Der Newsgroup-Beitrag – Eine Kommunikative Gattung?

Total Page:16

File Type:pdf, Size:1020Kb

Der Newsgroup-Beitrag – Eine Kommunikative Gattung? Timo Gausling Der Newsgroup-Beitrag – eine kommunikative Gattung? SASI Heft 4, Januar 2005 Inhalt 1 EINLEITUNG 1 2 DAS USENET ALS ASYNCHRONE, INTERAKTIVE KOMMUNI- KATIONSPLATTFORM: EINE EINFÜHRUNG 3 2.1 Wie läuft die Kommunikation in Newsgroups ab? 4 2.2 Grundlagen der Usenet-Kommunikation 7 2.2.1 Die Gruppenhierarchie und ihre Struktur 12 2.2.2 Die technisch-formalen Merkmale des News-Beitrages 16 2.2.3 Newsgroups: Charta, FAQs, Moderation und Killfile 19 2.3 Das Usenet in Abgrenzung zu verwandten netzbasierten Medien 23 2.3.1 E-Mail und Mailinglisten 23 2.3.2 Internet Relay Chat (IRC) 24 2.3.3 Foren auf Websites 24 2.4 Der Zugang zur Welt der Newsgroups 25 2.4.1 Der Newsreader 25 2.4.2 Der Online-Zugriff und das Usenet-Archiv 26 3 METHODISCHES VORGEHEN UND DATENMATERIAL 27 3.1 Das Konzept kommunikativer Gattungen als theoretischer Rahmen für die vorliegende Analyse 27 3.1.1 Die drei analytischen Ebenen des Gattungskonzeptes 29 3.1.2 Zur Durchführung der Untersuchung 31 3.2 Das Usenet als Gegenstand linguistischer Forschung 32 3.3 Die untersuchten Newsgroups 35 3.3.1 de.etc.sprache.deutsch 35 3.3.2 de.talk.jugend 36 4 DIE AUßENSTRUKTUR DES USENETS 38 4.1 Net and Netizens: Das Medium und sein kommunikatives Milieu 39 4.2 Die kommunikative Funktion von Newsgroups 44 4.2.1 Newsgroups als Diskussionsplattformen 45 4.2.2 Das Usenet als allgemeiner Antwortgeber und Support-Instrument der IT-Branche 45 4.2.3 Die Newsgroup als interaktives Unterhaltungsmedium 46 i 5 ZUR INTERAKTIONSEBENE DER KOMMUNIKATION IN NEWSGROUPS 48 5.1 Der räumliche und zeitliche Kontext der Interaktion und der Status der Teilnehmenden 48 5.1.1 Die Asynchronität und ihre Konsequenzen 49 5.1.2 Die Newsgroup als sozialer Raum: zur Teilnehmerkonstellation im Usenet 51 5.1.3 Format und Funktion von Signaturen 53 5.2 Der Thread als interaktiver dialogischer Prozess 57 5.2.1 Begrüßung und Verabschiedung 57 5.2.2 Bezugnahme, Zitat und Organisation des Dialogs 60 5.2.3 ROT13 und Spoiler: der virtuelle Sichtschutz 64 5.2.4 Korrekturen 68 5.2.5 Unterschiede zwischen de.etc.sprache.deutsch und de.talk.jugend 70 5.3 Beitragstypen und Präferenzstrukturen 71 5.4 Normalität und Norm 75 5.4.1 Metakommunikation im Usenet 75 5.4.2 Regelverstöße und Sanktionierungspraktiken 79 6 DER NEWS-BEITRAG UND SEINE BINNENSTRUKTUR 85 6.1 Medial motivierte formale Gestaltungsmerkmale 85 6.1.1 Authentizität durch „Realnamen“ (RFC-1036) 85 6.1.2 Das Erscheinungsbild des Textkörpers: Format, Zeilenumbruch und Codierung 87 6.2 Stilistische Regeln und Besonderheiten 91 6.2.1 Netiquette im Usenet 92 6.2.2 Der Kode: Sprachvarietät und Register 94 6.3 Die Kompensation nonverbaler und auditiver Qualitäten 96 6.3.1 Emoticons und ASCII-Art 97 6.3.2 Asteriske und andere Ersatzformatierungen 102 6.3.3 Lautmalereien und Lachen 104 6.3.4 Alternative Formen der Markierung von Ironie, Sarkasmus und persönlicher Stimmung 107 6.4 Lexiko-semantische, morphologische und syntaktische Phänomene 109 6.4.1 Abbreviationen und Kontraktionen 109 6.4.2 Akronyme 110 6.4.3 Phonologische Ideogramme 114 6.4.4 Entlehnungen aus Programmiersprachen, Anwendungsprogrammen und UNIX 115 6.4.5 Inflektivkonstruktionen 118 7 DIE GATTUNG ‚NEWSGROUP-BEITRAG’: SCHLUSSÜBERLEGUNGEN UND AUSBLICK 122 8 LITERATUR 128 ii 1 Einleitung Analog zur fortschreitenden Integration der so genannten „neuen Medien“ in die alltäglichen Kommunikationsgewohnheiten der meisten Menschen rücken diese auch zunehmend in den Fokus verschiedenster wissenschaftlicher Disziplinen. Auch in der Linguistik nimmt die Zahl der Publikationen zu den Themen Chat, E-Mail, SMS und Hypertext von Jahr zu Jahr in kaum überschaubarer Weise zu. Auffallend ist vor diesem Hintergrund, dass der Welt der Newsgroups – dem Usenet – bislang vergleichsweise wenig Beachtung geschenkt wurde, obwohl es mit seiner über zwanzigjährigen Tradition eine der ältesten und komplexesten netzbasierten Kommunikationsformen ist. Ein Grund für diese Zurückhaltung kann darin gesehen werden, dass der Nutzung des Mediums technische Hürden im Wege stehen, deren Überwindung meist profunde Kenntnisse im Umgang mit Computern erfordert, über die ein Großteil der Internetnutzer nicht verfügt. Diese Tatsache zeichnet vermutlich dafür verantwortlich, dass der Zustrom neuer Teilnehmer sowie die proportional zu ihm wachsende personelle und strukturelle Fluktuation in Newsgroups zumeist auf ein Minimum begrenzt war, wodurch das Usenet bis zum heutigen Tag tendenziell ein Medium der technisch versierten Minderheit geblieben ist. Zahlreiche Gruppen bilden daher – verglichen mit anderen Diensten im Netz – einen auffallend homogenen Interaktionsraum, in dem sich ohne nennenswerte externe Einflüsse ein in Teilen einzigartiges, hochgradig ausdifferenziertes Kommunikationssystem etablieren konnte, das ein auch für die Linguistik relevantes, interdisziplinäres Forschungsfeld abgibt. Ausgehend von dieser Beobachtung stellt die vorliegende Arbeit den Versuch dar, einen möglichst umfassenden Überblick über die vielfältigen interaktionalen und sprachlichen Phänomene des Usenets und die für deren Entwicklung verantwortlichen technischen und strukturellen Rahmenbedingungen zu geben. Denn auch im Falle der Newsgroup-Kommunikation eröffnet der neue, mediale Interaktionsraum seinen Teilnehmern im Sinne Hollys (1996) einerseits neue kommunikative Spielräume, die einer kreativen Erschließung und Ausgestaltung bedürfen, bringt andererseits aber auch elementare neue Restriktionen mit sich, etwa in Form von nicht vorhandenen, gewohnten Kommunikationskanälen. 1 Indem die Nutzer sich den medialen Einschränkungen unterwerfen und gemeinsam spezifische Strategien zu deren Kompensation hervorbringen, aber auch die hinzugewonnenen technischen Möglichkeiten entsprechend ihren kollektiven kom- munikativen Bedürfnissen gewinnbringend nutzbar machen, bringen sie eine neue, vitale Interaktionsform mit eigenständigem Profil hervor, deren effiziente Nutzung ein umfangreiches Wissen um ihre Besonderheiten voraussetzt. Da die im Rahmen dieses Entwicklungsprozesses hervortretenden sprachlichen Auffälligkeiten der Usenet-Kommunikation nur vor dem Hintergrund der für ihre Genese verantwortlichen außersprachlichen Faktoren sinnvoll beschrieben werden können, bietet sich das auf Luckmann (1986/88) zurückgehende, von Günthner und Knoblauch (1994) modifizierte und für die Untersuchung linguistischer Phänomene erweiterte Konzept kommunikativer Gattungen als theoretischer Rahmen für eine Analyse an. So werden in die Untersuchung des deutschsprachigen Newsgroup- Artikels als kommunikative Gattung neben sprachlichen Aspekten sowohl die soziokulturelle Situierung des Mediums und seiner Nutzer, als auch die Usenet- spezifischen interaktionsorganisierenden Strukturen einbezogen. Die hiermit sicher- gestellte Berücksichtigung eines breiten Spektrums relevanter Faktoren lässt eine fundierte Aussage in Bezug auf die Verbindlichkeit und den Institutionalisierungsgrad der untersuchten Phänomene zu. Das für die systematische Gattungsanalyse erforderliche empirische Datenmaterial in Form von Usenet-Beiträgen wurde zwei ausgewählten, sich hinsichtlich ihrer Thematik und ihres Nutzerkreises deutlich voneinander abhebenden Newsgroups des deutschsprachigen Usenets (de.-Hierarchie) entnommen. 2 2 Das Usenet als asynchrone, interaktive Kom- munikationsplattform: eine Einführung Da das Usenet den meisten Internetnutzern weitgehend unbekannt ist, soll das vorliegende Kapitel zunächst eine grobe Vorstellung vom Medium und den Besonderheiten seines Gebrauchs vermitteln. Dabei wird bewusst in Kauf genommen, dass einige Aspekte der hier dargestellten Phänomene auch in den Gegenstandsbereich der gattungstheoretischen Detailanalyse fallen. Dies hat zur Folge, dass dort gelegentlich auf Teile dieses Kapitels zurückverwiesen werden muss, um Redundanzen zu vermeiden. Angesichts der technischen und strukturellen Komplexität des Mediums ist eine geschlossene, einführende Überblicksdarstellung für das Verständnis der anschließenden linguistischen Analyse m.E. jedoch unabdingbar. Stark vereinfacht lässt sich das oberflächliche Erscheinungsbild des heutigen Usenets1 (= USEr NETwork) als eine Art Hybridkonstruktion aus zentralen Strukturelementen der Medien Chat und E-Mail beschreiben. So stellt eine Newsgroup, genau wie ein üblicher Internet Relay Chat (IRC), eine öffentliche Plattform dar, deren durch aktive Teilnehmer eingebrachte Textinhalte prinzipiell jedem interessierten Internetnutzer ohne Zugangsbeschränkung zur Verfügung stehen. Auf der anderen Seite baut das Usenet insofern weitgehend auf dem geläufigen E-Mail-System auf, als es einerseits zu großen Teilen auf den gleichen technischen Standards basiert und andererseits ein Newsgroup-Beitrag einer typischen E-Mail hinsichtlich Erscheinungsbild und Aufbau sehr ähnlich ist. (vgl. Horton/Adams 1987: 1f) Trotz der genannten Überschneidungen stellt das Usenet ein eigenständiges netzbasiertes Medium mit einer langen, von der Entwicklung des Internets weitgehend unabhängigen Entwicklungsgeschichte dar. Ein detaillierter Überblick über Funktion und Aufbau, auch in Abgrenzung zu verwandten Kommunikationsformen, soll dies im Folgenden erläutern. 1 Das Usenet wird häufig auch „Netnews“ genannt. Beide Begriffe werden heute überwiegend synonym verwendet. 3 2.1 Wie läuft die Kommunikation in Newsgroups ab? Das Usenet stellt in seiner heutigen Form ein frei zugängliches, nach thematischen Gesichtspunkten strukturiertes Kommunikationsnetzwerk zum Austausch von Informationen und Diskussionsbeiträgen via Computer dar. Jeder Nutzer hat die Möglichkeit,
Recommended publications
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • Cyber Law and Espionage Law As Communicating Vessels
    Maurer School of Law: Indiana University Digital Repository @ Maurer Law Books & Book Chapters by Maurer Faculty Faculty Scholarship 2018 Cyber Law and Espionage Law as Communicating Vessels Asaf Lubin Maurer School of Law - Indiana University, [email protected] Follow this and additional works at: https://www.repository.law.indiana.edu/facbooks Part of the Information Security Commons, International Law Commons, Internet Law Commons, and the Science and Technology Law Commons Recommended Citation Lubin, Asaf, "Cyber Law and Espionage Law as Communicating Vessels" (2018). Books & Book Chapters by Maurer Faculty. 220. https://www.repository.law.indiana.edu/facbooks/220 This Book is brought to you for free and open access by the Faculty Scholarship at Digital Repository @ Maurer Law. It has been accepted for inclusion in Books & Book Chapters by Maurer Faculty by an authorized administrator of Digital Repository @ Maurer Law. For more information, please contact [email protected]. 2018 10th International Conference on Cyber Conflict CyCon X: Maximising Effects T. Minárik, R. Jakschis, L. Lindström (Eds.) 30 May - 01 June 2018, Tallinn, Estonia 2018 10TH INTERNATIONAL CONFERENCE ON CYBER CONFLicT CYCON X: MAXIMISING EFFECTS Copyright © 2018 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1826N-PRT ISBN (print): 978-9949-9904-2-9 ISBN (pdf): 978-9949-9904-3-6 COPYRigHT AND REPRINT PERmissiONS No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]).
    [Show full text]
  • What Killed Australian Cinema & Why Is the Bloody Corpse Still Moving?
    What Killed Australian Cinema & Why is the Bloody Corpse Still Moving? A Thesis Submitted By Jacob Zvi for the Degree of Doctor of Philosophy at the Faculty of Health, Arts & Design, Swinburne University of Technology, Melbourne © Jacob Zvi 2019 Swinburne University of Technology All rights reserved. This thesis may not be reproduced in whole or in part, by photocopy or other means, without the permission of the author. II Abstract In 2004, annual Australian viewership of Australian cinema, regularly averaging below 5%, reached an all-time low of 1.3%. Considering Australia ranks among the top nations in both screens and cinema attendance per capita, and that Australians’ biggest cultural consumption is screen products and multi-media equipment, suggests that Australians love cinema, but refrain from watching their own. Why? During its golden period, 1970-1988, Australian cinema was operating under combined private and government investment, and responsible for critical and commercial successes. However, over the past thirty years, 1988-2018, due to the detrimental role of government film agencies played in binding Australian cinema to government funding, Australian films are perceived as under-developed, low budget, and depressing. Out of hundreds of films produced, and investment of billions of dollars, only a dozen managed to recoup their budget. The thesis demonstrates how ‘Australian national cinema’ discourse helped funding bodies consolidate their power. Australian filmmaking is defined by three ongoing and unresolved frictions: one external and two internal. Friction I debates Australian cinema vs. Australian audience, rejecting Australian cinema’s output, resulting in Frictions II and III, which respectively debate two industry questions: what content is produced? arthouse vs.
    [Show full text]
  • ITU Botnet Mitigation Toolkit Background Information
    ITU Botnet Mitigation Toolkit Background Information ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector January 2008 Acknowledgements Botnets (also called zombie armies or drone armies) are networks of compromised computers infected with viruses or malware to turn them into “zombies” or “robots” – computers that can be controlled without the owners’ knowledge. Criminals can use the collective computing power and connected bandwidth of these externally-controlled networks for malicious purposes and criminal activities, including, inter alia, generation of spam e-mails, launching of Distributed Denial of Service (DDoS) attacks, alteration or destruction of data, and identity theft. The threat from botnets is growing fast. The latest (2007) generation of botnets such as the Storm Worm uses particularly aggressive techniques such as fast-flux networks and striking back with DDoS attacks against security vendors trying to mitigate them. An underground economy has now sprung up around botnets, yielding significant revenues for authors of computer viruses, botnet controllers and criminals who commission this illegal activity by renting botnets. In response to this growing threat, ITU is developing a Botnet Mitigation Toolkit to assist in mitigating the problem of botnets. This document provides background information on the toolkit. The toolkit, developed by Mr. Suresh Ramasubramanian, draws on existing resources, identifies relevant local and international stakeholders, and
    [Show full text]
  • Shirky: Group As User: Flaming and the Design of Social Software 2/20/12 3:36 PM
    Shirky: Group as User: Flaming and the Design of Social Software 2/20/12 3:36 PM Clay Shirky's Writings About the Internet Economics & Culture, Media & Community [email protected] Group as User: Flaming and the Design of Social Software First published November 5, 2004 on the "Networks, Economics, and Culture" mailing list. Subscribe to the mailing list. When we hear the word "software," most of us think of things like Word, Powerpoint, or Photoshop, tools for individual users. These tools treat the computer as a box, a self-contained environment in which the user does things. Much of the current literature and practice of software design -- feature requirements, UI design, usability testing -- targets the individual user, functioning in isolation. And yet, when we poll users about what they actually do with their computers, some form of social interaction always tops the list -- conversation, collaboration, playing games, and so on. The practice of software design is shot through with computer-as-box assumptions, while our actual behavior is closer to computer-as-door, treating the device as an entrance to a social space. We have grown quite adept at designing interfaces and interactions between computers and machines, but our social tools -- the software the users actually use most often -- remain badly misfit to their task. Social interactions are far more complex and unpredictable than human/computer interaction, and that unpredictability defeats classic user-centric design. As a result, tools used daily by tens of millions are either ignored as design challenges, or treated as if the only possible site of improvement is the user-to-tool interface.
    [Show full text]
  • Defending an Open, Global, Secure, and Resilient Internet
    Spine Should Adjust depending on page count Defending an Open,Defending Global, Secure, and Resilient Internet The Council on Foreign Relations sponsors Independent Task Forces to assess issues of current and critical importance to U.S. foreign policy and provide policymakers with concrete judgments and recommendations. Diverse in backgrounds and perspectives, Task Force members aim to reach a meaningful consensus on policy through private and nonpartisan deliberations. Once launched, Task Forces are independent of CFR and solely responsible for the content of their reports. Task Force members are asked to join a consensus signifying that they endorse “the general policy thrust and judgments reached by the group, though not necessarily every finding and recommendation.” Each Task Force member also has the option of putting forward an additional or a dissenting view. Members’ affiliations are listed for identification purposes only and do not imply institutional endorsement. Task Force observers participate in discussions, but are not asked to join the consensus. Task Force Members Elana Berkowitz Craig James Mundie McKinsey & Company, Inc. Microsoft Corporation Bob Boorstin John D. Negroponte Google, Inc. McLarty Associates Jeff A. Brueggeman Joseph S. Nye Jr. AT&T Harvard University Peter Matthews Cleveland Samuel J. Palmisano Intel Corporation IBM Corporation Esther Dyson Neal A. Pollard EDventure Holdings, Inc. PricewaterhouseCoopers LLP Martha Finnemore Elliot J. Schrage George Washington University Facebook Patrick Gorman Adam Segal Bank of America Council on Foreign Relations Independent Task Force Report No. 70 Michael V. Hayden Anne-Marie Slaughter Chertoff Group Princeton University Eugene J. Huang James B. Steinberg John D. Negroponte and Samuel J.
    [Show full text]
  • America's Cyber Future Security and Prosperity in the Information
    America’s Cyber Future JUNE 2011 Security and Prosperity in the Information Age VOLUME II Edited by Kristin M. Lord and Travis Sharp Contributors: Robert E. Kahn, Mike McConnell, Joseph S. Nye, Jr. and Peter Schwartz (co-chairs); Nova J. Daly, Nathaniel Fick, Martha Finnemore, Richard Fontaine, Daniel E. Geer Jr., David A. Gross, Jason Healey, James A. Lewis, Kristin M. Lord, M. Ethan Lucarelli, Thomas G. Mahnken, Gary McGraw, Roger H. Miksad, Gregory J. Rattray, Will Rogers, Christopher M. Schroeder and Travis Sharp Acknowledgments The authors would like to thank the more than 200 people who generously contributed their time and expertise to this proj- ect. We are especially indebted to our co-chairs Bob Kahn, Mike McConnell, Joe Nye and Peter Schwartz for their tremendous support and guidance over the past year. We also thank our contributing authors for producing such insightful essays. We are particularly grateful to the many people who reviewed drafts of the papers included in this volume, including Irv Lachow, James Mulvenon, Charles Dunlap, Eric Rosenbach, Jeff Lord, Tom Gjelten, Greg Rattray, David Asher, Jeff Pryce, Andrew Lewman, Daniel Calingeart, David Gross, Nova Daly and several anonymous reviewers. In addition, we wish to thank the dozens of dedicated professionals in the U.S. government, armed services and private sector who candidly shared their perspectives. We also thank Global Business Network for hosting a workshop in San Francisco in February 2011, as well as the many technologists and other experts who attended. Peter Schwartz, David Babington and Audrey Plonk deserve special recognition for making the workshop a success.
    [Show full text]
  • Identity and Deception in the Virtual Community Identity and Deception in the Virtual Community
    2/2/2021 Identity and Deception in the Virtual Community Identity and Deception in the Virtual Community Judith S. Donath MIT Media Lab Prepared for: Kollock, P. and Smith M. (eds). Communities in Cyberspace. London: Routledge Available in Croatian, as Identitet i prijevare u virtualnoj zajednici, (translation courtesy of The Institute of Ethnology and Folklore Research) or in Greek, as ΤΑΥΤΟΤΗΤΑ ΚΑΙ ΕΞΑΠΑΤΗΣΗ ΣΤΗΝ ΔΥΝΗΤΙΚΗ (VIRTUAL) ΚΟΙΝΟΤΗΤΑ Identity and the virtual community Identity plays a key role in virtual communities. In communication, which is the primary activity, knowing the identity of those with whom you communicate is essential for understanding and evaluating an interaction. Yet in the disembodied world of the virtual community, identity is also ambiguous. Many of the basic cues about personality and social role we are accustomed to in the physical world are absent. The goal of this paper is to understand how identity is established in an online community and to examine the effects of identity deception and the conditions that give rise to it. In the physical world there is an inherent unity to the self, for the body provides a compelling and convenient definition of identity. The norm is: one body, one identity. Though the self may be complex and mutable over time and circumstance, the body provides a stabilizing anchor. Said Sartre in Being and Nothingness, ``I am my body to the extent that I am,'' The virtual world is different. It is composed of information rather than matter. Information spreads and diffuses; there is no law of the conservation of information. The inhabitants of this impalpable space are also diffuse, free from the body's unifying anchor.
    [Show full text]
  • If I Say If: the Poems and Short Stories of Boris Vian
    Welcome to the electronic edition of If I Say If: The Poems and Short Stories of Boris Vian. The book opens with the bookmark panel and you will see the contents page. Click on this anytime to return to the contents. You can also add your own bookmarks. Each chapter heading in the contents table is clickable and will take you direct to the chapter. Return using the contents link in the bookmarks. The whole document is fully searchable. Enjoy. If I Say If The high-quality paperback edition is available for purchase online: https://shop.adelaide.edu.au/ CONTENTS Foreword ix Marc Lapprand Boris Vian: A Life in Paradox 1 Alistair Rolls, John West-Sooby and Jean Fornasiero Note on the Texts 13 Part I: The Poetry of Boris Vian 15 Translated by Maria Freij I wouldn’t wanna die 17 Why do I live 20 Life is like a tooth 21 There was a brass lamp 22 When the wind’s blowing through my skull 23 I’m no longer at ease 24 If I were a poet-o 25 I bought some bread, stale and all 26 There is sunshine in the street 27 A stark naked man was walking 28 My rapier hurts 29 They are breaking the world 30 Yet another 32 I should like 34 If I say if 35 If I Say If A poet 36 If poets weren’t such fools 37 It would be there, so heavy 39 There are those who have dear little trumpets 41 I want a life shaped like a fishbone 42 One day 43 Everything has been said a hundred times 44 I shall die of a cancer of the spine 45 Rereading Vian: A Poetics of Partial Disclosure 47 Alistair Rolls Part II: The Short Stories of Boris Vian 63 Translated by Peter Hodges Martin called…
    [Show full text]
  • Angela's Ashes a Memoir of a Childhood by Frank
    Angela's Ashes A Memoir of a Childhood By Frank McCourt This book is dedicated to my brothers, Malachy, Michael, Alphonsus. I learn from you, I admire you and I love you. A c k n o w l e d g m e n t s This is a small hymn to an exaltation of women. R'lene Dahlberg fanned the embers. Lisa Schwarzbaum read early pages and encouraged me. Mary Breasted Smyth, elegant novelist herself, read the first third and passed it on to Molly Friedrich, who became my agent and thought that Nan Graham, Editor-in-Chief at Scribner, would be just the right person to put the book on the road. And Molly was right. My daughter, Maggie, has shown me how life can be a grand adventure, while exquisite moments with my granddaughter, Chiara, have helped me recall a small child's wonder. My wife, Ellen, listened while I read and cheered me to the final page. I am blessed among men. I My father and mother should have stayed in New York where they met and married and where I was born. Instead, they returned to Ireland when I was four, my brother, Malachy, three, the twins, Oliver and Eugene, barely one, and my sister, Margaret, dead and gone. When I look back on my childhood I wonder how I survived at all. It was, of course, a miserable childhood: the happy childhood is hardly worth your while. Worse than the ordinary miserable childhood is the miserable Irish childhood, and worse yet is the miserable Irish Catholic childhood.
    [Show full text]
  • Adam's Ale Noun. Water. Abdabs Noun. Terror, the Frights, Nerves. Often Heard As the Screaming Abdabs. Also Very Occasionally 'H
    A Adam's ale Noun. Water. abdabs Noun. Terror, the frights, nerves. Often heard as the screaming abdabs . Also very occasionally 'habdabs'. [1940s] absobloodylutely Adv. Absolutely. Abysinnia! Exclam. A jocular and intentional mispronunciation of "I'll be seeing you!" accidentally-on- Phrs. Seemingly accidental but with veiled malice or harm. purpose AC/DC Adj. Bisexual. ace (!) Adj. Excellent, wonderful. Exclam. Excellent! acid Noun. The drug LSD. Lysergic acid diethylamide. [Orig. U.S. 1960s] ackers Noun. Money. From the Egyptian akka . action man Noun. A man who participates in macho activities. Adam and Eve Verb. Believe. Cockney rhyming slang. E.g."I don't Adam and Eve it, it's not true!" aerated Adj. Over-excited. Becoming obsolete, although still heard used by older generations. Often mispronounced as aeriated . afto Noun. Afternoon. [North-west use] afty Noun. Afternoon. E.g."Are you going to watch the game this afty?" [North-west use] agony aunt Noun. A woman who provides answers to readers letters in a publication's agony column. {Informal} aggro Noun. Aggressive troublemaking, violence, aggression. Abb. of aggravation. air biscuit Noun. An expulsion of air from the anus, a fart. See 'float an air biscuit'. airhead Noun. A stupid person. [Orig. U.S.] airlocked Adj. Drunk, intoxicated. [N. Ireland use] airy-fairy Adj. Lacking in strength, insubstantial. {Informal} air guitar Noun. An imaginary guitar played by rock music fans whilst listening to their favourite tunes. aks Verb. To ask. E.g."I aksed him to move his car from the driveway." [dialect] Alan Whickers Noun. Knickers, underwear. Rhyming slang, often shortened to Alans .
    [Show full text]
  • Gnus Manual Gnus V5.10.2
    Gnus Manual Gnus v5.10.2 by Lars Magne Ingebrigtsen Copyright c 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover texts being “A GNU Manual”, and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled “GNU Free Documentation License” in the Emacs manual. (a) The FSF’s Back-Cover Text is: “You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development.” This document is part of a collection distributed under the GNU Free Doc- umentation License. If you want to distribute this document separately from the collection, you can do so by adding a copy of the license to the document, as described in section 6 of the license. Contents 1 Starting Gnus 1 1.1 Finding the News .......................... 2 1.2 The First Time ........................... 3 1.3 The Server is Down ......................... 3 1.4 Slave Gnusae ............................. 4 1.5 Fetching a Group .......................... 4 1.6 New Groups ............................. 4 1.6.1 Checking New Groups ................... 5 1.6.2 Subscription Methods .................... 5 1.6.3 Filtering New Groups .................... 6 1.7 Changing Servers .......................... 7 1.8 Startup Files ............................. 8 1.9 Auto Save .............................. 9 1.10 The Active File ..........................
    [Show full text]