Google Earth As Dionysusphere

Total Page:16

File Type:pdf, Size:1020Kb

Google Earth As Dionysusphere 6. John Lanchester, “The Global Id,” London Art Institute, and New Haven and London: Yale Tremble at Google’s Bird’s-Eye View”, The New What were we doing when we unchained this earth from its Review of Books, 28(2), January 26, 2006, University Press, 2008): 41-57. York Times, December 20 (2005) http://www. PAUL KINGSBURY IS AN ASSISTANT PROFESSOR sun? Where is it moving now? Where are we moving to? Away http://www.lrb.co.uk/v28/n02/john-lanchester/ 22. For example, the “picture of one of the worst nytimes.com/2005/12/20/technology/20image. IN THE DEPARTMENT OF GEOGRAPHY AT SIMON FRASER from all suns? Are we not continually falling? And backwards, the-global-id [23.03.10] things on the planet: the Athabasca oil sands html?_r=1&ei=5070&en=4b89cb0ad323cec6 UNIVERSITY. SpECIALIZING IN SOCIAL AND CULTURAL sidewards, forwards, in all directions? Is there still an up 7. David Vise, with Mark Malseed, The Google in Alberta, Canada” selected by Yann Arthus- &ex=1189051200&pagewanted=all [30.03.05]; GEOGRAPHY, HIS RESEARCH DRAWS ON THE THEORIES or down? Story (Basingstoke and Oxford: Pan Macmillan, Bertrand as his best photograph. “What you’re Lester Haines, “Taiwan Huffs and Puffs at OF JACQUES LACAN AND FRIEDRICH NIETZSCHE TO —Friedrich Nietzsche1 2008): 39. looking at is essentially poison and pollution, Google Earth,” The Register, October 4, 2005, EXAMINE MULTICULTURALISM, CONSUMPTION, POWER, AND 8. Cited in Vise, The Google Story: 3. yet the shot has great beauty.” “Yann Arthus- http://www.theregister.co.uk/2005/10/04/tai- AESTHETICS. In his 1969-70 seminar, “The Other Side of Psychoanalysis,” Jacques 9. John Markoff, “Hiding in Plain Sight, Google Bertrand’s Best Shot,” The Guardian (G2), wan_google_earth/ [30.03.10]; Lester Haines, Lacan coined the term “alethosphere” to address the Information Seeks More Power,” The New York Times, June September 24, 2009: 23. “Liverpool Throws Strop at Google Earth,” The Age’s proliferation of newfangled communication devices such as 14, 2006, http://www.nytimes.com/2006/06/14/ 23. Steven Johnson, “The Long Zoom,” Register, November 27, 2006, http://www. JOHN PAUL JONES III IS PROFESSOR satellites, computers, and telebanking networks.2 The neologism technology/14search.html?pagewanted=2&_ The New York Times Magazine, theregister.co.uk/2006/11/27/liverpool_google_ OF GEOGRAPHY IN THE ScHOOL OF GEOGRAPHY AND “alethosphere,” drawing on the Greek aletheia (referring to both r=1&ei=5070&en=5f47a9cc1f8a2faf October 8, 2006, http://www.nytimes. earth_outrage/ [30.03.10] DEVELOPMENT AND DEAN OF THE COLLEGE OF SOCIAL concealment and truth), is a place where something “gets recorded. If &ex=1189396800 [23.03.10]. com/2006/10/08/magazine/08games.html?_ 37. “Picture is Not Always Clear”, The Daily AND BEHAVIORAL ScIENCES AT THE UNIVERSITY OF you have a little microphone here, you are plugged into the aletho- 10. Lanchester, “The Global Id.” r=2&oref=slogin&pagewanted=all [25.03.10]. I Telegraph, January 13, 2007. http://www. ARIZONA. HE IS THE RECENT CO-EDITOR OF THE SAGE sphere.”3 Lacan notes that even “if you are in a little vehicle that is 11. Ken Auletta, Googled: The End of the World as am grateful to Amy Kulper for this reference. telegraph.co.uk/news/worldnews/1539400/ HaNDBOOK OF SOCIAL GEOGRapHIES AND RESEARCH transporting you to Mars you can still plug into the alethosphere” We Know It (London: Virgin Books, 2010). 24. For example, Vittoria Di Palma, “Zoom: Google Picture-is-not-always-clear.html [30.03.10] METHODS IN GEOGRapHY: A CRITICAL INTRODUCTION. much like the astronauts who orbited the moon and “had some minor 12. Alex Williams, “Planet Google Wants You,” Earth and Global Intimacy,” in Vittoria di Palma, 38. Thomas Harding, “Google Blots Out Iraq problems at the last minute… with their little machine… By virtue of The New York Times, October 15, 2006, http:// Diana Periton, and Marina Lathouri, ed.s, Intimate Bases on Internet,” The Daily Telegraph, January this [the human voice] they could allow themselves to say nothing but www.nytimes.com/2006/10/15/fashion/15google. Metropolis: Urban Subjects in the Modern City 20 (2007) http://www.telegraph.co.uk/news/ bullshit [conneries], such as for example that everything was going html?ex=1189051200&en=1640e28bbf02e82e (London and New York: Routledge, 2009): worldnews/1540039/Google-blots-out-Iraq- well when everything was going poorly. But that’s beside the point. 4 &ei=5070 [22.03.10]. 239-270. bases-on-internet.html [30.03.10] GOOGLE EARTH The point is that they stayed within the alethosphere.” 13. Ibid. 25. Stuart Elliott, “Marketing on Google: It’s 39. For a report on the appearance of high-resolu- If Lacan were alive today, he would regard geospatial technologies 14. Ibid. Not Just Text Anymore,” The New York Times, tion images of Israel on Google Earth in 2007, see such as Google Earth (hereafter GE) as a key part of the aletho- 15. Robert Verkaik, “Google Is Watching You,” The September 22, 2006, http://www.nytimes. http://www.informationliberation.com/?id=23961 sphere. Lacan’s notion of the alethosphere (and his psychoanalytic Independent, May 24, 2007: 1-2; 2. com/2006/09/22/business/media/22adco. [30.03.10] theories more generally) brings to the fore how social bonds take AS DIONYSUSPHERE 5 16. Victor Keegan, “That Ringing Sound Is Google html?_r=1&ex=1188964800&en=0e8871e8854 40. On the website they helpfully provided a place through people’s jouissance (hereafter, enjoyment). As Joan on the Phone,” The Guardian (Technology), 36af5&ei=5070 [27.03.10] “Search for bin Laden at Home!” link http://www. Copjec puts it: September 13, 2007: 4. 26. Michael Miller, Google.pedia: The Ultimate wired.com/wired/archive/15.03/start.html?pg=10 17. Fred Smith, From Counterculture to Google Resource (Indianapolis: Que Publishing, [30.03.10] The [“high-tech heaven” of the alethosphere] myth is probably Cyberculture: Stewart Brand, the Whole Earth 2007): 323. 41. Charles Starmer-Smith, “Zooming In: The inspired by the section of Civilization and Its Discontents where Freud Network, and the Rise of Digital Utopianism 27. Photograph reference: AS17-148-22727. World at Your Fingertip,” Daily Telegraph, speaks of modern man’s capacity to remake himself as ‘a kind of (Chicago: University of Chicago Press, 2006). Vittoria De Palma also discerns a relation between November 5, 2005, http://www.telegraph.co.uk/ prosthetic God,’ to replace every lost appendage or damaged organ 18. Stewart Brand, ed., The Next Whole Earth Google Earth and this image in “Zoom: Google travel/733938/Zooming-in-the-world-at-your- with another, superior one endowed with fantastic powers. In this Catalog: Access to Tools (POINT/Random House, Earth and Global Intimacy”: 264. fingertip.html [27.03.10] alethosphere … the prosthetically enhanced, plugged-in subject does 1981 [4th printing]): 2. 28. Denis Cosgrove, Apollo’s Eye: A Cartographic 42. Lester Haines, “Giant Colonel Sanders Visible not need to flee reality in order to indulge his pleasure principle, for he 19. Kevin Kelly, “Scan this Book!”, The New York Genealogy of the Earth in the Western Imagination from Space,” The Register, November 17, 2006, is now able to remould reality in accordance with it.6 Times Magazine, May 14, 2006, http://www. (Baltimore and London: Johns Hopkins University http://www.theregister.co.uk/2006/11/17/colo- nytimes.com/2006/05/14/magazine/14publishing. Press, 2001): 257-267. nel_sanders_mosaic/ [27.03.10] In this essay, we illustrate the extent to which GE users’ html?pagewanted=1&_r=1&ei=5070&en=a 29. Studied by Robert Poole in Earthrise: How 43. Anders Albrechtslund, “Surveillance in experiences are plugged into the enjoyment of what we call the c7163de40132770&ex=1189051200&adxn Man First Saw the Earth (New Haven and London: Searching: A Study into Ethical Aspects of an “Dionysusphere.”7 In so doing, we take inspiration from another nlx=1188918074-MfeDRLvuvFFoXIiFxqjuUw Yale University Press, 2008). Emergent Search Culture”, unpublished paper, no social theorist who was fascinated by the technological incorpora- [22.03.10] 30. Brand, ed., The Next Whole Earth Catalog: 1. pagination. I am grateful to the author for providing tions of pleasure and reality: Walter Benjamin. Benjamin is key to our 20. See Susan M. Roberts and Richard H. 31. On the relation between the Apollo images me with a copy of his essay. argument because he focuses on people’s practice-based — that Schein’s discussion of images of the globe and James Lovelock’s Gaia hypothesis, see Poole, 44. http://www.motivatepublishing.com/ is, embodied, psychical, and emotional — interactions with tech- in advertisements by geographic information Earthrise: 170-189. library/default.asp?categorycode=About_ nology. Writing on the rise of popular cinema and the mechanical providers, in which they note: “Views from above 32. In later releases, there is an option to switch on mp&ID=About_mp [30.03.10] reproduction of art in Europe during the 1930s, Benjamin affirmed underscore the advertiser’s totalizing claims of a shading effect, which disappears upon zooming 45. Mike Davis, “Does the Road to the Future End the indeterminacy of technology. That is, Benjamin was careful not complete coverage, of being everywhere.” Roberts in. at Dubai?,” Log: Observations on Architecture and to assign any inherent positive (e.g., progressive) or negative (e.g., and Schein, “Earth Shattering: Global Imagery 33. Randall Stross, Planet Google: How One the Contemporary City, 6 (2005): 61-64; 61. fascist) tendencies, qualities, or outcomes to cultural media and and GIS,” in John Pickles, ed., Ground Truth: The Company Is Transforming Our Lives (London: 46. http://www.nakheel.com/en/news/2008_ technology more generally.
Recommended publications
  • "New Energy Economy": an Exercise in Magical Thinking
    REPORT | March 2019 THE “NEW ENERGY ECONOMY”: AN EXERCISE IN MAGICAL THINKING Mark P. Mills Senior Fellow The “New Energy Economy”: An Exercise in Magical Thinking About the Author Mark P. Mills is a senior fellow at the Manhattan Institute and a faculty fellow at Northwestern University’s McCormick School of Engineering and Applied Science, where he co-directs an Institute on Manufacturing Science and Innovation. He is also a strategic partner with Cottonwood Venture Partners (an energy-tech venture fund). Previously, Mills cofounded Digital Power Capital, a boutique venture fund, and was chairman and CTO of ICx Technologies, helping take it public in 2007. Mills is a regular contributor to Forbes.com and is author of Work in the Age of Robots (2018). He is also coauthor of The Bottomless Well: The Twilight of Fuel, the Virtue of Waste, and Why We Will Never Run Out of Energy (2005). His articles have been published in the Wall Street Journal, USA Today, and Real Clear. Mills has appeared as a guest on CNN, Fox, NBC, PBS, and The Daily Show with Jon Stewart. In 2016, Mills was named “Energy Writer of the Year” by the American Energy Society. Earlier, Mills was a technology advisor for Bank of America Securities and coauthor of the Huber-Mills Digital Power Report, a tech investment newsletter. He has testified before Congress and briefed numerous state public-service commissions and legislators. Mills served in the White House Science Office under President Reagan and subsequently provided science and technology policy counsel to numerous private-sector firms, the Department of Energy, and U.S.
    [Show full text]
  • Communication & Media Studies
    COMMUNICATION & MEDIA STUDIES BOOKS FOR COURSES 2011 PENGUIN GROUP (USA) Here is a great selection of Penguin Group (usa)’s Communications & Media Studies titles. Click on the 13-digit ISBN to get more information on each title. n Examination and personal copy forms are available at the back of the catalog. n For personal service, adoption assistance, and complimentary exam copies, sign up for our College Faculty Information Service at www.penguin.com/facinfo 2 COMMUNICaTION & MEDIa STUDIES 2011 CONTENTS Jane McGonigal Mass Communication ................... 3 f REality IS Broken Why Games Make Us Better and Media and Culture .............................4 How They Can Change the World Environment ......................................9 Drawing on positive psychology, cognitive sci- ence, and sociology, Reality Is Broken uncov- Decision-Making ............................... 11 ers how game designers have hit on core truths about what makes us happy and uti- lized these discoveries to astonishing effect in Technology & virtual environments. social media ...................................13 See page 4 Children & Technology ....................15 Journalism ..................................... 16 Food Studies ....................................18 Clay Shirky Government & f CognitivE Surplus Public affairs Reporting ................. 19 Creativity and Generosity Writing for the Media .....................22 in a Connected age Reveals how new technology is changing us from consumers to collaborators, unleashing Radio, TElEvision, a torrent
    [Show full text]
  • LGST 642X Q2 2016 Syllabus 101816
    LGST 642x Big Data, Big Responsibilities: The Law and Ethics of Business Analytics Q2 2016 | MW 10:30am-12pm | JMHH F65 Overview Significant technologies always have unintended consequences, and their effects are never neutral. A world of ubiquitous data, subject to ever more sophisticated collection, aggregation, analysis, and use, creates massive opportunities for both financial gain and social good. It also creates dangers in areas such as privacy and discrimination, as well as simple hubris about the effectiveness of management by algorithm. This course introduces students to the legal, policy, and ethical dimensions of big data, predictive analytics, and related techniques. It then examines responses—both private and governmental—that may be employed to address these concerns. Instructor Associate Professor Kevin Werbach Department of Legal Studies and Business Ethics 673 Huntsman Hall (215) 898-1222 [email protected] (best way to reach me) Office Hours: Monday 12:30-2pm, or by appointment Learning Objectives Good data-driven decision-making means not just generating solutions, but understanding how to use them. Some of the most sophisticated firms in terms of data science expertise have already gotten into trouble over concerns about privacy, security, manipulation, and discrimination. Failure to anticipate such issues can result in ethical lapses, public relations disasters, regulatory sanctions, and even legal liability. My goal is to help you develop the skills to use analytics in the most responsible way, while remaining focused on your business objectives. After completion of the course, you should be able to: 1. Identify where algorithms depend on human judgments or assumptions. 2.
    [Show full text]
  • Stuxnet, Schmitt Analysis, and the Cyber “Use-Of-Force” Debate
    Members of International Telecommunications Union and UN Institute for Training and Research confer on cyber security UN (Jean-Marc Ferré) UN (Jean-Marc Stuxnet, Schmitt Analysis, and the Cyber “Use-of-Force” Debate By ANDREW C. FOLTZ All Members shall refrain in ne of the many seemingly advance the specific criteria states will use in intractable legal issues sur- making such determinations. their international relations rounding cyberspace involves As discussed in this article, several ana- from the threat or use of force O whether and when peacetime lytic frameworks have been developed to help against the territorial integ- cyber operations constitute a prohibited use of assess when cyber operations constitute a use force under Article 2(4) of the United Nations of force.3 One conclusion these frameworks rity or political independence (UN) Charter. Notwithstanding a significant share is that cyber operations resulting in of any state, or in any other body of scholarly work on this topic and physical damage or injury will almost always manner inconsistent with extensive real-world examples from which to be regarded as a use of force. When these draw, there is no internationally recognized frameworks were developed, however, there the Purposes of the United definition of a use of force.2 Rather, what has were few, if any, examples of peacetime, state- Nations. emerged is a general consensus that some sponsored cyber coercion. More importantly, cyber operations will constitute a use of force, the prospect of cyber attacks causing physical —Article 2(4), Charter of the but that it may not be possible to identify in damage was largely theoretical.4 Beginning United Nations1 Lieutenant Colonel Andrew C.
    [Show full text]
  • The New Investor Tom C.W
    The New Investor Tom C.W. Lin EVIEW R ABSTRACT A sea change is happening in finance. Machines appear to be on the rise and humans on LA LAW LA LAW the decline. Human endeavors have become unmanned endeavors. Human thought and UC human deliberation have been replaced by computerized analysis and mathematical models. Technological advances have made finance faster, larger, more global, more interconnected, and less human. Modern finance is becoming an industry in which the main players are no longer entirely human. Instead, the key players are now cyborgs: part machine, part human. Modern finance is transforming into what this Article calls cyborg finance. This Article offers one of the first broad, descriptive, and normative examinations of this sea change and its wide-ranging effects on law, society, and finance. The Article begins by placing the rise of artificial intelligence and computerization in finance within a larger social context. Next, it explores the evolution and birth of a new investor paradigm in law precipitated by that rise. This Article then identifies and addresses regulatory dangers, challenges, and consequences tied to the increasing reliance on artificial intelligence and computers. Specifically, it warns of emerging financial threats in cyberspace, examines new systemic risks linked to speed and connectivity, studies law’s capacity to govern this evolving financial landscape, and explores the growing resource asymmetries in finance. Finally, drawing on themes from the legal discourse about the choice between rules and standards, this Article closes with a defense of humans in an uncertain financial world in which machines continue to rise, and it asserts that smarter humans working with smart machines possess the key to better returns and better futures.
    [Show full text]
  • Cyber Warfare: Surviving an Attack
    14 Cyber Warfare: Surviving an Attack By Devabhaktuni Srikrishna Cyberspace is a new domain of warfare. Created to minimize the vulnerability of United States communications networks to a crippling nuclear first strike by the Soviet Union, the Internet that was originally envisioned to enhance U.S. security is turning into a battlefield 1 for nations or sub-national groups to launch virally spreading attacks 2 and induce network failures potentially involving critical infrastructure systems.3 Cyber warfare and cyberoffense 4 have been a part of U.S. military operations for decades.5 Treaties and rules of engagement define what is off-limits during a cyberwar.6 The more vulnerable the system is, the more policy is necessary to deter adversarial nations from launching attacks, and vice-versa. Some cyberattacks are analogous to air forces probing one anotherʼs defenses or perhaps to espionage during the Cold War, which occurred though there was no official war and no physical harm. Cyberespionage largest recent cyberattacks in their book, but due to a gap in theory and practice. operations of China, for example, against the United States and its allies Cyber War: The Next Threat to National Organizations are vulnerable to the extent have been going on for years and will Security and What to Do About It. Once a they want to be and to how much they want never really end.7 virus or malware is inadvertently to spend to address vulnerabilities. 14 And downloaded onto a networked personal cyber vulnerabilities can be completely U.S. Air Force General Kevin Chilton, computer (PC) by a user9, the PC can be eliminated -- unlike conventional, nuclear, former Commander-in-Chief of commandeered to perform cyberattacks chemical, or biological which are permanent Strategic Command, has stated that ranging from electronic banking crimes, vulnerabilities due to laws of nature.
    [Show full text]
  • Planning for the Future of Cyber Attack Attribution”
    Testimony and Statement for the Record of Marc Rotenberg President, EPIC Adjunct Professor, Georgetown University Law Center Hearing on “Planning for the Future of Cyber Attack Attribution” Before the Committee on Science and Technology Subcommittee on Technology and Innovation U.S. House of Representatives July 15, 2010 2138 Rayburn House Office Building Washington, DC Mr. Chairman, Members of the Committee, thank you for the opportunity to appear today to discuss the topic of Cyber Security and Attribution. We appreciate your interest in this topic.1 My name is Marc Rotenberg. I am President of the Electronic Privacy Information Center (EPIC), a non-partisan public interest research organization established in 1994 to focus public attention on emerging privacy and civil liberties issues. Since our founding, we have had an ongoing interest in computer security, privacy, and identification. In fact, EPIC began in response to a proposal from the National Security Agency to establish a mandatory key escrow encryption standard that could have easily prevented the emergence of the Internet as a powerful force for economic growth and political change EPIC was founded in 1994 in part to address concerns about the role of the National Security Agency in computer security policy.2 Since then EPIC has participated in numerous public debates regarding the protection of privacy rights on the Internet and elsewhere. EPIC is currently engaged in active litigation under the Freedom of Information Act with the NSA and National Security Council regarding
    [Show full text]
  • You Might Be a Robot
    \\jciprod01\productn\C\CRN\105-2\CRN203.txt unknown Seq: 1 28-MAY-20 13:27 YOU MIGHT BE A ROBOT Bryan Casey† & Mark A. Lemley‡ As robots and artificial intelligence (AI) increase their influ- ence over society, policymakers are increasingly regulating them. But to regulate these technologies, we first need to know what they are. And here we come to a problem. No one has been able to offer a decent definition of robots and AI—not even experts. What’s more, technological advances make it harder and harder each day to tell people from robots and robots from “dumb” machines. We have already seen disas- trous legal definitions written with one target in mind inadver- tently affecting others. In fact, if you are reading this you are (probably) not a robot, but certain laws might already treat you as one. Definitional challenges like these aren’t exclusive to robots and AI. But today, all signs indicate we are approaching an inflection point. Whether it is citywide bans of “robot sex brothels” or nationwide efforts to crack down on “ticket scalp- ing bots,” we are witnessing an explosion of interest in regu- lating robots, human enhancement technologies, and all things in between. And that, in turn, means that typological quandaries once confined to philosophy seminars can no longer be dismissed as academic. Want, for example, to crack down on foreign “influence campaigns” by regulating social media bots? Be careful not to define “bot” too broadly (like the California legislature recently did), or the supercomputer nes- tled in your pocket might just make you one.
    [Show full text]
  • Overview Not Confine the Discussion in This Report to Those Specific Issues Within the Commission’S Regulatory Jurisdiction
    television, cable and satellite media outlets operate. Accordingly, we do Overview not confine the discussion in this report to those specific issues within the Commission’s regulatory jurisdiction. Instead, we describe below 1 MG Siegler, Eric Schmidt: Every 2 Days We Create As Much Information a set of inter-related changes in the media landscape that provide the As We Did Up to 2003, TECH CRUNCH, Aug 4, 2010, http://techcrunch. background for future FCC decision-making, as well as assessments by com/2010/08/04/schmidt-data/. other policymakers beyond the FCC. 2 Company History, THomsoN REUTERS (Company History), http://thom- 10 Founders’ Constitution, James Madison, Report on the Virginia Resolu- sonreuters.com/about/company_history/#1890_1790 (last visited Feb. tions, http://press-pubs.uchicago.edu/founders/documents/amendI_ 8, 2011). speechs24.html (last visited Feb. 7, 2011). 3 Company History. Reuter also used carrier pigeons to bridge the gap in 11 Advertising Expenditures, NEwspapER AssoC. OF AM. (last updated Mar. the telegraph line then existing between Aachen and Brussels. Reuters 2010), http://www.naa.org/TrendsandNumbers/Advertising-Expendi- Group PLC, http://www.fundinguniverse.com/company-histories/ tures.aspx. Reuters-Group-PLC-Company-History.html (last visited Feb. 8, 2011). 12 “Newspapers: News Investment” in PEW RESEARCH CTR.’S PRoj. foR 4 Reuters Group PLC (Reuters Group), http://www.fundinguniverse.com/ EXCELLENCE IN JOURNALISM, THE StatE OF THE NEws MEDIA 2010 (PEW, company-histories/Reuters-Group-PLC-Company-History.html (last StatE OF NEws MEDIA 2010), http://stateofthemedia.org/2010/newspa- visited Feb. 8, 2011). pers-summary-essay/news-investment/.
    [Show full text]
  • Minutes Meeting of the Executive Committee Society of Professional Journalists August 22, 2007 Via Conference Call
    MINUTES MEETING OF THE EXECUTIVE COMMITTEE SOCIETY OF PROFESSIONAL JOURNALISTS AUGUST 22, 2007 VIA CONFERENCE CALL MEETING CALLED TO ORDER With President Christine Tatum presiding, the meeting of the Executive Committee of the Society of Professional Journalists was called to order at noon EDT on Wednesday, August 22, 2007 via telephonic conference call originating in Indianapolis, Indiana. The stated purpose of the call was to review nominations and select the various awards to be presented at the 2007 SPJ Convention and National Journalism Conference in Washington, D.C. in October. ROLL CALL In addition to President Tatum, the following were in attendance: President-Elect Clint Brewer; Secretary- Treasurer Dave Aeikens; Vice President, Campus Chapter Affairs Mead Loop; Immediate Past President David Carlson; and Region 3 Director Holly Fisher. Staff members present included Executive Director Terry Harper; Associate Executive Director Chris Vachon; and Programs Coordinator Heather Porter. DAVID L. ESHELMAN OUTSTANDING CAMPUS ADVISER AWARD The David L. Eshelman Outstanding Campus Adviser Award honors individuals who have done an outstanding job serving as SPJ campus adviser and who have contributed to their chapters and the national organization over an extended period of time. Upon proper motion and second by Loop and Brewer, respectively, Rick Brunson, University of Central Florida, was awarded the David L. Eshelman Outstanding Campus Adviser Award. DISTINGUISHED TEACHING IN JOURNALISM AWARD The Distinguished Teaching in Journalism Award honors an outstanding journalism educator who has made a significant contribution to the profession and/or journalism education. Upon proper motion and second by Carlson and Aeikens, respectively, Ralph Izard, Louisiana State University and Ohio University, was awarded the Distinguished Teaching in Journalism Award.
    [Show full text]
  • People Can Be So Fake: a New Dimension to Privacy and Technology Scholarship
    Volume 114 Issue 3 Dickinson Law Review - Volume 114, 2009-2010 1-1-2010 People Can Be So Fake: A New Dimension to Privacy and Technology Scholarship M. Ryan Calo Follow this and additional works at: https://ideas.dickinsonlaw.psu.edu/dlra Recommended Citation M. R. Calo, People Can Be So Fake: A New Dimension to Privacy and Technology Scholarship, 114 DICK. L. REV. 809 (2010). Available at: https://ideas.dickinsonlaw.psu.edu/dlra/vol114/iss3/3 This Article is brought to you for free and open access by the Law Reviews at Dickinson Law IDEAS. It has been accepted for inclusion in Dickinson Law Review by an authorized editor of Dickinson Law IDEAS. For more information, please contact [email protected]. People Can Be So Fake: A New Dimension to Privacy and Technology Scholarship M. Ryan Calo* This article updates the traditional discussion of privacy and technology, focused since the days of Warren and Brandeis on the capacity of technology to manipulate information. It proposes a novel dimension to the impact of anthropomorphicor social design on privacy. Technologies designed to imitate people-through voice, animation, and natural language-are increasingly commonplace, showing up in our cars, computers, phones, and homes. A rich literature in communications and psychology suggests that we are hardwiredto react to such technology as though a person were actually present. Social interfaces accordingly capture our attention, improve interactivity, and can free up our handsfor other tasks. At the same time, technologies that imitate people have the potential to implicate long-standingprivacy values. One of the well-documented effects on users of interfaces and devices that emulate people is the sensation of being observed and evaluated.
    [Show full text]
  • Intel Prototype May Herald a New Age of Processing - New York Times
    Intel Prototype May Herald a New Age of Processing - New York Times http://www.nytimes.com/2007/02/12/technology/12chip.html?page... February 12, 2007 Intel Prototype May Herald a New Age of Processing By JOHN MARKOFF SAN FRANCISCO, Feb. 11 — Intel will demonstrate on Monday an experimental computer chip with 80 separate processing engines, or cores, that company executives say provides a model for commercial chips that will be used widely in standard desktop, laptop and server computers within five years. The new processor, which the company first described as a Teraflop Chip at a conference last year, will be detailed in a technical paper to be presented on the opening day of the International Solid States Circuits Conference, beginning here on Monday. While the chip is not compatible with Intel’s current chips, the company said it had already begun design work on a commercial version that would essentially have dozens or even hundreds of Intel-compatible microprocessors laid out in a tiled pattern on a single chip. The chip’s design is meant to exploit a new generation of manufacturing technology the company introduced last month. Intel said that it had changed the basic design of transistors in such a way that it would be able to continue to shrink them to smaller sizes — offering lower power and higher speeds — for at least a half-decade or more. During a briefing on Thursday in a hotel room here, Nitin Borkar, one of the chip’s designers, showed an air-cooled computer based on the chip running a simple scientific calculation at speeds above one trillion mathematical calculations a second.
    [Show full text]