The Evolution of the Meme
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
It Came from Outer Space: the Virus, Cultural Anxiety, and Speculative
Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2002 It came from outer space: the virus, cultural anxiety, and speculative fiction Anne-Marie Thomas Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the English Language and Literature Commons Recommended Citation Thomas, Anne-Marie, "It came from outer space: the virus, cultural anxiety, and speculative fiction" (2002). LSU Doctoral Dissertations. 4085. https://digitalcommons.lsu.edu/gradschool_dissertations/4085 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. IT CAME FROM OUTER SPACE: THE VIRUS, CULTURAL ANXIETY, AND SPECULATIVE FICTION A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Department of English by Anne-Marie Thomas B.A., Texas A&M-Commerce, 1994 M.A., University of Arkansas, 1997 August 2002 TABLE OF CONTENTS Abstract . iii Chapter One The Replication of the Virus: From Biomedical Sciences to Popular Culture . 1 Two “You Dropped A Bomb on Me, Baby”: The Virus in Action . 29 Three Extreme Possibilities . 83 Four To Devour and Transform: Viral Metaphors in Science Fiction by Women . 113 Five The Body Electr(on)ic Catches Cold: Viruses and Computers . 148 Six Coda: Viral Futures . -
Online Identity in the Case of the Share Phenomenon. a Glimpse Into the on Lives of Romanian Millennials
Online identity in the case of the share phenomenon. A glimpse into the on lives of Romanian millennials Demetra GARBAȘEVSCHI PhD Student National University of Political Science and Public Administration E-Mail: [email protected] Abstract. In less than a decade, the World Wide Web has evolved from a predominantly search medium to a predominantly share medium, from holding a functional role to being endowed with a social one.In the context of a reontologisation of the infosphere and of an unprecedented display of mass self-communication, the identity system has gained a legitimate dimension – online identity –, as individuals have become the sum of impressions openly offered online and decoded into a coherent story by the receiver. In the network society, there are consequences to both having and not having an online identity. Originating in an interactionist perspective, the present paper looks into Romanian Millennials in trying to find out whether online identity is undergoing a process of intentionalization, in other words whether it becomes a conscious, planned effort of the individual to build himself/ herself a legitimate and profitable dimension in the digital space. Keywords: online identity; infosphere; mass self-communication; Millennials; Generation Y. 1. Introduction and theoretical background This paper examines online identity as part of an individual’s identity system, in the specific context of current Internet development, generalized connectivity Journal of Media Research, Vol. 8 Issue 2(22) / 2015,14 pp. 14-26 and participation through the share web. The discussion centers on Romanian young adults, seeking to uncover their perceptions of online identity as a potentially strategic self-representation process. -
Storming the Reality Studio
DRAFT Storming the Reality Studio: Leveraging Public Information in the War on Terror Brendan Matthew-Gordon Kelly Prepared for the 47th Annual International Studies Association Convention March 22-25, 2006 San Diego, CA Abstract This paper ar gues that the war on terror is understood on both sides as an idea war, an event that signifies the triumph of Constructivist theories over strictly Realist interpretations of international politics. It further argues that this is a watershed event, in which information operations have finally taken a primary role in military strategy. Finally, it argues that this is most visible in cyberspace. On February 17th, Defense Secretary Donald Rumsfeld spoke before the Council on Foreign Relations to argue that America was losing the information war in its struggle against radical Islam: Rumsfeld also said al-Qaida and other Islamic extremist groups have poisoned the Muslim public's view of the United States through deft use of the Internet and other modern communications methods that the American government has failed to master. "Our enemies have skillfully adapted to fighting wars in today's media age, but for the most part we - our country, our government - has not adapted," he said. 1 This argument is problematic for several reasons. First, it fails to consider the possibility that the Muslim world’s “poisoned” view of the United States has nothing to do with Al-Qaeda or other extremist organizations.2 But even if we accept Rumsfeld’s argument at face value, these statements are still problematic. The fact is that America, the home of Hollywood and Madison Avenue, has dominated the art of political spin for decades. -
Data Management in Systems Biology I
Data management in systems biology I – Overview and bibliography Gerhard Mayer, University of Stuttgart, Institute of Biochemical Engineering (IBVT), Allmandring 31, D-70569 Stuttgart Abstract Large systems biology projects can encompass several workgroups often located in different countries. An overview about existing data standards in systems biology and the management, storage, exchange and integration of the generated data in large distributed research projects is given, the pros and cons of the different approaches are illustrated from a practical point of view, the existing software – open source as well as commercial - and the relevant literature is extensively overviewed, so that the reader should be enabled to decide which data management approach is the best suited for his special needs. An emphasis is laid on the use of workflow systems and of TAB-based formats. The data in this format can be viewed and edited easily using spreadsheet programs which are familiar to the working experimental biologists. The use of workflows for the standardized access to data in either own or publicly available databanks and the standardization of operation procedures is presented. The use of ontologies and semantic web technologies for data management will be discussed in a further paper. Keywords: MIBBI; data standards; data management; data integration; databases; TAB-based formats; workflows; Open Data INTRODUCTION the foundation of a new journal about biological The large amount of data produced by biological databases [24], the foundation of the ISB research projects grows at a fast rate. The 2009 (International Society for Biocuration) and special edition of the annual Nucleic Acids Research conferences like DILS (Data Integration in the Life database issue mentions 1170 databases [1]; alone Sciences) [25]. -
Four Modes of Travelling and Navigating the Knowledge Universe?
Alternative view of segmented documents via Kairos 21st December 2006 | Draft Noonautics Four modes of travelling and navigating the knowledge "universe"? -- / -- Annex 4 of Towards an Astrophysics of the Knowledge Universe: from astronautics to noonautics? (2007) Introduction Four modes of travel? "Vehicles" "Globe"... "planets"... "celestial sphere"? "Global" as integrative Travel where / when / why? Constraints and possibilities Travelling "songlines" to engender the knowledge universe Songlines as "elven pathways" through the knowledge universe? Embodying a universe of "stargates"? Introduction Following from the arguments of the main paper, four distinct "universes" can notably be distinguished, as in the following table Distinctive "universes" cognitively objective and subjective neither objective nor subjective "complex" (relevantial universe) (enactivism) cognitively objective ("external") subjective ("internal") "binary" (classificational universe) (relational universe) This distribution benefits from the case made by Kinhide Mushakoji (Global Issues and Interparadigmatic Dialogue: essays on multipolar politics, 1988) for a quadrilemma (A, not-A, A and not-A, neither A nor not-A) as well as from the distinction, noted earlier, by Magoroh Maruyama regarding the different kinds of information universe (classificational, relational, and relevantial): Objective: With respect to an "objective" understanding of the knowledge universe, the main approach to its organization and navigation has been widely addressed through conventional knowledge organization and information systems and the possibilities of the world wide web. Objective and subjective: Beyond what might be caricatured as the management of conceptual "pigeon holes" and the conceptual "tunnels" between them, there is the potential for a more meaningful integrative approach, necessarily dependent on a subjective dimension and appeals to "values". Features of this are emerging in the conceptual dimensions of Web 2.0 and may be significant in the future of the semantic web. -
Thomas Hardy: Between the Scylla of the Genes and the Charybdis of The
Syrian Arab Republic Tishreen University Faculty of Arts English Department Thomas Hardy: Between the Scylla of the Genes and the Charybdis of the Memes In partial fulfillment of the requirements For the Degree of Master in Arts By: Rawa Zrekah Supervised by: Dr. Ahmad Al-Issa Summer 2018 Dedication I dedicate this work to those who believed in me: My great Father My loving Mother My patient Husband My supporting Sisters and Brothers And to your pure soul… My unforgettable Meray. With My Love Acknowledgements Although I was not the perfect student, you were the perfect supervisor. Thanks for your invaluable moral support. I am also grateful to all my doctors at the English Department, Tishreen University especially Dr. Abeer Zahra and Dr. Susie Gharib. Their reading of the dissertation is a rebirth of it. Thomas Hardy: Between the Scylla of the Genes and the Charybdis of the Memes Abstract ………………………………………………….1 I. Introduction A. Merciless Memes ………………………………………. 2 B. The Literature of Memes ……………………………… 9 C. “Steel Traps” ………………………………………….. 19 II. Jude the Obscure A. The Unbreakable Bubble ……………………………… 24 B. Survival of the Submissive ……………………………. 29 C. Social-Construction and Self-Destruction ………….. 40 D. Membots: Agents of Conformity ……………………. 49 E. Mesmerized Memoids …………………………………. 65 F. Negating the Power of Negation …………………….. 87 III. Conclusion “Individuality”: A Trojan Horse ………………………... 111 Works Cited ……………………………………………...... 115 Zrekah Abstract Between what the characters of Thomas Hardy think they know and what they do not know lies their inevitable tragedy. They strongly believe that they are men and women. They do not know that they are nothing but membots and memoids. They think that they run their own lives but they do not realize that they are lifeless. -
The Geographies of the Black Henna Meme Organism and the Epidemic
THE GEOGRAPHIES OF THE BLACK HENNA MEME ORGANISM AND THE EPIDEMIC OF PARA-PHENYLENEDIAMINE SENSITIZATION: A QUALITATIVE HISTORY A dissertation submitted To Kent State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy by Catherine Cartwright-Jones May, 2015 Copyright All rights reserved Except for previously published materials Dissertation written by Catherine Cartwright-Jones B.A. UCLA, 1972 M.A., Kent State University, 2006 Ph. D., Kent State University, 2015 Approved by ___________________________________________________ James Tyner, Full Professor, Ph.D., Geography, Doctoral Advisor ________________________________________________ Mandy Munro-Stasiuk, Chair and Full Professor, Ph.D., Geography ___________________________________________________ Scott Sheridan, Professor, Ph.D., Geography ___________________________________________________ Elizabeth Howard, Professor, Ph.D., , English Accepted by ___________________________________________________ Mandy Munro-Stasiuk, Chair, Ph.D., Department of Geography ___________________________________________________ James L. Blank, Ph.D., Interim Dean, College of Arts and Sciences TABLE OF CONTENTS Preface: Definitions and Style .....................................................................................................xxx I: Introduction to the Qualitative History of ‘Black Henna’ and the Epidemic of Para- phenylenediamine Sensitization…………………………………………………………...1 Two Case Studies of ‘Black Henna’ in the Third Space of Tourism: Camilla and Spider -
Implementing an Infosphere Optim Data Growth Solution
Front cover IBM® Information Management Software Implementing an InfoSphere Optim Data Growth Solution Understanding the InfoSphere Optim Data Growth solution architectures Implementing InfoSphere Optim Data Growth solutions Managing data growth with flexibility Whei-Jen Chen David Alley Barbara Brown Sunil Dravida Saunnie Dunne Tom Forlenza Pamela S Hoffman Tejinder S Luthra Rajat Tiwary Claudio Zancani ibm.com/redbooks International Technical Support Organization Implementing an InfoSphere Optim Data Growth Solution November 2011 SG24-7936-00 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. First Edition (November 2011) This edition applies to IBM InfoSphere Optim Data Growth Solution Version 7.3.1. © Copyright International Business Machines Corporation 2011. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii Preface . xiii The team who wrote this book . xiii Acknowledgements . xvi Now you can become a published author, too! . xvii Comments welcome. xvii Stay connected to IBM Redbooks . xviii Chapter 1. Introduction to IBM InfoSphere Optim . 1 1.1 Challenges . 2 1.1.1 Data explosion . 2 1.1.2 Current approaches . 3 1.2 Information governance. 3 1.3 IBM role in information governance. 4 1.3.1 History . 4 1.3.2 IBM approach to data governance . 5 1.3.3 Data governance maturity model . 7 1.4 Information lifecycle management. 8 1.4.1 Benefits of implementing the correct ILM strategy . 11 1.4.2 What is data archiving. 11 1.5 IBM InfoSphere Optim Data Growth Solution . -
Dynamic Information with IBM Infosphere Data Replication CDC
Front cover IBM® Information Management Software Smarter Business Dynamic Information with IBM InfoSphere Data Replication CDC Log-based for real-time high volume replication and scalability High throughput replication with integrity and consistency Programming-free data integration Chuck Ballard Alec Beaton Mark Ketchie Anzar Noor Frank Ketelaars Judy Parkes Deepak Rangarao Bill Shubin Wim Van Tichelen ibm.com/redbooks International Technical Support Organization Smarter Business: Dynamic Information with IBM InfoSphere Data Replication CDC March 2012 SG24-7941-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition (March 2012) This edition applies to Version 6.5 of IBM InfoSphere Change Data Capture (product number 5724-U70). © Copyright International Business Machines Corporation 2012. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team who wrote this book . xii Now you can become a published author, too! . xvi Comments welcome. xvii Stay connected to IBM Redbooks . xvii Chapter 1. Introduction and overview . 1 1.1 Optimized data integration . 2 1.2 InfoSphere architecture . 4 Chapter 2. InfoSphere CDC: Empowering information management. 9 2.1 The need for dynamic data . 10 2.2 Data delivery methods. 11 2.3 Providing dynamic data with InfoSphere CDC . 12 2.3.1 InfoSphere CDC architectural overview . 14 2.3.2 Reliability and integrity . 16 Chapter 3. Business use cases for InfoSphere CDC . 19 3.1 InfoSphere CDC techniques for transporting changed data . -
Ic Catches Cold: Viruses and Computers
CHAPTER FIVE THE BODY ELECTR(ON)IC CATCHES COLD: VIRUSES AND COMPUTERS “This Snow Crash thing–is it a virus, a drug, or a religion?” –Neal Stephenson, Snow Crash “It’s a program. It’s a virus. It’s an AI. It’s a breath mint. It’s a dessert topping. It’s the greatest thing since sliced toothpaste.” –Pat Cadigan, Synners While including a chapter on computer viruses in a study dealing with biological viruses and their metaphorical attachments may seem only natural, it is often the case that what appears to be a “natural” association is anything but. This is particularly so in the case of the computer virus, which, for all its affinities with its biological counterpart, is a strictly artificial construct that has no discernible effect on the human body. And yet the discourse of the computer virus is inextricable from that of the biological virus, utilizing terminology that suggests the computer virus poses as serious a risk to public health as does a biological virus. Or perhaps even more so–proximity is not a requirement for the transmission of a computer virus. A serious outbreak that causes widespread damage to computer systems can usually guarantee far more media attention than the latest Ebola outbreak, despite the fact that this virus does not directly threaten individual lives.1 Information, it seems, is a more precious commodity than human life. Like the common cold, there are less serious computer viruses that may quickly be dispatched by a virus “doctor” installed on a user’s hard drive. My own virus program helpfully offers to -
Annual Meeting with the Financial Market
Annual meeting with the financial market Speech by the Chairman Professor Paolo Savona Rome, 16 June 2020 Speech by the Chairman to the financial market Introduction 1. Rethinking the institutional architecture while taking into account changes in the monetary policy framework, financial conditions and technological innovations available 2. The ultimate goal: to strengthen the risk capital of exporting companies, especially medium and small, and to protect all forms of savings by directing them to support real business 3. Actions to be taken immediately Conclusions Introduction The Report that Consob is presenting today was forwarded to the Minister of Economy and Finance on 31 March pursuant to Law 216/1974. It illustrates the work carried out in 2019, ranging from approving share and bond issue prospectuses to examining takeover bids, monitoring stock exchange transactions and the activities of financial operators, imposing sanctions and examining domestic, European and supranational regulatory measures. The extent of the commitment can be summarised by the 101 meetings of the Commission held to examine the 1246 files handled by the offices. The most important news was the closure of 117 websites (223 as at 11 June 2020) that were collecting savings illegally, which was ordered consequently to the power granted to Consob by Law 58 of 28 June 2019. In the first part of 2020, 21 measures were taken to tackle the problems arising from the outbreak of the Covid-19 pandemic; such measures were announced during the hearing at the Parliamentary Committee of Inquiry into the Banking and Financial System on 28 May. With the International supervisory bodies (ESMA and IOSCO), firms were given instructions, among other things, on the information to be disclosed to the market in the financial reporting and information on the measures taken to grant the continuity of companies’ business and to mitigate the dominant uncertainties about looming risks. -
A Metalogue with Floridi's Information Ethics
APA NEWSLETTER | PHILOSOPHY AND COMPUTERS ———. “On the Intrinsic Value of Information Objects and the Infosphere.” Ethics and Information Technology 4, no. 4 (2002): 287– 304. Meaningful Reality: A Metalogue with ———. The Fourth Revolution, How the Infosphere Is Reshaping Human Reality. Oxford: Oxford University Press, 2014. Floridi’s Information Ethics ———. “The Method of Levels of Abstraction.” Minds and Machines 18, no. 3 (2008): 303–29. doi:10.1007/s11023-008-9113-7. Pompeu Casanovas ———. “Understanding Information Ethics.” APA Newsletter on INSTITUTE OF LAW AND TECHNOLOGY, AUTONOMOUS UNIVERSITY Philosophy and Computers 7, no. 1 (2007): 3–12. OF BARCELONA, [email protected] / CENTRE FOR APPLIED SOCIAL RESEARCH, ROYAL MELBOURNE Floridi, Luciano, and J. W. Sanders. “Artificial Evil and the Foundation INSTITUTE OF TECHNOLOGY, [email protected] of Computer Ethics.” Ethics and Information Technology 3, no. 1 (2001): 55–66. Floridi, Luciano, and Mariarosaria Taddeo. The Ethics of Information Abstract. This is a comment on some aspects of the The Warfare. New York: Springer, 2014. Ethics of the Information by Luciano Floridi. This paper Gelven, Michael. War and Existence: a Philosophical Inquiry. University explores some of the notions advanced in the book, its Park, PA: Pennsylvania State University Press, 1994. methodology, and its practical and ontological turn. In the Hayes, Carol M., and Jay P. Kesan. Law of Cyber Warfare. SSRN Scholarly end, some suggestions are made about the relationship Paper ID 2396078. Rochester, NY: Social Science Research Network, 2014. http://papers.ssrn.com/abstract=2396078. between Information Ethics (IE), policy, and law. Hepburn, Ronald W. “Wonder” and Other Essays: Eight Studies in Aesthetics and Neighbouring Fields.