Introduction

Total Page:16

File Type:pdf, Size:1020Kb

Introduction Introduction “Remember the first time you learned binary code?” “Sure.” “You were forming pathways in your brain. Deep structures. Your nerves grow new connections as you use them—the axons split and push their way between the dividing glial cells—your bioware self-modifies—the software becomes part of the hardware. So now you’re vulnerable—all hackers are vulnerable—to a nam-shub. We have to look out for one another.” Neal Stephenson, Snow Crash, p. 126 Codes and Magic The myth is probably as old as language itself. There are spells in the world: incantations that can transform reality through the power of procedural utterances. The marriage vow, the courtroom sentence, the shaman’s curse: these words are codes that change reality. It is an old and attractive idea.1 From the logos of Genesis to the many religious traditions identifying the “true names” of God, humanity has persistently believed that certain invocations do not merely describe the world but make it. And why not? Language has always operated at the troubled boundary between reality and the description of reality. The more structured, abstract, and esoteric an idea, the less likely we are to divine its substance without first gleaning a name to call it by. Today our languages sprawl across many registers: procedural computer languages, critical languages of film and new media, creoles, fictional lan- guages, newspeak, emoji. In our perception, each of those registers ascribes certain magical powers to symbols and meaning; each of them generates cultural power based on the inherent tension between reality and 2 Introduction representation. The link between spoken language and abstract symbolic systems, particularly mathematics, has created new avenues for mystical connections between numbers, universal truths, and the fundamental structure of reality. Jewish kabbalah, Isaac Newton’s fascination with alchemy, and biological examples of mathematical figures like the Golden Ratio all reinforce a particular metaphysical notion that some logical order, some grammar and symbolic vocabulary, underlies the universe. In debating these questions, philosophers and mathematicians devel- oped increasingly sophisticated understandings of symbolic languages, lay- ing the groundwork for the contemporary era of computation. From its bones in set theory and symbolic logic to the latest articulations of data- driven machine learning, computation casts a cultural shadow that is informed by this long tradition of magical thinking. As computation trans- forms almost every aspect of cultural life, the stories we tell about it, the balance of myth and reason, will play a major role in determining what we can know and think. Language has power in the world, and may in some sense define the world. When enacted, symbolic logic can effect procedural alterations to reality. The key term here is “enacted.” This book uncovers how the humble vehicle of computation, the algorithm, has its roots not only in mathemati- cal logic but in the philosophical traditions of cybernetics, consciousness, and the magic of symbolic language. To understand the algorithm we need to uncover those roots and then build a new model of “algorithmic read- ing” that incorporates a deep understanding of abstraction and process. The algorithm deploys concepts from the idealized space of computation in messy reality, implementing them in what I call “culture machines”: com- plex assemblages of abstractions, processes, and people. Algorithms enact theoretical ideas in pragmatic instructions, always leaving a gap between the two in the details of implementation. The implementation gap is the most important thing we need to know, and the thing we most frequently misunderstand, about algorithmic systems. Understanding how we can know that requires the critical methods of the humanities. This is algorith- mic reading: a way to contend with both the inherent complexity of com- putation and the ambiguity that ensues when that complexity intersects with human culture. Introduction 3 Excavation In the epigraph above, the nam-shubs of Neal Stephenson’s seminal cyber- punk novel Snow Crash are ancient Sumerian incantations whose magic infects the modern substrates of silicon and binary logic. A megalomaniacal billionaire begins digging up Sumerian clay tablets inscribed with actual spells that once had the power to directly program human minds. A Sume- rian hearing a nam-shub would ingest it as procedural language, a set of instructions that could alter her mind and her world. Stephenson adapts the magical tradition of Sumerian myth to a near- future digital culture where virtual reality and ubiquitous computation are well established. The novel imagines the nam-shub to be a linguistic algo- rithm or hack, turning the poetic spells of the god Enki into a set of operat- ing instructions for the human mind. Stephenson makes this rather obscure mythic history more familiar to his readers by putting it in the hands of hackers, who by the book’s publication in 1992 were already imbued with their their own contemporary mythos. In Snow Crash, Hiro Protagonist satirically defines the icon of the hacker figure, working at the periphery of monolithic cultural systems to make crucial interventions through techni- cal skill, idealistic motivation, and a blithe disregard for traditional mores. Hiro is a character right out of the trickster archetype that technology journalist Steven Levy chronicles in Hackers; a character who came to life around Silicon Valley pioneer Stewart Brand’s Hackers Conference in 1984.2 The computational systems of the novel, from the various security systems to the Metaverse itself, were created by hackers and are subject to their manipulations. As a high-water mark in the cyberpunk genre, Snow Crash both embellished and consecrated hackers as potent and capricious architects of computational reality. Tricksters and rebels, hackers performed feats of technological prowess akin to magic (and often depicted as quasi-magical in films like Hackers, Sneakers, and The Matrix, where the source code becomes what media critic Wendy Hui Kyong Chun calls “sourcery”).3 Their power over code was shamanic, and their very roles as peripheral figures reinforced the notion that computation itself was susceptible to mysterious external forces. This story is by now deeply familiar to us and well chronicled by Levy, Brand, Chun, digital culture scholar Fred Turner, and many others.4 4 Introduction But, as the Snow Crash epigraph suggests, hackers are not so much the subjects of this novel as the medium through which the plot propagates, in the form of a memetic virus derived from an ancient nam-shub. Behind the spotlit figure of the hacker is the gloomier region from which he or she draws power: the space of computation itself, of source code, procedural language, hacks, and clever digital tricks. As computers become more ubiquitous and accessible, that space of computation has started to become more thinkable and tangible through our proliferating screens, keystrokes, and muttered queries. We are not just getting logistically closer to that space of computation; we are now intimate with it, sharing our most per- sonal memories and accepting algorithmic guidance on matters ranging from love to real estate. Snow Crash extends this story into a kind of contemporary parable for computation-as-magic. The hackers who carry this virus into the world do so because they are particularly vulnerable to a kind of neurolinguistic infection. In Snow Crash, the space of computation touches you through a kind of code, a procedural language that operates in consciousness as well as in the world. Precisely because language occupies a special status as an intellectual technology, its role as an epistemological layer or medium has interested philosophers from Plato to John Searle. In the context of code, language can reformat the world and the mind. Without the right vocabulary, it is difficult, sometimes almost impossible to articulate certain ideas, particu- larly in the context of technical systems. Human languages seem to acquire different color words in a predictable sequence, for example, and the exis- tence of the word makes possible, for cultural purposes, the reality of the color: without the word for “green,” that band of the spectrum disappears into the neighboring concept of “blue.”5 Speakers of these languages have the same eyes, the same biological apparatus of vision as the rest of us, but they do not have the “deep structures,” the “neurolinguistic pathways” in their brains parsing out this particular band of the visual spectrum. At some point the universal biological equipment of our sensorium gives way to the relative power of language to structure and prioritize experience. The corollary to this distinguishing power of language is that some incantations cannot be unheard: they permanently alter us when we inter- pret and understand them. In Snow Crash Stephenson imagines that the god Enki deliberately destroyed the universal system of transmission that Introduction 5 was the Sumerian language by releasing a nam-shub virus that, “coiled like a serpent around the human brainstem,” scrambled humanity’s ability to understand other Sumerian signals.6 Linking this moment to the mythic Tower of Babel, Snow Crash makes the nam-shub a relic of a universal lan- guage once lost but now regained (and being put to nefarious use). Thus Stephenson taps into the much deeper mythos of language as incantation. If code can be magical and hackers are its shamans, we still recognize it as a symbolic system that operates at the intersection of cognition and reality. By investing the figure of code with cultural power, we also endorse the notion that it functions on a platform: the idea that humanity might run a universal operating system. So code can be magical, code can change the world, and code can change the mind. But how does this actually work? What are the entities, the structures of operation in that space of computation? In Snow Crash’s neo-Sumerian operating system there are me, particular units of language that embody vital civilizational concepts.
Recommended publications
  • Strategic Planning
    Decision Superiority Presented to Williams Foundation August 2017 JD McCreary Chief, Disruptive Technology Programs Georgia Tech Research Institute Topics • Innovation • Disruption • Man-machine teaming, artificial intelligence • Battle management, multi-domain command and control • Live-virtual-constructive • OODA loop • Force Design Gen Sir Deverall at 2016 A2AD workshop “The JFC is not about ships, aircraft and tanks. It is about command, control, intelligence, surveillance, reconnaissance and cyber. They are vital in current operations but you cannot reach out and touch them. Sometimes they can lose priority in a resource constrained world. We are the champions of the things you cannot see.” ACM Sir Stuart Peach, Comd JFC 2012-2013 Innovation Culture • Ries – Lean Startup • Startup is an organization dedicated to creating something new under conditions of extreme uncertainty • Catmull – Creativity, Inc • Within organizations, groups often hold so tightly to plans and practices that they are not open to seeing what is changing right in front of them • Isaacson – The Innovators • …asking Kay for an assessment of “trends” that foretold what the future might hold…Kay shot back “The best way to predict the future is to invent it.” • Christensen – The Innovator’s Dilemma • Disruptive technology should be framed as a marketing challenge, not a technological one • Spear – The High-Velocity Edge • Great performance comes from discovery, not decisions Future Environment, Future Force • Integrated cyber/EW • VCJCS Selva re: Russia/China • Technology
    [Show full text]
  • Google Overview Created by Phil Wane
    Google Overview Created by Phil Wane PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Tue, 30 Nov 2010 15:03:55 UTC Contents Articles Google 1 Criticism of Google 20 AdWords 33 AdSense 39 List of Google products 44 Blogger (service) 60 Google Earth 64 YouTube 85 Web search engine 99 User:Moonglum/ITEC30011 105 References Article Sources and Contributors 106 Image Sources, Licenses and Contributors 112 Article Licenses License 114 Google 1 Google [1] [2] Type Public (NASDAQ: GOOG , FWB: GGQ1 ) Industry Internet, Computer software [3] [4] Founded Menlo Park, California (September 4, 1998) Founder(s) Sergey M. Brin Lawrence E. Page Headquarters 1600 Amphitheatre Parkway, Mountain View, California, United States Area served Worldwide Key people Eric E. Schmidt (Chairman & CEO) Sergey M. Brin (Technology President) Lawrence E. Page (Products President) Products See list of Google products. [5] [6] Revenue US$23.651 billion (2009) [5] [6] Operating income US$8.312 billion (2009) [5] [6] Profit US$6.520 billion (2009) [5] [6] Total assets US$40.497 billion (2009) [6] Total equity US$36.004 billion (2009) [7] Employees 23,331 (2010) Subsidiaries YouTube, DoubleClick, On2 Technologies, GrandCentral, Picnik, Aardvark, AdMob [8] Website Google.com Google Inc. is a multinational public corporation invested in Internet search, cloud computing, and advertising technologies. Google hosts and develops a number of Internet-based services and products,[9] and generates profit primarily from advertising through its AdWords program.[5] [10] The company was founded by Larry Page and Sergey Brin, often dubbed the "Google Guys",[11] [12] [13] while the two were attending Stanford University as Ph.D.
    [Show full text]
  • A Self-Other-Utility Approach to Cars and Avatars
    International Journal of Communication 13(2019), 2774–2792 1932–8036/20190005 When Automobiles Are Avacars: A Self-Other-Utility Approach to Cars and Avatars RABINDRA RATAN1 Michigan State University, USA This article argues that automobiles can be understood as avatars, or avacars, given the inclusive definition of avatars as mediated (not necessarily digital) representations of human users that facilitate interaction with other users, entities, or environments. Building on an understanding of user-avatar relationships, the article argues that automobiles (and avatars in general) serve as self-representations, social others, and/or utilitarian tools in different degrees. Examples of automotive and digital avatars are classified within this Self-Other-Utility (SOU) framework. The article argues that this framework provides a new and valuable approach to understanding the antecedents and consequences of using avatars. Regarding consequences, in the automotive context, the SOU framework could be used to explain how psychological and social factors influence driving habits (i.e., safety), adoption (e.g., of autonomous vehicles), and brand loyalty. A measurement scale to facilitate such research is offered. After presenting some potential limitations to this approach, the article concludes with counterarguments that reaffirm the value and relevance of this new perspective to communication scholarship. Keywords: automobiles, avatars, avacars, communication technology, Self-Other-Utility framework Just as digital media technologies have been converging in content and functionality (Jenkins, 2004), digital communication technologies such as the mobile Internet are being increasingly integrated into automobiles (Goggin, 2012). This assemblage of automotive and communication technologies complement the mobile self and facilitate new modes of communication among automobile users (Hay & Packer, 2003; Juhlin, 2011).
    [Show full text]
  • Science Fiction As an Introduction to AI Research ∗
    Proceedings of the Second Symposium on Educational Advances in Artificial Intelligence Science Fiction as an Introduction to AI Research ∗ Judy Goldsmith and Nicholas Mattei Department of Computer Science University of Kentucky Lexington, KY 40506 Abstract or possibly funding. And they should be able to access and take advantage of the work that has been done. The undergraduate computer science curriculum is generally The goal of the exercise described here is for students to focused on skills and tools; most students are not exposed to start from their own interests, and explore research related to much research in the field, and do not learn how to navigate the research literature. We describe how science fiction re- those interests. The context of this discovery is a senior-level views were used as a gateway to research reviews. Students computer science elective, Introduction to Artificial Intelli- 1 learn a little about current or recent research on a topic that gence. The exercise is student reviews of science fiction stirs their imagination, and learn how to search for, read crit- books, movies, or other media that contain significant AI ically, and compare technical papers on a topic related their content. chosen science fiction book, movie, or TV show. For the last several years, I’ve walked in to the first Arti- ficial Intelligence2 class of the semester and asked the stu- dents’ permission to not give exams. After a while, someone Introduction in the class usually recovers from the shock and asks what Science fiction has inspired generations of would-be com- would replace the exams.
    [Show full text]
  • Reamde Pdf Free Download
    REAMDE PDF, EPUB, EBOOK Neal Stephenson | 1056 pages | 20 Sep 2011 | ATLANTIC BOOKS | 9781848874503 | English | London, United Kingdom Reamde PDF Book Is it Reamde? I would love to see this novel become a film but I don't know that a film version is possible. Islamic terrorists vs. The consequence is that I felt fully sated as if I had played an engaging video game around the clock or binged on reading the equivalent of three exciting thrillers in a row. It takes a while to develop and readers may find the beginning a little slow. Not because he is unpleasant but because he is so interesting. More videos With Reamde , it's clear that Neal Stephenson has embraced his: the infodump. It's important for writers to recognize their strengths. Only one strand of the plot actually seemed plausible. Richard Forthrast fled the US for Canada to avoid the draft during Vietnam and once the war was over he made a small fortune as a marijuana smuggler. Kirkus Reviews sums up Reamde as: "An intriguing yarn—most geeky, and full of satisfying mayhem. So: this is a blinding book. But fans of his genre-blending touch that often welds historical to science fiction with a bead of cyberpunk might find themselves displeased with the ride of this narrative machine. The other issue is the book is long There are infodumps about the setting of wind shield wipers on cars in Seattle, bears roaming the Rockies, and Walmart. Entertainment Weekly called it "an ingenious epic" in their "Must List" column.
    [Show full text]
  • A Cloud-Based Extensible Avatar for Human Robot Interaction Enas Khaled Altarawneh a Thesis Submitted to the Faculty of Graduate
    A CLOUD-BASED EXTENSIBLE AVATAR FOR HUMAN ROBOT INTERACTION ENAS KHALED ALTARAWNEH A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE GRADUATE PROGRAM IN ELECTRICAL ENGINEERING AND COMPUTER SCIENCE YORK UNIVERSITY TORONTO, ONTARIO FEBRUARY, 2019 c ENAS KHALED ALTARAWNEH, 2019 Abstract Adding an interactive avatar to a human-robot or human-machine interface requires the development of tools that animate the avatar so as to simulate an intelligent partner in the conversation. Although there has been considerable advancement in the development of cloud-based speech-to-text, text-to-speech and natural language understanding and generation, there exist few tools to support interactive avatar animation and modeling. This thesis addresses this issue. The human-robot interaction avatar developed here utilizes standard speech-to-text cloud-based software to perform generic speech-to-text mapping. This mapping provides support for continuous and active listen- ing that detects sound and reduces the surrounding noise participants. The speech to text module can be tuned to expected queries/commands from human operators thus enhancing the expected accuracy of the process and ensuring that the resulting text maps to pre-determined commands for the robot itself. The avatar's text-to-speech module combines a standard cloud-based or local text-to-speech generation system with a 3D avatar (puppet) whose animation is tied to the utterance being generated. Text messages pre- sented to the text-to-speech module are embedded within an XML structure that allows the user to tune the nature of the puppet animation so that different emotional states of the puppet can be simulated.
    [Show full text]
  • CULTURE on ALIEN SHORES Umut Yener Kara*
    Journal of Cultural Studies, Faculty of Communication, Hacettepe University 2017, 4(2): 527-534 ISSN: 2148-970X DOI: https://doi.org/10.17572/mj2017.2.527534 Book Review CULTURE ON ALIEN SHORES Umut Yener Kara* Finn, E. (2017). What algorithms want: Imagination in the age of computing. Cambridge, MA: MIT Press, 272 pages, ISBN: 9780262035927. Once deemed a technical subject better left to engineering and other fields, algorithms have recently become a topic of interest among social scientists and cultural scholars. Most of this interest stems from a desire to better understand our digital world where social and cultural processes are increasingly mediated by, and interacting with, plethora of computer based, automated, algorithmic systems. While Google’s search engine, Facebook’s news feed algorithm (and phenomenon of “filter bubble” associated with both), product recommendation systems of Amazon and Netflix got the most public and scholarly attention, the topics are obviously not limited to them. This interest in algorithms is also * Res. Asst. Hacettepe University, Faculty of Communication, Department of Communication Sciences. [email protected] Date of Submission: 20/11/2017 Date of Acceptance: 01/12/2017 Moment Journal, 2017, 4(2): 527-534 Umut Yener Kara related to some recent theoretical and methodological orientations in media and communication studies defending a closer engagement with technical and infrastructural aspects of technological media as exemplified by software studies, critical code studies, platform studies, German media theory, media archeology and digital humanities. Ed Finn’s What algorithms want: Imagination in the age of computing (2017) can be seen as a direct contribution to this emerging literature.
    [Show full text]
  • Robotization - Then and Now
    Barbara Czarniawska & Bernward Joerges Robotization - Then and Now Gothenburg Research Institute Managing Transformations GRI-rapport 2018:1 © Gothenburg Research Institute All rights reserved. No part of this report may be reproduced without the written permission from the publisher. Front cover: Two figures (1913-14), painting by Liubov Popova Gothenburg Research Institute School of Business, Economics and Law at University of Gothenburg P.O. Box 600 SE-405 30 Göteborg Tel: +46 (0)31 - 786 54 13 Fax: +46 (0)31 - 786 56 19 e-mail: [email protected] gri.gu.se / gri-bloggen.se ISSN 1400-4801 Robotization - Then and Now Barbara Czarniawska Senior Professor of Management, Gothenburg Research Institute Bernward Joerges Professor of Sociology (emeritus), Wissenschaftszentrum Berlin für Sozialforschung (WZB) Contents Introduction 5 1. Robot revolution 7 2. Robotization and popular culture 13 3. Robots in popular culture 16 3.1. Rossum’s Universal Robots (R.U.R. 1920) 16 3.2. I, Robot (Isaac Asimov, 1950) 19 3.3. Player Piano (Kurt Vonnegut, 1952) 24 3.4. 2001: A Space Odyssey (Stanley Kubrick and Arthur C. Clark, 1968) 29 3.5. Star Wars (First trilogy, George Lucas, 1977-1980) 33 3.6. Blade Runner (Do Androids Dream of Electric Sheep, Philip K. Dick 1968, Ridley Scott 1982) 36 3.7. Snow Crash (Neal Stephenson, 1992) 39 3.8. The Matrix (Lana and Lily Wachowski, 1998) 42 3.9. Stepford Wives (Ira Levin 1972, Frank Oz 2004) 43 3.10. Big Hero 6 (Marvin Comics 1998, Disney 2014) 48 3.11. Interstellar (Christopher Nolan, 2014) 51 3.12.
    [Show full text]
  • Snow Crash: Neal Stephenson's Fusions of Human and Computer
    Dr. Beshero-Bondar Englit 0626: Science Fiction Snow Crash: Neal Stephenson’s Fusions of Human and Computer Lagos the “gargoyle:” a dangerous and endangered researcher! Note how he dies. Transmission of his knowledge to Juanita (who passes it to Hiro Protagonist). Also connection to L. Bob Rife (to be revealed). Snow Crash Human-Computer Virus: --infects hackers in the Metaverse, exposure to binary code? Metaverse connection to physical body: Da5id --Real world physical manifestations: Falabalas—infected programmers, blood extraction. Distribution of glass vials in briefcases. Attacks DNA in nucleus of brain cells—changes the way the brain cells function: (See Ng’s explanation to Y. T., Ch. 31 p. 239) Revd Wayne’s Pearly Gates→nonsense speech. --Note: L. Bob Rife’s claim to understand the “babble” of the Asian refugees on the Raft (Ch. 27 p. 207) Raven: Metaverse and Real life: nuclear bomb on motorcycle, deliverer of Snow Crash, leads “Orthos” takeover of old Russian nuclear sub! Potentially devastating, apocalyptic invasion of “America” via West Coast and Metaverse. (TROKK, Raft, Los Angeles) --fusion of primitive and high tech. Foil to Hiro in use of ancient weaponry/martial arts. Parallel understanding of powers they work with. Mythical/Religious Background→Computer Distribution of Information: Sumeria: clay tablets distribute me (rules for society) * History of Religions: Asherah (See Ch. 30, pp. 227-28): associated with serpents and Eve Asherah cults—viral transmission of religion→glossolalia→oral transmission of viral cult- religions Sumeria: Enki’s semen→water→flow of information in society Enki vs. Asherah: Enki vs. Asherah—or her analog: Asherah makes Enki sick: Ch.
    [Show full text]
  • Dark Futures
    Dark Futures Edited by Ed Finn and G. Pascal Zachary Credits Editors Tomorrow Project Director Ed Finn, Arizona State University Brian David Johnson, Intel G. Pascal Zachary, Arizona State University Project Management Jim Olsen, Omedia Managing Editor Joe Zawadsky Joey Eschrich, Arizona State University Book Design and Creative Direction Associate Editors April Miller, Omedia Angie Dell, Arizona State University Emily Dekovich, Omedia Sam Martone, Arizona State University Dwayne Custer, Omedia Competition Management Society for Science & the Public © 2014 Intel Corporation. The copyrights for individual stories and chapters are owned by their respective authors. Fictitious names of companies, products, people, characters, and/or data mentioned herein are not intended to represent any real individual, company, product, or event. Other names and brands may be claimed as the property of others. First Printing: December 2014 Table of Contents Introduction v ��������������������������������������������������������������������������������������������������������������������������������� by Ed Finn Don’t Diss Dystopias 001 . by Ramez Naam HEAVEN 007 . by Andrew Crawford The Metamorphosis 017 . by Joseph Hirshorn A Whole New World 025 . by Haylee Bolinger Troubleshooting 027 . by Fallon Leyba Intelligence Testing 041 . by Clancy Flynn Roomba Painting #1 and Pittsburgh 1957 053 . by Bobby Zokaites The Ocean 055 . by Pavel Chvykov Unpredictable 063 . .by Ben Hylak Utopias and Dystopias 073 .....................................An interview with
    [Show full text]
  • Illustrative Mechanism and Fantastic Organism in Postmodern American Science Fiction
    영어어문교육 11권 3호 2005년 가을 Illustrative Mechanism and Fantastic Organism in Postmodern American Science Fiction Ilgu Kim (Hannam University) Kim, Ilgu. (2005). Illustrative mechanism and fantastic organism in postmodern American science fiction. English Language & Literature Teaching, 11(3), 25-38. Postmodern American science fiction authors often dramatize the human fear and hope for the newly emerging artificial life forms. For example, Helen as an advanced artificial intelligence Richard Power's Galatea 2.2 shows that the student's memorizing efforts for exams can be useless someday. In Neal Stephenson's Snow Crash machines are liable to be infected with viruses like human bodies. In He, She and It, Piercy's parallel of an artificial human (Yod) and a mythic personification (Golem) allegorically reveals the pandora-like unpredictable effect of advanced technology. More than the mechanical entities (the diffusion and linear models for Latour), these biologically artificial entities reveal the limitations of even the fantastically idealized technology simply because the human being as the creators or impersonators of these machines are not perfect. Compared to illustrative mechanism, biologically artificial entities (Latour's transition or whirlwind models) are inherently rebellious because of their closeness to the creators. The Butler's organic environmental interaction of the Earthseed convincingly demonstrates how the wrong use of science ruins the holy earth and also how human beings survive through the right use of effective science with the aid of anthroposophy. [anthrosophy/mechanism/goddess/organism/technology/myth, 인지 학/기계론/여신/유기체/기술/신화] 26 Kim Ilgu I. INTRODUCTION Genesis tells us that God created men in his own image: “in the image of God he [God] created him [man]; male and female he created them”(1: 26-27).
    [Show full text]
  • Bishop Fox Cybersecurity Style Guide
    BISHOP FOX CYBERSECURITY STYLE GUIDE VERSION 1.1 JUNE 27, 2018 This work is licensed under a Creative Commons Attribution-ShareAlike 2.0 Generic License. Bishop Fox Contact Information: +1 (480) 621-8967 [email protected] 8240 S. Kyrene Road Suite A-113 Tempe, AZ 85284 Contributing Technical Editors: Brianne Hughes, Erin Kozak, Lindsay Lelivelt, Catherine Lu, Amanda Owens, Sarah Owens We want to thank all of our Bishop Fox consultants, especially Dan Petro, for reviewing and improving the guide’s technical content. Bishop Fox™ 2018/06/27 2 TABLE OF CONTENTS Welcome! ................................................................................................................................. 4 Advice on Technical Formatting ........................................................................................................ 5 What to Expect in the Guide .............................................................................................................. 6 The Cybersecurity Style Guide .............................................................................................. 7 A-Z .......................................................................................................................................................... 7 Appendix A: Decision-making Notes .................................................................................. 96 How We Choose Our Terms ............................................................................................................96 How to Codify Your Own Terms ......................................................................................................97
    [Show full text]