and SQL Server 2012 as the database. WPF can present the appearance that can be tailored to user needs. This study discusses the interface, backend applications, and database design. After testing the flexibility of the interface on the screen with a resolution of 1366 x 768, 1024 x 768 and 1280 x 720, proves that WPF can adjust the screen resolution being tested. The test results showed that the backend of Barang Jasa application are functioning properly, the test is done using sql query by entering the required parameters, for example username and password to log in and match the query returns results with what is displayed by the application.
APA, Harvard, Vancouver, ISO, and other styles
19

Leal Neto, Viriato, José Wilson Vieira, and Fernando Roberto de Andrade Lima. "Aplicativo para dosimetria interna usando a distribuição biocinética de fótons baseada em imagens de medicina nuclear." Radiologia Brasileira 47, no. 5 (October 2014): 275–82. http://dx.doi.org/10.1590/0100-3984.2013.1744.

Full text
Abstract:
Objetivo: Este artigo apresenta uma forma de se obterem estimativas de dose em pacientes submetidos a tratamentos radioterápicos a partir da análise das regiões de interesse em imagens de medicina nuclear. Materiais e Métodos: Foi desenvolvido o software denominado DoRadIo (Dosimetria das Radiações Ionizantes), que recebe as informações sobre os órgãos fontes e o órgão alvo e retorna resultados gráficos e numéricos. As imagens de medicina nuclear utilizadas foram obtidas de catálogos disponibilizados por físicos médicos. Nas simulações utilizaram-se modelos computacionais de exposição constituídos por fantomas de voxels acoplados ao código Monte Carlo EGSnrc. O software foi desenvolvido no Microsoft Visual Studio 2010 com o modelo de projeto Windows Presentation Foundation e a linguagem de programação C#. Resultados: Da aplicação das ferramentas foram obtidos: o arquivo para otimização das simulações Monte Carlo utilizando o EGSnrc, a organização e compactação dos resultados dosimétricos com todas as fontes, a seleção das regiões de interesse, a contagem da intensidade dos tons de cinza nas regiões de interesse, o arquivo das fontes ponderadas e, finalmente, todos os resultados gráficos e numéricos. Conclusão: A interface de usuários pode ser adaptada para uso em clínicas de medicina nuclear como ferramenta computacional auxiliar na estimativa da atividade administrada.
APA, Harvard, Vancouver, ISO, and other styles
20

Y.kraidi, Aaras Y., and A. Rajalingam. "Improvement and Enhancement of bandwidth of 5G Networks using Machine Learning." International Journal of Wireless and Ad Hoc Communication 2, no. 2 (2021): 68–76. http://dx.doi.org/10.54216/ijwac.020205.

Full text
Abstract:
Radio-frequency-based systems are exhibiting severe bandwidth congestion as a result of the exponential development in the amount of data flow. Both cognitive radio technology and free-space-optical communication are examples of attempts to find solutions to the problems posed by high data rates and limited spectral bandwidth. Operating an optical wireless transmission system does not need the purchase of a license. Additionally, the accommodation of unlicensed users across the restricted frequency that is accessible to us is the foundation of the technology known as cognitive radio. Since Dynamic-Window Size systems do not need a license, they are very cost-effective, they can be readily deployed, and they provide a high bandwidth; hence, Dynamic-Window Size systems may be used to bridge with the existing Radio Frequency system. Within the framework of the proposed Dynamic-Window-Size system, the Radio Frequency link is modeled based on the Rayleigh distribution, whilst the Dynamic-Window-Size link experiences -IG composite fading. It is possible to determine both the moment-generating function (MGF) and its derivative. By making use of the formulas that were derived from them, various performance metrics, such as ergodic channel capacity, bit error rate (BER), and output power are calculated, along with the validations that are provided by asymptotic findings. In addition to this, a new closed-form identity is discovered that relates to a specific instance of Bessel's function. In addition to the convex optimization that was mentioned above for the purpose of optimizing the overlay and underlay power in the scheme that was presented, the performance of the Cognitive Radio network is evaluated by making use of a variety of pulse-shaping windows. Suppressing the side lobes of the primary users' (PUs') sub-carriers is a way to reduce the amount of interference that primary users cause for secondary users without harming the primary users' own transmissions. This study involves the creation of a variety of pulse-shaping windows across a variety of power allocation systems as well as an examination of how these windows compare to one another.
APA, Harvard, Vancouver, ISO, and other styles
21

Umar, Muhammad Zakaria, and La Ode Abdul Rachmad Sabdin Andisiri. "Identifikasi Koeksistensi Arsitektural pada Rumah Tradisional Walaka dan Bangunan DPRD di Kota Baubau." EMARA: Indonesian Journal of Architecture 4, no. 1 (August 9, 2018): 30–36. http://dx.doi.org/10.29080/emara.v4i1.221.

Full text
Abstract:
Coexistence in architecture was considered as the process of cooperation between two or more different architectural styles and synergized each others. The Old Buton society consists of Kaomu, Walaka, Maradika, and Batua. The social stratification system in Buton society was reflected in its dwelling. In the architectural context, various attempts to rediscover the identity in each of his work were very pronounced, with varying results. The study was aimed to identified coexistence between Walaka’s house and parliament building using a comparative causal approach. The results concluded that the coexistence between the Walaka’s houses and parliament building could be found in the form of philosophical, meanings, symbols, function on the modified floor plan, view, and sections.The coexistence between the house of Walaka’s with govermental position and parliament building could not be found between under the Walaka’s house and the parliament building foundation, tangkebala sasambiri and overstek console at parliament building and the Walaka’s box-shaped pabate and the overstek console from parliament building. The philosophical coexistence was also not founded between wide large and latticed windows at Walaka’s house with ones at parliament building, the Walaka’s bosu bosu and the overstek console without ornament at parliament building, as well as the Walaka’s double-decker roof and the parliament’s double-decker roof.
APA, Harvard, Vancouver, ISO, and other styles
22

Kerr, Cheryl, and Lotte Darso. "Case Study: Art and business for European identity: Illustrating meaningful evolutions in business through classical masterpieces of music." Journal of Management & Organization 14, no. 5 (November 2008): 588–92. http://dx.doi.org/10.1017/s1833367200003060.

Full text
Abstract:
We end this special issue with a case study (Darsø 2004) of how Miha Pogacnik, virtuoso violinist and cultural ambassador of Slovenia, works to inspire and engage artful behaviour. Miha's interpretations of musical masterpieces illuminate universal human archetypes, which are profoundly meaningful to individuals as well as to organisations.Music reaches of all the arts the most, the deepest into our experience.Miha PogacnikAt a time when pressures for change are at their highest, from globalisation, new technologies, product and process innovations, successful business leaders need to be at their creative best just to survive. Creativity is the hallmark of art, and artists are increasingly a source of inspiration for entrepreneurs world-wide.Miha Pogacnik's unique contribution stems from this new consciousness, the need for creativity, imagination and perfection in business. Time after time, his input in countless business conferences has been magnificent, unexpected and unique. Through music and art, Miha Pogacnik ignites a new force in us, the power of rising above our old selves in perceiving problems and opportunities in an entirely new light, and thus striking in new directions. Miha is truly at the leading edge of business as we move towards the 21st century.Marcello Palazzi, Co-Founder & Executive Director, Progressio Foundation Rotterdam, Netherlands (Balough 1996)Miha Pogacnik saw the potential of Art & Business long before anyone else and has worked in the field for more than 20 years. Today Miha Pogacnik uses his violin to decompose and play classical masterpieces when doing his presentations around the world as a business consultant with, among others, ABN AMRO Bank, General Electric, JP Morgan, Hewlett-Packard, IBM, Microsoft, LEGO, Mitsubishi, Nike, Nokia, Novartis, Procter & Gamble, Shell, Volvo, World Bank, World Economic Forum, and many more.
APA, Harvard, Vancouver, ISO, and other styles
23

Kerr, Cheryl, and Lotte Darso. "Case Study: Art and business for European identity: Illustrating meaningful evolutions in business through classical masterpieces of music." Journal of Management & Organization 14, no. 5 (November 2008): 588–92. http://dx.doi.org/10.5172/jmo.837.14.5.588.

Full text
Abstract:
We end this special issue with a case study (Darsø 2004) of how Miha Pogacnik, virtuoso violinist and cultural ambassador of Slovenia, works to inspire and engage artful behaviour. Miha's interpretations of musical masterpieces illuminate universal human archetypes, which are profoundly meaningful to individuals as well as to organisations.Music reaches of all the arts the most, the deepest into our experience.Miha PogacnikAt a time when pressures for change are at their highest, from globalisation, new technologies, product and process innovations, successful business leaders need to be at their creative best just to survive. Creativity is the hallmark of art, and artists are increasingly a source of inspiration for entrepreneurs world-wide.Miha Pogacnik's unique contribution stems from this new consciousness, the need for creativity, imagination and perfection in business. Time after time, his input in countless business conferences has been magnificent, unexpected and unique. Through music and art, Miha Pogacnik ignites a new force in us, the power of rising above our old selves in perceiving problems and opportunities in an entirely new light, and thus striking in new directions. Miha is truly at the leading edge of business as we move towards the 21st century.Marcello Palazzi, Co-Founder & Executive Director, Progressio Foundation Rotterdam, Netherlands (Balough 1996)Miha Pogacnik saw the potential of Art & Business long before anyone else and has worked in the field for more than 20 years. Today Miha Pogacnik uses his violin to decompose and play classical masterpieces when doing his presentations around the world as a business consultant with, among others, ABN AMRO Bank, General Electric, JP Morgan, Hewlett-Packard, IBM, Microsoft, LEGO, Mitsubishi, Nike, Nokia, Novartis, Procter & Gamble, Shell, Volvo, World Bank, World Economic Forum, and many more.
APA, Harvard, Vancouver, ISO, and other styles
24

Masniati Murni Ritonga and Roni Juliansyah. "English Teachers Teaching Models In English Class." Sintaksis : Publikasi Para ahli Bahasa dan Sastra Inggris 2, no. 1 (March 2, 2024): 269–79. http://dx.doi.org/10.61132/sintaksis.v2i1.438.

Full text
Abstract:
The quality of learning depends on the instructor, serving as a basic calculate in deciding its adequacy. This think about points to create a educator competency show through Lesson Consider (LS) exercises. Show competence alludes to the direction of Indonesian Service of Instruction and Culture No 6565 in 2020. This consider connected the subjective graphic inquire about plan. It utilized the lesson consider approach in creating EFL teacher's proficient information competence, proficient learning hone competence, and career proficient advancement. The members included four EFL Instructors at Senior Tall School 10 Ternate City Indonesia. They comprised of one male and three females. Four EFL instructors were chosen through purposive examining with four criteria: (a) sex, (b) age, (c) instructing encounter (d) instructive foundation, and, (e) work status. Moreover, the think about information were gotten through three LS stages (arrange, teach/do, and reflect/see) for four cycles. A 4-point Likert scale ((1=Thriving; 2= Competent; 3 = Worth; and 4 = progressed) was utilized to degree lesson consider profile perspectives on the improvement of EFL Teachers' Demonstrate competencies and it is an impact on students' communication and basic considering abilities. Information was picked up by a 4-point Likert scale calculated with recurrence and introduction equation through Microsoft Exceed expectations Windows 10. The result appeared that LS exercises affected the improvement of information competencies, proficient learning hones, and proficient advancement of EFL instructors in learning English. It too moves forward communication, basic considering, and understudy excitement for English learning in lesson. This consider gives openings for instructors to share information, great learning hones, and encounter, as well as reflect and learn to collaborate professionally. This think about speaks to a oneof a kind commitment by joining three models of educator competence as an exertion to alter the Autonomous Educational programs.
APA, Harvard, Vancouver, ISO, and other styles
25

Newton, Peter F. "Croplanner: A Stand Density Management Decision-Support Software Suite for Addressing Volumetric Yield, End-Product and Ecosystem Service Objectives When Managing Boreal Conifers." Forests 12, no. 4 (April 7, 2021): 448. http://dx.doi.org/10.3390/f12040448.

Full text
Abstract:
The objectives of this study were to develop a stand density management decision-support software suite for boreal conifers and demonstrate its potential utility in crop planning using practical deployment exemplifications. Denoted CPDSS (CroPlanner Decision-support Software Suite), the program was developed by transcribing algorithmic analogues of structural stand density management diagrams previously developed for even-aged black spruce (Picea mariana (Mill) BSP.) and jack pine (Pinus banksiana Lamb.) stand-types into an integrated software platform with shared commonalities with respect to computational structure, input requirements and generated numerical and graphical outputs. The suite included 6 stand-type-specific model variants (natural-origin monospecific upland black spruce and jack pine stands, mixed upland black spruce and jack pine stands, and monospecific lowland black spruce stands, and plantation-origin monospecific upland black spruce and jack pine stands), and 4 climate-sensitive stand-type-specific model variants (monospecific upland black spruce and jack pine natural-origin and planted stands). The underlying models which were equivalent in terms of their modular structure, parameterization analytics and geographic applicability, were enabled to address a diversity of crop planning scenarios when integrated within the software suite (e.g., basic, extensive, intensive and elite silvicultural regimes). Algorithmically, the Windows® (Microsoft Corporation, Redmond, WA, USA) based suite was developed by recoding the Fortran-based algorithmic model variants into a collection of VisualBasic.Net® (Microsoft Corporation, Redmond, WA, USA) equivalents and augmenting them with intuitive graphical user interfaces (GUIs), optional computer-intensive optimization applications for automated crop plan selection, and interactive tabular and charting reporting tools inclusive of static and dynamic stand visualization capabilities. In order to address a wide range of requirements from the end-user community and facilitate potential deployment within provincially regulated forest management planning systems, a participatory approach was used to guide software design. As exemplified, the resultant CPDSS can be used as an (1) automated crop planning searching tool in which computer-intensive methods are used to find the most appropriate precommercial thinning, commercial thinning and (or) initial espacement (spacing) regime, according to a weighted multivariate scoring metric reflective of attained mean tree size, operability status, volumetric productivity, and economic viability, and a set of treatment-related constraints (e.g., thresholds regarding intensity and timing of thinning events, and residual stocking levels), as specified by the end-user, or (2) iterative gaming-like crop planning tool where end-users simultaneously contrast density management regimes using detailed annual and rotational volumetric yield, end-product and ecological output measures, and (or) an abbreviated set of rotational-based performance metrics, from which they determine the most applicable crop plan required for attaining their specified stand-level objective(s). The participatory approach, modular computational structure and software platform used in the formulation of the CPDSS along with its exemplified utility, collectively provides the prerequisite foundation for its potential deployment in boreal crop planning.
APA, Harvard, Vancouver, ISO, and other styles
26

McCarthy, R., P. Cleary, and L. J. Sahm. "515 Pharmacy Students’ Experiences of Discrimination during Experiential Learning Placement - a quantitative survey." International Journal of Pharmacy Practice 31, Supplement_1 (April 1, 2023): i46. http://dx.doi.org/10.1093/ijpp/riad021.054.

Full text
Abstract:
Abstract Introduction Discrimination in the workplace is defined by the Irish Human Rights and Equality Commission as ‘less favourable treatment’ than another employee in a comparable setting (1). When pharmacy students undertake experiential learning placements (ELP), they become part of the workplace and therefore potential candidates for exposure to discrimination. This study aimed to assess the student learning experience on ELP in line with the values of Equality, Diversity and Inclusion (EDI) of University College Cork. Aim This study investigated if pharmacy students experienced discrimination during ELP with a focus on EDI. The prevalence and types of discrimination encountered were also examined. Methods A 20-item quantitative survey was created on MS forms relating to differing areas of discrimination including age, gender, appearance, sexual identity, race/ethnic origin, or English language proficiency. Of the 20 items, 14 were binary with yes/no responses, 6 were demographics. A free text box for additional comments was included. This survey was emailed to 3rd, 4th, and 5th year pharmacy students. All data obtained from the survey was entered into Microsoft Excel (IBM Corporation) for descriptive statistics which included percentages and frequencies. Further statistical analysis was undertaken using SPSS version 28 (2). Chi-squared test were undertaken as appropriate and a p ≤ 0.05 was considered statistically significant. Results Of 201 students, 84 completed the survey (response rate=41.8%), 72.6% (n=61) were female, 27.4% (n=23) male, 83.3% (n=70) identified as heterosexual. 52.4% (n=44) of respondents were aged 21-22 years. 53.6% (n=45) were in 3rd year. Almost two in five (39.3%, n=33) reported experiencing at least one incident of discrimination while on ELP. A total of 7.1% (n=6) reported gender discrimination and discrimination based on appearance, of which 2 in 3 were female (66%, n=4). No student reported racial discrimination. Age discrimination had the highest incidence, with 19% (n=16) of students reporting experiences of discrimination based on age. A Chi-squared test of independence was performed to investigate the association between age and discrimination based on age. The results showed that there was no statistically significant association between these two variables, X2 (4, N=84) = 2.5, p= 0.664. Conclusion Pharmacy students report experiencing discrimination on their ELP. Discrimination can have a negative impact on mental health; therefore, efforts are needed to reduce its prevalence. Students should receive awareness training and encouragement to report episodes of discrimination. Preceptors may also benefit from training in how to support students experiencing discrimination. Limitations of the study are the small sample size and single study site. References 1. Irish Human Rights and Equality Commission [Internet]. Citizensinformation.ie. 2022 [cited 16 January 2022]. Available from: https://www.citizensinformation.ie/en/justice/law_and_rights/irish_human_rights_commission.html 2. IBM Corp. Released 2021. IBM SPSS Statistics for Windows, Version 28.0. Armonk, NY: IBM Corp
APA, Harvard, Vancouver, ISO, and other styles
27

Chan, Rachel Suet Kay. "Cities and Culture:." Asia Proceedings of Social Sciences 4, no. 1 (April 18, 2019): 115–17. http://dx.doi.org/10.31580/apss.v4i1.586.

Full text
Abstract:
Research HighlightsIn the quest to develop cities for the long run, the debate is whether to retain elements of culture or to reinvent such spaces for new uses. Cultural heritage preservation thus becomes an issue in urban planning, particularly in developing countries including Malaysia (Mohd Shakir Tamjes et al, 2017). Scholars mention that Kuala Lumpur needs to create a distinctive city identity and image if it is to achieve its bigger goal of becoming a World-Class City by 2020 (Mohamad Asri Ibrahim et al, 2017). A question raised by researchers is whether the policies to safeguard heritage buildings in Kuala Lumpur is comparable to the practices in UNESCO heritage sites such as Malacca and Georgetown (Mohd Shakir Tamjes et al, 2017). Through participant observation, combining focus group discussions, content analysis, photography, and videography, I outline how the preservation of one particular historical building, a Chinese clan association, increases the cultural value of the city’s surroundings in Kuala Lumpur, as well as being a major tourist attraction. This makes the case for the continued retention of historical buildings and practices, despite overarching social changes such as super-diversity (Vertovec, 2007). Research Objectives This paper makes the case for preserving a particular heritage building, namely the Chan See Shu Yuen Clan Association Kuala Lumpur & Selangor (CSSYKL), a clan association, pre-war historical site, and tourist attraction. Methodology How does the preservation of CSSYKL increase the cultural value of the city’s surroundings in Kuala Lumpur? This research question is answered through fieldwork by the project leader through participant observation which included photography, videography, content analysis of secondary documents, and focus group discussions with clan leaders and members. Photographic evidence is provided to argue for the case of enriching place attachment through the retention of meaning for inhabitants of Kuala Lumpur, due to the special nature it possesses. For example, Monnet (2014) conducted a photoethnography of urban space in the form of a multimedia essay, referring to the “production of data” rather than the “collection of data”. Monnet (2014) explained that images and sounds allow for attentive observation of the smallest details of daily life, and that the ethnographer experientially chooses to interpret and define what should be recorded in their photography - hence the “production of data”. This renders photographic evidence the best form of data for the case of cultural heritage preservation within the urban. Photographs were also harvested from stills captured in Google Maps under the Street View, where the journey was screen captured using Game DVR, a software which comes enclosed with Microsoft Windows 10. Results The photographic evidence shows how the preservation of cultural heritage buildings add character to the presence of Kuala Lumpur Chinatown, or Petaling Street. In the case of CSSYKL, it provides the historical elements as well as familiarity given its longstanding association with Kuala Lumpur’s history, and thus evokes the symbolic aesthetic. It provides symbolic aesthetic meaning to the future of Kuala Lumpur’s development and enriches the local cultural expression in league with the Malaysian National Cultural Policy. Ultimately, it guarantees that no matter how developed or industrialised Kuala Lumpur is, what with the move into the Fourth Industrial Revolution and the Internet of Things, there will still be cultural meaning and place attachment resonant within the heart and soul of Kuala Lumpur. Even in the face of super-diversity, the clan association building will still reinvent itself as a place of attachment not only to those of Chinese descent but to all who are interested to appreciate its value. Findings Chan See Shu Yuen Clan Association Kuala Lumpur & Selangor (CSSYKL) is one example of a historical building which functioned not only in the past as a community centre for the Chinese who migrated to Malaya in search of economic opportunity, but still retains its functions today as a gateway to maintaining links with Mainland China, especially in the economic dimension. Simultaneously, the heritage building also attracts tourists from all around the world, including those from China and local tourists themselves. Acknowledgement This research work is supported by the Ministry of Education of Malaysia under Grant Number FRGS/1/2018/WAB12/UKM/02/1 (Superdiversity Networks: Cantonese Clan Associations in Malaysia as Transnational Social Support System).
APA, Harvard, Vancouver, ISO, and other styles
28

Sandeep, Velicheti, Vankineni Srikanth, Kondrugunta Chandra Sekhar, Balije Swetha, and Vallabhaneni Jagadeep. "Incidentalomas Discovered during COVID- 19 Chest CT Screening: A Cross-sectional Study from Andhra Pradesh, India." INTERNATIONAL JOURNAL OF ANATOMY RADIOLOGY AND SURGERY, 2023. http://dx.doi.org/10.7860/ijars/2023/58724.2870.

Full text
Abstract:
Introduction: The highly contagious Coronavirus Disease 2019 (COVID-19) virus has spread across the globe. For the aberrant changes in the lung parenchyma, thin-section chest Computed Tomography (CT) is more sensitive than chest radiography and can identify early disease. Increased CT usage and resolution also lead to an increase in the discovery of "incidental" findings, creating questions about additional research, diagnosis, and follow-up with associated financial and emotional costs. Aim: To evaluate the non COVID-19 lung pathologies and other system findings in High Resolution Computed Tomography (HRCT) chest done for COVID-19 screening study. Materials and Methods: This was a cross-sectional study done in the Department of Radiodiagnosis at Dr.Pinnamaneni Siddhartha Institute of Medical Sciences and Research Foundation, Vijayawada, Andhra Pradesh, India, from May 2021 to December 2021. The CT scan was done in a craniocaudal direction with an average exposure time of 4-6 seconds, slice thickness of 5 mm and 1.5 mm in mediastinal and lung windows. A total of 1000 HRCT scans done were examined for covid screening. Data was entered in Microsoft Excel and analysed by using Statistical Package for Social Sciences (SPSS) software. Descriptive statistics were represented with percentages. Results: A total of 348 cases were found with various other pathologies incidentally. Lesions like infectious and inflammatory lesions, metabolic diseases, tumours, metastases of various systems and fractures were found. Among 348 total cases with incidental findings 98 cases (28.1%) showed non COVID-19 lung pathologies, 114 cases (32.7%) had findings in the upper abdomen, 30 cases (8.6%) in the thyroid, and three cases (0.8%) had other findings. Conclusion: The HRCT chest screening for COVID-19 not only provided the status of pulmonary infection but gave a broad view of many other system pathologies like in upper abdomen, musculoskeletal system, thyroid, breast which were found incidentally. Identifying those pathologies and correlating them with history will help in early detection and management.
APA, Harvard, Vancouver, ISO, and other styles
29

Widyarto, Chris Tri, Hero Wintolo, and Yuliani Indrianingsih. "PENERAPAN ALGORITMA SAPA PADA JARINGAN AD-HOC UNTUK MENGIDENTIFIKASI KOMPUTER BERBASIS MAC ADDRESS." Compiler 2, no. 1 (May 1, 2013). http://dx.doi.org/10.28989/compiler.v2i1.31.

Full text
Abstract:
Wi-Fi waves are commonly used as an intermediary in the communication relationships in the wireless network. However, the use o f Wi-Fi waves can be used in addition to getting the relationship in the network, the user is also able to detect and identify other devices by using Wi-Fi waves. Ad-hoc network is a network that can be built independently by the computer with the Microsoft Windows operating system, to enable ad-hoc device has to have an identity that is SSID, the SSID is then activate the device can be detected by other devices. Activation is done ad-hoc by the netsh command is a shell command in the Windows 7 operating system. An ID must be unique for each device as there is no dual identity, to maximize the identification process. Utilizing MAC address as an identity is used, allowing the device to be uniquely identified. In addition to the MAC address is added to the device profile in the identity o f the device for easier identification. Sapa application users can identify the device is detected, and recognize it as a co-owned devices. Scheme which is the concept o f the algorithm Sapa. Sapa application allows device activation or notebook PC with the Windows 7 operating system to be detected and detected by other devices with the Windows 7 operating system and applications are also active Sapa. Communication is established indirect communication that occurs in a single direction. Detection range can be done up to 77 meters distance.
APA, Harvard, Vancouver, ISO, and other styles
30

Dwivedi, Sumit, and Shahnawaz Alam. "Software Development for Setup Planning of Rotational Part." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 4, no. 1 (June 8, 2015). http://dx.doi.org/10.18090/samriddhi.v4i1.1545.

Full text
Abstract:
An innovative approach was developed to solve the problem of setup planning, which is the most critical problem in process planning for discrete metal parts. Setup planning is the act of preparing detailed work instructions for setting up a part. The major objective of this research is to improve the performance of CAPP systems by developing a systematic approach to generate practical setup plans based on tolerance analysis. A comprehensive literature review on tolerance control in CAPP was conducted. It was found that tolerance chart analysis, a traditional tolerance control technique, is reactive in nature and can be greatly improved by solving the problem of setup planning. In order to develop a theoretically sound foundation for tolerance analysis-based setup planning, the problem of tolerance stack up in NC machining was analyzed in terms of manufacturing error analysis. Guidelines for setup planning were then developed based on the analysis. To systematically solve the setup planning problem, a graph theoretical setup planning algorithm for rotational parts was then developed for automated and integrated setup planning and fixture design. Its efficiency and effectiveness evaluated. The result is promising. The algorithms were then computerized. A setup planning program was developed under the Microsoft Windows environment using C.
APA, Harvard, Vancouver, ISO, and other styles
31

Saquin, Maria Dara C., and Dave E. Marcial. "Developing an Automated Student Academic Record Management with Business Intelligence Approach." Jurnal Informatika 12, no. 2 (November 29, 2016). http://dx.doi.org/10.21460/inf.2016.122.453.

Full text
Abstract:
Student academic records management and assessment are among the vital processes in any higher education institution. These processes must be efficient and systematic. The significant problems of the current system that is holding the student’s academic record have been observed and identified. Based upon the limitations and the challenges on the existing procedures of a manual storing and archiving of the students’ academic records, a centralized students’ academic record management system was proposed. This project primarily aimed to develop a computerized student academic record management system in order to help DMC College Foundation Incorporated (DMCCFI) Philippines improve its performance in the registrar services, specifically in the assessment and evaluation of student records. The newly developed system is integrated with business intelligence. It offers modules such as grade submission, assessment, and student kiosk with security feature. The development model included Rapid Application Development (RAD). The tools used in the development are Windows Server 2008 R2, DevExpress, Microsoft Visual Studio C#, MSSQL, and SmartDraw. Based on the system evaluation, the proposed system is very good with an aggregate mean of 4.55. The result implies that the MIS staff, coordinators and dean strongly agree that the proposed system is highly acceptable. In terms of usability, the proposed system is rated with an aggregate mean of 6.43 described as “Strongly Agree.” It was concluded that the developed system offers the capabilities and functions that can help improve the performance of the registrar services in DMCCFI and is highly recommended for immediate utilization by DMCCFI.
APA, Harvard, Vancouver, ISO, and other styles
32

Meakins, Felicity. "Identity." M/C Journal 1, no. 3 (October 1, 1998). http://dx.doi.org/10.5204/mcj.1711.

Full text
Abstract:
Identity is two-faced. In fact, identity is many-faced. Since the work of Goffman on the theory of face, we have come to recognise the flucuating and diverse nature of our identities. Context has become highly relevant. In my own experience, my identity adjusts to various social situations and people. One moment, I am a linguistics student paying more attention to how people speak than to what they are saying -- a tactic guaranteed to irritate the imperturbable. In this face, I frequent the library at lunchtime only to emerge lugging a pile of books and periodicals. The next moment I find myself wearing dresses (well, occasionally) and lipstick, frolicking about the Arts scene feigning an air of infinite wisdom about some obscurity or other. Finally, I don the baggies, yellow glasses and an air of cool unconcern as I sit on my bike at the top of a steep drop-off, contemplating the promise of blood, mud, scars and facial reconstructions. In all these guises, I expend great energy ensuring that various friends only see one of these faces, adjusting my appearance and language accordingly. Mixed parties, of course, present an ultimate dilemma -- which face will I reveal this time!? Of course, this fluidity of face shift is not merely a personality quirk. We all constantly adopt different faces, depending on particular social contexts. We dress differently, adjust the modulation of our voices, and skillfully change the topics of our conversations as we interact in our changing environments. We are not merely two-faced, but many-faced. In this issue of M/C, the writers pull on their 'social commentator' faces to deal with various aspects of identity. M/C guest writer Jonathan Lillie takes a constructionist approach to identity, considering Manuel Castells's idea of a collective identity. He highlights problems with models which fail to identify the individual within the mass, proposing that even within an identity constructed by the dominant instutions, a person may adopt some aspects of a resistance identity. Lillie recognises the Internet as an ideal outlet for resistance identities. Continuing with the Internet theme, Axel Bruns discusses the display of personal identity within the Internet community. He describes how the disembodied nature of online identity means that some form of outside feedback to the presentation of individual personality is needed to realise a user's identity. The effect of this phenomenon is, Bruns suggests, that in computer-mediated communication the Cartesian 'cogito ergo sum' must be rephrased. Adam Dodd looks at computer fighting games and the transfer of player identity onto the characters onscreen. He suggests that in this projection, we demonstrate a willingness to forget ourselves and become an arrangement of coloured lights, happily turning our friends into quivering bloody masses. Linguistically, we can't separate the "I" at the controller from the "I" onscreen. Yet Dodd believes that we still never fail to distinguish between the violence of the computer microworld and that of everyday 'reality'. P. David Marshall considers the confession and its relationship to the self, suggesting that while confession demands an audience, the protestant reformations of self internalised this audience. However, Marshall believes that this audience has recently re-emerged in television programmes such as Ricki Lake, which he dubs the 'public confessional' of television talkshows. This type of confession is exemplified with his own confession concerning a Pat Rafter obsession. Also writing on identity and confession, Heather Wolffram examines the motives behind the current "scholarly striptease", proposing that academics are revealing their identities to vindicate their politics. Adrienne Rich is one academic rejecting the shroud of objectivity, identifying herself as a lesbian in order to speak with more authority on the subject. Wolffram also describes the self-promotion factor of these public confessions. Nick Caldwell turns the focus to a very different kind of assumption of identity. He observes that with the advent of sufficient processor power, many computer users are now using their machines to take on the look and feel of older home computers from a time before Microsoft established its stranglehold on the market. The reason behind this phenomenon, Caldwell offers, is not so much a nostalgia for the good old days, but the desire for computers with an identity beyond the slick and soulless design of Windows. Finally, Kirsty Leishman also looks at an area of rebellion against the mainstream. Taking her cue from a recent newsgroup debate, she reviews the adolescent nature of zines -- publications on the low- and no-budget end of the market. By nature, she finds, zines are both revolutionary in their questioning of institutional publishing industry wisdom, and evolutionary in their aim to develop the zine medium as well as the individual identities of their creators -- qualities which are also at the very heart of the adolescent quest for personal identity. As you can see, cultural criticism has approached problems of identity from many angles. So please slip on your critical reader face, and send us your comments on any of these articles! Citation reference for this article MLA style: Felicity Meakins. "Editorial: 'Identity'." M/C: A Journal of Media and Culture 1.3 (1998). [your date of access] <http://www.uq.edu.au/mc/9810/edit.php>. Chicago style: Felicity Meakins, "Editorial: 'Identity'," M/C: A Journal of Media and Culture 1, no. 3 (1998), <http://www.uq.edu.au/mc/9810/edit.php> ([your date of access]). APA style: Felicity Meakins. (199x) Editorial: 'identity'. M/C: A Journal of Media and Culture 1(3). <http://www.uq.edu.au/mc/9810/edit.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
33

Beltran-Arreche, Maialen, Judit Fullana Noell, and Maria Pallisera Díaz. "Perspectives of Women with Intellectual Disabilities Regarding Affective Sexual Relationships: a Systematic Literature Review." Sexuality Research and Social Policy, December 11, 2023. http://dx.doi.org/10.1007/s13178-023-00911-2.

Full text
Abstract:
Abstract Introduction Despite the recognition of the right to sexual identity and expression for all people, individuals with intellectual disabilities continue to face significant restrictions in these aspects of their lives. The prevailing myths and stereotypes surrounding their sexual-affective relationships place people with intellectual disabilities—especially women—in a position of great vulnerability. Methods A systematic literature review was conducted, examining the content of the following databases: BASE, Dialnet, ERIC, La Referencia, Microsoft Academic, Redalyc, REDIB, Redined, Science Direct, Scopus, Web of Science, and World Wide Science. A total of 178 potentially relevant articles were identified, out of which 11 met the eligibility criteria. Finally, the themes covered in the articles were identified and analyzed. Results The results obtained were classified into six categories: perceptions regarding sex and sexuality, experiences of abuse, views and experiences of relationships between couples, the LGTBIQ + community, knowledge about contraception and related experiences, and, finally, beliefs regarding gender scripts. Conclusions This study offers valuable insights into the knowledge (or lack thereof) and beliefs regarding sex and sexuality, experiences of abuse among women with intellectual disabilities, the lack of independence and external intervention, and the influence of traditional gender scripts. Furthermore, this research also establishes a theoretical foundation for future support resources and initiatives, as well as social and public implications.
APA, Harvard, Vancouver, ISO, and other styles
34

Liu, Miaogu. "Digitized Perception of Piano Accompaniment in Songs with the Involvement of Deep Learning Techniques." Applied Mathematics and Nonlinear Sciences 9, no. 1 (January 1, 2024). http://dx.doi.org/10.2478/amns-2024-1017.

Full text
Abstract:
Abstract In this paper, we use the Hanning window function to add windows to the piano accompaniment human brain perception signal, and the noise and redundant features in the piano accompaniment human brain perception signal are downgraded by principal component analysis and Relief algorithm for dimensionality reduction processing and feature selection. Based on the basic structure of RCNN, the ReConv-EEG Net EEG identity recognition method is established, and the feature vectors in the recurrent network are classified and computed through the feed-forward layer, the normalization layer and the output layer to obtain the feature values of the EEG signals. Under different speed accompaniments, the subjects perceived the high-speed piano accompaniment with the lowest α -wave power spectral value of 47.85 on average, while the original speed accompaniment had the most significant α -wave power spectral value of 49.12 on average.Meanwhile, there were differences in the perception of piano accompaniment among subjects, and the mean EEG δ -wave synchronization indexes of the non-musicians and the musicians differed by an average of 0.2297 when they were listening to the same accompaniment.The method in this paper contributes to developing a new method for deep learning-assisted music perception research in the field. Also, it lays the data foundation for applying the technique to the field.
APA, Harvard, Vancouver, ISO, and other styles
35

Pestka, Brandy. "Using Reflective Practice to Enhance Student Professionalism." Journal of Medical Education and Curricular Development 11 (January 2024). http://dx.doi.org/10.1177/23821205241250172.

Full text
Abstract:
Reflective practice, critically reflecting on one's actions or attitudes to engage in the process of continuous adaptation and learning, has proven to be an effective strategy for improved patient care. Additionally, literature supports applying reflective practice for professional growth in medical providers. When contemplating professionalism training in physician assistant (PA) education, it is important to consider how to obtain buy-in from students. One way to do this is to link professionalism to the students’ future career as a PA. The School of Physician Assistant Studies at Pacific University (the Program) created an Online Orientation Reflective Practice Assignment that was implemented during online orientation. Students were prompted to use reflective practice to create detailed “plans for success.” The goal of this assignment was to reduce common professionalism missteps students often experienced. Data regarding the number of professionalism encounters per cohort, broken down into occurrences by curricular phase (didactic vs clinical), was tracked and collated using Microsoft® Excel®. The data was analyzed to determine trends. Implementation of the Online Reflective Practice Assignment for all PA students at the beginning of their education has increased student awareness of the Program's, and the profession's, expectations regarding professionalism and accountability. Thus far, the resulting number of professionalism missteps have not decreased year-over-year. We hypothesize that this is due to the difficulty meeting increased administrative expectations and burdens put on students during the pandemic. Students’ use of reflective practice to review what went wrong and to create plans to avoid missteps in the future allows them to focus on productive next steps in building their professional identity. Implementation of the Online Orientation Reflective Practice Assignment has better prepared students for the expectations of the PA profession and provided them with a solid foundation to build their professional identity throughout their education and into their careers.
APA, Harvard, Vancouver, ISO, and other styles
36

Graves, Tom. "Something Happened on the Way to the ©." M/C Journal 6, no. 2 (April 1, 2003). http://dx.doi.org/10.5204/mcj.2155.

Full text
Abstract:
Intellectual property. It's a strange term, indicating from its structure that the questionable notion of property has been appended to something that, in a tangible sense, doesn't even exist. Difficult to grasp, like water, or air, yet at the same time so desirable to own... In Anglo-American law, property is defined, as the eighteenth-century jurist Sir William Blackstone put it, as "that sole and despotic dominion which one man claims and exercises over the external things of the world, in total exclusion of the right of any other individual in the universe" (Terry & Guigni 207). For most physical things, the 'right' of exclusion seems simple enough to understand, and to control. Yet even there, when the boundaries blur, especially over space and time, the results of such 'rights' become less and less manageable, as indicated by the classic 'tragedy of the commons' (Hardin). And once we move outside of the physical realm, and into the world of ideas, or of feelings or the spirit, the notion of an exclusive 'right' of ownership steadily makes less and less sense. It's an issue that's come to the fore with the rise of the Open Source movement, creating software that can be freely shared and used by anyone. There are many arguments about exactly is meant by 'free', though there's often an emphasis on freedom of ideas rather than price: "think of 'free' as in 'free speech', not as in 'free beer'" is how one group describes it (Free Software Foundation). Unlike proprietary software such as Microsoft Windows, the source-code from which the programs are compiled is available is available for anyone to view, amend, extend. As yet, few programmers are paid to do so; certainly no-one is excluded from doing so. The results from this apparently anarchic and altruistic model would be startling for anyone coming from a conventional economics background: for example, Sourceforge, the main Open Source repository, currently hosts almost 60,000 projects, with almost ten times that number of active contributors (Sourceforge). Some of these projects are huge: for example, the Linux kernel is well over a million lines of code, whilst the Gnome user-interface is already almost twice that size. Open Source programs such as the 'LAMP' quadrivirate of the GNU/Linux operating-system, Apache web-server, MySQL database and PHP, Perl or Python scripting languages provide most of the software infrastructure for the Internet (Linux, Apache, MySQL, PHP, Perl, Python). And the Internet returns the favour, by providing a space in which collaboration can happen quickly and for the most part transparently, without much regard for status or location. Yet central though the Internet may be to this new wave of shared 'public good', the core innovations of Open Source are more social than technological. Of these, probably the most important are a specific kind of collaboration, and an unusual twist on copyright law. Eric Raymond's classic essay 'The Cathedral and the Bazaar' is one of the best descriptions of the social processes behind Open Source (Raymond). "Every good work of software starts by scratching a developer's personal itch", says Raymond: see a need, tackle it, share the initial results, ask for help. Larry Wall, the initiator of Perl, "wanted to create something that was so useful that it would be taken up by many people" (Moody 133), and consciously promoted it in much the same way as a missionary (Moody 131). Open access to communications and a culture of shared learning provides the space to "release early, release often" and invite collaboration. Some projects, such as Apache and PHP, are run as a kind of distributed collective, but many are somewhat hierarchical, with a well-known lead-figure at the centre: Linus Torvalds for Linux, Larry Wall for Perl, Guido van Rossum for Python, Miguel de Icaza for Gnome. Yet the style rarely seems hierarchical in practice: the lead-figure's role is that of coordinator and final arbiter of quality, far removed from the militaristic 'command and control' so common in business environments. What makes it work is that anyone can join in, identify a bug, submit a patch, volunteer to design some desirable function or feature, and gain personal satisfaction and social respect for doing so. Programmers’ motivations vary enormously, of course: some share their work as a kind of libertarian statement, whilst others are more driven by a sense of obligation to others in the software-development community, or in the wider world. Yet for many, perhaps most, it's the personal satisfaction that's most important: as Linus Torvalds comments, "most of the good programmers do [Open Source] programming not because they expect to get paid or get adulation by the public, but because it is fun to program" (Torvalds & Ghosh). In that sense it more closely resembles a kind of art-form rather than a conventional business proposition. Realistically, many of the smaller Open Source projects are little more than student exercises, with limited real-world usefulness. But for larger, more relevant projects this borderless, inclusive collaboration usually results in code of very high quality and reliability – "given enough eyeballs, all bugs are shallow" is another of Raymond's aphorisms – in stark contrast to the notorious security holes and general fragility of proprietary products from Redmond and elsewhere. And it leverages different people's skills to create an extraordinary degree of 'win/win', as Linus Torvalds points out: "imagine ten people putting in one hour each every day on the project. They put in one hour of work, but because they share the end results they get nine hours of 'other peoples work' for free. It sounds unfair: get nine hours of work for doing one hour. But it obviously is not" (Torvalds & Ghosh). It's this kind of return-on-investment that's making many businesses more than willing to embrace the 'insanity' of paying programmers to give away their time on Open Source projects (Pavlicek). The hard part, for many businesses, is that it demands a very different approach to business relationships. "Forget business as usual", writes Russell Pavlicek; "forget about demanding your own way; forget fluffy, empty management speeches; forget about fudging facts; forget about marketing that alienates the community; forget about pushing hype rather than real value; forget about taking more than you give" (Pavlicek 131-7). When everything is open, and everyone is in effect a volunteer, none of those time-dishonoured tactics works well. But the real catch is the legal framework under which Open Source is developed and distributed. Conventionally, placing work in the public domain – the intellectual-property equivalent of the commons – means that anyone can apply even the minutest of changes and then declare it exclusively as their own. Walt Disney famously did exactly this with many classics, such as the Grimms' fairy-tales or Rudyard Kipling's Jungle Book. The Free Software Foundation's 'GNU Public License' – used for most Open Source software – avoids this by copyrighting the work, permitting freedom to view, amend and extend the code for any purpose, but requiring that any new version permit the same freedoms (GNU/FSF). This inclusive approach – nicknamed 'copyleft' in contrast to conventional copyright – turns the usual exclusive model of intellectual property on its head. Its viral, self-propagating nature uses the law to challenge the law of property: everything it touches is – in principle – freed from exclusive private ownership. Larry Lessig and the Creative Commons legal team have extended this somewhat further, with machine-readable licenses that permit a finer granularity of choice in defining what uses of a work – a musical performance, a book or a Weblog, for example – are open or withheld (Creative Commons). But the central theme is that copyleft, together with the open nature of the Internet, "moves everything that touches it toward the public domain" (Norlin). Which is not a happy thought for those whose business models depend on exclusion and control of access to intellectual property – such as Hollywood, the media and the biotechnology industry – nor, for that matter, for those who'd prefer to keep their secrets secret (AWOLBush). Part of the problem, for such people, is a mistaken notion of what the Internet really is. It's not a pipe or a medium, like cable TV; it's more like a space or a place, a 'world of ends' (Searls & Weinberger). Not so much infrastructure, to be bought and sold, but necessarily shared, it's more 'innerstructure', a kind of artificial force of nature: "like the Earth's fertile surface, it derives much of its fertility from the life it supports" (Searls). Its key characteristics, argues Doc Searls, are that "No-one owns it; Everyone can use it; Anyone can improve it". And these characteristics of the Internet ultimately arise not from the hardware – routers, cables, servers and the like – or even the software, but ultimately from an agreement – the Internet Protocol – and an idea – that network connections can and should be self-routing, beyond direct control. Yet perhaps the most important idea that arises from this is that one of the most basic foundation-stones of Western society – the model of property as an exclusive 'right', a "sole and despotic dominion" – simply doesn't work. This is especially true for supposed 'intellectual property', such as copyrights, trade-marks, patents, genome sequences, scientific theories: after all, from where do those ideas and patterns ultimately arise? Who owns that? In legal terms, there's no definable root for a trail of provenance, no means to identify all involved intermediaries, and hence no ultimate anchor for any kind of property claim. Many other types of intellectual property, such as domain-names, phrases, words, radio-frequencies, colours, sounds - the word 'Yes', the phrase 'The Real Thing', Ferrari red, the sound of a Harley-Davidson – can only be described as arbitrary expropriations from the public domain. In many senses, then, the whole legal edifice of intellectual property is little more than "all smoke and mirrors", held together by lawyers' bluff – hardly a stable foundation for the much-vaunted 'information economy'! Whilst it's not quite true that "nobody owns it", in practice the only viable ownership for any kind of intellectual property would seem to be that of a declaration of responsibility, of stewardship – such as a project-leader's responsibility for an Open Source project – rather than an arbitrary and ultimately indefensible assertion of exclusive 'right'. So a simple question about intellectual property – is it copyright or copyleft? should source-code be proprietary or 'free'? – goes deeper and deeper into the 'innerstructure' of society itself. Miguel Icaza describes this well: "as the years pass and you're working in this framework, you start to reevaluate in many areas your relationships with your friends and your family. The same ideas about free software and sharing and caring about other people start to permeate other aspects of your life" (Moody 323). Perhaps it's time to look more carefully to look more carefully not just at intellectual property, but at the 'rights' and responsibilities associated with all kinds of property, to reach a more equitable and sustainable means to manage the tangible and intangible resources of this world we share. Works Cited Blackstone, Sir William. "Commentaries on the Laws of England." Book 2, 1765, 2, quoted in Andrew Terry and Des Guigni, Business, Society and the Law. Marrickville, Australia: Harcourt, Brace and Co., 1994. Hardin, Garrett. "The Tragedy of the Commons." Science 162 (1968): 1243-8. 10 Mar. 2003 <http://www.constitution.org/cmt/tragcomm.htm>. “The Free Software Definition.” Free Software Foundation. 10 Mar. 2003 <http://www.fsf.org/philosophy/free-sw.php>. Sourceforge. 9 Mar. 2003 <http://sourceforge.net/>. Linux. 9 Mar. 2003 <http://www.linux.org/>. GNOME. 9 Mar. 2003 <http://www.gnome.org/>. Apache. The Apache Software Foundation. 9 Mar. 2003 <http://www.apache.org/>. MySQL. 9 Mar. 2003 <http://www.mysql.com/>. PHP. 9 Mar. 2003 <http://www.php.net/>. Perl. 9 Mar. 2003 <http://www.perl.org/>. Python. 9 Mar. 2003 <http://www.python.org/>. Raymond, Eric S. The Cathedral and the Bazaar. 11 Aug. 1998. 9 Mar. 2003 <http://www.openresources.com/documents/cathedral-bazaar>. (Note: original location at http://tuxedo.org/~esr/writings/cathedral-bazaar/ is no longer accessible.) Moody, Glyn. Rebel Code: Linux and the Open Source Revolution. London: Allen Lane/Penguin, 2001. Torvalds, Linus, and Rishab Aiyer Ghosh. "Interview with Linus Torvalds". First Monday 3.3 (1998). 9 Mar. 2003 <http://www.firstmonday.dk/issues/issue3_3/torvalds/index.php>. Pavlicek, Russell C. Embracing Insanity: Open Source Software Development. Indianapolis: Sams Publishing, 2000. "Licenses – GNU Project." GNU/Free Software Foundation. 9 Mar. 2003 <http://www.fsf.org/licenses/licenses.html#TOCWhatIsCopyleft>. Lessig, Lawrence (Larry). Home page. 9 Mar. 2003 <http://cyberlaw.stanford.edu/lessig>. Creative Commons. 9 Mar. 2003 <http://creativecommons.org/>. Norlin, Eric. Weblog. 23 Feb. 2003. 9 Mar. 2003 <http://www.unchartedshores.com/blogger/archive/2003_02_23_ar... ...chive3.html#90388497>. “G W Bush Went AWOL.” AWOLBush.com. 9 Mar. 2003 <http://www.awolbush.com/>. Searls, Doc, and David Weinberger. World Of Ends: What the Internet Is and How to Stop Mistaking It for Something Else. 9 Mar. 2003 <http://worldofends.com/>. Searls, Doc. "Is Linux Infrastructure? Or Is it Deeper than That?" Linux Journal 14 May 2002. 10 Mar. 2003 <http://www.linuxjournal.com/article.php?sid=6074>. ---. "Setting Fire to Hollywood’s Plans for the Net: The GeekPAC Story". Linux Journal 29 Apr. 2002. 10 Mar. 2003 <http://www.linuxjournal.com/article.php?sid=6033>. Links http://creativecommons.org/ http://cyberlaw.stanford.edu/lessig http://sourceforge.net/ http://tuxedo.org/~esr/writings/cathedral-bazaar/ http://worldofends.com/ http://www.apache.org/ http://www.awolbush.com/ http://www.constitution.org/cmt/tragcomm.htm http://www.firstmonday.dk/issues/issue3_3/torvalds/index.html http://www.fsf.org/licenses/licenses.html\lTOCWhatIsCopyleft http://www.fsf.org/philosophy/free-sw.html http://www.gnome.org/ http://www.linux.org/ http://www.linuxjournal.com/article.php?sid=6033 http://www.linuxjournal.com/article.php?sid=6074 http://www.mysql.com/ http://www.openresources.com/documents/cathedral-bazaar http://www.perl.org/ http://www.php.net/ http://www.python.org/ http://www.unchartedshores.com/blogger/archive/2003_02_23_archive3.html\l90388497 Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Graves, Tom. "Something Happened on the Way to the ©" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0304/03-somethinghappened.php>. APA Style Graves, T. (2003, Apr 23). Something Happened on the Way to the ©. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0304/03-somethinghappened.php>
APA, Harvard, Vancouver, ISO, and other styles
37

Mutahar, Dua’a Jamal Ahmed, Khaled Saad Abdulrahman Al-Khamesy, Khaled Abdul-Karim A. Al-Moyed, Hassan Abdulwahab Al-Shamahy, and Mohammed Hassan Al-Shahary. "PATTERN OF LIVER DISEASE ADMISSIONS AT A TERTIARY GOVERNMENT HOSPITAL IN SANA’A, YEMEN." Universal Journal of Pharmaceutical Research, September 15, 2022. http://dx.doi.org/10.22270/ujpr.v7i4.807.

Full text
Abstract:
Back ground and objectives: Liver disease causes major public health problems international, especially in poor countries, and it is associated with poor long-term clinical outcomes and results in the deaths of millions worldwide annually. The aim of this study is to ascertain the virtual frequencies of liver disease and to assess etiological factors among patients admitted to Al-Thawra tertiary Hospital in Sana'a City, Yemen. Methods: This was a descriptive retrospective analysis study of gastrointestinal patients admitted from January 1, 2021 to December 31, 2021 to the medical wards of Al-Thawra Hospital. This is a tertiary hospital located in the Yemeni capital, Sana'a City. Data were extracted from patient case folders for the period of under review. Data validated with Microsoft Excel version 13 and exported to SPSS version 23.0 for windows; for statistical analysis. Data were evaluated for demographic and other clinical characteristics as definite variables. Results: Of the 516 gastroenterology patients admitted to the gastroenterology service in medical wards during a one-year period, liver disease accounted for 30% of all gastroenterology in the same period. There were 155 patients diagnosed with liver disease. There were 86 (55.5%) males and 69 (44.5%) females, with a male to female ratio of 1.2:1. The mean overall age of patients and the age range were 46.14±16.5 and 8-85 years, respectively. The peak incidence of age occurred during the fifth and sixth decades of life at 38.1%. The most common liver disease was; autoimmune hepatitis 43 (27.7%), followed by nonalcoholic fatty liver disease 35 (22.6%), viral hepatitis 32 (20.6%) and schistosomiasis 10 (6.5%). Conclusion: Current findings show that autoimmune hepatitis was the most common cause among gastrointestinal diseases in Sana'a city, Yemen; the male to female ratio was roughly the same. In light of this, health education and public awareness about hepatitis virus screening tests and schistosomiasis screening and treatment is the primary preventive strategy to be considered. Peer Review History: Received: 4 July 2022; Revised: 12 August; Accepted: 7 September, Available online: 15 September 2022 Academic Editor: Dr. Gehan Fawzy Abdel Raoof Kandeel, Pharmacognosy Department, National Research Centre, Dokki, 12622, Giza, Egypt, gehankandeel9@yahoo.com UJPR follows the most transparent and toughest ‘Advanced OPEN peer review’ system. The identity of the authors and, reviewers will be known to each other. This transparent process will help to eradicate any possible malicious/purposeful interference by any person (publishing staff, reviewer, editor, author, etc) during peer review. As a result of this unique system, all reviewers will get their due recognition and respect, once their names are published in the papers. We expect that, by publishing peer review reports with published papers, will be helpful to many authors for drafting their article according to the specifications. Auhors will remove any error of their article and they will improve their article(s) according to the previous reports displayed with published article(s). The main purpose of it is ‘to improve the quality of a candidate manuscript’. Our reviewers check the ‘strength and weakness of a manuscript honestly’. There will increase in the perfection, and transparency. Received file: Reviewer's Comments: Average Peer review marks at initial stage: 6.0/10 Average Peer review marks at publication stage: 7.5/10 Reviewers: Dr. Bilge Ahsen KARA, Ankara Gazi Mustafa Kemal Hospital, Turkey, ahsndkyc@gmail.com Dr. Tamer Elhabibi, Suez Canal University, Egypt, tamer_hassan@pharm.suez.edu.eg Dr. Rima Benatoui,Laboratory of Applied Neuroendocrinology, Department of Biology, Faculty of Science, Badji Mokhtar University Annaba, Algeria. benattouiryma@gmail.com Dr. A.A. Mgbahurike, University of Port Harcourt, Nigeria, amaka_mgbahurike@yahoo.com Similar Articles: PREVALENCE OF HEPATITIS G VIRUS AMONG PATIENTS WITH CHRONIC LIVER DISEASE AND HEALTHY INDIVIDUALS, SANA'A CITY-YEMEN
APA, Harvard, Vancouver, ISO, and other styles
38

Hill, Benjamin Mako. "Revealing Errors." M/C Journal 10, no. 5 (October 1, 2007). http://dx.doi.org/10.5204/mcj.2703.

Full text
Abstract:
Introduction In The World Is Not a Desktop, Marc Weisner, the principal scientist and manager of the computer science laboratory at Xerox PARC, stated that, “a good tool is an invisible tool.” Weisner cited eyeglasses as an ideal technology because with spectacles, he argued, “you look at the world, not the eyeglasses.” Although Weisner’s work at PARC played an important role in the creation of the field of “ubiquitous computing”, his ideal is widespread in many areas of technology design. Through repetition, and by design, technologies blend into our lives. While technologies, and communications technologies in particular, have a powerful mediating impact, many of the most pervasive effects are taken for granted by most users. When technology works smoothly, its nature and effects are invisible. But technologies do not always work smoothly. A tiny fracture or a smudge on a lens renders glasses quite visible to the wearer. The Microsoft Windows “Blue Screen of Death” on subway in Seoul (Photo credit Wikimedia Commons). Anyone who has seen a famous “Blue Screen of Death”—the iconic signal of a Microsoft Windows crash—on a public screen or terminal knows how errors can thrust the technical details of previously invisible systems into view. Nobody knows that their ATM runs Windows until the system crashes. Of course, the operating system chosen for a sign or bank machine has important implications for its users. Windows, or an alternative operating system, creates affordances and imposes limitations. Faced with a crashed ATM, a consumer might ask herself if, with its rampant viruses and security holes, she should really trust an ATM running Windows? Technologies make previously impossible actions possible and many actions easier. In the process, they frame and constrain possible actions. They mediate. Communication technologies allow users to communicate in new ways but constrain communication in the process. In a very fundamental way, communication technologies define what their users can say, to whom they say it, and how they can say it—and what, to whom, and how they cannot. Humanities scholars understand the power, importance, and limitations of technology and technological mediation. Weisner hypothesised that, “to understand invisibility the humanities and social sciences are especially valuable, because they specialise in exposing the otherwise invisible.” However, technology activists, like those at the Free Software Foundation (FSF) and the Electronic Frontier Foundation (EFF), understand this power of technology as well. Largely constituted by technical members, both organisations, like humanists studying technology, have struggled to communicate their messages to a less-technical public. Before one can argue for the importance of individual control over who owns technology, as both FSF and EFF do, an audience must first appreciate the power and effect that their technology and its designers have. To understand the power that technology has on its users, users must first see the technology in question. Most users do not. Errors are under-appreciated and under-utilised in their ability to reveal technology around us. By painting a picture of how certain technologies facilitate certain mistakes, one can better show how technology mediates. By revealing errors, scholars and activists can reveal previously invisible technologies and their effects more generally. Errors can reveal technology—and its power and can do so in ways that users of technologies confront daily and understand intimately. The Misprinted Word Catalysed by Elizabeth Eisenstein, the last 35 years of print history scholarship provides both a richly described example of technological change and an analysis of its effects. Unemphasised in discussions of the revolutionary social, economic, and political impact of printing technologies is the fact that, especially in the early days of a major technological change, the artifacts of print are often quite similar to those produced by a new printing technology’s predecessors. From a reader’s purely material perspective, books are books; the press that created the book is invisible or irrelevant. Yet, while the specifics of print technologies are often hidden, they are often exposed by errors. While the shift from a scribal to print culture revolutionised culture, politics, and economics in early modern Europe, it was near-invisible to early readers (Eisenstein). Early printed books were the same books printed in the same way; the early press was conceived as a “mechanical scriptorium.” Shown below, Gutenberg’s black-letter Gothic typeface closely reproduced a scribal hand. Of course, handwriting and type were easily distinguishable; errors and irregularities were inherent in relatively unsteady human hands. Side-by-side comparisons of the hand-copied Malmesbury Bible (left) and the black letter typeface in the Gutenberg Bible (right) (Photo credits Wikimedia Commons & Wikimedia Commons). Printing, of course, introduced its own errors. As pages were produced en masse from a single block of type, so were mistakes. While a scribe would re-read and correct errors as they transcribed a second copy, no printing press would. More revealingly, print opened the door to whole new categories of errors. For example, printers setting type might confuse an inverted n with a u—and many did. Of course, no scribe made this mistake. An inverted u is only confused with an n due to the technological possibility of letter flipping in movable type. As print moved from Monotype and Linotype machines, to computerised typesetting, and eventually to desktop publishing, an accidentally flipped u retreated back into the realm of impossibility (Mergenthaler, Swank). Most readers do not know how their books are printed. The output of letterpresses, Monotypes, and laser printers are carefully designed to produce near-uniform output. To the degree that they succeed, the technologies themselves, and the specific nature of the mediation, becomes invisible to readers. But each technology is revealed in errors like the upside-down u, the output of a mispoured slug of Monotype, or streaks of toner from a laser printer. Changes in printing technologies after the press have also had profound effects. The creation of hot-metal Monotype and Linotype, for example, affected decisions to print and reprint and changed how and when it is done. New mass printing technologies allowed for the printing of works that, for economic reasons, would not have been published before. While personal computers, desktop publishing software, and laser printers make publishing accessible in new ways, it also places real limits on what can be printed. Print runs of a single copy—unheard of before the invention of the type-writer—are commonplace. But computers, like Linotypes, render certain formatting and presentation difficult and impossible. Errors provide a space where the particulars of printing make technologies visible in their products. An inverted u exposes a human typesetter, a letterpress, and a hasty error in judgment. Encoding errors and botched smart quotation marks—a ? in place of a “—are only possible with a computer. Streaks of toner are only produced by malfunctioning laser printers. Dust can reveal the photocopied provenance of a document. Few readers reflect on the power or importance of the particulars of the technologies that produced their books. In part, this is because the technologies are so hidden behind their products. Through errors, these technologies and the power they have on the “what” and “how” of printing are exposed. For scholars and activists attempting to expose exactly this, errors are an under-exploited opportunity. Typing Mistyping While errors have a profound effect on media consumption, their effect is equally important, and perhaps more strongly felt, when they occur during media creation. Like all mediating technologies, input technologies make it easier or more difficult to create certain messages. It is, for example, much easier to write a letter with a keyboard than it is to type a picture. It is much more difficult to write in languages with frequent use of accents on an English language keyboard than it is on a European keyboard. But while input systems like keyboards have a powerful effect on the nature of the messages they produce, they are invisible to recipients of messages. Except when the messages contains errors. Typists are much more likely to confuse letters in close proximity on a keyboard than people writing by hand or setting type. As keyboard layouts switch between countries and languages, new errors appear. The following is from a personal email: hez, if there’s not a subversion server handz, can i at least have the root password for one of our machines? I read through the instructions for setting one up and i think i could do it. [emphasis added] The email was quickly typed and, in two places, confuses the character y with z. Separated by five characters on QWERTY keyboards, these two letters are not easily mistaken or mistyped. However, their positions are swapped on German and English keyboards. In fact, the author was an American typing in a Viennese Internet cafe. The source of his repeated error was his false expectations—his familiarity with one keyboard layout in the context of another. The error revealed the context, both keyboard layouts, and his dependence on a particular keyboard. With the error, the keyboard, previously invisible, was exposed as an inter-mediator with its own particularities and effects. This effect does not change in mobile devices where new input methods have introduced powerful new ways of communicating. SMS messages on mobile phones are constrained in length to 160 characters. The result has been new styles of communication using SMS that some have gone so far as to call a new language or dialect called TXTSPK (Thurlow). Yet while they are obvious to social scientists, the profound effects of text message technologies on communication is unfelt by most users who simply see the messages themselves. More visible is the fact that input from a phone keypad has opened the door to errors which reveal input technology and its effects. In the standard method of SMS input, users press or hold buttons to cycle through the letters associated with numbers on a numeric keyboard (e.g., 2 represents A, B, and C; to produce a single C, a user presses 2 three times). This system makes it easy to confuse characters based on a shared association with a single number. Tegic’s popular T9 software allows users to type in words by pressing the number associated with each letter of each word in quick succession. T9 uses a database to pick the most likely word that maps to that sequence of numbers. While the system allows for quick input of words and phrases on a phone keypad, it also allows for the creation of new types of errors. A user trying to type me might accidentally write of because both words are mapped to the combination of 6 and 3 and because of is a more common word in English. T9 might confuse snow and pony while no human, and no other input method, would. Users composing SMS’s are constrained by its technology and its design. The fact that text messages must be short and the difficult nature of phone-based input methods has led to unique and highly constrained forms of communication like TXTSPK (Sutherland). Yet, while the influence of these input technologies is profound, users are rarely aware of it. Errors provide a situation where the particularities of a technology become visible and an opportunity for users to connect with scholars exposing the effect of technology and activists arguing for increased user control. Google News Denuded As technologies become more complex, they often become more mysterious to their users. While not invisible, users know little about the way that complex technologies work both because they become accustomed to them and because the technological specifics are hidden inside companies, behind web interfaces, within compiled software, and in “black boxes” (Latour). Errors can help reveal these technologies and expose their nature and effects. One such system, Google’s News, aggregates news stories and is designed to make it easy to read multiple stories on the same topic. The system works with “topic clusters” that attempt to group articles covering the same news event. The more items in a news cluster (especially from popular sources) and the closer together they appear in time, the higher confidence Google’s algorithms have in the “importance” of a story and the higher the likelihood that the cluster of stories will be listed on the Google News page. While the decision to include or remove individual sources is made by humans, the act of clustering is left to Google’s software. Because computers cannot “understand” the text of the articles being aggregated, clustering happens less intelligently. We know that clustering is primarily based on comparison of shared text and keywords—especially proper nouns. This process is aided by the widespread use of wire services like the Associated Press and Reuters which provide article text used, at least in part, by large numbers of news sources. Google has been reticent to divulge the implementation details of its clustering engine but users have been able to deduce the description above, and much more, by watching how Google News works and, more importantly, how it fails. For example, we know that Google News looks for shared text and keywords because text that deviates heavily from other articles is not “clustered” appropriately—even if it is extremely similar semantically. In this vein, blogger Philipp Lenssen gives advice to news sites who want to stand out in Google News: Of course, stories don’t have to be exactly the same to be matched—but if they are too different, they’ll also not appear in the same group. If you want to stand out in Google News search results, make your article be original, or else you’ll be collapsed into a cluster where you may or may not appear on the first results page. While a human editor has no trouble understanding that an article using different terms (and different, but equally appropriate, proper nouns) is discussing the same issue, the software behind Google News is more fragile. As a result, Google News fails to connect linked stories that no human editor would miss. A section of a screenshot of Google News clustering aggregation showcasing what appears to be an error. But just as importantly, Google News can connect stories that most human editors will not. Google News’s clustering of two stories by Al Jazeera on how “Iran offers to share nuclear technology,” and by the Guardian on how “Iran threatens to hide nuclear program,” seem at first glance to be a mistake. Hiding and sharing are diametrically opposed and mutually exclusive. But while it is true that most human editors would not cluster these stories, it is less clear that it is, in fact, an error. Investigation shows that the two articles are about the release of a single statement by the government of Iran on the same day. The spin is significant enough, and significantly different, that it could be argued that the aggregation of those stories was incorrect—or not. The error reveals details about the way that Google News works and about its limitations. It reminds readers of Google News of the technological nature of their news’ meditation and gives them a taste of the type of selection—and mis-selection—that goes on out of view. Users of Google News might be prompted to compare the system to other, more human methods. Ultimately it can remind them of the power that Google News (and humans in similar roles) have over our understanding of news and the world around us. These are all familiar arguments to social scientists of technology and echo the arguments of technology activists. By focusing on similar errors, both groups can connect to users less used to thinking in these terms. Conclusion Reflecting on the role of the humanities in a world of increasingly invisible technology for the blog, “Humanities, Arts, Science and Technology Advanced Collaboratory,” Duke English professor Cathy Davidson writes: When technology is accepted, when it becomes invisible, [humanists] really need to be paying attention. This is one reason why the humanities are more important than ever. Analysis—qualitative, deep, interpretive analysis—of social relations, social conditions, in a historical and philosophical perspective is what we do so well. The more technology is part of our lives, the less we think about it, the more we need rigorous humanistic thinking that reminds us that our behaviours are not natural but social, cultural, economic, and with consequences for us all. Davidson concisely points out the strength and importance of the humanities in evaluating technology. She is correct; users of technologies do not frequently analyse the social relations, conditions, and effects of the technology they use. Activists at the EFF and FSF argue that this lack of critical perspective leads to exploitation of users (Stallman). But users, and the technology they use, are only susceptible to this type of analysis when they understand the applicability of these analyses to their technologies. Davidson leaves open the more fundamental question: How will humanists first reveal technology so that they can reveal its effects? Scholars and activists must do more than contextualise and describe technology. They must first render invisible technologies visible. As the revealing nature of errors in printing systems, input systems, and “black box” software systems like Google News show, errors represent a point where invisible technology is already visible to users. As such, these errors, and countless others like them, can be treated as the tip of an iceberg. They represent an important opportunity for humanists and activists to further expose technologies and the beginning of a process that aims to reveal much more. References Davidson, Cathy. “When Technology Is Invisible, Humanists Better Get Busy.” HASTAC. (2007). 1 September 2007 http://www.hastac.org/node/779>. Eisenstein, Elisabeth L. The Printing Press as an Agent of Change: Communications and Cultural Transformations in Early-Modern Europe. Cambridge, UK: Cambridge University Press, 1979. Latour, Bruno. Pandora’s Hope: Essays on the Reality of Science Studies. Harvard UP, 1999. Lenssen, Philipp. “How Google News Indexes.” Google Blogscoped. 2006. 1 September 2007 http://blogoscoped.com/archive/2006-07-28-n49.html>. Mergenthaler, Ottmar. The Biography of Ottmar Mergenthaler, Inventor of the Linotype. New ed. New Castle, Deleware: Oak Knoll Books, 1989. Monotype: A Journal of Composing Room Efficiency. Philadelphia: Lanston Monotype Machine Co, 1913. Stallman, Richard M. Free Software, Free Society: Selected Essays of Richard M. Stallman. Boston, Massachusetts: Free Software Foundation, 2002. Sutherland, John. “Cn u txt?” Guardian Unlimited. London, UK. 2002. Swank, Alvin Garfield, and United Typothetae America. Linotype Mechanism. Chicago, Illinois: Dept. of Education, United Typothetae America, 1926. Thurlow, C. “Generation Txt? The Sociolinguistics of Young People’s Text-Messaging.” Discourse Analysis Online 1.1 (2003). Weiser, Marc. “The World Is Not a Desktop.” ACM Interactions. 1.1 (1994): 7-8. Citation reference for this article MLA Style Hill, Benjamin Mako. "Revealing Errors." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/01-hill.php>. APA Style Hill, B. (Oct. 2007) "Revealing Errors," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/01-hill.php>.
APA, Harvard, Vancouver, ISO, and other styles
39

Laba, Martin. "Culture as Action." M/C Journal 3, no. 2 (May 1, 2000). http://dx.doi.org/10.5204/mcj.1837.

Full text
Abstract:
Culture is a mercurial concept -- volatile, contested, and somehow, less than the sum of its parts. Its anthropology, it can be argued, was rooted in an exoticising scholarship typical of the late 19th-century colonialist ruminations on all things "other"; in contemporary terms of course, this exoticising tendency would be termed, as it should, "Orientalist". Still, there is something more than merely residual in the persistence of a notion of culture as a summary, as a package of knowledge and practice, as a name for identity, or even politics, all of which draw clearly from the well of Edward B. Tylor's bold attempt to terminologically and conceptually capture "the most complex whole", a people's entire way of life (albeit non-white, non-literate, non-western people) from what we can trust were the considerable comforts of his armchair. This Tylorean notion of culture, as Clifford Geertz once suggested, leads to a "conceptual morass" that "obscures a great deal more than it reveals" (4). Another definitional foundation of culture for consideration is the philosophical tradition of German Idealism. Culture as a process of aesthetic education was for Friedrich Schiller a means of progressing from a state of nature to a state of reason without the destruction of nature. Schiller offered a critique of Kant's account of the development of reason (the achievement of the state of rationality as key to the education and progress of humanity) as necessarily predicated on the containment and ultimately, the destruction of nature (against the chaos and moral abyss that is nature). Schiller argued for the capacity of art to infuse nature with morality, to serve as an intermediary of sorts, between chaotic nature and the structures of pure reason. It is the cultivation of moral character -- Bildung -- that is the foundation of this capacity, and that defines the nature and purpose of "culture" as a process of aesthetic education. There were two influential trajectories that seem inspired by this philosophical source. First, there was an important sense from the German Idealists that culture was a determining principle of nation (the nation-state is achieved through Bildung, through cultivation), and accordingly, culture was understood as the source of nationhood. Second, culture took on the sense of moral authority, an Arnoldian equation of culture with high culture and a concomitant mistrust of all things democratic and popular, which debase and ultimately threaten the authority of high culture. Raymond Williams's reinterpretation of culture merits attention because of its departure from previous traditions of defining culture, and because it is a useful foundation for the view of culture proposed later in this discussion. Williams offered a detailed historical analysis of the reasons for the under-theorisation of the British labour movement, and the glaring dislocation of the English proletariat from the ideas, the concepts, the political theory of capitalism. Actual working classes in Britain, the "lived culture" of workers, fit neither into broad political theoretical currents, nor into an examination of workers as elements in a historical process -- this lived culture defied the embrace of political analysis. Williams argued for a more anthropological view of culture, and decisively shifted the concept away from the British literary-cultural tradition, away from Arnold's "high culture", to a view of culture as a whole way of life, and open to the vision and the possibilities of social integration, popular classes, and popular struggles in ordinary, everyday life. Williams argued compellingly for the "ordinariness" of culture. As Bill Readings notes, "Williams's insistence that culture is ordinary was a refusal to ignore the actual working classes in favor of the liberated proletarians who were to be their successors after the revolution" (92). In this sense, culture confounds political theory -- or to stretch the point, culture confounds systematic theorising. In a similar vein, and in a classic of anthropological inquiry, Clifford Geertz argued that the analysis of culture was "not an experimental science in search of law, but an interpretive one in search of meaning" (4). Such an "interpretive" project demands above all, that that the analyst is also a participant in a dimension of the culture she/he is describing. I want to consider two of Geertz's assertions in his interpretive theory of culture to frame my proposal for a concept of culture-as-action. Geertz maintained that cultural analysis is guesswork rather than systematic theorising, which he regarded as a manipulation or reconstruction of reality through analytical practices in search of elegant schemata. Cultural analysis is "guessing at meanings, assessing the guesses, and drawing explanatory conclusions from the better guesses, not discovering the Continent of Meaning and mapping out its bodiless landscape" (20). Clearly, Geertz trained his critical sights on anthropological trends to extrapolate from material data singularly coherent, even symmetrical systems, orders, properties, and universals in a method that wants to imitate, but is not science. Interpretation resists scientism. In a second assertion, Geertz argued that any sustained symbolic action -- the stuff of culture -- is "saying something of something" (448-53). While this assertion appears disarmingly simple, it is profound in its implications. It points to the possibility that cultural analysis, if it is to grasp and interpret layered, textured, and often thoroughly complex significations, must attend to "semantics" rather than "mechanics"; the representation of the substance of culture, its symbolic expressive forms and its unfolding action, rather than the insinuation, or even the bold declaration of systems and formulas, however elegant, of cultural patterns and process. The concern in interpretation -- a form of representation -- is that "a good interpretation of anything -- a poem, a person, a history, a ritual, an institution, a society -- takes us into the heart of that of which it is the interpretation" (18). To describe culture is to attend to action -- actual and resonant -- and such descriptions representations have responsibility; specifically, they must seek to grasp and portray social discourse and its possible meanings in ways that allow symbolic action -- the vocabulary of culture -- to speak on its own behalf. We arrived back in Lahore after a day's journey by jeep over the bone-dry and dusty roads of rural Punjab. The air was a toxic soup, and the heat was crushing, as it always is in Pakistan in monsoon season. The interior of the vehicle was an oven, and I was feeling sealed and cooked, even with all the windows open. My friend and driver, Ashicksahib and I were soaked with sweat from the journey, and we were eager to finally get out of the jeep as we pulled into the city in the late afternoon. I had been through a half dozen bottles of water, but I still felt dizzy with dehydration. I knew that this day was the celebration of Mohammed's birthday, and while I expected many people on the streets, I was unprepared for the magnitude of the event that was taking place. The crowds consumed us. We crawled along until we couldn't continue. The jeep had to stop as the sea of celebrants became denser and denser inside the city, and Ashicksahib shrugged his massive shoulders, smiled at me from under his thick white moustache, wiped his neck with a sodden cloth, and said in Urdu, "That's it, we cannot move, there's nowhere for us to go. We must be patient." I had never seen this much humanity gathered in a single place before. There were only boys and men of course, thousands and thousands of them moving along in joyous procession -- on foot, piled on platforms of flatbed trucks, stuffed into rickshaws, two or three sharing scooters and bicycles. The usual animal multitudes -- herds of water buffalo, goats, some camels, the ubiquitous miserable and thread- bare donkeys with their carts -- all stood passively in the midst of the chaos, too exhausted or too confused to register any instinctive response. Blasting loudspeakers competed from a hundred different directions, chants and patriotic music, prayers and devotional declarations, the staccato delivery of fundamentalist pedagogy and the improvised reveries of individuals with small bullhorns. The soft drink vendors shouted to the crowds to make way as they spun their carts around over and over again, and darted off into fray. I brought out my camera, and because the noise was deafening, I mimed to Ashicksahib my intention to take some photos from the roof of the jeep. He motioned with an affirmative sweep of his hand and the typical and essential south Asian head roll, and I pried open the door and squeezed out against the celebrants pressed up to the side of the jeep. I hoisted myself onto the roof and sat cross-legged to steady myself for some wide- angle shots of the celebrations. I had some concern over my obviousness -- white and western -- but everyone who saw me shouted greetings in Urdu or Punjabi, waved and smiled, and young boys ran up very close to the jeep to see what I was up to. I heard Ashicksahib laughing, and all seemed safe -- until the squadrons of Sunni fundamentalists caught sight of me as their trucks crawled by in a formation that seemed remarkably disciplined and militaristic in the direct contrast to the emotionalism and formlessness of the event. Like the wave in a sports stadium, the young men stood up one by one on the back of the trucks, their green turbans cut into the indefinite wash of a grey, polluted sky, their eyes searching until they fixed on me, now exposed and vulnerable on the roof of the jeep. And quickly they leapt from their trucks like a SWAT team responding crisply to a crisis, precise and efficient, jaws clenched, cocked for action. I saw them first through the lens of my camera, and uttered an expletive or two appropriate to the situation. I knew I was in trouble, and clearly, I had nowhere to go. The turbans formed a green ribbon winding through the mass. As they approached, the eyes of the militants were trained on me with the focus of a predator about to take down its prey. I slipped back into the jeep through the window, and motioned for Ashicksahib to look over the crowd and see the slow and steady movement of the green turbans toward us. His smile vanished instantly, and he readied himself for confrontation. When the first militant reached the jeep's window, Ashicksahib's entire body was taut and urgent, like a finger twitching on the trigger of a pistol. "American! American! No photo! No photo!" The leader of the group shouted at me in English and began to bang the side of the jeep. Ten or twelve young men, eyes flaring under their turbans, screamed at me and joined in the assault on the jeep. Ashicksahib had waited for a particular moment, it occurred to me later, a certain point in the rising arc of tension and emotion. He opened his door, but did not leave the jeep. Instead he stood on the step on the driver's side, half in and half out, slowly unfurled his considerable frame to its full height, and began his verbal assault. He stood on his perch above the action and in a play of passions, he shouted his opponents into submission. There were a few physical sorties by the militants, attempts to kick the door of the jeep into Ashicksahib, but these were displays, and Ashicksahib kicked back only once. And suddenly they wavered, an erosion of spirit evidenced in their eyes, a bending to the force roaring above them. They gave up their attempts to grab my camera, to gain entry to the jeep, and with a swift gesture of his hand, the leader called his small army into retreat. This same festival that mobilised great masses of people in celebration, that enacted the inextricableness of nationalist and Pakistani Muslim commitment and identity, that on the surface appeared to articulate and demonstrate a collective belief and purpose, also dramatised conflictive divisions and the diverse interpretations of what it means to be a Pakistani, a Muslim, a Punjabi, an Indus person, a Lahori, a poor person, a person of means, and numerous other identities at stake. As an obvious westerner in the midst of the event, I was variously ignored, warmly greeted as a friendly foreigner, or accosted as an unwelcome interloper, each interaction unfolding within a broader and deeper passionate ritual which for some meant play and celebration, and for others meant a serious and forceful demonstration of affiliation, faith, and nationalism. I had been working in both village and urban contexts on issues and strategies around communication/education and advocacy with South Asia Partnership-Pakistan, a non-government organisation based in Lahore that was engaged in front-line work for social change. The organisation was driven by the pursuit of the principles of civil society, and on a daily basis, it contended with the brutal contradictions to those principles. Its work was carried out against a bulwark of poverty and fundamentalism that seemed impenetrable, and this moment of imminent confrontation resonated with the complex historical, cultural, and political dynamics of identity, religion, nationalism, colonialism, and a seething cauldron of south Asian geopolitics. As Paulo Freire argued that world views are manifested in actions that offer insight into broader and prevailing social and political conditions, so Geertz maintained that societies "contain their own interpretations". This was not essentialism -- there were none of the conceits or romanticism of essentialist readings of the commonplace as encapsulated social and political axioms. Rather, these views were a call for analytical honesty, a participatory and political dimension to cultural analysis that works to gain some access to these "interpretations" by encountering and apprehending culture in forms of action. Cultural analysis becomes a kind of trial-by-fire, a description from a viewpoint of participatory engagement. By "participatory", I mean everything that the bloodlessness and obfuscation of so much of Cultural Studies is not -- an actual stake in action and consequence in a real world of politics. The interpretation of culture is valuable when it attends to action rather than theoretical insinuation; to cultural volatility and contingency, and the broad determinants of social discourse rather than schemata and structure as critical ends. Interpretation has a participatory dimension -- an involvement, an engagement with culture described and interpreted -- which eschews the privilege of theory unimpeded by empirical evidence. References Freire, Paulo. Pedagogy of the Oppressed. Harmondsworth. Penguin, 1972. Geertz, Clifford. The Interpretation of Cultures. New York: Basic Books, 1973. Readings, Bill. The University in Ruins. Cambridge: Harvard UP, 1996. Schiller, Friedrich. Notes on the Aesthetic Education of Man. Trans. E.M. Wilkinson and L.A. Willoughby. Oxford: Clarendon Press, 1967. Tylor, Edward B. Primitive Culture: Researches into the Development of Mythology, Philosophy, Religion, Language, Art and Customes. 2 vol. New York: Henry Holt, 1877. Williams, Raymond. "Culture is Ordinary". Resources of Hope: Culture, Democracy, Socialism. Ed. Robin Gable. London: Verso, 1989. Citation reference for this article MLA style: Martin Laba. "Culture as Action." M/C: A Journal of Media and Culture 3.2 (2000). [your date of access] <http://www.api- network.com/mc/0005/action.php>. Chicago style: Martin Laba, "Culture as Action," M/C: A Journal of Media and Culture 3, no. 2 (2000), <http://www.api-network.com/mc/0005/action.php> ([your date of access]). APA style: Martin Laba. (2000) Culture as action. M/C: A Journal of Media and Culture 3(2). <http://www.api-network.com/mc/0005/action.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
40

Mules, Warwick. "Virtual Culture, Time and Images." M/C Journal 3, no. 2 (May 1, 2000). http://dx.doi.org/10.5204/mcj.1839.

Full text
Abstract:
Introduction The proliferation of electronic images and audiovisual forms, together with the recent expansion of Internet communication makes me wonder about the adequacy of present theoretical apparatus within the humanities and communication disciplines to explain these new phenomena and their effects on human life. As someone working roughly within a cultural and media studies framework, I have long harboured suspicions about the ability of concepts such as text, discourse and representation to give an account of the new media which does not simply reduce them to another version of earlier media forms. Many of these concepts were established during the 1970s and 80s, in the development of poststructuralism and its linguistic bias towards the analysis of literary and print media text. The application of these concepts to an electronic medium based on the visual image rather than the printed word seems somewhat perverse, and needs to be replaced by the application of other concepts drawn from a paradigm more suited for the purpose. In this brief essay, I want to explore some of the issues involved in thinking about a new cultural paradigm based on the photovisual/electronic image, to describe and critique the transformation of culture currently taking place through the accelerated uptake of new televisual, audiovisual and computer technologies. I am reminded here of the existential philosopher Heidegger's words about technology: 'the essence of technology is by no means anything technological' (Heidegger 4). For Heidegger, technology is part of the 'enframing' of the beingness which humans inhabit in various ways (Dasein). But technology itself does not constitute this beingness. This is good news for those of us (like myself) who have only a general and non-technical knowledge of the new technologies currently sweeping the globe, but who sense their profound effects on the human condition. Indeed, it suggests that technical knowledge in itself is insufficient and even inadequate to formulate appropriate questions about the relationship between technology and human being, and to the capacities of humans to respond to, and transform their technologically mediated situations. We need a new way of understanding human being as mediated by technologies, which takes into account the specific technological form in which mediation occurs today. To do this, we need new ways of conceptualising culture, and the specific kind of human subjectivity made possible within a culture conditioned by electronic media. From Material to Virtual Culture The concept of culture, as it has been predominantly understood in the humanities and associated disciplines, is based on the idea of physical presence. That is to say, culture is understood in terms of the various representations and practices that people experience within social and historical contexts defined by the living presence of one human being to another. The paradigm case here is speech-based linguistics in which all forms of communication are understood in terms of an innate subjectivity, expressed in the act of communicating something to someone else. Although privileging the site and moment of co-presence, this model does not require the speakers to be immediately present to each other in face-to-face situations, but asks only that co-presence be the ideal upon which successful acts of communication take place. As French philosopher Jacques Derrida has consistently argued over the last thirty years, all forms of western discourse, in one way or another, have been based on this kind of understanding of the way meanings and expressions of subject identity take place (Derrida 27ff.). A good case in point is the introductory essay by John Frow and Meaghan Morris to their edited text book Australian Cultural Studies: A Reader, where culture is defined as "a contested and conflictual set of practices of representation bound up with the processes of formation and re-formation of social groups" (xx). If culture is defined in terms of the agonistic formation of social groups through practices of representation, then there can be no way of thinking about culture outside the social as the privileged domain of human interaction. Culture is reduced to the social as a kind of paradigm limit, which is, in turn, characterised by the formation of social groups fixed in time and space. Even when an effort is made to indicate that social groups are themselves culturally constituted, as Frow and Morris go on to say, the social is nevertheless invoked again as an underlying presumption: "the social processes by which the categories of the real and of group existence are formed" (xx). In this model, social groups are formed by social processes. The task of representation and signification (the task of culture) is to draw the group together, no matter how widespread or dispersed, to make it coherent and identifiably different from other groups. Under these terms, the task of cultural analysis is to describe how this process takes place. This 'material' approach to culture normalises the social at the expense of the cultural, underpinned by a 'metaphysics of presence' whereby meaning and identity are established within a system of differential values (difference) by fixing human subjectivity in space and time. I argue that the uptake of new communication technologies makes this concept of culture obsolete. Culture now has to be understood in terms of 'virtual presence' in which the physical context of human existence is simultaneously 'doubled' and indeed proliferated into a virtual reality, with effective force in the 'real' world. From this perspective, we need to rethink culture so that it is no longer understood in terms of differential meanings, identities, texts, discourses and representational forms, but rather as a new kind of ontology involving the 'being' of human subjects and their relations to each other in deterritorialised fields of mediated co-presence, where the real and the virtual enmesh and interact. In this case, the laws governing physical presence no longer apply since it is possible to be 'here' and 'there' at the same time. We need a new approach and a new set of analytical terms to account for this new phenomenon. Virtual Culture and the Time of Human Presence In his well known critique of modern culture, Walter Benjamin invents the concept of the 'dialectical image' to define the visual concreteness of the everyday world and its effect on human consciousness. Dialectical images operate through an instantaneous flash of vision which breaks through everyday reality, allowing an influx of otherness to flood present awareness in a transformation of the past into the present: "the past can be seized only as an image which flashes up at the instant when it can be recognized and is never seen again" (Benjamin, Theses 255). Bypassing discourse, language and meaning, dialectical images invoke the eternal return -- the affirmation of the present as an ever-constant repetition of temporality -- as the 'ground' of history, progress and the future. Modern technology and its infinite power of reproduction has created the condition under which the image separates from its object, thereby releasing materiality from its moribund state in the past (Benjamin, The Work of Art). The ground of temporality is thus rendered virtual and evanescent, involving a 'deterritorialisation' of human experience from its ego-attachment to the present; an experience which Benjamin understands in repressed mythical terms. For Benjamin, the exemplary modern technology is photography. A photograph 'destroys' the originariness of the object, by robbing it of aura, or "the unique phenomenon of a distance, however close it may be" (Benjamin, The Work of Art 222). The photographic image is thus dialectical because it collapses the distance between the object and its image, thereby undermining the ontological space between the past and the present which might otherwise grant to the object a unique being in the presence of the viewer. But all 'things' also have their images, which can be separated and dispersed through space and time. Benjamin's approach to culture, where time surpasses space, and where the reproduced image takes priority over the real, now appears strangely prophetic. By suggesting that images are somehow directly and concretely affective in the constitution of human temporality, Benjamin has anticipated the current 'postmodern' condition in which the electronic image has become enmeshed in everyday life. As Paul Virilio argues, new communication technologies accelerate the transmission of images to such a rate that the past is collapsed into the present, creating an overpowering sense of immediacy: the speed of new optoelectronic and electroacoustic milieu becomes a final void (the void of the quick), a vacuum that no longer depends on the interval between places or things and so on the world's very extension, but on the interface of an instantaneous transmission of remote appearances, on a geographic and geometric retention in which all volume, all relief vanish. (33) Distance is now experienced in terms of its virtual proximity to the perceiving subject, in which space is no longer understood in terms of Newtonian extension, but as collapsed or compressed temporality, defined by the speed of light. In this Einsteinian world, human interaction is no longer governed by the law of non-contradiction which demands that one thing cannot be something else or somewhere else at the same time, and instead becomes 'interfacial', where the image-double enmeshes with its originary being as a co-extensive ontology based on "trans-appearance", or the effective appearance on a single horizon of two things from different space and time zones: "the direct transparence of space that enables each of us to perceive our immediate neighbours is completed by the indirect transparence of the speed-time of the electromagnetic waves that transmit our images and our voices" (Virilio 37). Like the light from some distant star which reaches earth millions of years after its explosive death, we now live in a world of remote and immediately past events, whose effects are constantly felt in real time. In this case the present is haunted by its past, creating a doppelgänger effect in which human being is doubled with its image in a co-extensive existence across space and time. Body Doubles Here we can no longer speak of the image as a representation, or even a signification, since the image is no longer secondary to the thing from which it is separated, nor is it a sign of anything else. Rather, we need to think of the possibility of a kind of 'image-event', incorporating both the physical reality of the human body and its image, stretched through time and space. French theorists Gilles Deleuze and Félix Guattari have developed an entire theoretical scheme to define and describe this kind of phenomenon. At one point in their magnum opus, A Thousand Plateaus: Capitalism and Schizophrenia, they introduce the concept of haecceity: a body is not defined by the form that determines it nor as a determinate substance or subject nor by the organs it possesses or the function it fulfils. On the plane of consistency, a body is defined by a longitude and a latitude: in other words the sum total of the material elements belonging to it under given relations of movement and rest, speed and slowness (longitude); the sum total of the intensive affects it is capable of at a given power or degree of potential (latitude). (260) This haecceity of the human body, as "trajectory", or "interassemblage" (262) denies the priority of an originating event or substance from which its constitutive elements could be derived. For instance photographs cease to be 'indexes' of things, and become instead part of an assemblage which includes living bodies and other forms of human presence (speech, writing, expressive signs), linked contingently into assemblages through space and time. A photographic image is just as much part of the 'beingness' of something as the thing itself; things and images are part of a perpetual process of becoming; a contingent linking of bricolage with different and diverging material expressions and effects. Thinking along these lines will get us around the problem of non-contradiction (that something cannot be both 'here' and 'there' at the same time), by extending the concept of 'thing' to include all the elements of its dispersal in time and space. Here we move from the idea of a thing as unique to itself (for instance the body as human presence) and hence subject to a logic of exchange based on scarcity and lack, to the idea of a thing as 'becoming', and subject to a logic of proliferation and excess. In this case, the unique phenomenon of human presence anchored in speech can no longer be used as a focal point to fix human subjectivity, its meanings and forms of expression, since there will be many different kinds of 'presencing' of human being, through the myriad trajectories traced out in all the practices and assemblages through time and space. A Practical Approach By thinking of culture in terms of virtual presence, we can no longer assume the existence of a bedrock foundation for human interaction based on the physical proximity of individuals to each other in time and space. Rather we need to think of culture in terms the emergence of new kinds of 'beingness', which deterritorialises human presence in different ways through the mediating power of photovisual and electronic imagery. These new kinds of beingness are not really new. Recent writers and cultural theorists have already described in detail the emergence of a virtual culture in the nineteenth century with the invention of photography and film, as well as various viewing devices such as the stereoscope and other staging apparatuses including the panorama and diorama (Friedberg, Batchen, Crary). Analysis of virtual culture needs to identify the various trajectories along which elements are assembled into an incessant and contingent 'becoming'. In terms of photovisual and electronic media, this can take place in different ways. By tracing the effective history of an image, it is possible to locate points at which transformations from one form to another occur, indicating different effects in different contexts through time. For instance by scanning through old magazines, you might be able to trace the 'destiny' of a particular type of image, and the kinds of meanings associated with it. Keeping in mind that an image is not a representation, but a form of affect, it might be possible to identify critical points where the image turns into its other (in fashion imagery we are now confronted with images of thin bodies suddenly becoming too thin, and hence dangerously subversive). Another approach concerns the phenomenon known as the media event, in which electronic images outstrip and overdetermine physical events in real time to which they are attached. In this case an analysis of a media event would involve the description of the interaction between events and their mediated presence, as mutually effective in real time. Recent examples here include the Gulf War and other international emergencies and conflicts in the Balkans and the 1986 coup in the Philippines, where media presence enabled images to have a direct effect on the decisions and deployment of troops and strategic activities. In certain circumstances, the conduct of warfare might now take place entirely in virtual reality (Kellner). But these 'peak events' don't really exhaust the ways in which the phenomenon of the media event inhabits and affects our everyday lives. Indeed, it might be better to characterise our entire lives as conditioned to various degrees by media eventness, as we become more and more attached and dependent on electronic imagery and communication to gain our sense of place in the world. An analysis of this kind of everyday interaction is long overdue. We can learn about the virtual through our own everyday experiences. Here I am not so much thinking of experiences to be had in futuristic apparatuses such as the virtual reality body suit and other computer generated digital environments, but the kinds of experiences of the virtual described by Benjamin in his wanderings through the streets of Berlin and Paris in the 1920s (Benjamin, One Way Street). A casual walk down the main street of any town, and a perfunctory gaze in the shop windows will trigger many interesting connections between specific elements and the assemblages through which their effects are made known. On a recent trip to Bundaberg, a country town in Queensland, I came across a mechanised doll in a jewellery store display, made up in the likeness of a watchmaker working at a miniature workbench. The constant motion of the doll's arm as it moved up and down on the bench in a simulation of work repeated the electromechanical movements of the dozens of clocks and watches displayed elsewhere in the store window, suggesting a link between the human and the machine. Here I was presented not only with a pleasant shop display, but also with the commodification of time itself, as an endless repetition of an interval between successive actions, acted out by the doll and its perpetual movement. My pleasure at the display was channelled through the doll and his work, as a fetishised enchantment or "fairy scene" of industrialised productivity, in which the idea of time is visualised in a specific image-material form. I can imagine many other such displays in other windows in other towns and cities, all working to reproduce this particular kind of assemblage, which constantly 'pushes' the idea-image of time as commodity into the future, so long as the displays and their associated apparatuses of marketing continue in this way rather than some other way. So my suggestion then, is to open our eyes to the virtual not as a futuristic technology, but as it already shapes and defines the world around us through time. By taking the visual appearance of things as immaterial forms with material affectivity, we allow ourselves to move beyond the limitations of physical presence, which demands that one thing cannot be something else, or somewhere else at the same time. The reduction of culture to the social should be replaced by an inquiry into the proliferation of the social through the cultural, as so many experiences of the virtual in time and space. References Bataille, Georges. Visions of Excess: Selected Writings, 1927-1939.Trans. Allan Stoekl. Minneapolis: Minnesota UP, 1985. Batchen, Geoffrey. "Spectres of Cyberspace." Afterimage 23.3. Benjamin, Walter. "Theses on the Philosophy of History." Illuminations: Essays and Reflections. Trans. Hannah Arendt. New York: Schocken, 1968. 253-64. ---. "The Work of Art in the Age of Electronic Reproduction." Illuminations: Essays and Reflections. Trans. Hannah Arendt. New York: Schocken, 1968. 217-51. ---. One Way Street and Other Writings. Trans. Edmund Jephcott and Kingsley Shorter. London: Verso, 1979. Buck-Morss, Susan. The Dialectics of Seeing: Walter Benjamin and the Arcades Project. Cambridge, Mass.: MIT P, 1997. Crary, Jonathan. Techniques of the Observer: On Vision and Modernity in the Nineteenth Century. Chicago: MIT P, 1992. Derrida, Jacques. Of Grammatology. Trans. Gayatri Spivak. Baltimore: Johns Hopkins UP, 1974. Friedberg, Anne. Window Shopping: Cinema and the Postmodern. Berkeley: U of California P, 1993. Frow, John. Time & Commodity Culture: Essays in Cultural Theory and Postmodernity. Oxford: Clarendon, 1997. Frow, John, and Meaghan Morris, eds. Australian Cultural Studies: A Reader. St. Leonards, NSW: Allen and Unwin, 1993. Heidegger, Martin. "The Question Concerning Technology." The Question Concerning Technology. Trans. William Lovitt. New York: Harper. 3-35. Kellner, Douglas. "Virilio, War and Technology." Theory, Culture & Society 16.5-6 (1999): 103-25. Sean Aylward Smith. "Where Does the Body End?" M/C: A Journal of Media and Culture 2.3 (1999). 30 Apr. 2000 <http://www.uq.edu.au/mc/9905/end.php>. Virilio, Paul. Open Sky. Trans. Julie Rose. London: Verso, 1997. Zimnik, Nina. "'Give Me a Body': Deleuze's Time Image and the Taxonomy of the Body in the Work of Gabriele Leidloff." Enculturation 2.1 (1998). <http://www.uta.edu/huma/enculturation/>. Citation reference for this article MLA style: Warwick Mules. "Virtual Culture, Time and Images: Beyond Representation." M/C: A Journal of Media and Culture 3.2 (2000). [your date of access] <http://www.api-network.com/mc/0005/images.php>. Chicago style: Warwick Mules, "Virtual Culture, Time and Images: Beyond Representation," M/C: A Journal of Media and Culture 3, no. 2 (2000), <http://www.api-network.com/mc/0005/images.php> ([your date of access]). APA style: Warwick Mules. (2000) Virtual culture, time and images: beyond representation. M/C: A Journal of Media and Culture 3(2). <http://www.api-network.com/mc/0005/images.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
41

West, Patrick Leslie, and Cher Coad. "Drawing the Line: Chinese Calligraphy, Cultural Materialisms and the "Remixing of Remix"." M/C Journal 16, no. 4 (August 11, 2013). http://dx.doi.org/10.5204/mcj.675.

Full text
Abstract:
Western notions of authors’ Intellectual Property Rights (IPRs), as expressed within copyright law, maintain a potentially fraught relationship with a range of philosophical and theoretical positions on writing and authorship that have developed within contemporary Western thinking. For Roland Barthes, authorship is compromised, de-identified and multiplied by the very nature of writing: ‘Writing is that neutral, composite, oblique space where our subject slips away, the negative where all identity is lost, starting with the very identity of the body writing’ (142). Gilles Deleuze and Félix Guattari follow a related line of thought in A Thousand Plateaus: ‘Write, form a rhizome, increase your territory by deterritorialization, extend the line of flight to the point where it becomes an abstract machine covering the entire plane of consistency’ (11). Similarly, in Of Grammatology, Jacques Derrida suggests that ‘Writing is that forgetting of the self, that exteriorization, the contrary of the interiorizing memory’ (24). To the extent that these philosophical and theoretical positions emerge within the practices of creative writers as remixes of appropriation, homage and/or pastiche, prima facie they problematize the commercial rights of writers as outlined in law. The case of Kathy Acker often comes up in such discussions. Acker’s 1984 novel Blood and Guts in High School, for example, incorporates techniques that have attracted the charge of plagiarism as this term is commonly defined. (Peter Wollen notes this in his aptly named essay ‘Death [and Life] of the Author.’) For texts like Acker’s, the comeback against charges of plagiarism usually involves underscoring the quotient of creativity involved in the re-combination or ‘remixing’ of the parts of the original texts. (Pure repetition would, it would seem, be much harder to defend.) ‘Plagiarism’, so-called, was simply one element of Acker’s writing technique; Robert Lort nuances plagiarism as it applies to Acker as ‘pseudo-plagiarism’. According to Wollen, ‘as she always argued, it wasn’t really plagiarism because she was quite open about what she did.’ As we shall demonstrate in more detail later on, however, there is another and, we suggest, more convincing reason why Acker’s work ‘wasn’t really plagiarism.’ This relates to her conscious interest in calligraphy and to her (perhaps unconscious) appropriation of a certain strand of Chinese philosophy. All the same, within the Western context, the consistent enforcement of copyright law guarantees the rights of authors to control the distribution of their own work and thus its monetised value. The author may be ‘dead’ in writing—just the faintest trace of remixed textuality—but he/she is very much ‘alive’ as in recognised at law. The model of the author as free-standing citizen (as a defined legal entity) that copyright law employs is unlikely to be significantly eroded by the textual practices of authors who tarry artistically in the ‘de-authored territories’ mapped by figures like Barthes, Deleuze and Guattari, and Derrida. Crucially, disputes concerning copyright law and the ethics of remix are resolved, within the Western context, at the intersection of relatively autonomous creative and legal domains. In the West, it is seen that these two domains are related within the one social fabric; each nuances the other (as Acker’s example shows in the simultaneity of her legal/commercial status as an author and her artistic practice as a ‘remixer’ of the original works of other authors). Legal and writing issues co-exist even as they fray each other’s boundaries. And in Western countries there is force to the law’s operations. However, the same cannot be said of the situation with respect to copyright law in China. Chinese artists are traditionally regarded as being aloof from mundane legal and commercial matters, with the consequence that the creative and the legal domains tend to ‘miss each other’ within the fabric of Chinese society. To this extent, the efficacy of the law is muted in China when it comes into contact with circumstances of authorship, writing, originality and creativity. (In saying this though, we do not wish to fall into the trap of cultural essentialism: in this article, ‘China’ and ‘The West’ are placeholders for variant cultural tendencies—clustered, perhaps, around China and its disputed territories such as Taiwan on the one hand, and around America on the other—rather than homogeneous national/cultural blocs.) Since China opened its system to Western capitalist economic activity in the 1980s, an ongoing criticism, sourced mainly out of the West, has been that the country lacks proper respect for notions of authorship and, more directly, for authorship’s derivative: copyright law. Tellingly, it took almost ten years of fierce negotiations between elements of the capitalist lobby in China and the Legislative Bureau to make the Seventh National People’s Congress pass the first Copyright Law of the People’s Republic of China on 7 September 1990. A law is one thing though, and adherence to the law is another. Jayanthi Iyengar of Asia Times Online reports that ‘the US government estimates that piracy within China [of all types of products] costs American companies $20-24 billion a year in damages…. If one includes European and Japanese firms, the losses on account of Chinese piracy is in excess of $50 billion annually.’ In 2008, the International Federation of the Phonographic Industry (IFPI) reported that more than 99% of all music files in China are pirated. In the same year, Cara Anna wrote in The Seattle Times that, in desperation at the extent of Chinese infringement of its Intellectual Property Rights (IPRs), Microsoft has deployed an anti-piracy tactic that blacks out the screens of computers detected running a fake copy of Windows. The World Trade Organisation (WTO) has filed complaints from many countries against China over IPRs. Iyengar also reports that, under such pressure, the State Intellectual Property Office in Beijing has vowed it will continue to reinforce awareness of IPRs in order to better ensure their protection. Still, from the Western perspective at least, progress on this extremely contentious issue has been excruciatingly slow. Such a situation in respect of Chinese IPRs, however, should not lead to the conclusion that China simply needs to catch up with the more ‘morally advanced’ West. Rather, the problematic relations of the law and of creativity in China allow one to discern, and to trace through ancient Chinese history and philosophy, a different approach to remix that does not come into view so easily within Western countries. Different materialisms of writing and authorship come into play across global space, with different effects. The resistance to both the introduction and the policing of copyright law in China is, we think, the sign of a culture that retains something related to authorship and creativity that Western culture only loosely holds onto. It provides a different way of looking at remix, in the guise of what the West would tend to label plagiarism, as a practice, especially, of creativity. The ‘death’ of the author in China at law (the failure to legislate and/or police his/her rights) brings the author, as we will argue, ‘alive’ in the writing. Remix as anonymous composition (citing Barthes) becomes, in the Chinese example, remix as creative expression of singular feelings—albeit remix set adrift from the law. More concretely, our example of the Chinese writer/writing takes remix to its limit as a practice of repetition without variation—what the West would be likely to call plagiarism. Calligraphy is key to this. Of course, calligraphy is not the full extent of Chinese writing practice—not all writing is calligraphic strictly speaking. But all calligraphy is writing, and in this it influences the ethics of Chinese writing, whether character-based or otherwise, more generally. We will have more to say about the ‘pictorial’ material aspect of Chinese writing later on. In traditional Chinese culture, writing is regarded as a technical practice perfected through reproduction. Chinese calligraphy (visual writing) is learnt through exhaustively tracing and copying the style of the master calligrapher. We are tempted to say that what is at stake in Chinese remix/calligraphy is ‘the difference that cannot be helped:’ that is, the more one tries, as it were, to repeat, the more repetition becomes impossible. In part, this is explained by the interplay of Qing 情 (‘feelings’) and Yun 韵 (‘composed body movements’). Now, the order of the characters—Qing 情 (‘feelings’) before Yun 韵 (‘composed body movements’)—suggests that Qing creates and supports Yun. To this extent, what we have here is something akin to a Western understanding of creative writing (of the creativity of writing) in which individual and singular feelings are given expression in the very movement of the writing itself (through the bodily actions of the writer). In fact though, the Chinese case is more complicated than this, for the apprenticeship model of Chinese calligraphy cultivates a two-way interplay of Qing 情 (‘feelings’) and Yun 韵 (‘composed body movements’). More directly, the ‘composed body movements’ that one learns from the master calligrapher help compose one’s own ‘feelings’. The very repetition of the master’s work (its remixing, as it were…) enables the creativity of the apprentice. If this model of creativity is found somewhat distasteful from a Western perspective (that is, if it is seen to be too restrictive of originality) then that is because such a view, we think, depends upon a cultural misunderstanding that we will try to clear up here. To wit, the so-called Confucian model of rote learning that is more-or-less frowned upon in the West is not, at least not in the debased form that it adopts in Western stereotypes, the philosophy active in the case of Chinese calligraphy. That philosophy is Taoism. As Wing-Tsit Chan elucidates, ‘by opposing Confucian conformity with non-conformity and Confucian worldliness with a transcendental spirit, Taoism is a severe critic of Confucianism’ (136). As we will show in a moment, Chinese calligraphy exemplifies this special kind of Taoist non-conformity (in which, as Philip J. Ivanhoe limns it, ‘one must unweave the social fabric’). Chan again: ‘As the way of life, [Taoism] denotes simplicity, spontaneity, tranquility, weakness, and most important of all, non-action (wu-wei). By the latter is not meant literally “inactivity” but rather “taking no action that is contrary to Nature”—in other words, letting Nature take its own course’ (136). Thus, this is a philosophy of ‘weakness’ that is neither ‘negativism’ nor ‘absolute quietism’ (137). Taoism’s supposed weakness is rather a certain form of strength, of (in the fullest sense) creative possibilities, which comes about through deference to the way of Nature. ‘Hold fast to the great form (Tao), / And all the world will come’ illustrates this aspect of Taoism in its major philosophical tract, The Lao Tzu (Tao-Te Ching) or The Classic of the Way and its Virtue (section 35, Chan 157). The guiding principle is one of deference to the original (way, Nature or Tao) as a strategy of an expression (of self) that goes beyond the original. The Lao Tzu is full of cryptic, metaphoric expressions of this idea: ‘The pursuit of learning is to increase day after day. / The pursuit of Tao is to decrease day after day. / It is to decrease and further decrease until one reaches the point of taking no action. / No action is undertaken, and yet nothing is left undone’ (section 48, Chan 162). Similarly, The female always overcomes the male by tranquility, / And by tranquility she is underneath. / A big state can take over a small state if it places itself below the small state; / And the small state can take over a big state if it places itself below the big state. / Thus some, by placing themselves below, take over (others), / And some, by being (naturally) low, take over (other states) (section 61, Chan 168). In Taoism, it is only by (apparent) weakness and (apparent) in-action that ‘nothing is left undone’ and ‘states’ are taken over. The two-way interplay of Qing 情 (‘feelings’) and Yun 韵 (‘composed body movements’), whereby the apprentice copies the master, aligns with this key element of Taoism. Here is the linkage between calligraphy and Taoism. The master’s work is Tao, Nature or the way: ‘Hold fast to the great form (Tao), / And all the world will come’ (section 35, Chan 157). The apprentice’s calligraphy is ‘all the world’ (‘all the world’ being, ultimately in this context, Qing 情 [‘feelings’]). Indeed, Taoism itself is a subtle philosophy of learning (of apprenticeship to a master), unlike Confucianism, which Chan characterises as a doctrine of ‘social order’ (of servitude to a master) (136). ‘“Learn not learn”’ is how Wang Pi, as quoted by Chan (note 121, 170), understands what he himself (Chan) translates as ‘He learns to be unlearned’ (section 64, 170). In unlearning one learns what cannot be taught: this is, we suggest, a remarkable definition of creativity, which also avoids falling into the trap of asserting a one-to-one equivalence between (unlearnt) originality and creativity, for there is both learning and creativity in this Taoist paradox of pedagogy. On this, Michael Meehan points out that ‘originality is an over-rated and misguided concept in many ways.’ (There is even a sense in which, through its deliberate repetition, The Lao Tzu teaches itself, traces over itself in ‘self-plagiarising’ fashion, as if it were reflecting on the re-tracings of calligraphic pedagogy. Chan notes just how deliberate this is: ‘Since in ancient times books consisted of bamboo or wooden slabs containing some twenty characters each, it was not easy for these sentences… to be added by mistake…. Repetitions are found in more than one place’ [note 102, 166].) Thinking of Kathy Acker too as a learner, Peter Wollen’s observation that she ‘incorporated calligraphy… in her books’ and ‘was deeply committed to [the] avant-garde tradition, a tradition which was much stronger in the visual arts’ creates a highly suggestive connection between Acker’s work and Taoism. The Taoist model for learning calligraphy as, precisely, visual art—in which copying subtends creativity—serves to shift Acker away from a Barthesian or Derridean framework and into a Taoist context in which adherence to another’s form (as ‘un-learnt learning’) creatively unravels so-called plagiarism from the inside. Acker’s conscious interest in calligraphy is shown by its prevalence in Blood and Guts in High School. Edward S. Robinson identifies this text as part of her ‘middle phase’, which ‘saw the introduction of illustrations and diagrams to create multimedia texts with a collage-like feel’ (154). To our knowledge, Acker never critically reflected upon her own calligraphic practices; perhaps if she had, she would have troubled what we see as a blindspot in critics’ interpretations of her work. To wit, whenever calligraphy is mentioned in criticism on Acker, it tends to be deployed merely as an example of her cut-up technique and never analysed for its effects in its own cultural, philosophical and material specificity. (Interestingly, if the words of Chinese photographer Liu Zheng are any guide, the Taoism we’re identifying in calligraphy has also worked its way into other forms of Chinese visual art: she refers to ‘loving photographic details and cameras’ with the very Taoist term, ‘lowly’ 低级 [Three Shadows Photography Art Centre 187].) Being ‘lowly’, ‘feminine’ or ‘underneath’ has power as a radical way of learning. We mentioned above that Taoism is very metaphoric. As the co-writer of this paper Cher Coad recalls from her calligraphy classes, students in China grow up with a metaphoric proverb clearly inspired by Lao Tzu’s Taoist philosophy of learning: ‘Learning shall never stop. Black comes from blue, but is more than the blue.’ ‘Black comes from blue, but is more than the blue.’ What could this mean? Before answering this question with recourse to two Western notions that, we hope, will further effect (building on Acker’s example) a rapprochement between Chinese and Western ways of thinking (be they nationally based or not), we reiterate that the infringement of Intellectual Property Rights (IPRs) in China should not be viewed only as an egregious denial of universally accepted law. Rather, whatever else it may be, we see it as the shadow in the commercial realm—mixed through with all the complexities of Chinese tradition, history and cultural difference, and most particularly of the Taoist strand within Confucianism—of the never-quite-perfect copying of calligraphic writing/remixing. More generally, the re-examination of stereotypical assumptions about Chinese culture cues a re-examination of the meaning behind the copying of products and technology in contemporary, industrialised China. So, ‘Black comes from blue, but is more than the blue.’ What is this ‘more than the blue of black’? Or put differently, why is calligraphic writing, as learnt from the master, always infused with the singular feelings of the (apprentice) writer? The work of Deleuze, Guattari and Claire Parnet provides two possible responses. In On the Line, Deleuze and Guattari (and Deleuze in co-authorship with Parnet) author a number of comments that support the conception we are attempting to develop concerning the lines of Chinese calligraphy. A line, Deleuze and Guattari suggest, is always a line of lines (‘Line of chance, line of hips, line of flight’ [57]). In the section of On the Line entitled ‘Politics’, Deleuze and Parnet outline the impossibility of any line being just one line. If life is a line (as it is said, you throw someone a life line), then ‘We have as many entangled lines in our lives as there are in the palm of a hand’ (71). Of any (hypothetical) single line it can be said that other lines emerge: ‘Black comes from blue, but is more than the blue.’ The feelings of the apprentice calligrapher (his/her multiple lines) emerge through the repeated copying of the lines and composed body movements of the master. The Deleuzean notion of repetition takes this idea further. Repetitive Chinese calligraphy clearly indexes what Claire Colebrook refers to as ‘Deleuze’s concept of eternal return. The only thing that is repeated or returns is difference; no two moments of life can be the same. By virtue of the flow of time, any repeated event is necessarily different (even if different only to the extent that it has a predecessor)’ (121). Now, it might be objected that Chinese calligraphic practices, because of the substantially ideographic nature of Chinese writing (see Kristeva 72-81), allow for material mutations that can find no purchase in Western, alphabetical systems of writing. But the materiality of time that Colebrook refers to as part of her engagement with Deleuzean non-repetitious (untimely) repetition guarantees the materiality of all modes of writing. Furthermore, Julia Kristeva notes that, with any form of language, one cannot leave ‘the realm of materialism’ (6) and Adrian Miles, in his article ‘Virtual Actual: Hypertext as Material Writing,’ sees the apparently very ‘unmaterial’ writing of hypertext ‘as an embodied activity that has its own particular affordances and possibilities—its own constraints and local actualisations’ (1-2). Calligraphic repetition of the master’s model creates the apprentice’s feelings as (inevitable) difference. In this then, the learning by the Chinese apprentice of the lines of the master’s calligraphy challenges international (both Western and non-Western) artists of writing to ‘remix remix’ as a matter—as a materialisation—of the line. Not the line as a self-identical entity of writing that only goes to make up writing more generally; rather, lines as a materialisation of lines within lines within lines. More self-reflexively, even the collaborative enterprise of this article, co-authored as it is by a woman of Chinese ethnicity and a white Australian man, suggests a remixing of writing through, beneath and over each other’s lines. Yun 韵 (‘composed body movements’) expresses and maximises Qing 情 (‘feelings’). Taoist ‘un-learnt learning’ generates remix as the singular creativity of the writer. Writers get into a blue with the line—paint it, black. Of course, these ideas won’t and shouldn’t make copyright infringement (or associated legalities) redundant notions. But in exposing the cultural relativisms often buried within the deployment of this and related terms, the idea of lines of lines far exceeds a merely formalistic practice (one cut off from the materialities of culture) and rather suggests a mode of non-repetitious repetition in contact with all of the elements of culture (of history, of society, of politics, of bodies…) wherever these may be found, and whatever their state of becoming. In this way, remix re-creates the depths of culture even as it stirs up its surfaces of writing. References Acker, Kathy. Blood and Guts in High School: A Novel. New York: Grove Press, 1978. Anna, Cara. ‘Microsoft Anti-Piracy Technology Upsets Users in China.’ The Seattle Times. 28 Oct. 2008 ‹http://seattletimes.com/html/businesstechnology/2008321919_webmsftchina28.html›. Barthes, Roland. ‘The Death of the Author.’ Barthes, Roland. Image-Music-Text. London: Fontana Press, 1977. 142-148. Chan, Wing-Tsit. A Source Book in Chinese Philosophy. Princeton, New Jersey: Princeton University Press, 1969. Colebrook, Claire. Gilles Deleuze. London: Routledge, 2002. Deleuze, Gilles, and Félix Guattari. On the Line. New York: Semiotext(e), 1983. Deleuze, Gilles, and Félix Guattari. A Thousand Plateaus: Capitalism and Schizophrenia. Minneapolis: University of Minnesota Press, 1987. Derrida, Jacques. Of Grammatology. Baltimore: Johns Hopkins University Press, 1976. International Federation of the Phonographic Industry. ‘Recording Industry Steps Up Campaign against Internet Piracy in China.’ ifpi. 4 Feb. 2008 ‹http://www.ifpi.org/content/section_news/20080204.html›. Ivanhoe, Philip J. ‘Taoism’. The Cambridge Dictionary of Philosophy. Ed. Robert Audi. Cambridge: Cambridge University Press, 1995. 787. Iyengar, Jayanthi. ‘Intellectual Property Piracy Rocks China Boat.’ Asia Times Online. 16 Sept. 2004 ‹http://www.atimes.com/atimes/China/FI16Ad07.html›. Kristeva, Julia. Language: The Unknown: An Initiation into Linguistics. New York: Columbia University Press, 1989. Lort, Robert. ‘Kathy Acker (1944-1997).’ Jahsonic: A Vocabulary of Culture. 2003 ‹http://www.jahsonic.com/KathyAcker.html›. Meehan, Michael. ‘Week 5a: Playing with Genres.’ Lecture notes. Unit ALL705. Short Stories: Writers and Readers. Trimester 2. Melbourne: Deakin University, 2013. Miles, Adrian. ‘Virtual Actual: Hypertext as Material Writing.’ Studies in Material Thinking 1.2 (April 2008) ‹http://www.materialthinking.org/papers/29›. Robinson, Edward S. Shift Linguals: Cut-up Narratives from William S. Burroughs to the Present. New York: Editions Rodopi, 2011. Three Shadows Photography Art Centre. ‘Photography and Intimate Space Symposium.’ Conversations: Three Shadows Photography Art Centre’s 2007 Symposium Series. Ed. RongRong, inri, et al. Beijing: Three Shadows Press Limited, 2008. 179-191. Wollen, Peter. ‘Death (and Life) of the Author.’ London Review of Books 20.3 (5 Feb. 1998). ‹http://www.lrb.co.uk/v20/n03/peter-wollen/death-and-life-of-the-author›.
APA, Harvard, Vancouver, ISO, and other styles
42

Kerasidou, Xaroula (Charalampia). "Regressive Augmentation: Investigating Ubicomp’s Romantic Promises." M/C Journal 16, no. 6 (November 7, 2013). http://dx.doi.org/10.5204/mcj.733.

Full text
Abstract:
Machines that fit the human environment instead of forcing humans to enter theirs will make using a computer as refreshing as taking a walk in the woods. Mark Weiser on ubiquitous computing (21st Century Computer 104) In 2007, a forum entitled HCI 2020: Human Values in a Digital Age sought to address the questions: What will our world be like in 2020? Digital technologies will continue to proliferate, enabling ever more ways of changing how we live. But will such developments improve the quality of life, empower us, and make us feel safer, happier and more connected? Or will living with technology make it more tiresome, frustrating, angst-ridden, and security-driven? What will it mean to be human when everything we do is supported or augmented by technology? (Harper et al. 10) The forum came as a response to, what many call, post-PC technological developments; developments that seek to engulf our lives in digital technologies which in their various forms are meant to support and augment our everyday lives. One of these developments has been the project of ubiquitous computing along with its kin project, tangible computing. Ubiquitous computing (ubicomp) made its appearance in the late 1980s in the labs of Xerox’s Palo Alto Research Center (PARC) as the “third wave” in computing, following those of the mainframe and personal computing (Weiser, Open House 2). Mark Weiser, who coined the term, along with his collaborators at Xerox PARC, envisioned a “new technological paradigm” which would leave behind the traditional one-to-one relationship between human and computer, and spread computation “ubiquitously, but invisibly, throughout the environment” (Weiser, Gold and Brown 693). Since then, the field has grown and now counts several peer-reviewed journals, conferences, and academic and industrial research centres around the world, which have set out to study the new “post-PC computing” under names such as Pervasive Computing, Ambient Intelligence, Tangible Computing, The Internet of Things, etc. Instead of providing a comprehensive account of all the different ubicomp incarnations, this paper seeks to focus on the early projects and writings of some of ubicomp’s most prominent figures and tease out, as a way of critique, the origins of some of its romantic promises. From the outset, ubiquitous computing was heavily informed by a human-centred approach that sought to shift the focus from the personal computer back to its users. On the grounds that the PC has dominated the technological landscape at the expense of its human counterparts, ubiquitous computing promised a different human-machine interaction, with “machines that fit the human environment instead of forcing humans to enter theirs” (104, my italics) placing the two in opposite and antagonistic terrains. The problem comes about in the form of interaction between people and machines … So when the two have to meet, which side should dominate? In the past, it has been the machine that dominates. In the future, it should be the human. (Norman 140) Within these early ubicomp discourses, the computer came to embody a technological menace, the machine that threatened the liberal humanist value of being free and in control. For example, in 1999 in a book that was characterized as “the bible of ‘post-PC’ thinking” by Business Week, Donald Norman exclaimed: we have let ourselves to be trapped. … I don’t want to be controlled by a technology. I just want to get on with my life, … So down with PC’s; down with computers. All they do is complicate our lives. (72) And we read on the website of MIT’s first ubicomp project Oxygen: For over forty years, computation has centered about machines, not people. We have catered to expensive computers, pampering them in air-conditioned rooms or carrying them around with us. Purporting to serve us, they have actually forced us to serve them. Ubiquitous computing then, in its early incarnations, was presented as the solution; the human-centred, somewhat natural approach, which would shift the emphasis away from the machine and bring control back to its legitimate owner, the liberal autonomous human subject, becoming the facilitator of our apparently threatened humanness. Its promise? An early promise of regressive augmentation, I would say, since it promised to augment our lives, not by changing them, but by returning us to a past, better world that the alienating PC has supposedly displaced, enabling us to “have more time to be more fully human” (Weiser and Brown). And it sought to achieve this through the key characteristic of invisibility, which was based on the paradox that while more and more computers will permeate our lives, they will effectively disappear. Ubicomp’s Early Romantic Promises The question of how we can make computers disappear has been addressed in computer research in various ways. One of the earliest and most prominent of these is the approach, which focuses on the physicality of the world seeking to build tangible interfaces. One of the main advocates of this approach is MIT’s Tangible Media Group, led by Professor Hiroshi Ishii. The group has been working on their vision, which they call “Tangible Bits,” for almost two decades now, and in 2009 they were awarded the “Lasting Impact Award” at the ACM Symposium on User Interface Software and Technology (UIST) for their metaDesk platform, presented in 1997 (fig.1), which explores the coupling of everyday physical objects with digital information (Ullmer and Ishii). Also, in 2004 in a special paper titled “Bottles: A Transparent Interface as a Tribute to Mark Weiser”, Ishii presented once again an early project he and his group developed in 1999, and for which they were personally commented by Weiser himself. According to Ishii, bottles (fig. 2)—a system which comprises three glass bottles “filled with music” each representing a different musical instrument, placed on a Plexiglas “stage” and controlled by their physical manipulation (moving, opening or closing them)—no less, “illustrates Mark Weiser’s vision of the transparent (or invisible) interface that weaves itself into the fabric of everyday life” (1299). Figure 1: metaDesk platform (MIT Tangible Media Group) Figure 2: musicBottles (MIT Tangible Media Group) Tangible computing was based on the premise that we inhabit two worlds: the physical world and cyberspace, or as Ishii and Ullmer put it, the world of atoms and the world of bits claiming that there is gap between these two worlds that left us “torn between these parallel but disjoint spaces” (1). This agreed with Weiser’s argument that cyberspace, and specifically the computer, has taken centre stage leaving the real world—the real people, the real interactions—in the background and neglected. Tangible computing then sought to address this problem by "bridging the gaps between both cyberspace and the physical environment" (1). As Ishii and Ullmer wrote in 1997: The aim of our research is to show concrete ways to move beyond the current dominant model of GUI [Graphic User Interface] bound to computers with a flat rectangular display, windows, a mouse, and a keyboard. To make computing truly ubiquitous and invisible, we seek to establish a new type of HCI that we call "Tangible User Interfaces" (TUIs). TUIs will augment the real physical world by coupling digital information to everyday physical objects and environments. (2) “Our intention is to take advantage of natural physical affordances to achieve a heightened legibility and seamlessness of interaction between people and information” (2). In his earlier work computer scientist Paul Dourish turned to phenomenology and the concept of embodiment in order to develop an understanding of interaction as embodied. This was prior to his recent work with cultural anthropologist Bell where they examined the motivating mythology of ubiquitous computing along with the messiness of its lived experience (Dourish and Bell). Dourish, in this earlier work observed that one of the common critical features early tangible and ubiquitous computing shared is that “they both attempt to exploit our natural familiarity with the everyday environment and our highly developed spatial and physical skills to specialize and control how computation can be used in concert with naturalistic activities” (Context-Aware Computing 232). They then sought to exploit this familiarity in order to build natural computational interfaces that fit seamlessly within our everyday, real world (Where the Action Is 17). This idea of an existing set of natural tactile skills appears to come hand-in-hand with a nostalgic, romantic view of an innocent, simple, and long gone world that the early projects of tangible and ubiquitous computing sought to revive; a world where the personal computer not only did not fit, an innocent world in fact displaced by the personal computer. In 1997, Ishii and Ullmer wrote about their decision to start their investigations about the “future of HCI” in the museum of the Collection of Historic Scientific Instruments at Harvard University in their efforts to get inspired by “the aesthetics and rich affordances of these historical scientific instruments” concerned that, “alas, much of this richness has been lost to the rapid flood of digital technologies” (1). Elsewhere Ishii explained that the origin of his idea to design a bottle interface began with the concept of a “weather forecast bottle;” an idea he intended to develop as a present for his mother. “Upon opening the weather bottle, she would be greeted by the sound of singing birds if the next day’s weather was forecasted to be clear” (1300). Here, we are introduced to a nice elderly lady who has opened thousands of bottles while cooking for her family in her kitchen. This senior lady; who is made to embody the symbolic alignment between woman, the domestic and nature (see Soper, Rose, Plumwood); “has never clicked a mouse, typed a URL, nor booted a computer in her life” (Ishii 1300). Instead, “my mother simply wanted to know the following day’s weather forecast. Why should this be so complicated?” (1300, my italics). Weiser also mobilised nostalgic sentiments in order to paint a picture of what it would be to live with ubiquitous computing. So, for example, when seeking a metaphor for ubiquitous computing, he proposed “childhood – playful, a building of foundations, constant learning, a bit mysterious and quickly forgotten by adults” (Not a Desktop 8). He viewed the ubicomp home as the ideal retreat to a state of childhood; playfully reaching out to the unknown, while being securely protected and safely “at home” (Open House). These early ideas of a direct experience of the world through our bodily senses along with the romantic view of a past, simple, and better world that the computer threatened and that future technological developments promised, could point towards what Leo Marx has described as America’s “pastoral ideal”, a force that, according to Marx, is ingrained in the American view of life. Balancing between primitivism and civilisation, nature and culture, the pastoral ideal “is an embodiment of what Lovejoy calls ‘semi-primitivism’; it is located in a middle ground somewhere ‘between’, yet in a transcendent relation to, the opposing forces of civilisation and nature” (Marx 23). It appears that the early advocates of tangible and ubiquitous computing sought to strike a similar balance to the American pastoral ideal; a precarious position that managed to reconcile the disfavour and fear of Europe’s “satanic mills” with an admiration for the technological power of the Industrial Revolution, the admiration for technological development with the bucolic ideal of an unspoiled and pure nature. But how was such a balance to be achieved? How could the ideal middle state be achieved balancing the opposing forces of technological development and the dream of the return to a serene pastoral existence? According to Leo Marx, for the European colonisers, the New World was to provide the answer to this exact question (101). The American landscape was to become the terrain where old and new, nature and technology harmonically meet to form a libertarian utopia. Technology was seen as “‘naturally arising’ from the landscape as another natural ‘means of happiness’ decreed by the Creator in his design of the continent. So, far from conceding that there might be anything alien or ‘artificial’ about mechanization, technology was seen as inherent in ‘nature’; both geographic and human” (160). Since then, according to Marx, the idea of the “return” to a new Golden Age has been engrained in the American culture and it appears that it informs ubiquitous computing’s own early visions. The idea of a “naturally arising” technology which would facilitate our return to the once lost garden of security and nostalgia appears to have become a common theme within ubiquitous computing discourses making appearances across time and borders. So, for example, while in 1991 Weiser envisioned that ubiquitous technologies will make “using a computer as refreshing as taking a walk in the woods” (21st Century Computer 11), twelve years later Marzano writing about Philip’s vision of Ambient Intelligence promised that “the living space of the future could look more like that of the past than that of today” (9). While the pastoral defined nature in terms of the geographical landscape, early ubiquitous computing appeared to define nature in terms of the objects, tools and technologies that surround us and our interactions with them. While pastoral America defined itself in contradistinction to the European industrial sites and the dirty, smoky and alienating cityscapes, within those early ubiquitous computing discourses the role of the alienating force was assigned to the personal computer. And whereas the personal computer with its “grey box” was early on rejected as the modern embodiment of the European satanic mills, computation was welcomed as a “naturally arising” technological solution which would infuse the objects which, “through the ages, … are most relevant to human life—chairs, tables and beds, for instance, … the objects we can’t do without” (Marzano 9). Or else, it would infuse the—newly constructed—natural landscape fulfilling the promise that when the “world of bits” and the “world of atoms” are finally bridged, the balance will be restored. But how did these two worlds come into existence? How did bits and atoms come to occupy different and separate ontological spheres? Far from being obvious or commonsensical, the idea of the separation between bits and atoms has a history that grounds it to specific times and places, and consequently makes those early ubiquitous and tangible computing discourses part of a bigger story that, as documented (Hayles) and argued (Agre), started some time ago. The view that we inhabit the two worlds of atoms and bits (Ishii and Ullmer) was endorsed by both early ubiquitous and tangible computing, it was based on the idea of the separation of computation from its material instantiation, presenting the former as a free floating entity able to infuse our world. As we saw earlier, tangible computing took the idea of this separation as an unquestionable fact, which then served as the basis for its research goals. As we read in the home page of the Tangible Media Group’s website: Where the sea of bits meets the land of atoms, we are now facing the challenge of reconciling our dual citizenship in the physical and digital worlds. "Tangible Bits" is our vision of Human Computer Interaction (HCI): we seek a seamless coupling of bits and atoms by giving physical form to digital information and computation (my italics). The idea that digital information does not have to have a physical form, but is given one in order to achieve a coupling of the two worlds, not only reinforces the view of digital information as an immaterial entity, but also places it in a privileged position against the material world. Under this light, those early ideas of augmentation or of “awakening” the physical world (Ishii and Ullmer 3) appear to be based on the idea of a passive material world that can be brought to life and become worthy and meaningful through computation, making ubiquitous computing part of a bigger and more familiar story. Restaging the dominant Cartesian dualism between the “ensouled” subject and the “soulless” material object, the latter is rendered passive, manipulable, and void of agency and, just like Ishii’s old bottles, it is performed as a mute, docile “empty vessel” ready to carry out any of its creator’s wishes; hold perfumes and beverages, play music, or tell the weather. At the same time, computation was presented as the force that could breathe life to a mundane and passive world; a free floating, somewhat natural, immaterial entity, like oxygen (hence the name of MIT’s first ubicomp project), like the air we breathe that could travel unobstructed through any medium, our everyday objects and our environment. But it is interesting to see that in those early ubicomp discourses computation’s power did not extend too far. While computation appeared to be foregrounded as a powerful, almost magic, entity able to give life and soul to a soulless material world, at the same time it was presented as controlled and muted. The computational power that would fill our lives, according to Weiser’s ubiquitous computing, would be invisible, it wouldn’t “intrude on our consciousness” (Weiser Not a Desktop 7), it would leave no traces and bring no radical changes. If anything, it would enable us to re-establish our humanness and return us to our past, natural state promising not to change us, or our lives, by introducing something new and unfamiliar, but to enable us to “remain serene and in control” (Weiser and Brown). In other words, ubiquitous computing, as this early story goes, would not be alienating, complex, obtrusive, or even noticeable, for that matter, and so, at the end of this paper, we come full circle to ubicomp’s early goals of invisibility with its underpinnings of the precarious pastoral ideal. This short paper focused on some of ubicomp’s early stories and projects and specifically on its promise to return us to a past and implicitly better world that the PC has arguably displaced. By reading these early promises of, what I call, regressive augmentation through Marx’s work on the “pastoral ideal,” this paper sought to tease out, in order to unsettle, the origins of some of ubicomp’s romantic promises. References Agre, P. E. Computation and Human Experience. New York: Cambridge University Press, 1997. Dourish, P. “Seeking a Foundation for Context-Aware Computing.” Human–Computer Interaction 16.2-4 (2001): 229-241. ———. Where the Action Is: The Foundations of Embodied Interaction. Cambridge: MIT Press, 2001. Dourish, P. and Genevieve Bell. Divining a Digital Future: Mess and Mythology in Ubiquitous Computing. Cambridge, Massachusetts: MIT Press, 2011.Grimes, A., and R. Harper. “Celebratory Technology: New Directions for Food Research in HCI.” In CHI’08, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM, 2008. 467-476. Harper, R., T. Rodden, Y. Rogers, and A. Sellen (eds.). Being Human: Human-Computer Interaction in the Year 2020. Microsoft Research, 2008. 1 Dec. 2013 ‹http://research.microsoft.com/en-us/um/Cambridge/projects/hci2020/downloads/BeingHuman_A3.pdf›. Hayles, K. How We Became Posthuman: Virtual Bodies in Cybernetics, Literature, and Informatics. Chicago: University of Chicago Press, 1999. Ishii, H. “Bottles: A Transparent Interface as a Tribute to Mark Weiser.” IEICE Transactions on Information and Systems 87.6 (2004): 1299-1311. Ishii, H., and B. Ullmer. “Tangible Bits: Towards Seamless Interfaces between People, Bits and Atoms.” In CHI ’97, Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems. New York: ACM, 1997. 234-241. Marx, L. The Machine in the Garden: Technology and the Pastoral Ideal in America. 35th ed. New York: Oxford University Press, 2000. Marzano, S. “Cultural Issues in Ambient Intelligence”. In E. Aarts and S. Marzano (eds.), The New Everyday: Views on Ambient Intelligence. Rotterdam: 010 Publishers, 2003. Norman, D. The Invisible Computer: Why Good Oroducts Can Fail, the Personal Computer Is So Complex, and Information Appliances Are the Solution. Cambridge, Mass.: MIT Press, 1999. Plumwood, V. Feminism and the Mastery of Nature. London, New York: Routledge, 1993. Rose, G. Feminism and Geography. Cambridge: Polity, 1993. Soper, K. “Naturalised Woman and Feminized Nature.” In L. Coupe (ed.), The Green Studies Reader: From Romanticism to Ecocriticism. London: Routledge, 2000. Ullmer, B., and H. Ishii. “The metaDESK: Models and Prototypes for Tangible User Interfaces.” In UIST '97, Proceedings of the 10th Annual ACM Symposium on User Interface Software and Technology. New York: ACM, 1997. 223-232. Weiser, M. “The Computer for the 21st Century." Scientific American 265.3 (1991): 94-104. ———. “The Open House.” ITP Review 2.0, 1996. 1 Dec. 2013 ‹http://makingfurnitureinteractive.files.wordpress.com/2007/09/wholehouse.pdf›. ———. “The World Is Not a Desktop." Interactions 1.1 (1994): 7-8. Weiser, M., and J.S. Brown. “The Coming Age of Calm Technology.” 1996. 1 Dec. 2013 ‹http://www.johnseelybrown.com/calmtech.pdf›. Weiser, M., R. Gold, and J.S. Brown. “The Origins of Ubiquitous Computing at PARC in the Late 80s.” Pervasive Computing 38 (1999): 693-696.
APA, Harvard, Vancouver, ISO, and other styles
43

Have, Paul ten. "Computer-Mediated Chat." M/C Journal 3, no. 4 (August 1, 2000). http://dx.doi.org/10.5204/mcj.1861.

Full text
Abstract:
The technical apparatus is, then, being made at home with the rest of our world. And that's a thing that's routinely being done, and it's the source of the failure of technocratic dreams that if only we introduced some fantastic new communication machine, the world will be transformed. Where what happens is that the object is made at home in the world that has whatever organisation it already has. -- Harvey Sacks (Lectures on Conversation Vol. 2., 548-9) Chatting, or having a conversation, has long been a favourite activity for people. It seemed so ordinary, if not to say trivial, that it has for almost equally long not been studied in any dedicated way. It was only when Harvey Sacks and his early collaborators started using the tape recorder to study telephone conversations that 'conversation' as a topic has become established (cf. Sacks, Lectures Vol. 1). Inspired by Harold Garfinkel, the perspective chosen was a procedural one: they wanted to analyse how conversations are organised on the spot. As Sacks once said: The gross aim of the work I am doing is to see how finely the details of actual, naturally occurring conversation can be subjected to analysis that will yield the technology of conversation. (Sacks, "On Doing 'Being Ordinary'" 411) Later, Sacks also started using data from audio-recorded face-to-face encounters. Most of the phenomena that the research on telephone conversation unearthed could also be found in face-to-face data. Whether something was lost by relying on just audio materials was not clear at the beginning. But with video-based research, as initiated by Charles Goodwin in the 1970s, one was later able to demonstrate that visual exchanges did play an essential role the actual organisation of face-to-face conduct. When using telephone technology, people seemed to rely on a restricted set of the interactional procedures used in face-to-face settings. But new ways to deal with both general and setting-specific problems, such as mutual identification, were also developed. Now that an increasing number of people spend various amounts of their time 'online', chatting with friends or whoever is available, it is time to study Computer-Mediated Conversation (CMC), as we previously studied face-to-face conversation and Telephone (Mediated) Conversation, using the same procedural perspective. We may expect that we will encounter many phenomena that have become familiar to us, and that we will be able to use many of the same concepts. But we will probably also see that people have developed new technical variations of familiar themes as they adapt the technology of conversation to the possibilities and limitations of this new technology of communicative mediation. In so doing, they will make the new technology 'at home in the world that has whatever organisation it already has.' Space does not allow a full discussion of the properties of text-based CMC as instantiated in 'chat' environments, but comparing CMC with face-to-face communication and telephone conversations, it is obvious that the means to convey meanings are severely restricted. In face-to-face encounters, many of the more subtle aspects of the conversation rely on visual and vocal productions and perceptions, which are more or less distinguishable from the 'text' that has been uttered. Following the early work of Gregory Bateson, these aspects are mostly conceived of as a kind of commentary on the core communication available in the 'text', that is as 'meta-communication'. While the 'separation' between 'levels' of communication, that these conceptualisations imply may distort what actually goes on in face-to-face encounters, there is no doubt that telephone conversations, in which the visual 'channel' is not available, and text-based CMC, which in addition lacks access to voice qualities, do confront participants with important communicative restrictions. An important aspect of text-based computer-mediated chatting is that it offers users an unprecedented anonymity, and therefore an unprecedented licence for unaccountable action, ranging from bland banality to criminal threat, while passing through all imaginable sexual 'perversities'. One upshot of this is that they can present themselves as belonging to any plausible category they may choose, but they will -- in the chat context -- never be sure whether the other participants 'really' are legitimate members of the categories they claim for themselves. In various other formats for CMC, like MUDs and MOOs, the looseness of the connections between the people who type messages and the identities they project in the chat environment seems often to be accepted as an inescapable fact, which adds to the fascination of participation1. The typists can then be called 'players' and the projected identities 'characters', while the interaction can be seen as a game of role-playing. In general chat environments, as the one I will discuss later, such a game-like quality seems not to be openly admitted, although quite often hinted at. Rather, the participants stick to playing who they claim they are. In my own text, however, I will use 'player' and 'character' to indicate the two faces of participation in computer-mediated, text-based chats. In the following sections, I will discuss the organised ways in which one particular problem that chat-players have is dealt with. That problem can be glossed as: how do people wanting to 'chat' on the Internet find suitable partners for that activity? The solution to that problem lies in the explicit naming or implicit suggestion of various kinds of social categories, like 'age', 'sex' and 'location'. Chat players very often initiate a chat with a question like: "hi, a/s/l please?", which asks the other party to self-identify in those terms, as, for instance "frits/m/amsterdam", if that fits the character the player wants to project. But, as I will explain, categorisation plays its role both earlier and later in the chat process. 'Membership Categorisation' in Finding Chat Partners The following exploration is, then, an exercise in Membership Categorisation Analysis (MCA; Hester & Eglin) as based on the ideas developed by Harvey Sacks in the 1960s (Sacks, "An Initial Investigation", "On the Analyzability of Stories", Lectures on Conversation Vol. 1). An immense part of the mundane knowledge that people use in living their everyday lives is organised in terms of categories that label members of some population as being of certain types. These categories are organised in sets, called Membership Categorisation Devices (MCDs). The MCD 'sex' (or 'gender'), for instance, consists of the two categories of 'male' and 'female'. Labelling a person as being male or female carries with it an enormous amount of implied properties, so called 'category-predicates', such as expectable or required behaviours, capacities, values, etc. My overall thesis is that people who want to chat rely mostly on categorical predications to find suitable chat partners. Finding a chat partner or chat partners is an interactive process between at least two parties. Their job involves a combination of presenting themselves and reading others' self presentations. For each, the job has a structure like 'find an X who wants a Y as a partner', where X is the desired chat character and Y is the character you yourself want to play. The set of XY-combinations varies in scope, of course, from very wide, say any male/female combination, to rather narrow, as we will see. The partner finding process for chats can be loosely compared with partly similar processes in other environments, such as cocktail parties, poster sessions at conferences, and telephone calls. The openings of telephone calls have been researched extensively by conversation analysts, especially Schegloff ("Sequencing", "Identification", "Routine"; also Hopper). An interesting idea from this work is that a call opening tends to follow a loosely defined pattern, called the canonical model for telephone openings. This involves making contact, mutual identification/recognition, greetings and 'how-are-you?'s, before the actual business of the call is tackled. When logging on to a chat environment, one enters a market of sorts, where the participants are both buyers and sellers: a general sociability-market like a cocktail party. And indeed some writers have characterised chat rooms as 'virtual cocktail parties'. Some participants in a cocktail party may, of course, have quite specific purposes in mind, like wanting to meet a particular kind of person, or a particular individual, or even being open to starting a relationship which may endure for some time after the event. The same is true for CMC chats. The trajectory that the partner-finding process will take is partly pre-structured by the technology used. I have limited my explorations to one particular chat environment (Microsoft Chat). In that program, the actual partner-finding starts even before logging on, as one is required to fill in certain information slots when setting up the program, such as Real Name and Nickname and optional slots like Email Address and Profile. When you click on the Chat Room List icon, you are presented with a list of over a thousand rooms, alphabetically arranged, with the number of participants. You can select a Room and click a button to enter it. When you do, you get a new screen, which has three windows, one that represents the ongoing general conversation, one with a list of the participants' nicks, and a window to type your contributions in. When you right-click on a name in the participant list, you get a number of options, including Get Profile. Get Profile allows you to get more information on that person, if he/she has filled in that part of the form, but often you get "This person is too lazy to create a profile entry." Categorisation in Room Names When you log in to the chat server, you can search either the Chat Room List or the Users List. Let us take the Chat Room List first. Some room names seem to be designed to come early in the alphabetically ordered list, by starting with one or more A's, as in A!!!!!!!!!FriendlyChat, while others rely on certain key words. Scanning over a thousand names for those words by scrolling the list might take a lot of time, but the Chat Room List has a search facility. You can type a string and the list will be shortened to only those with that string in their name. Many room names seem to be designed for being found this way, by containing a number of more or less redundant strings that people might use in a search. Some examples of room names are: A!!!!!!!!!FriendlyChat, Animal&Girls, Australia_Sydney_Chat_Room, christian evening post, desert_and_cactus_only, engineer, francais_saloppes, francais_soumise_sub_slave, german_deutsch_rollenspiele, hayatherseyeragmensürüyor, holland_babbel, italia_14_19anni, italia_padania_e_basta, L@Ros@deiVenti, nederlandse_chat, sex_tr, subslavespankbondage, Sweet_Girl_From_Alabama, #BI_LES_FEM_ONLY, #Chinese_Chat, #France, #LesbiansBiTeenGirls_Cam_NetMeeting, #polska_do_flirtowania, #russian_Virtual_Bar?, #tr_%izmir, #ukphonefantasy. A first look at this collection of room names suggests two broad classes of categorisation: first a local/national/cultural/ethnic class, and second one oriented to topics, with a large dose of sexual ones. For the first class, different kinds of indicators are available, such as naming as in Australia_Sydney_Chat_Room, and the use of a local language as in hayatherseyeragmensürüyor, or in combination: german_deutsch_rollenspiele. When you enter this type of room, a first function of such categorisations becomes apparent in that non-English categorisations suggest a different language practice. While English is the default language, quite a few people prefer using their own local language. Some rooms even suggest a more restricted area, as in Australia_Sydney_Chat_Room, for those who are interested in chatting with people not too far off. This seems a bit paradoxical, as chatting in a world-wide network allows contacts between people who are physically distant, as is often mentioned in chats. Rooms with such local restrictions may be designed, however, to facilitate possible subsequent face-to-face meetings or telephone contacts, as is suggested by names like Fr@nce_P@ris_Rencontre and #ukphonefantasy. The collection of sexually suggestive names is not only large, but also indicative of a large variety of interests, including just (probably heterosexual) sex, male gay sex, female lesbian or bi-sexuality. Some names invoke some more specialized practices like BDSM, and a collection of other 'perversities', as in names like 'francais_soumcateise_sub_slave', 'subslavespankbondage', 'golden_shower' or 'family_secrets'. But quite often sexual interest are only revealed in subsequent stages of contact. Non-sexual interests are, of course, also apparent, including religious, professional, political or commercial ones, as in 'christian evening post', or 'culturecrossing', 'holland_paranormaal', 'jesussaves', 'Pokemon_Chat', 'francais_informatique', and '#Russian_Philosophy_2918'. Categorisation through Nicknames Having selected a room, your next step is to see who is there. As chatting ultimately concerns exchanges between (virtual) persons, it is no surprise that nicknames are used as concise 'labels' to announce who is available on the chat network or in a particular room. Consider some examples: ^P0371G , amanda14, anneke, banana81, Dream_Girl, emma69, ericdraven, latex_bi_tch1 , Leeroy, LuCho1, Mary15, Miguelo, SomeFun, Steffi, teaser. Some of these are rather opaque, at least at first, while others seem quite ordinary. Anneke, for instance, is an ordinary Dutch name for girls. So, by using this nick name, a person at the same time categorises herself in two Membership Categorisation Devices: gender: 'female' and language: 'Dutch'. When using this type of nick, you will quite often be addressed in Dutch, for instance with the typically Dutch chat-greeting "hoi" and/or by a question like "ben jij Nederlandse?" ("are you Dutch?" -- female form). This question asks you to categorise yourself, using the nationality device 'Dutch/Belgian', within the language category 'speaker of Dutch'. Many other first names like 'amanda' and 'emma', do not have such a language specificity and so do not 'project' a specific European language/nationality as 'anneke' does. Some French names, like 'nathalie' are a bit ambiguous in that respect, as they are used in quite a number of other language communities, so you may get a more open question like "bonjour, tu parle francais?" ("hi, do you speak French?"). A name like 'Miguelo' suggests a roman language, of course, while 'LuCho1' or 'Konusmaz' indicate non-European languages (here Chinese and Turkish, respectively). Quite often, a first name nick also carries an attached number, as in 'Mary15'. One reason for such attachments is that a nick has to be unique, so if you join the channel with a nick like 'Mary', there will mostly be another who has already claimed that particular name. An error message will appear suggesting that you take another nick. The easiest solution, then, is to add an 'identifying detail', like a number. Technically, any number, letter or other character will do, so you can take Mary1, or Mary~, or Mary_m. Quite often, numbers are used in accord with the nick's age, as is probably the case in our examples 'Mary15' and 'amanda14', but not in 'emma69', which suggests an 'activity preference' rather than an age category. Some of the other nicks in our examples suggest other aspects, claims or interests, as in Dream_Girl, latex_bi_tch1, SomeFun, or teaser. Other examples are: 'machomadness', 'daddyishere', 'LadySusan28', 'maleslave', 'curieuse33', 'patrickcam', or 'YOUNG_GAY_BOY'. More elaborate information about a character can sometimes be collected from his or her profile, but for reasons of space, I will not discuss its use here. This paper's interest is not only in finding out which categories and MCDs are actually used, but also how they are used, what kind of function they can be seen to have. How do chat participants organise their way to 'the anchor point' (Schegloff, "Routine"), at which they start their actual chat 'business'? For the chatting environment that I have observed, there seems to be two major purposes, one may be called social, i.e. 'just chatting', as under the rubric 'friendly chat', and the other is sexual. These purposes may be mixed, of course, in that the first may lead to the second, or the second accompanied by the first. Apart from those two major purposes, a number of others can be inferred from the room titles, including the discussion of political, religious, and technical topics. Sexual chats can take various forms, most prominently 'pic trading' and 'cybersex'. As becomes clear from research by Don Slater, an enormous 'market' for 'pic trading' has emerged, with a quite explicit normative structure of 'fair trading', i.e. if one receives something, one should reciprocate in kind. When one is in an appropriate room, and especially if one plays a female character, other participants quite often try to initiate pic trading. This can have the form of sending a pic, without any verbal exchange, possibly followed by a request like 'send also'. But you may also get a verbal request first, like "do you have a (self) pic?" If you reply in a negative way, you often do not get any further reaction, or just "ok." A 'pic request' can also be preceded by some verbal exchanges; social, sexual or both. That question -- "have a pic?" or "wanna trade" -- can then be considered the real starting point for that particular encounter, or it can be part of a process of getting to know each other: "can i c u?" The second form of sexual chats involves cyber sex. This may be characterised as interactionally improvised pornography, the exchange of sexually explicit messages enacting a sexual fantasy or a shared masturbation session. There is a repertoire of opening moves for these kinds of games, including "wanna cyber?", "are you alone?" and "what are you wearing now?" Functions of Categorisations Categorisations in room names, nicks and profiles has two major functions: guiding the selection of suitable chat partners and suggesting topics. Location information has quite diverse implications in different contexts, e.g. linguistic, cultural, national and geographical. Language is a primordial parameter in any text-based activity, and chatting offers numerous illustrations for this. Cultural implications seem to be more diffuse, but probably important for some (classes of?) participants. Nationality is important in various ways, for instance as an 'identity anchor'. So when you use a typically Dutch nick, like 'frits' or 'anneke', you may get first questions asking whether you are from the Netherlands or from Belgium and subsequently from which region or town. This may be important for indicating reachability, either in person or over the phone. Location information can also be used as topic opener. So when you mention that you live in Amsterdam, you often get positive remarks about the city, like "I visited Amsterdam last June and I liked it very much", or "I would die to live there" (sic) from a pot-smoking U.S. student. After language, age and gender seem to be the most important points in exploring mutual suitability. When possible partners differ in age or gender category, this quite often leads to questions like "Am I not too old/young for you?" Of course, age and gender are basic parameters for sexual selection, as people differ in their range of sexual preferences along the lines of these categories, i.e. same sex or opposite sex, and roughly the same age or older/younger age. Such preferences intersect with straight or kinky ones, of which a large variety can be found. Many rooms are organised around one or another combination, as announced in names like '#LesbiansBiTeenGirls_Cam_NetMeeting', 'Hollandlolita' or '#Lesbian_Domination'. In some of these, the host makes efforts to keep to a more or less strict 'regime', for instance by banning obvious males from a room like '#BI_LES_FEM_ONLY'. In others, an automated welcome message is used to lay out the participation rules. Conclusion To sum up, categorisation plays an essential role in a sorting-out process leading, ideally, to small-group or dyadic suitability. A/S/L, age, sex and location, are obvious starting points, but other differentiations, as in sexual preferences which are themselves partly rooted in age/gender combinations, also play a role. In this process, suitability explorations and topic initiations are intimately related. Chatting, then, is text-based categorisation. New communication technologies are invented with rather limited purposes in mind, but they are quite often adopted by masses of users in unexpected ways. In this process, pre-existing communicational purposes and procedures are adapted to the new environment, but basically there does not seem to be any radical change. Comparing mutual categorisation in face-to-face encounters, telephone calls, and text-based CMC as in online chatting, one can see that similar procedures are being used, although in a more and more explicit manner, as in the question: "a/s/l please?" Footnote These ideas have been inspired by Schaap; for an ethnography focussing on the connection between 'life online' and 'real life', see Markham, 1998. References Hopper, Robert. Telephone Conversation. Bloomington: Indiana UP, 1992. Hester, Stephen, and Peter Eglin, eds. Culture in Action: Studies in Membership Categorisation Analysis. Washington, D.C.: UP of America, 1997. Markham, Annette H. Life Online: Researching Real Experience in Virtual Space. Walnut Creek, London, New Delhi: Altamira P, 1998. Sacks, Harvey. "An Initial Investigation of the Usability of Conversational Data for Doing Sociology." Studies in Social Interaction. Ed. D. Sudnow. New York: Free P, 1972. 31-74. ---. Lectures on Conversation. Vol. 1. Ed. Gail Jefferson, with an introduction by Emanuel A. Schegloff. Oxford: Basil Blackwell, 1992. ---. Lectures on Conversation. Vol. 2. Ed. Gail Jefferson, with an introduction by Emanuel A. Schegloff. Oxford: Basil Blackwell, 1992. ---. "On Doing 'Being Ordinary'." Structures of Social Action: Studies in Conversation Analysis. Ed. J. Maxwell Atkinson and John Heritage. Cambridge: Cambridge UP, 1984. 413-29. ---. "On the Analyzability of Stories by Children." Directions in Sociolinguistics: The Ethnography of Communication. Ed. John. J. Gumperz and Dell Hymes. New York: Rinehart & Winston, 1972. 325-45. Schaap, Frank. "The Words That Took Us There: Not an Ethnography." M.A. Thesis in Anthropology, University of Amsterdam, 2000. <http://fragment.nl/thesis/>. Schegloff, Emanuel A. "Identification and Recognition in Telephone Conversation Openings." Everyday Language: Studies in Ethnomethodology. Ed. George Psathas. New York: Irvington, 1979. 23-78. ---. "The Routine as Achievement." Human Studies 9 (1986): 111-52. ---. "Sequencing in Conversational Openings." American Anthropologist 70 (1968): 1075-95. Slater, Don R. "Trading Sexpics on IRC: Embodiment and Authenticity on the Internet." Body and Society 4.4 (1998): 91-117. Ten Have, Paul. Doing Conversation Analysis: A Practical Guide. Introducing Qualitative Methods. London: Sage, 1999. Citation reference for this article MLA style: Paul ten Have. "Computer-Mediated Chat: Ways of Finding Chat Partners." M/C: A Journal of Media and Culture 3.4 (2000). [your date of access] <http://www.api-network.com/mc/0008/partners.php>. Chicago style: Paul ten Have, "Computer-Mediated Chat: Ways of Finding Chat Partners," M/C: A Journal of Media and Culture 3, no. 4 (2000), <http://www.api-network.com/mc/0008/partners.php> ([your date of access]). APA style: Paul ten Have. (2000) Computer-mediated chat: ways of finding chat partners. M/C: A Journal of Media and Culture 3(4). <http://www.api-network.com/mc/0008/partners.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
44

Geoghegan, Hilary. "“If you can walk down the street and recognise the difference between cast iron and wrought iron, the world is altogether a better place”: Being Enthusiastic about Industrial Archaeology." M/C Journal 12, no. 2 (May 13, 2009). http://dx.doi.org/10.5204/mcj.140.

Full text
Abstract:
Introduction: Technology EnthusiasmEnthusiasts are people who have a passion, keenness, dedication or zeal for a particular activity or hobby. Today, there are enthusiasts for almost everything, from genealogy, costume dramas, and country houses, to metal detectors, coin collecting, and archaeology. But to be described as an enthusiast is not necessarily a compliment. Historically, the term “enthusiasm” was first used in England in the early seventeenth century to describe “religious or prophetic frenzy among the ancient Greeks” (Hanks, n.p.). This frenzy was ascribed to being possessed by spirits sent not only by God but also the devil. During this period, those who disobeyed the powers that be or claimed to have a message from God were considered to be enthusiasts (McLoughlin).Enthusiasm retained its religious connotations throughout the eighteenth century and was also used at this time to describe “the tendency within the population to be swept by crazes” (Mee 31). However, as part of the “rehabilitation of enthusiasm,” the emerging middle-classes adopted the word to characterise the intensity of Romantic poetry. The language of enthusiasm was then used to describe the “literary ideas of affect” and “a private feeling of religious warmth” (Mee 2 and 34). While the notion of enthusiasm was embraced here in a more optimistic sense, attempts to disassociate enthusiasm from crowd-inciting fanaticism were largely unsuccessful. As such enthusiasm has never quite managed to shake off its pejorative connotations.The 'enthusiasm' discussed in this paper is essentially a personal passion for technology. It forms part of a longer tradition of historical preservation in the United Kingdom and elsewhere in the world. From preserved railways to Victorian pumping stations, people have long been fascinated by the history of technology and engineering; manifesting their enthusiasm through their nostalgic longings and emotional attachment to its enduring material culture. Moreover, enthusiasts have been central to the collection, conservation, and preservation of this particular material record. Technology enthusiasm in this instance is about having a passion for the history and material record of technological development, specifically here industrial archaeology. Despite being a pastime much participated in, technology enthusiasm is relatively under-explored within the academic literature. For the most part, scholarship has tended to focus on the intended users, formal spaces, and official narratives of science and technology (Adas, Latour, Mellström, Oldenziel). In recent years attempts have been made to remedy this imbalance, with researchers from across the social sciences examining the position of hobbyists, tinkerers and amateurs in scientific and technical culture (Ellis and Waterton, Haring, Saarikoski, Takahashi). Work from historians of technology has focussed on the computer enthusiast; for example, Saarikoski’s work on the Finnish personal computer hobby:The definition of the computer enthusiast varies historically. Personal interest, pleasure and entertainment are the most significant factors defining computing as a hobby. Despite this, the hobby may also lead to acquiring useful knowledge, skills or experience of information technology. Most often the activity takes place outside working hours but can still have links to the development of professional expertise or the pursuit of studies. In many cases it takes place in the home environment. On the other hand, it is characteristically social, and the importance of friends, clubs and other communities is greatly emphasised.In common with a number of other studies relating to technical hobbies, for example Takahashi who argues tinkerers were behind the advent of the radio and television receiver, Saarikoski’s work focuses on the role these users played in shaping the technology in question. The enthusiasts encountered in this paper are important here not for their role in shaping the technology, but keeping technological heritage alive. As historian of technology Haring reminds us, “there exist alternative ways of using and relating to technology” (18). Furthermore, the sociological literature on audiences (Abercrombie and Longhurst, Ang), fans (Hills, Jenkins, Lewis, Sandvoss) and subcultures (Hall, Hebdige, Schouten and McAlexander) has also been extended in order to account for the enthusiast. In Abercrombie and Longhurst’s Audiences, the authors locate ‘the enthusiast’ and ‘the fan’ at opposing ends of a continuum of consumption defined by questions of specialisation of interest, social organisation of interest and material productivity. Fans are described as:skilled or competent in different modes of production and consumption; active in their interactions with texts and in their production of new texts; and communal in that they construct different communities based on their links to the programmes they like. (127 emphasis in original) Based on this definition, Abercrombie and Longhurst argue that fans and enthusiasts differ in three ways: (1) enthusiasts’ activities are not based around media images and stars in the way that fans’ activities are; (2) enthusiasts can be hypothesized to be relatively light media users, particularly perhaps broadcast media, though they may be heavy users of the specialist publications which are directed towards the enthusiasm itself; (3) the enthusiasm would appear to be rather more organised than the fan activity. (132) What is striking about this attempt to differentiate between the fan and the enthusiast is that it is based on supposition rather than the actual experience and observation of enthusiasm. It is here that the ethnographic account of enthusiasm presented in this paper and elsewhere, for example works by Dannefer on vintage car culture, Moorhouse on American hot-rodding and Fuller on modified-car culture in Australia, can shed light on the subject. My own ethnographic study of groups with a passion for telecommunications heritage, early British computers and industrial archaeology takes the discussion of “technology enthusiasm” further still. Through in-depth interviews, observation and textual analysis, I have examined in detail the formation of enthusiast societies and their membership, the importance of the material record to enthusiasts (particularly at home) and the enthusiastic practices of collecting and hoarding, as well as the figure of the technology enthusiast in the public space of the museum, namely the Science Museum in London (Geoghegan). In this paper, I explore the culture of enthusiasm for the industrial past through the example of the Greater London Industrial Archaeology Society (GLIAS). Focusing on industrial sites around London, GLIAS meet five or six times a year for field visits, walks and a treasure hunt. The committee maintain a website and produce a quarterly newsletter. The title of my paper, “If you can walk down the street and recognise the difference between cast iron and wrought iron, the world is altogether a better place,” comes from an interview I conducted with the co-founder and present chairman of GLIAS. He was telling me about his fascination with the materials of industrialisation. In fact, he said even concrete is sexy. Some call it a hobby; others call it a disease. But enthusiasm for industrial archaeology is, as several respondents have themselves identified, “as insidious in its side effects as any debilitating germ. It dictates your lifestyle, organises your activity and decides who your friends are” (Frow and Frow 177, Gillespie et al.). Through the figure of the industrial archaeology enthusiast, I discuss in this paper what it means to be enthusiastic. I begin by reflecting on the development of this specialist subject area. I go on to detail the formation of the Society in the late 1960s, before exploring the Society’s fieldwork methods and some of the other activities they now engage in. I raise questions of enthusiast and professional knowledge and practice, as well as consider the future of this particular enthusiasm.Defining Industrial ArchaeologyThe practice of 'industrial archaeology' is much contested. For a long time, enthusiasts and professional archaeologists have debated the meaning and use of the term (Palmer). On the one hand, there are those interested in the history, preservation, and recording of industrial sites. For example the grandfather figures of the subject, namely Kenneth Hudson and Angus Buchanan, who both published widely in the 1960s and 1970s in order to encourage publics to get involved in recording. Many members of GLIAS refer to the books of Hudson Industrial Archaeology: an Introduction and Buchanan Industrial Archaeology in Britain with their fine descriptions and photographs as integral to their early interest in the subject. On the other hand, there are those within the academic discipline of archaeology who consider the study of remains produced by the Industrial Revolution as too modern. Moreover, they find the activities of those calling themselves industrial archaeologists as lacking sufficient attention to the understanding of past human activity to justify the name. As a result, the definition of 'industrial archaeology' is problematic for both enthusiasts and professionals. Even the early advocates of professional industrial archaeology felt uneasy about the subject’s methods and practices. In 1973, Philip Riden (described by one GLIAS member as the angry young man of industrial archaeology), the then president of the Oxford University Archaeology Society, wrote a damning article in Antiquity, calling for the subject to “shed the amateur train drivers and others who are not part of archaeology” (215-216). He decried the “appallingly low standard of some of the work done under the name of ‘industrial archaeology’” (211). He felt that if enthusiasts did not attempt to maintain high technical standards, publish their work in journals or back up their fieldwork with documentary investigation or join their county archaeological societies then there was no value in the efforts of these amateurs. During this period, enthusiasts, academics, and professionals were divided. What was wrong with doing something for the pleasure it provides the participant?Although relations today between the so-called amateur (enthusiast) and professional archaeologies are less potent, some prejudice remains. Describing them as “barrow boys”, some enthusiasts suggest that what was once their much-loved pastime has been “hijacked” by professional archaeologists who, according to one respondent,are desperate to find subjects to get degrees in. So the whole thing has been hijacked by academia as it were. Traditional professional archaeologists in London at least are running head on into things that we have been doing for decades and they still don’t appreciate that this is what we do. A lot of assessments are handed out to professional archaeology teams who don’t necessarily have any knowledge of industrial archaeology. (James, GLIAS committee member)James went on to reveal that GLIAS receives numerous enquiries from professional archaeologists, developers and town planners asking what they know about particular sites across the city. Although the Society has compiled a detailed database covering some areas of London, it is by no means comprehensive. In addition, many active members often record and monitor sites in London for their own personal enjoyment. This leaves many questioning the need to publish their results for the gain of third parties. Canadian sociologist Stebbins discusses this situation in his research on “serious leisure”. He has worked extensively with amateur archaeologists in order to understand their approach to their leisure activity. He argues that amateurs are “neither dabblers who approach the activity with little commitment or seriousness, nor professionals who make a living from that activity” (55). Rather they pursue their chosen leisure activity to professional standards. A point echoed by Fine in his study of the cultures of mushrooming. But this is to get ahead of myself. How did GLIAS begin?GLIAS: The GroupThe 1960s have been described by respondents as a frantic period of “running around like headless chickens.” Enthusiasts of London’s industrial archaeology were witnessing incredible changes to the city’s industrial landscape. Individuals and groups like the Thames Basin Archaeology Observers Group were recording what they could. Dashing around London taking photos to capture London’s industrial legacy before it was lost forever. However the final straw for many, in London at least, was the proposed and subsequent demolition of the “Euston Arch”. The Doric portico at Euston Station was completed in 1838 and stood as a symbol to the glory of railway travel. Despite strong protests from amenity societies, this Victorian symbol of progress was finally pulled down by British Railways in 1962 in order to make way for what enthusiasts have called a “monstrous concrete box”.In response to these changes, GLIAS was founded in 1968 by two engineers and a locomotive driver over afternoon tea in a suburban living room in Woodford, North-East London. They held their first meeting one Sunday afternoon in December at the Science Museum in London and attracted over 130 people. Firing the imagination of potential members with an exhibition of photographs of the industrial landscape taken by Eric de Maré, GLIAS’s first meeting was a success. Bringing together like-minded people who are motivated and enthusiastic about the subject, GLIAS currently has over 600 members in the London area and beyond. This makes it the largest industrial archaeology society in the UK and perhaps Europe. Drawing some of its membership from a series of evening classes hosted by various members of the Society’s committee, GLIAS initially had a quasi-academic approach. Although some preferred the hands-on practical element and were more, as has been described by one respondent, “your free-range enthusiast”. The society has an active committee, produces a newsletter and journal, as well as runs regular events for members. However the Society is not simply about the study of London’s industrial heritage, over time the interest in industrial archaeology has developed for some members into long-term friendships. Sociability is central to organised leisure activities. It underpins and supports the performance of enthusiasm in groups and societies. For Fine, sociability does not always equal friendship, but it is the state from which people might become friends. Some GLIAS members have taken this one step further: there have even been a couple of marriages. Although not the subject of my paper, technical culture is heavily gendered. Industrial archaeology is a rare exception attracting a mixture of male and female participants, usually retired husband and wife teams.Doing Industrial Archaeology: GLIAS’s Method and PracticeIn what has been described as GLIAS’s heyday, namely the 1970s to early 1980s, fieldwork was fundamental to the Society’s activities. The Society’s approach to fieldwork during this period was much the same as the one described by champion of industrial archaeology Arthur Raistrick in 1973:photographing, measuring, describing, and so far as possible documenting buildings, engines, machinery, lines of communication, still or recently in use, providing a satisfactory record for the future before the object may become obsolete or be demolished. (13)In the early years of GLIAS and thanks to the committed efforts of two active Society members, recording parties were organised for extended lunch hours and weekends. The majority of this early fieldwork took place at the St Katherine Docks. The Docks were constructed in the 1820s by Thomas Telford. They became home to the world’s greatest concentration of portable wealth. Here GLIAS members learnt and employed practical (also professional) skills, such as measuring, triangulations and use of a “dumpy level”. For many members this was an incredibly exciting time. It was a chance to gain hands-on experience of industrial archaeology. Having been left derelict for many years, the Docks have since been redeveloped as part of the Docklands regeneration project.At this time the Society was also compiling data for what has become known to members as “The GLIAS Book”. The book was to have separate chapters on the various industrial histories of London with contributions from Society members about specific sites. Sadly the book’s editor died and the project lost impetus. Several years ago, the committee managed to digitise the data collected for the book and began to compile a database. However, the GLIAS database has been beset by problems. Firstly, there are often questions of consistency and coherence. There is a standard datasheet for recording industrial buildings – the Index Record for Industrial Sites. However, the quality of each record is different because of the experience level of the different authors. Some authors are automatically identified as good or expert record keepers. Secondly, getting access to the database in order to upload the information has proved difficult. As one of the respondents put it: “like all computer babies [the creator of the database], is finding it hard to give birth” (Sally, GLIAS member). As we have learnt enthusiasm is integral to movements such as industrial archaeology – public historian Raphael Samuel described them as the “invisible hands” of historical enquiry. Yet, it is this very enthusiasm that has the potential to jeopardise projects such as the GLIAS book. Although active in their recording practices, the GLIAS book saga reflects one of the challenges encountered by enthusiast groups and societies. In common with other researchers studying amenity societies, such as Ellis and Waterton’s work with amateur naturalists, unlike the world of work where people are paid to complete a task and are therefore meant to have a singular sense of purpose, the activities of an enthusiast group like GLIAS rely on the goodwill of their members to volunteer their time, energy and expertise. When this is lost for whatever reason, there is no requirement for any other member to take up that position. As such, levels of commitment vary between enthusiasts and can lead to the aforementioned difficulties, such as disputes between group members, the occasional miscommunication of ideas and an over-enthusiasm for some parts of the task in hand. On top of this, GLIAS and societies like it are confronted with changing health and safety policies and tightened security surrounding industrial sites. This has made the practical side of industrial archaeology increasingly difficult. As GLIAS member Bob explains:For me to go on site now I have to wear site boots and borrow a hard hat and a high visibility jacket. Now we used to do incredibly dangerous things in the seventies and nobody batted an eyelid. You know we were exploring derelict buildings, which you are virtually not allowed in now because the floor might give way. Again the world has changed a lot there. GLIAS: TodayGLIAS members continue to record sites across London. Some members are currently surveying the site chosen as the location of the Olympic Games in London in 2012 – the Lower Lea Valley. They describe their activities at this site as “rescue archaeology”. GLIAS members are working against the clock and some important structures have already been demolished. They only have time to complete a quick flash survey. Armed with the information they collated in previous years, GLIAS is currently in discussions with the developer to orchestrate a detailed recording of the site. It is important to note here that GLIAS members are less interested in campaigning for the preservation of a site or building, they appreciate that sites must change. Instead they want to ensure that large swathes of industrial London are not lost without a trace. Some members regard this as their public duty.Restricted by health and safety mandates and access disputes, GLIAS has had to adapt. The majority of practical recording sessions have given way to guided walks in the summer and public lectures in the winter. Some respondents have identified a difference between those members who call themselves “industrial archaeologists” and those who are just “ordinary members” of GLIAS. The walks are for those with a general interest, not serious members, and the talks are public lectures. Some audience researchers have used Bourdieu’s metaphor of “capital” to describe the experience, knowledge and skill required to be a fan, clubber or enthusiast. For Hills, fan status is built up through the demonstration of cultural capital: “where fans share a common interest while also competing over fan knowledge, access to the object of fandom, and status” (46). A clear membership hierarchy can be seen within GLIAS based on levels of experience, knowledge and practical skill.With a membership of over 600 and rising annually, the Society’s future is secure at present. However some of the more serious members, although retaining their membership, are pursuing their enthusiasm elsewhere: through break-away recording groups in London; active membership of other groups and societies, for example the national Association for Industrial Archaeology; as well as heading off to North Wales in the summer for practical, hands-on industrial archaeology in Snowdonia’s slate quarries – described in the Ffestiniog Railway Journal as the “annual convention of slate nutters.” ConclusionsGLIAS has changed since its foundation in the late 1960s. Its operation has been complicated by questions of health and safety, site access, an ageing membership, and the constant changes to London’s industrial archaeology. Previously rejected by professional industrial archaeology as “limited in skill and resources” (Riden), enthusiasts are now approached by professional archaeologists, developers, planners and even museums that are interested in engaging in knowledge exchange programmes. As a recent report from the British think-tank Demos has argued, enthusiasts or pro-ams – “amateurs who work to professional standards” (Leadbeater and Miller 12) – are integral to future innovation and creativity; for example computer pro-ams developed an operating system to rival Microsoft Windows. As such the specialist knowledge, skill and practice of these communities is of increasing interest to policymakers, practitioners, and business. So, the subject once described as “the ugly offspring of two parents that shouldn’t have been allowed to breed” (Hudson), the so-called “amateur” industrial archaeology offers enthusiasts and professionals alike alternative ways of knowing, seeing and being in the recent and contemporary past.Through the case study of GLIAS, I have described what it means to be enthusiastic about industrial archaeology. I have introduced a culture of collective and individual participation and friendship based on a mutual interest in and emotional attachment to industrial sites. As we have learnt in this paper, enthusiasm is about fun, pleasure and joy. The enthusiastic culture presented here advances themes such as passion in relation to less obvious communities of knowing, skilled practices, material artefacts and spaces of knowledge. Moreover, this paper has been about the affective narratives that are sometimes missing from academic accounts; overlooked for fear of sniggers at the back of a conference hall. Laughter and humour are a large part of what enthusiasm is. Enthusiastic cultures then are about the pleasure and joy experienced in doing things. Enthusiasm is clearly a potent force for active participation. I will leave the last word to GLIAS member John:One meaning of enthusiasm is as a form of possession, madness. Obsession perhaps rather than possession, which I think is entirely true. It is a pejorative term probably. The railway enthusiast. But an awful lot of energy goes into what they do and achieve. Enthusiasm to my mind is an essential ingredient. If you are not a person who can muster enthusiasm, it is very difficult, I think, to get anything out of it. On the basis of the more you put in the more you get out. In terms of what has happened with industrial archaeology in this country, I think, enthusiasm is a very important aspect of it. The movement needs people who can transmit that enthusiasm. ReferencesAbercrombie, N., and B. Longhurst. Audiences: A Sociological Theory of Performance and Imagination. London: Sage Publications, 1998.Adas, M. Machines as the Measure of Men: Science, Technology and Ideologies of Western Dominance. Ithaca: Cornell UP, 1989.Ang, I. Desperately Seeking the Audience. London: Routledge, 1991.Bourdieu, P. Distinction: A Social Critique of the Judgement of Taste. London: Routledge, 1984.Buchanan, R.A. Industrial Archaeology in Britain. Harmondsworth, Middlesex: Penguin, 1972.Dannefer, D. “Rationality and Passion in Private Experience: Modern Consciousness and the Social World of Old-Car Collectors.” Social Problems 27 (1980): 392–412.Dannefer, D. “Neither Socialization nor Recruitment: The Avocational Careers of Old-Car Enthusiasts.” Social Forces 60 (1981): 395–413.Ellis, R., and C. Waterton. “Caught between the Cartographic and the Ethnographic Imagination: The Whereabouts of Amateurs, Professionals, and Nature in Knowing Biodiversity.” Environment and Planning D: Society and Space 23 (2005): 673–693.Fine, G.A. “Mobilizing Fun: Provisioning Resources in Leisure Worlds.” Sociology of Sport Journal 6 (1989): 319–334.Fine, G.A. Morel Tales: The Culture of Mushrooming. Champaign, Ill.: U of Illinois P, 2003.Frow, E., and R. Frow. “Travels with a Caravan.” History Workshop Journal 2 (1976): 177–182Fuller, G. Modified: Cars, Culture, and Event Mechanics. Unpublished PhD Thesis, University of Western Sydney, 2007.Geoghegan, H. The Culture of Enthusiasm: Technology, Collecting and Museums. Unpublished PhD Thesis, University of London, 2008.Gillespie, D.L., A. Leffler, and E. Lerner. “‘If It Weren’t for My Hobby, I’d Have a Life’: Dog Sports, Serious Leisure, and Boundary Negotiations.” Leisure Studies 21 (2002): 285–304.Hall, S., and T. Jefferson, eds. Resistance through Rituals: Youth Sub-Cultures in Post-War Britain. London: Hutchinson, 1976.Hanks, P. “Enthusiasm and Condescension.” Euralex ’98 Proceedings. 1998. 18 Jul. 2005 ‹http://www.patrickhanks.com/papers/enthusiasm.pdf›.Haring, K. “The ‘Freer Men’ of Ham Radio: How a Technical Hobby Provided Social and Spatial Distance.” Technology and Culture 44 (2003): 734–761.Haring, K. Ham Radio’s Technical Culture. London: MIT Press, 2007.Hebdige, D. Subculture: The Meaning of Style. London: Methuen, 1979.Hills, M. Fan Cultures. London: Routledge, 2002.Hudson, K. Industrial Archaeology London: John Baker, 1963.Jenkins, H. Textual Poachers: Television Fans and Participatory Culture. London: Routledge, 1992.Latour, B. Aramis, or the Love of Technology. London: Harvard UP, 1996.Leadbeater, C., and P. Miller. The Pro-Am Revolution: How Enthusiasts Are Changing Our Economy and Society. London: Demos, 2004.Lewis, L.A., ed. The Adoring Audience: Fan Culture and Popular Media. London: Routledge, 1992.McLoughlin, W.G. Revivals, Awakenings, and Reform: An Essay on Religion and Social Change in America, 1607-1977. London: U of Chicago P, 1977.Mee, J. Romanticism, Enthusiasm, and Regulation: Poetics and the Policing of Culture in the Romantic Period. Oxford: Oxford UP, 2003.Mellström, U. “Patriarchal Machines and Masculine Embodiment.” Science, Technology, & Human Values 27 (2002): 460–478.Moorhouse, H.F. Driving Ambitions: A Social Analysis of American Hot Rod Enthusiasm. Manchester: Manchester UP, 1991.Oldenziel, R. Making Technology Masculine: Men, Women and Modern Machines in America 1870-1945. Amsterdam: Amsterdam UP, 1999.Palmer, M. “‘We Have Not Factory Bell’: Domestic Textile Workers in the Nineteenth Century.” The Local Historian 34 (2004): 198–213.Raistrick, A. Industrial Archaeology. London: Granada, 1973.Riden, P. “Post-Post-Medieval Archaeology.” Antiquity XLVII (1973): 210-216.Rix, M. “Industrial Archaeology: Progress Report 1962.” The Amateur Historian 5 (1962): 56–60.Rix, M. Industrial Archaeology. London: The Historical Association, 1967.Saarikoski, P. The Lure of the Machine: The Personal Computer Interest in Finland from the 1970s to the Mid-1990s. Unpublished PhD Thesis, 2004. ‹http://users.utu.fi/petsaari/lure.pdf›.Samuel, R. Theatres of Memory London: Verso, 1994.Sandvoss, C. Fans: The Mirror of Consumption Cambridge: Polity, 2005.Schouten, J.W., and J. McAlexander. “Subcultures of Consumption: An Ethnography of the New Bikers.” Journal of Consumer Research 22 (1995) 43–61.Stebbins, R.A. Amateurs: On the Margin between Work and Leisure. Beverly Hills: Sage, 1979.Stebbins, R.A. Amateurs, Professionals, and Serious Leisure. London: McGill-Queen’s UP, 1992.Takahashi, Y. “A Network of Tinkerers: The Advent of the Radio and Television Receiver Industry in Japan.” Technology and Culture 41 (2000): 460–484.
APA, Harvard, Vancouver, ISO, and other styles
45

Tomkinson, Sian. "“This kind of life has no meaning”." M/C Journal 27, no. 2 (April 16, 2024). http://dx.doi.org/10.5204/mcj.3037.

Full text
Abstract:
Voice synthesising software Vocaloid (Yamaha Corporation) is a popular tool for professional and amateur music production. At the time of writing, there are over 770,000 videos tagged ‘vocaloid’ on Niconico; karaoke chain Karatez displays the top five thousand tracks on its Website (Karatetsu); Hatsune Miku Wiki has over 59,000 pages, while the Vocaloid Lyrics Wiki has over 90,000. Vocaloid is part of Japan’s unique media mix, comprising of the software and music but also official collaborations and a significant amount of fan culture. However, while there is academic research on the way that Vocaloid music is produced and consumed (Sousa; Hamasaki et al.; Leavitt et al.; Kobayashi and Taguchi), there is a lack of research into the content of Vocaloid songs and music videos: that is, what kinds of themes and messages are present and what this might suggest for producers and consumers. This article highlights the importance of the content of Vocaloid music. To this end, I have focussed on Vocaloid composer/producer Neru’s 2018 album CYNICISM. Not to be confused with the Vocaloid Akita Neru, Neru’s music tends to focus on negative affect such as depression, loneliness, and anxiety. Documenting such themes helps to illustrate some of the struggles that producers and consumers experience. I provide a brief explanation of Vocaloid, followed by a reflection on their personas and functioning as a Body without Organs (Annett; Lam; Deleuze and Guattari, Anti-Oedipus). Then I introduce Small’s concept of musicking to provide a framework for the way that music transmits certain affects. In the second half of the article, I unpack Neru’s album and its use of imagery, lyrics, and sound. Vocaloids Voice synthesising software Vocaloid was initially released in 2004, the result of a collaboration between Japan’s Yamaha Corporation and Spain’s Pompeu Fabra University (Voctro Labs; Yamada 17). This software allows the user to create singing audio, drawing from recordings of real people called “voicebanks”. These voicebanks are produced by third-party companies, and are typically provided with a persona with an appearance and personality. For instance, the most well-known Vocaloid is Hatsune Miku, while Kagamine Rin and Kagamine Len are those most used by Neru. Essentially anyone who uses the Vocaloid software can become producers – the term used in Vocaloid cultures for composer. Vocaloid is an example of Japan’s “unique media mix”, where the media are produced not just by “the original company”, but also via “commercial collaborations with media franchises”, and “by a creative collective of individuals on the internet” (Leavitt et al. 204 & 211; see also Steinberg). As well as producers there are songwriters, lyricists, tuners, illustrators, and animators. Some people edit Vocaloid videos, creating compilations, ranking them, and so on (Hamasaki et al. 166). There is also a vibrant fan culture of database managers, fan translators, artists, and fiction writers, as well as human cover artists (utaite), such as Mafumafu, who became popular in part due to his covers of Neru’s music. Official corporate production mostly involves Hatsune Miku, and includes concerts, video games, and collaborations for consumer products. Such branding and collaboration illustrates the creation of a complex Vocaloid narrative. Accordingly, most researchers who examine Vocaloid discuss the complex relationships between various content creators and their methods of collaboration (Yamada), as well as Vocaloid as fan-generated media, examining issues such as commercial interest and exploitation (Bell; Sousa; Jørgensen et al.; To; Kobayashi and Taguchi). However, in this article I am interested in why fans strongly enjoy Vocaloid music and find meaning in it; as I will explore below, such fan collaboration is both a symptom and a cause. Personas and Bodies without Organs Although Vocaloid has a crowd-sourced and collaborative production environment, its use of digital voicebanks and significant consumer culture has led to criticism. For instance, Lam (1110–11) describes voicebanks as being “devoid of originality”, suggests that “all Vocaloid works are derivative”, and also that Vocaloid simply allows users “to indulge … within the virtual space of fabricated authenticity and depthlessness”. However, it is evident from comments on Niconico, YouTube, Reddit, the aforementioned Wikis, Vocaloid Discord servers, and any other space where fans socialise that listeners are emotionally moved by Vocaloid music. Zaborowski, for instance, describes two Japanese boys enthusiastically singing to ryo/Supercell’s Melt. Strikingly, Zaborowski (107) noted that the boys repeatedly told him that “precisely because the voice is the same, the listener can appreciate the quality of the melody and the lyrics”, and that a Vocaloid “sounds different when you are sad. Or when you are away from home”. Listeners are experiencing something when they engage with Vocaloid music, and it would be hasty to simply dismiss their experiences as “depthless”. One factor that makes Vocaloid music particularly authentic and affective for its audiences is the attachment of crowdsourced, constructed personas to Vocaloids. Authenticity here is not necessarily evaluated by the virtual nature of the artist (or instrument) itself, but the producers’ effort to create the work (Zaborowski 107). In this sense there is a need to consider the people involved in producing and listening to Vocaloid music, who find meaning in the songs and characters. Aside from Vocaloids, producers and utaite often also establish a character or imagery as a persona. Neru for instance is recognisable through his avatar—a closed eye with eyelashes and a single tear, and the various characters featured in his videos. The practice of creating a persona for non-human items is unique to Japanese culture, visible in the way that yuru kyara or “wobbly characters” are created to represent entities such as events, corporations, locations, policies, and so on (Occhi 77). These characters can be human-like or creature-like, drawing on Shinto’s anthropomorphism (Jensen and Blok 97). Kyara help minimise the separation between humans and nature, as well as humans and technology (Occhi 80–81). The attachment of kyara to voicebanks, which would otherwise have no face, helps to facilitate a sense of humanisation and connection with the software. It may be that the synthetic nature of the music as well as the use of personas in Vocaloid music means that the listener feels that the song is sung by the Vocaloid, but also processes the creator’s emotion. Kenmochi (4), for instance, suggests that since synthetic voices hold less emotion, it is the persona that functions as a symbol to connect the creator and listener. The producer is able to “impose their own values and perceptions on the virtual character” (Lam 1111), and in doing so, the persona functions as what Deleuze and Guattari call a Body without Organs (Anti-Oedipus 9; A Thousand Plateaus 151). That is, the persona has “no fixed identity” (Lam 1117), and can stratify or destratify, depending on what people do with it (Annett 172). They can become whatever the listener or creator wants, and so there is an emotional connection. Vocaloid music is meaningful to listeners, then, not despite its digital, virtual, constructed nature, but in fact because of what these elements facilitate. Musicking Christopher Small’s work Musicking also provides a framework useful to consider the emotional impact of Vocaloid music. Small argues that “the fundamental nature and meaning of music lie not in objects … but in action”, and therefore proposes a definition of ‘musicking’; to “take part, in any capacity, in a musical performance” (8–9, emphasis omitted). Importantly, for Small (77) simply listening to a recording is to take part in music, and “we may be sure that somebody's values are being explored, affirmed, and celebrated in every musical performance”. Small’s comments here provide a framework for focussing on the experiences of the people involved in producing and listening to Vocaloid music, rather than getting caught up in negative beliefs around the digital nature of production. Further, reflecting on remix, a significant aspect of Vocaloid music, Small (214) notes that relationships are “open to reinterpretation over and over again as listeners create new contexts for their reception and their ritual use of it”. Further, Small (134) suggests that the act of musicking functions as a powerful “means of social definition and self-definition”. Small’s suggestions here that music can be recycled, reinterpreted, and used for self-definition aligns with many aspects of Vocaloid music; tracks are frequently covered by producers using other Vocaloids, or utaite; the meanings of lyrics are frequently discussed in comment sections of YouTube videos and Wikis, and fans often align themselves with certain Vocaloids or producers that they enjoy and relate to. Such self-definition is an important theme to keep in mind when I consider Neru’s CYNICISM album as it touches on societal issues such as loneliness, nihilism, and low self-esteem. CYNICISM Vocaloid producer Neru, also known as z’5 or Oshiire-P, is quite popular. At the time of writing, he has 124,000 followers on Japanese video-sharing site Niconico (Neru, "Neru"), 242,000 on Chinese video-sharing site BiliBili (Neru, "Neru_Official"), 388,000 monthly listeners on Spotify (Spotify), and 560,000 subscribers on YouTube (Neru, "Neru OFFICIAL"). He released his first Vocaloid song in 2009, and to date has three major albums. CYNICISM is the latest, released in 2018. The standard edition contains 14 tracks, and all aside from one use the Vocaloids Kagamine Rin or Kagamine Len. Fig. 1: CYNICISM standard edition, illustrated by Sudou Souta (Apple Music) Fig. 2: Tracklist All quotes from songs are my own translations from the original Japanese. The CYNICISM album communicates a strong sense of nihilism. Nihilism is an ambiguous concept (Nietzsche 76; Diken 6; Marmysz 61). However, Marmysz (71) summarises that nihilists have three claims: that humans are alienated from the world; that this should not be the case; and that “there is nothing we can do” about this situation. As explored below, Neru’s nihilism appears to align with Kant’s “existential nihilism (believing that life has no meaning)” (Gertz, ch. 2, emphasis omitted). It is worth noting that Neru’s music has some commonalities with other genres. For instance, Prinz (584–85) suggests that punk music is irreverent, challenging social norms, and is nihilistic, reflecting on themes such as “decay, despair, suicide, and societal collapse”. As explored below, CYNICISM projects feelings including disappointment with society, poor self-esteem, and themes of irreverence. Irreverence and Society The namesake of the album is important to note within the context of nihilism, as cynicism can be understood as “a passive nihilist affect” (Diken 61). Cynicism is the attitude that comes about when one has failed “to come to terms with loss”, “to realize that something has been lost”, or understand exactly what has been lost. It incited a state of melancholy, trapping the cynic, who suffers an “utterly debilitating sense of disappointment, the root cause of which it cannot identify or move beyond” (Allen, ch. 7). In numerous ways Neru exhibits a lack of faith in humanity and society. Just the title of the track What a Terrible Era communicates a sense of hopelessness, particularly the line “強いて言うとするなら人類は失敗作だった” (“if I had to say, humanity was a work of failure”). The album’s lyrics repeatedly refer to the negative state of the world; “本日の世界予報向上性低迷後退” (“today’s world forecast: Progress is stagnant and regressing”) (Hey, Rain). SNOBBISM asks “バグ塗れの人類のデバッグはいつ終わる” (“humanity is stained with bugs; when will debugging end?”). Neru repeatedly laments the state of humanity and his disappointment with the world. Further, cynicism is an attitude of scorn towards “sincerity and integrity”, which are viewed as “a cover for self-interest” (Allen, ch. 1). In line with this, reflecting the cynic’s embrace of untruthfulness (Gertz, ch. 3), in SNOBBISM Neru states “一生、ブラフを威すがいいさ” (“it’s okay to threaten to bluff through your entire life”). Further, Diken (59) suggests that “capitalism is the age of cynicism”, and the Law-Evading Rock (Neru OFFICIAL, "Law-Evading Rock") music video, illustrated and animated by Ryuusee, exhibits such a critique of capitalism. The video is quite chaotic, designed to appear as a Japanese TV channel. Meme-style characters are superimposed onto photographic backgrounds to depict absurd advertisements and news programmes with flashing and dancing, as the lyrics call for the viewer to escape from reality. The character in this video, Datsu, appears to enter a state of nirvana when Neru’s CD is inserted into him. Here we can see how personas are particularly affectual in Vocaloid music, with fans stating that they relate to Datsu, among other forms of affectation, in comments on his Wikia page (Neru Wikia). Further, CYNICISM frequently calls for the self-identified ‘losers’ to band together, breaking the norms of society. Whatever Whatever Whatever, with its upbeat tune, bright colours, and proclamation of “能天気STYLE” (“Carefree STYLE”) exhibits a strong sense that ‘nothing matters so do whatever’. Let’s Drop Dead’s “僕等はきっとあぶれ者” (“we are surely hooligans”), Law-Evading Rock’s “負け犬になって 吠えろ 吠えろ” (“become a loser, roar, roar”) indicate a sense of knowing that one is ‘useless’ but attempting to take pride in or band together in spite (or indeed, because of this). These lyrics ascribe to a nihilistic notion that nothing matters, but are also a call to arms in a sense – a call for losers to band together for strength, and to act with irreverence. Some encourage the listener to become someone unfit for society (Law-Evading Rock), or to turn back on and break away from morals that are designed to get one into heaven (March of Losers). The music video for SNOBBISM (Neru OFFICIAL, "SNOBBISM"), illustrated and animated by Ryuusee, features Bizu, a demon man wearing a formal suit and top hat. The video has a retro style and is bright but muted with blurry backgrounds, streaking, and graininess. Bizu appears to take on a retro rubber hose animation style, dancing and sometimes hitting objects while calling on the viewer to “make a scene”; to be irreverent and break the norms of society. Personal Failure CYNICISM also in numerous ways refers to personal failures and a lack of faith in the future. Some lyrics refer to a plan or manual (SNOBBISM, Song of Running Away), or a future being wrecked or torn (Spare Me My Inferiority, What a Terrible Era). Corresponding with the nihilistic tone of the album, Whatever Whatever Whatever describes being lazy today, and putting effort in tomorrow, while Let’s Drop Dead simply states “明日はくたばろうぜ” (“tomorrow let’s drop dead”). Yet continuing forward into the future seems mandatory, as in Whatever Whatever Whatever Neru describes himself as being too much of a wimp to commit suicide, and March of Losers repeats the refrain “進め進め” (“forward, forward”), calling for the losers to continue even though “this kind of life has no meaning”. Some tracks indicate a more raw or vulnerable state, with Nihil and the Sunken City’s “もっとちょーだい ちょーだい 承認をちょーだい” (“more, give it to me, give it to me, please give me approval”). Importantly, Neru identifies himself as a loser, engaging in self-irreverence, making fun of himself (Kroth 104), referring to himself and his social group as ‘losers’. The music videos for Whatever Whatever Whatever (Neru OFFICIAL, "Whatever Whatever Whatever") and Let’s Drop Dead (Neru OFFICIAL, "Let’s Drop Dead"), illustrated and animated by Terada Tera, exhibit self-irreverent themes. The former uses vapourwave aesthetics, and both exhibit bright colours, with cartoonish characters I and Yaya dancing and drinking alcohol. I wears a Space Invaders jacket and grill glasses, while Yaya wears a t-shirt featuring a marijuana leaf and a pink animal-eared beanie; together in the video they communicate a ‘slacker’, partying attitude. What is particularly interesting here is the way that nihilistic lyrics have been employed alongside upbeat, catchy, pop-style music and flashy colours. Such dissonance is attention-grabbing and also reflects a sarcastic, careless sense of cynicism, one that is “irreverent” and “playful” – a style that Nietzsche adopted (Allen, ch. 7). Relatedly, Marmysz (4) suggests that humour is a useful response to nihilism because it shatters expectations. It is important to understand CYNICISM within the Japanese context. Discussing the Meiji Period, Nishitani (175) points out that Buddhism and Confucianism lost their power, and that with modernisation Japan became Europeanised and Americanised to the extent that there is a spiritual void. More recently, various economic crises and disasters throughout the 1990s and 2000s have contributed to national trauma (Roquet 89). Due to significant societal pressure, many Japanese people feel anxiety, sensitivity, vulnerability, and alienation (Ren 29). Accordingly, much Japanese anime engages with feelings of nihilism (Lozano-Méndez and Loriguillo-López; Tsang). In some respects Vocaloid culture is interrelated with hikikomori, a form of social withdrawal associated with various psychological, social, and behavioural factors (Li and Wong 603). Much academic literature exists on hikikomori, which in many ways is a Japanese phenomenon, being influenced by “culture, society and history”, and having come about in Japan during a period of “very rapid socioeconomic changes” (Kato et al. 1062). Many Vocaloid producers and utaite identify as hikikomori, including Mafumafu. However, studies on hikikomori outside Japan have shown that feelings of isolation, anxiety, and social exclusion are a global concern (Krieg and Dickie 61; Kato et al. 1062), contributing to Neru’s popularity among English-speaking audiences Conclusion My goal in this article is to point out that a significant number of people find Vocaloid music relatable and affectual, and it would be hasty to dismiss such music as “depthless” due to its use of voicebanks and connection to consumer culture. Vocaloid music is particularly affective in part due to the way that Vocaloids, producers, and utaite make use of personas which function as bodies without organs: something that listeners are able to project their own feelings onto. Further, Small’s concept of musicking encourages us to pay attention to what producers are saying as well as what listeners and fans are engaging with: what values are being explored and how they are being used for self-definition. It is important to consider not just the economic aspects of participatory culture and the networks of production surrounding Vocaloid, but the content of the music and the meanings that listeners get out of it. Neru’s CYNICISM album is particularly interesting in this regard. The combination of upbeat music, bright and garish imagery, and nihilistic lyrics communicates a strong sense of disappointment with society and a lack of self-worth in a dissonant manner – there is a sense of playfulness that is attention-grabbing and uses humour to communicate these negative themes. Given the breadth of Vocaloid content that is produced, further research into other producers, fan groups, and pieces of media will provide insight into this varied and rich phenomenon. References Allen, Ansgar. Cynicism. Cambridge: MIT P, 2020. Annett, Sandra. "What Can a Vocaloid Do? The Kyara as Body without Organs." Mechademia 10 (2017): 163–77. Bell, Sarah A. "The dB in the .Db: Vocaloid Software as Posthuman Instrument." Popular Music and Society 39.2 (2016): 222–240. Deleuze, Gilles, and Félix Guattari. A Thousand Plateaus. Trans. Brian Massumi. 11th ed. Minneapolis: U of Minnesota P, 2005. ———. Anti-Oedipus. Trans. Robert Hurley et al. 10th ed. Minneapolis: U of Minnesota P, 2000. Diken, Bulent. Nihilism. London: Routledge, 2009. Gertz, Nolen. Nihilism. Cambridge: MIT P, 2019. Hamasaki, Masahiro, et al. "Network Analysis of Massively Collaborative Creation of Multimedia Contents – Case Study of Hatsune Miku Videos on Nico Nico Douga." Proceedings of the 1st International Conference on Designing Interactive User Experiences for TV and Video (UXTV '08). New York: Association for Computing Machinery, 2008. 165–168. Hatsune Miku Wiki. Page List [ページ一覧]. 15 Mar. 2024 <https://w.atwiki.jp/hmiku/list>. Jensen, Casper Bruun, and Anders Blok. "Techno-Animism in Japan: Shinto Cosmograms, Actor-Network Theory, and the Enabling Powers of Non-Human Agencies." Theory, Culture & Society 30.2 (2013): 84–115. Jørgensen, Stina Marie Hasse, et al. "Hatsune Miku: An Uncertain Image." Digital Creativity 28.4 (2017): 318–331. Karatetsu. Vocaloid Monthly Karaoke Ranking TOP5,000 [ボカロ月間カラオケランキング TOP5,000]. 15 Mar. 2024 <https://www.karatetsu.com/vocala/pickup/ranking.php>. Kato, Takahiro A., et al. "Hikikomori: Multidimensional Understanding, Assessment, and Future International Perspectives." PCN Frontier Review 73 (2019): 427–440. Kenmochi, Hideki. "VOCALOID and Hatsune Miku Phenomenon in Japan." Proceedings of the First Interdisciplinary Workshop on Singing Voice (InterSinging 2010) (2010): 1–4 <https://www.isca-speech.org/archive/intersinging_2010/kenmochi10_intersinging.html>. Kobayashi, Hajime, and Takashi Taguchi. "Virtual Idol Hatsune Miku: Case Study of New Production/Consumption Phenomena Generated by Network Effects in Japan’s Online Environment." Markets, Globalization & Development Review 3.4 (2018): 1–17. Krieg, Alexander, and Jane R. Dickie. "Attachment and Hikikomori: A Psychosocial Developmental Model." International Journal of Social Psychiatry 59.1 (2013): 61–72. Kroth, Michael. "Irreverence." Human Resource Development Review 16.1 (2017): 100–108. Lam, Ka Yan. "The Hatsune Miku Phenomenon: More than a Virtual J-Pop Diva." Journal of Popular Culture 49.5 (2016): 1107–1124. Leavitt, A., et al. "Producing Hatsune Miku: Concerts, Ommercialisation, and the Politics of Peer Production." Media Convergence in Japan. Eds. Patrick W. Galbraith and Jason Carlin. New Haven: Kinema Club, 2016. 200–229. Li, Tim M.H., and Paul W.C. Wong. "Youth Social Withdrawal Behavior (Hikikomori): A Systematic Review of Qualitative and Quantitative Studies." Australian and New Zealand Journal of Psychiatry 49.7 (2015): 595–609. Lozano-Méndez, Artur, and Antonio Loriguillo-López. "Nihilistamina: Gloomy Heroisms in Contemporary Anime." Handbook of Japanese Media and Popular Culture in Transition. Eds. Forum Mithani and Griseldis Kirsch. Amsterdam: Amsterdam UP, 2022. 124–139. Marmysz, John. Laughing at Nothing: Humor as a Response to Nihilism. Albany: State U of New York P, 2003. Neru. CYNICISM. NBC Universal Japan, 2018. 15 Mar. 2024 <http://nbcuni-music.com/neru/cynicism/detail/index.html>. ———. "Neru". Nico Nico Douga, 15 Mar. 2024 <https://www.nicovideo.jp/user/112798/>. ———. "Neru OFFICIAL". YouTube, 15 Mar. 2024 <https://www.youtube.com/user/NeruSleepOfficial>. ———. "Neru_Official". BiliBili, 15 Mar. 2024 <https://space.bilibili.com/243955530/>. Neru OFFICIAL. "Neru - Law-Evading Rock (脱法ロック) Feat. Kagamine Len." YouTube, 19 June 2016. <https://www.youtube.com/watch?v=u5mHVUwDf_0>. ———. "Neru - Let’s Drop Dead Feat. Kagamine Rin & Kagamine Len." YouTube, 29 Dec. 2017. <https://www.youtube.com/watch?v=jJirzFqSp-A>. ———. "Neru & z’5 - SNOBBISM Feat. Kagamine Rin & Kagamine Len." YouTube, 21 Mar. 2018. <https://www.youtube.com/watch?v=f5jDVFmEIVQ>. ———. "Neru & z’5 - Whatever Whatever Whatever (I~ya I~ya I~ya) Feat. Kagamine Rin & Kagamine Len." YouTube, 10 Nov. 2017. <https://www.youtube.com/watch?v=y8-6QPEes1k>. Niconico. Tag: VOCALOID. 15 Mar. 2024 <https://www.nicovideo.jp/tag/VOCALOID>. Nietzsche, Friedrich Wilhelm. The Will to Power: Selections from the Notebooks of the 1880s. Trans. R. Kevin Hill and Michael A. Scarpitti. London: Penguin, 2017. Nishitani, Keiji. The Self-Overcoming of Nihilism. Albany: State U of New York P, 1990. Occhi, Debra J. "Consuming Kyara 'Characters:' Anthropomorphization and Marketing in Contemporary Japan." Comparative Culture 15 (2010): 78–87. Neru Wikia. "Datsu." 16 Mar. 2024 <https://neru-oshiirep.fandom.com/wiki/Datsu>. Prinz, Jesse. "The Aesthetics of Punk Rock." Philosophy Compass 9.9 (2014): 583–593. Ren, Jiawen. "Analysis of the Japanese Iyashikei Films and the Culture behind These Films." Proceedings of the 2020 International Conference on Language, Art and Cultural Exchange (ICLACE 2020). Xiamen: Atlantis Press, 2020. Roquet, Paul. "Ambient Literature and the Aesthetics of Calm: Mood Regulation in Contemporary Japanese Fiction." The Journal of Japanese Studies 35.1 (2009): 87–111. Small, Christopher. Musicking: The Meanings of Performance and Listening. Middletown: Wesleyan UP, 1998. Sousa, Ana Matilde. "Beauty Is in the Eye of the 'Produser': Virtual Idol Hatsune Miku from Software, to Network, to Stage." In Post Screen: Intermittence + Interference, eds. Ana Moutinho et al. Lisbon: Edicoes Universitarias Lusofonas, 2016. 117–128. Spotify. "Neru." Spotify, 15 Mar. 2024 <https://open.spotify.com/artist/0rhcL1Mw7J9YJRDpD6mhXr>. Steinberg, Marc. Anime’s Media Mix: Franchising Toys and Characters in Japan. Minneapolis: U of Minnesota P, 2012. To, Kit Yan. The Voice of the Future: Seeking Freedom of Expression through VOCALOID Fandom. Master’s Thesis. Austin: University of Texas at Austin, 2014. Tsang, Gabriel F.Y. "Beyond 2015 : Nihilism and Existentialist Rhetoric in Neon Genesis Evangelion." Journal of International and Advanced Japanese Studies 8 (2016): 35–43. Vocaloid Lyrics Wiki. Home. 15 Mar. 2024 <https://vocaloidlyrics.fandom.com/wiki/Vocaloid_Lyrics_Wiki>. Voctro Labs. Vocaloid Libraries. 2020. <https://www.voctro-vocaloid.com/>. Yamada, Keisuke. Supercell Featuring Hatsune Miku. New York: Bloomsbury, 2017. Yamaha Corporation. Vocaloid. Microsoft Windows, macOS. 2004–2022. Zaborowski, Rafal. "Fans Negotiating Performer Personas: 'Melt' by Ryo Feat. Hatsune Miku." Suomen Antropologi 43.2 (2019): 104–108.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography