Proquest Dissertations

Total Page:16

File Type:pdf, Size:1020Kb

Proquest Dissertations REPROGRAMMING THE LYRIC: A GENRE APPROACH FOR CONTEMPORARY DIGITAL POETRY HOLLY DUPEJ A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS GRADUATE PROGRAM IN COMMUNICATIONS AND CULTURE YORK UNIVERSITY, TORONTO, ONTARIO APRIL 2008 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-38769-6 Our file Notre reference ISBN: 978-0-494-38769-6 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Plntemet, prefer, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation. reproduced without the author's permission. In compliance with the Canadian Conformement a la loi canadienne Privacy Act some supporting sur la protection de la vie privee, forms may have been removed quelques formulaires secondaires from this thesis. ont ete enleves de cette these. While these forms may be included Bien que ces formulaires in the document page count, aient inclus dans la pagination, their removal does not represent il n'y aura aucun contenu manquant. any loss of content from the thesis. Canada REPROGRAMMING THE LYRIC: A GENRE APPROACH FOR CONTEMPORARY DIGITAL POETRY by Holly Dupej By virtue of submitting this document electronically, the author certifies that this is a true electronic equivalent of the copy of the thesis approved by York University for the award of the degree. No alteration of the content has occurred and if there are any minor variations in formatting, they are as a result of the conversion to Adobe Acrobat format (or similar software application). Examination Committee members: 1. KateEichhorn 2. Priscila Uppal 3. Stephen Cain 4. Caitlin Fisher 5. Marcus Boon 6. Barbara Crow iv Abstract Reprogramming The Lyric: A Genre Approach for Contemporary Digital Poetry explores the consequence of reading contemporary digital poetry with lyric genre theory. Using theories of posthuman and digital subjectivity (Haraway; Hayles) and studies on digital culture (Turkle; Benkler), the readings in this thesis generate a distinct version of the lyric subject, reflecting the realities of existing in the digital age. Building an analysis based on both close textual readings and broader considerations of creation and reception, each chapter focuses on a text or small group of texts in which digital technologies have contributed to the writing process. The works addressed include Rachel Zolf s Human Resources, Michael Magee's MyAngie Dickinson, Bill Kennedy and Darren Wershler- Henry's Apostrophe, Patrick Herron's Proximate and William Poundstone's "White Poem." By combining literary theory and digital studies, this thesis proposes an approach to recognizing the lyric tradition within digital innovation. V TABLE OF CONTENTS Abstract iv Introduction: Digitizing the Lyric Genre 1 Existing Approaches to Digital Poetry: The Avant-Garde Precedent 10 Scope of Study: Second Generation Digital Poetry 14 Problems of the Genre Method: Alternatives to Taxonomy 21 Chapter 1: The Cyborg Lyric: Complicating Boundaries in Rachel Zolf s Human Resources 36 The Human/Machine and Lyric/Experimental Divides 43 Bodily Divisions and Re-Writing the Origin Story 50 Agency and the Socially Determined Nature of Language 54 Chapter 2: Writing with the Search Engine: The Lyric and Mainstream Culture in Michael Magee's My Angie Dickinson 60 Angie to Emily: The Lyric Plays as Well as Works 63 Identity Play Online: From Abstract Theory to Lived Experience 71 The Carnivalesque Laughter of Flarf 79 Chapter 3: Searching for the Lyric in Bill Kennedy and Darren Wershler-Henry's Apostrophe 86 Social Production and the (Lack of) Lyric Subject 90 Lyric Brevity: Constraining Entropy 95 Apostrophe and the Lyric "You": I-Thou and the URL 99 Chapter 4: The Onscreen Lyric: Translating Genre Across Media 107 Lyric Interiority: Externalizing Thought 109 Immersive Reading Spaces: Speed-reading and Multimedia Distraction 117 Conclusion: Tradition and the Permanence of Edifice 131 1 Introduction Digitizing the Lyric Genre In the introduction to New Media Poetics: Contexts, Technotexts, and Theories (2006), Adalaide Morris recognizes the potential for digital poetry1 to portray the human experience of the digital age, yet quickly dismisses the lyric as a viable option to address these concerns: What can new media poetics tell us about thinking and writing in a world increasingly reliant on databases, algorithms, collaborative problem-solving, instant retrieval and manipulation of information, the play of cutting, pasting, morphing and sampling, and the ambient and nomadic aesthetics of a networked and programmable culture? How are these changes in the processes of thinking and knowing altering structures of subjectivity and patterns of emotion that were once the providence of the lyric poem? (15) As Morris observes, digital poetry - the diverse category of poetry written with digital technologies like hypertext, poetry generating software, onscreen animation, databases, and search engines - creates the opportunity to explore the conditions of "thinking and knowing" in contemporary culture. Morris's conclusion, however, that such issues were "once the providence of the lyric poem," insinuates digital poetry should not - or perhaps cannot - be interpreted as lyric, even though the genre forms the obvious link between poetry and the subjective experience that Morris describes. Although the lyric has been Poetry written with digital technologies has a variety of labels, including new media poetry, e-poetry, online poetry, and cyberpoetry. For the purpose of this study, the term digital poetry will be adopted as a means of emphasizing the unique properties of information in its digitized state, without necessarily associating the topic at hand with Internet-based practices or new media displays. 2 assigned numerous definitions2, the most common use of the term indicates a short poem in which a single speaker expresses, very often in the present tense, an internal experience such as a thought, emotion, or perception (Abrams "Lyric" 146). In other words, the lyric expresses exactly the kinds of "structures of subjectivity and patterns of emotion" that Morris suggests may appear in a digital poem. Investigating the potential to connect a literary tradition with contemporary human experience, the following thesis explores the possibility of reading digital poetry using lyric genre theory. Considering the status of lyric subjectivity and other genre conventions provides an opportunity to consider the conditions of writing and existing in the digital age, but the opportunity is not without significant challenges. Morris's dismissal of the lyric is symptomatic of a more general framework prevailing in the poetry community, which positions the lyric in direct opposition to experimental texts, including those using non-conventional digital writing methods. This opposition, which Mutlu Konuk Biasing describes this as "the ideological poetry wars" (5), is one of the major challenges facing the lyric approach in this thesis. As Biasing explains in his study, Lyric Poetry: The Pain and the Pleasure of Words (2007), since Modernism, a significant population in the poetry community has characterized the lyric as outmoded, apolitical, bourgeois, and, at times, the very antithesis of innovation (6). Admittedly, terms like innovative, experimental, and avant-garde are problematic from the outset, especially when differentiating them from a "mainstream" practice that often adopts "experimental" techniques. Nevertheless, the terms will continue to be used 2 Later in the chapter I discuss the history of the lyric and its varied definitions at greater length, including less conventional interpretations of the genre. 3 throughout this study as a shorthand for poetry that has been perceptibly influenced by the pioneering work of the New York School, L=A=N=G=U=A=G=E movement, Black Mountain School, concrete poetry, and other schools operating outside of mainstream poetry in the twentieth century. Since Modernism, the innovative poetry of these and other factions has been defined, at least in part, by the degree to which the text problematizes what are assumed to be the defining characteristics of the lyric genre: grammatical syntax, musical language, the unproblematic speaking "I," and the static positions of the reader and writing subject. Instead, experimental poetry, for the
Recommended publications
  • TIBCO Jasperreports® Server Administrator Guide
    TIBCO JasperReports® Server Administrator Guide Software Release 7.8 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. ANY SOFTWARE ITEM IDENTIFIED AS THIRD PARTY LIBRARY IS AVAILABLE UNDER SEPARATE SOFTWARE LICENSE TERMS AND IS NOT PART OF A TIBCO PRODUCT. AS SUCH, THESE SOFTWARE ITEMS ARE NOT COVERED BY THE TERMS OF YOUR AGREEMENT WITH TIBCO, INCLUDING ANY TERMS CONCERNING SUPPORT, MAINTENANCE, WARRANTIES, AND INDEMNITIES. DOWNLOAD AND USE OF THESE ITEMS IS SOLELY AT YOUR OWN DISCRETION AND SUBJECT TO THE LICENSE TERMS APPLICABLE TO THEM. BY PROCEEDING TO DOWNLOAD, INSTALL OR USE ANY OF THESE ITEMS, YOU ACKNOWLEDGE THE FOREGOING DISTINCTIONS BETWEEN THESE ITEMS AND TIBCO PRODUCTS.
    [Show full text]
  • CIO Guide to Application Modernization
    CIO Guide to Application Modernization May 2020 2 What You Need To Know The global pandemic has put unexpected pressures on businesses of all sorts — in ways no one was projecting at the beginning of the year. As a result, CIOs face a series of urgent challenges: • How can they raise system visibility and system control over operations that are more dispersed and changing than ever? • How can they cut costs, yet create a more agile and responsive IT system? • How can they do more with older data, even as they understand better the data from a market that is changing every week? • How can they help people work faster, with a minimum of change management, or set the stage for growth, while preserving capital? In many cases the answer is a step-by-step deployment of cloud computing technology, tailored to meet the most pressing needs first. Working with a comprehensive cloud provider, it is possible to create cloud systems that respect and preserve core assets, while enabling rapid modernization, in particular for the cost-aware agility and resilience of modern application architecture. Why You Should Keep Reading This guide offers a series of approaches to application modernization, from identifying needs and developing an action-oriented roadmap, to methods of identifying and effecting meaningful change in the most critical parts of your IT operations. We have also included at the end a list of key solutions that Google Cloud and our technology partners have to give your organization fast results. 3 Introduction Even before the current crisis, IT organizations saw pressure to be more agile and innovative.
    [Show full text]
  • EN-Google Hacks.Pdf
    Table of Contents Credits Foreword Preface Chapter 1. Searching Google 1. Setting Preferences 2. Language Tools 3. Anatomy of a Search Result 4. Specialized Vocabularies: Slang and Terminology 5. Getting Around the 10 Word Limit 6. Word Order Matters 7. Repetition Matters 8. Mixing Syntaxes 9. Hacking Google URLs 10. Hacking Google Search Forms 11. Date-Range Searching 12. Understanding and Using Julian Dates 13. Using Full-Word Wildcards 14. inurl: Versus site: 15. Checking Spelling 16. Consulting the Dictionary 17. Consulting the Phonebook 18. Tracking Stocks 19. Google Interface for Translators 20. Searching Article Archives 21. Finding Directories of Information 22. Finding Technical Definitions 23. Finding Weblog Commentary 24. The Google Toolbar 25. The Mozilla Google Toolbar 26. The Quick Search Toolbar 27. GAPIS 28. Googling with Bookmarklets Chapter 2. Google Special Services and Collections 29. Google Directory 30. Google Groups 31. Google Images 32. Google News 33. Google Catalogs 34. Froogle 35. Google Labs Chapter 3. Third-Party Google Services 36. XooMLe: The Google API in Plain Old XML 37. Google by Email 38. Simplifying Google Groups URLs 39. What Does Google Think Of... 40. GooglePeople Chapter 4. Non-API Google Applications 41. Don't Try This at Home 42. Building a Custom Date-Range Search Form 43. Building Google Directory URLs 44. Scraping Google Results 45. Scraping Google AdWords 46. Scraping Google Groups 47. Scraping Google News 48. Scraping Google Catalogs 49. Scraping the Google Phonebook Chapter 5. Introducing the Google Web API 50. Programming the Google Web API with Perl 51. Looping Around the 10-Result Limit 52.
    [Show full text]
  • Lexical Innovation on the Internet - Neologisms in Blogs
    Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können.
    [Show full text]
  • Google Search Techniques
    Google Search Techniques Google Search Techniques Disclaimer: Using Google to search the Internet will locate resources that are available to the public. While these resources are good for some purposes, serious research and academic work often requires access to databases, articles and books that, if they are available online, are only accessible by subscription. Fortunately, the UMass Library subscribes to most of these services. To access these resources online, go to the UMass Library Web site (library.umass.edu). For the best possible help finding information on any topic, talk to a reference librarian in person. They can help you find the resources you need and can teach you some fantastic techniques for doing your own searches. For a complete guide to Google’s features go to http://www.google.com/help/ Simple Search Strategies Google keeps the specifics of its page-ranking techniques secret, but here are a few things we know about what makes pages appear at the top of your search: - your search terms appears in the title of the web page - your search terms appear in links that lead to that page - your search terms appear in the content of the page (especially in headers) When you choose the search terms you enter into Google, think about the titles you would expect to see on these pages or that you would see in links to these pages. The more well-known your search target, the more easy it will be to find. Obscure topics or topics that share terms with more common topics will take more work to find.
    [Show full text]
  • Bigquery SQL Example: Simple Aggregates
    Crunching Big Data with Big Query Ryan Boyd, Developer Advocate Jordan Tigani, Software Engineer How BIG is big? 1 million rows? 1 million 1 million 1 million 1 million 1 million 1 million10 million rows? 1 million 1 million 1 million 1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million100 1million million 1 million rows?1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 1 million 1 million 1 million1 million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million11 million 1million1 million million 11 million 1million1 500million million11 millionmillion 1million1 million million11 million 1million1 million millionrows?11 million 1million1 million million 11 million 1million1 million
    [Show full text]
  • Rui Torres & Sandy Baldwin
    CONFERENCE, FESTIVAL, EXHIBITS BOOK OF ABSTRACTS AND CATALOGS EDITORS: RUI TORRES & SANDY BALDWIN Conference Book of Abstracts edited by Rui Torres and Sandy Baldwin Festival Catalog edited by Rui Torres and Sandy Baldwin Exhibits Catalog edited by Rui Torres with texts by the Curators: • Affiliations - Remix and Intervene: Computing Sound and Visual Poetry: Álvaro Seiça and Daniela Côrtes Maduro • Communities - Signs, Actions, Codes: Bruno Ministro and Sandra Guerreiro Dias • Translations - Translating, Transducing, Transcoding: Ana Marques da Silva and Diogo Marques • E-lit for Kids: Mark Marino, Astrid Ensslin, María Goicoechea, and Lucas Ramada Prieto. EDIÇÕES UNIVERSIDADE FERNANDO PESSOA PORTO . 2017 CONTENts INTRODUCTION ................................................. 7 CONFERENCE .................................................... 15 FESTIVAL ............................................................ 475 EXHIBITS ............................................................. 591 INTRODUCTION The ELO (Electronic Literature Organization) organized its 2017 Conference, Festi- val and Exhibits, from July 18-22, at University Fernando Pessoa, Porto, as well as several other venues located in the center of the historic city of Porto, Portugal. Titled Electronic Literature: Affiliations, Communities, Translations, ELO’17 pro- poses a reflection about dialogues and untold histories of electronic literature, providing a space for discussion about what exchanges, negotiations, and move- ments we can track in the field of electronic literature.
    [Show full text]
  • Vendor Contract
    d/W^sEKZ'ZDEd ĞƚǁĞĞŶ t'ŽǀĞƌŶŵĞŶƚ͕>>ĂŶĚ d,/EdZ>K>WhZ,^/E'^z^dD;d/W^Ϳ &Žƌ Z&Wϭϴ1102 Internet & Network Security 'ĞŶĞƌĂů/ŶĨŽƌŵĂƚŝŽŶ dŚĞsĞŶĚŽƌŐƌĞĞŵĞŶƚ;͞ŐƌĞĞŵĞŶƚ͟ͿŵĂĚĞĂŶĚĞŶƚĞƌĞĚŝŶƚŽďLJĂŶĚďĞƚǁĞĞŶdŚĞ/ŶƚĞƌůŽĐĂů WƵƌĐŚĂƐŝŶŐ^LJƐƚĞŵ;ŚĞƌĞŝŶĂĨƚĞƌƌĞĨĞƌƌĞĚƚŽĂƐ͞d/W^͟ƌĞƐƉĞĐƚĨƵůůLJͿĂŐŽǀĞƌŶŵĞŶƚĐŽŽƉĞƌĂƚŝǀĞ ƉƵƌĐŚĂƐŝŶŐƉƌŽŐƌĂŵĂƵƚŚŽƌŝnjĞĚďLJƚŚĞZĞŐŝŽŶϴĚƵĐĂƚŝŽŶ^ĞƌǀŝĐĞĞŶƚĞƌ͕ŚĂǀŝŶŐŝƚƐƉƌŝŶĐŝƉĂůƉůĂĐĞ ŽĨďƵƐŝŶĞƐƐĂƚϰϴϰϱh^,ǁLJϮϳϭEŽƌƚŚ͕WŝƚƚƐďƵƌŐ͕dĞdžĂƐϳϱϲϴϲ͘dŚŝƐŐƌĞĞŵĞŶƚĐŽŶƐŝƐƚƐŽĨƚŚĞ ƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚďĞůŽǁ͕ŝŶĐůƵĚŝŶŐƉƌŽǀŝƐŝŽŶƐŽĨĂůůƚƚĂĐŚŵĞŶƚƐƌĞĨĞƌĞŶĐĞĚŚĞƌĞŝŶ͘/ŶƚŚĞĞǀĞŶƚŽĨ ĂĐŽŶĨůŝĐƚďĞƚǁĞĞŶƚŚĞƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚďĞůŽǁĂŶĚƚŚŽƐĞĐŽŶƚĂŝŶĞĚŝŶĂŶLJƚƚĂĐŚŵĞŶƚ͕ƚŚĞ ƉƌŽǀŝƐŝŽŶƐƐĞƚĨŽƌƚŚƐŚĂůůĐŽŶƚƌŽů͘ dŚĞǀĞŶĚŽƌŐƌĞĞŵĞŶƚƐŚĂůůŝŶĐůƵĚĞĂŶĚŝŶĐŽƌƉŽƌĂƚĞďLJƌĞĨĞƌĞŶĐĞƚŚŝƐŐƌĞĞŵĞŶƚ͕ƚŚĞƚĞƌŵƐĂŶĚ ĐŽŶĚŝƚŝŽŶƐ͕ƐƉĞĐŝĂůƚĞƌŵƐĂŶĚĐŽŶĚŝƚŝŽŶƐ͕ĂŶLJĂŐƌĞĞĚƵƉŽŶĂŵĞŶĚŵĞŶƚƐ͕ĂƐǁĞůůĂƐĂůůŽĨƚŚĞƐĞĐƚŝŽŶƐ ŽĨƚŚĞƐŽůŝĐŝƚĂƚŝŽŶĂƐƉŽƐƚĞĚ͕ŝŶĐůƵĚŝŶŐĂŶLJĂĚĚĞŶĚĂĂŶĚƚŚĞĂǁĂƌĚĞĚǀĞŶĚŽƌ͛ƐƉƌŽƉŽƐĂů͘͘KƚŚĞƌ ĚŽĐƵŵĞŶƚƐƚŽďĞŝŶĐůƵĚĞĚĂƌĞƚŚĞĂǁĂƌĚĞĚǀĞŶĚŽƌ͛ƐƉƌŽƉŽƐĂůƐ͕ƚĂƐŬŽƌĚĞƌƐ͕ƉƵƌĐŚĂƐĞŽƌĚĞƌƐĂŶĚĂŶLJ ĂĚũƵƐƚŵĞŶƚƐǁŚŝĐŚŚĂǀĞďĞĞŶŝƐƐƵĞĚ͘/ĨĚĞǀŝĂƚŝŽŶƐĂƌĞƐƵďŵŝƚƚĞĚƚŽd/W^ďLJƚŚĞƉƌŽƉŽƐŝŶŐǀĞŶĚŽƌĂƐ ƉƌŽǀŝĚĞĚďLJĂŶĚǁŝƚŚŝŶƚŚĞƐŽůŝĐŝƚĂƚŝŽŶƉƌŽĐĞƐƐ͕ƚŚŝƐŐƌĞĞŵĞŶƚŵĂLJďĞĂŵĞŶĚĞĚƚŽŝŶĐŽƌƉŽƌĂƚĞĂŶLJ ĂŐƌĞĞĚĚĞǀŝĂƚŝŽŶƐ͘ dŚĞĨŽůůŽǁŝŶŐƉĂŐĞƐǁŝůůĐŽŶƐƚŝƚƵƚĞƚŚĞŐƌĞĞŵĞŶƚďĞƚǁĞĞŶƚŚĞƐƵĐĐĞƐƐĨƵůǀĞŶĚŽƌƐ;ƐͿĂŶĚd/W^͘ ŝĚĚĞƌƐƐŚĂůůƐƚĂƚĞ͕ŝŶĂƐĞƉĂƌĂƚĞǁƌŝƚŝŶŐ͕ĂŶĚŝŶĐůƵĚĞǁŝƚŚƚŚĞŝƌƉƌŽƉŽƐĂůƌĞƐƉŽŶƐĞ͕ĂŶLJƌĞƋƵŝƌĞĚ ĞdžĐĞƉƚŝŽŶƐŽƌĚĞǀŝĂƚŝŽŶƐĨƌŽŵƚŚĞƐĞƚĞƌŵƐ͕ĐŽŶĚŝƚŝŽŶƐ͕ĂŶĚƐƉĞĐŝĨŝĐĂƚŝŽŶƐ͘/ĨĂŐƌĞĞĚƚŽďLJd/W^͕ƚŚĞLJ ǁŝůůďĞŝŶĐŽƌƉŽƌĂƚĞĚŝŶƚŽƚŚĞĨŝŶĂůŐƌĞĞŵĞŶƚ͘ WƵƌĐŚĂƐĞKƌĚĞƌ͕ŐƌĞĞŵĞŶƚŽƌŽŶƚƌĂĐƚŝƐƚŚĞd/W^DĞŵďĞƌ͛ƐĂƉƉƌŽǀĂůƉƌŽǀŝĚŝŶŐƚŚĞ ĂƵƚŚŽƌŝƚLJƚŽƉƌŽĐĞĞĚǁŝƚŚƚŚĞŶĞŐŽƚŝĂƚĞĚĚĞůŝǀĞƌLJŽƌĚĞƌƵŶĚĞƌƚŚĞŐƌĞĞŵĞŶƚ͘^ƉĞĐŝĂůƚĞƌŵƐ
    [Show full text]
  • The Evolution of Cloud Computing
    Read the complete book: www.bcs.org/books/cloud Read the complete book: www.bcs.org/books/cloud THE EVOLUTION OF CLOUD COMPUTING Read the complete book: www.bcs.org/books/cloud BCS, THE CHARTERED INSTITUTE FOR IT BCS, The Chartered Institute for IT, is committed to making IT good for society. We use the power of our network to bring about positive, tangible change. We champion the global IT profession and the interests of individuals engaged in that profession, for the benefit of all. Exchanging IT expertise and knowledge The Institute fosters links between experts from industry, academia and business to promote new thinking, education and knowledge sharing. Supporting practitioners Through continuing professional development and a series of respected IT qualifica- tions, the Institute seeks to promote professional practice tuned to the demands of business. It provides practical support and information services to its members and volunteer communities around the world. Setting standards and frameworks The Institute collaborates with government, industry and relevant bodies to establish good working practices, codes of conduct, skills frameworks and common standards. It also offers a range of consultancy services to employers to help them adopt best practice. Become a member Over 70,000 people including students, teachers, professionals and practitioners enjoy the benefits of BCS membership. These include access to an international community, invitations to a roster of local and national events, career development tools and a quar- terly thought-leadership magazine. Visit www.bcs.org/membership to find out more. Further Information BCS, The Chartered Institute for IT, First Floor, Block D, North Star House, North Star Avenue, Swindon, SN2 1FA, United Kingdom.
    [Show full text]
  • Building Secure and Reliable Systems
    Building Secure & Reliable Systems Best Practices for Designing, Implementing and Maintaining Systems Compliments of Heather Adkins, Betsy Beyer, Paul Blankinship, Piotr Lewandowski, Ana Oprea & Adam Stubblefi eld Praise for Building Secure and Reliable Systems It is very hard to get practical advice on how to build and operate trustworthy infrastructure at the scale of billions of users. This book is the first to really capture the knowledge of some of the best security and reliability teams in the world, and while very few companies will need to operate at Google’s scale many engineers and operators can benefit from some of the hard-earned lessons on securing wide-flung distributed systems. This book is full of useful insights from cover to cover, and each example and anecdote is heavy with authenticity and the wisdom that comes from experimenting, failing and measuring real outcomes at scale. It is a must for anybody looking to build their systems the correct way from day one. —Alex Stamos, Director of the Stanford Internet Observatory and former CISO of Facebook and Yahoo This book is a rare treat for industry veterans and novices alike: instead of teaching information security as a discipline of its own, the authors offer hard-wrought and richly illustrated advice for building software and operations that actually stood the test of time. In doing so, they make a compelling case for reliability, usability, and security going hand-in-hand as the entirely inseparable underpinnings of good system design. —Michał Zalewski, VP of Security Engineering at Snap, Inc. and author of The Tangled Web and Silence on the Wire This is the “real world” that researchers talk about in their papers.
    [Show full text]
  • Regulation and Emancipation in Cyberspace by Zhu Chenwei *
    Volume 1, Issue 4,December 2004 In Code, We Trust? Regulation and Emancipation in Cyberspace * By Zhu Chenwei Abstract Code is one of the regulatory modalities as identified by Lawrence Lessig. It is proposed that, in cyberspace, code should not only regulate but also emancipate. However, the emancipatory dimension of code has long been neglected since law and market are increasingly operating in a normative vacuum. The emancipatory approach is also supported by the practice of digital commons, which is to liberate cyberspace from various constraints. DOI: 10.2966/scrip.010404.585 © Zhu Chenwei 2004. This work is licensed through SCRIPT-ed Open Licence (SOL) . * ZHU Chenwei, LL.B. (SISU, Shanghai), LLM in Innovation, Technology and the Law (Edinburgh). He is currently a member on the team of iCommons China. The Author is thankful to Mr. Andres Guadamuz, who always provides rich inspiration and great food for thought. This article is impossible without some fruitful discussions with Gerard Porter, David Possee, Isaac Mao, Sun Tian, Chen Wan, Michael Chen and Zheng Yang. The author is also indebted to the anonymous reviewers providing invaluable comments on this paper. He is solely responsible for any mistake in it. (2004) 1:4 SCRIPT-ed 586 Ronald Dworkin: Lawrence Lessig: We live in and by the law. It makes us We live life in real space, subject to what we are: citizens and employees the effects of code. We live ordinary and doctors and spouses and people lives, subject to the effects of code. who own things. It is sword, shield, We live social and political lives, and menace [....] We are subjects of subject to the effects of code.
    [Show full text]
  • Digital Poetry and Critical Discourse
    Digital poetry and critical discourse: a network of self-references? Autor(es): Seiça, Álvaro Publicado por: Centro de Literatura Portuguesa; Imprensa da Universidade de Coimbra URL persistente: URI:http://hdl.handle.net/10316.2/38729 DOI: DOI:http://dx.doi.org/10.14195/2182-8830_4-1_6 Accessed : 10-Oct-2021 15:20:12 A navegação consulta e descarregamento dos títulos inseridos nas Bibliotecas Digitais UC Digitalis, UC Pombalina e UC Impactum, pressupõem a aceitação plena e sem reservas dos Termos e Condições de Uso destas Bibliotecas Digitais, disponíveis em https://digitalis.uc.pt/pt-pt/termos. Conforme exposto nos referidos Termos e Condições de Uso, o descarregamento de títulos de acesso restrito requer uma licença válida de autorização devendo o utilizador aceder ao(s) documento(s) a partir de um endereço de IP da instituição detentora da supramencionada licença. Ao utilizador é apenas permitido o descarregamento para uso pessoal, pelo que o emprego do(s) título(s) descarregado(s) para outro fim, designadamente comercial, carece de autorização do respetivo autor ou editor da obra. Na medida em que todas as obras da UC Digitalis se encontram protegidas pelo Código do Direito de Autor e Direitos Conexos e demais legislação aplicável, toda a cópia, parcial ou total, deste documento, nos casos em que é legalmente admitida, deverá conter ou fazer-se acompanhar por este aviso. impactum.uc.pt digitalis.uc.pt Digital Poetry and Critical Discourse: A Network of Self-References? ÁLVARO SEIÇA University of Bergen Ph.D. Fellow in Digital Culture Abstract This article emerges from macroanalysis of several works of critical writing in the field of digital poetry, which have been documented in the ELMCIP Knowledge Base.
    [Show full text]