Kit Son Lee E T Al Manu Al

Total Page:16

File Type:pdf, Size:1020Kb

Kit Son Lee E T Al Manu Al MANUAL KIT SON LEE ET AL MANUAL (SHIFT CTRL) MANUAL (SHIFT CTRL) KIT SON LEE et al. TABLE OF CONTENTS 7 FOREWORD Kit Son Lee 9 GLOSSARY 159 REFERENCES 163 Readings 221 Arts 257 Websites 269 Softwares & Hardwares 283 Games 305 LEXICONS 322 SIGNATURES 324 COLOPHON FOREWORD Kit Son Lee Manual accompanies CTRL SHIFT as its user manual. Collected here are the inputs that led to the output presented in the other book, the way computers receive inputs to generate outputs. The inputs in this volume together provide insight into CTRL SHIFT’s operations, thereby fulfilling Manual’s role as a user You are here manual. These conceits are extensions of CTRL SHIFT’s endeavor to model a computer (see CTRL SHIFT, pg 11). Manual is itself a model; it functions as a user manual but is not in actuality a user manual. User manuals typically instruct the reader on using the device in the box, but Manual is not meant to be prescriptive. Where other books relegate termi­­- nology, references, and lexicons to back matter, Manual instead presents them as main body content. This distinction is exaggerated further through the use of large type and illustrative imagery. Manual declares itself to be a book in its own right. A reader can therefore choose to read only this book. The inputs need not be tied to the outputs in CTRL SHIFT. This decoupling is an affordance of 7 a book that models a user manual alongside a book that models a computer. Their relationship can be reconfigured to break the directives of its referrants. GLOSSARY Additionally, the inputs need not be tied to the author of the outputs: me. The works in CTRL SHIFT are the results of my processing; the inputs are mediated by my understanding or lack thereof. Manual was compiled with the hope that its readers will approach the content with their own frameworks, perspectives, and ways of knowing, without the threat of my interpellation. To this end, all of the images and the vast majority of the words in Manual are not mine. They are offered as I initially encoun- tered them—in Wikipedia articles, Google searches, dictionaries, and source materials. That is why this section is a foreword and not a preface—a preface is written by the author of a book, while a foreword is algorithm closed system DMZ written by someone else. I concede authorship to the armistice code doxx above amalgamation and to the reader, whose ouput Arnold’s Cat Map cognitive easter egg I eagerly await. Auterism estrangment The Eye of Of course, I recognize that total concession is attention command line Providence impossible. Beyond the fact of my curation, this book economy computer Fibonacci is designed, meaning my mediation remains a threat. backend computer vision sequence My concession is therefore a gesture to argue that development console feedback partialness, whether of knowledge or success, can bouba/kiki corpus foley still move towards. As for reaching the destination, effect cybernetics forcing that remains to be seen. All I know is that I cannot Big data cyberpunk frame rate get there alone. The alternate title for Manual is SHIFT black box cyborg framework CTRL; though the shift might be incremental, incre - caesar cipher cypherpunk frontend ments together approach a total. My partial yielding chaos magic decentralized development of control is an increment as such, in anticipation of chaos theory decision tree furry readers to come and shifts with each, until the way chaotic map direct fursona is cleared. chimera manipulation GamerGate cli-fi div GUI 8 10 hack neg substitution hard science nerf cipher fiction nootropic surveillance ALGORITHM horror vacui novum capitalism hostile object-oriented tech bubble hot take ontology technē hyperlink OCR technoliberalism hypermedia one-time pad technology hypertext open source tofu information open system torus innovation orientalism transparency economy ouroboros UAV interface outopos UI elements Internet own unicorn IP address P2P user IP tracking panopticon user-friendly kettling PrEP user-hostile keylogging procedural warchalking leet generation will-to-power lexicon program WYSIWYG library programming machine learning language malware roguelike Markov chain role-playing meme game (RPG) metaphor sabotage A process or set of instructions microworld Sacred Geometry to be followed in calculations or mobile-first Ship it model shitpost other problem-solving operations. mutual aid sigil Algorithms differ from computer mystification snake myth software programs in that 1) they must natural language speculative solve something, and 2) they Natural Language biology Processing steganography must have an end. 10 Glossary 11 ARMISTICE An agreement made by opposing sides in a war to stop fighting for a certain time; a truce. 12 Glossary 13 ARNOLD’S CAT MAP (mathematics) A chaotic map from the torus into itself, named after Vladimir Arnold, who demonstrated its effects in the 1960s using an image of a cat, hence the name. A feature of a discrete cat map is that an image is apparently randomized into noise by the transformation but returns to its original state after a number of steps. 14 Glossary ATTENTION AUTERISM ECONOMY An economic approach to infor- mation that treats human atten- (film theory) tion as a scarce commodity. The In film criticism, the theory accord- term was coined by psychologist, ing to which the primary creator economist, and Nobel Laureate of a film is the director, all of whose Herbert A. Simon, who posited works are said to reflect to a cer- that attention was the “bottleneck tain degree the characteristics of of human thought.” a personal style. 16 Glossary 17 BACKEND BIG DATA DEVELOP- MENT A field that treats ways to analyze, systematically extract information from, or otherwise deal with data (computing) sets that are too large or complex The writing of code to be exe- to be dealt with by traditional cuted on the server side of a web data-processing application soft- application and everything that ware. An example of big data in communicates between the data- use is the tailoring of ads on social base and the browser. media and search platforms. 18 Glossary 19 BLACK BOX BOUBA/KIKI EFFECT (psychology) A non-arbitrary mapping between speech sounds and the visual shape of objects, first docu- mented by Wolfgang Köhler in 1929 using nonsense words. Köhler showed two forms to particpants and asked them (computing) which shape was called “takete” In machine learning, a black box and which was called “baluba.” is a system whose inputs and There was a strong preference operations are completely hidden. to pair the jagged shape with Black box models are created “takete” and the rounded shape directly from data by an algorithm. with “baluba.” 20 Glossary 21 CAESAR CIPHER (cryptography) An encryption technique in which each letter is replaced by a letter some fixed number of positions down the alphabet, e.g. “A” becomes “B,” “B” becomes “C,” etc. The Caesar cipher is named for Julius Caesar, who used an alphabet where decrypting would shift three letters to the left. 22 Glossary CHAOS MAGIC A contemporary magical practice developed in the 1960s that emphasizes the attainment of specific results over the symbolic, ritualistic, or otherwise ornamen- tal aspects of other occult tradi- tions. Chaos magic holds a post- modernist skepticism concerning the existence or knowability of objective truth. Chaos magicians subsequently treat belief as a tool, often creating their own idiosyncratic magical systems and frequently borrowing from other magical traditions, religious movements, popular culture and various strands of philosophy. 24 Glossary 25 CHAOS CHAOTIC THEORY MAP (mathematics) A branch of mathematics focusing on the study of chaos—dynami- cal systems whose apparently random states of disorder and irregularities are actually gov- (mathematics) erned by underlying patterns and A map (evolution function) that deterministic laws that are highly exhibits some sort of chaotic sensitive to initial conditions. behavior. 26 Glossary 27 CHIMERA (in Greek mythology) A fire-breathing female monster with a lion’s head, a goat’s body, and a serpent’s tail. A thing that is hoped or wished for but in fact is illusory or impossible to achieve. (biology) An organism containing a mixture of genetically different tissues, formed by processes such as fusion of early embryos, grafting, or mutation. 28 Glossary 29 CLI-FI CLOSED SYSTEM (systems theory) A physical system that does not exchange any matter with its A portmanteau of “climate” and surroundings, and is not subject “science fiction,” climate fiction to any net force whose source (Cli-Fi) refers to works that deal is external to the system. Closed with climate change and global systems are often used to limit the warming as a primary component factors that can affect the results of speculative worldbuilding. of specific problem or experiment. 30 Glossary 31 CODE COGNITIVE ESTRANGE- MENT (cryptography) A system of words, letters, figures, or other symbols substituted for other words, letters, etc., espe- cially for the purposes of secrecy. (computing) (literature) Instructions for a computer A narrative logic, characteristic written in a human-legible alpha- of science fiction, whereby numeric system. devices used in the story are lent plausibility by their being placed (verb) in the context of the fictional To put in or into the form or sym- universe, which is imagined to be bols of a code; to create or edit scientifically consistent. The term computer code. was coined by Darko Suvin. 32 Glossary 33 COMMAND COMPUTER LINE (computing) A text-based user interface navi- An electronic device for storing gated by typing commands at and processing data, typically prompts, instead of using a mouse. in binary form, according to Unlike a GUI, a command line only instructions given to it in a vari- uses a keyboard to navigate by able program.
Recommended publications
  • Assessment of Options for Handling Full Unicode Character Encodings in MARC21 a Study for the Library of Congress
    1 Assessment of Options for Handling Full Unicode Character Encodings in MARC21 A Study for the Library of Congress Part 1: New Scripts Jack Cain Senior Consultant Trylus Computing, Toronto 1 Purpose This assessment intends to study the issues and make recommendations on the possible expansion of the character set repertoire for bibliographic records in MARC21 format. 1.1 “Encoding Scheme” vs. “Repertoire” An encoding scheme contains codes by which characters are represented in computer memory. These codes are organized according to a certain methodology called an encoding scheme. The list of all characters so encoded is referred to as the “repertoire” of characters in the given encoding schemes. For example, ASCII is one encoding scheme, perhaps the one best known to the average non-technical person in North America. “A”, “B”, & “C” are three characters in the repertoire of this encoding scheme. These three characters are assigned encodings 41, 42 & 43 in ASCII (expressed here in hexadecimal). 1.2 MARC8 "MARC8" is the term commonly used to refer both to the encoding scheme and its repertoire as used in MARC records up to 1998. The ‘8’ refers to the fact that, unlike Unicode which is a multi-byte per character code set, the MARC8 encoding scheme is principally made up of multiple one byte tables in which each character is encoded using a single 8 bit byte. (It also includes the EACC set which actually uses fixed length 3 bytes per character.) (For details on MARC8 and its specifications see: http://www.loc.gov/marc/.) MARC8 was introduced around 1968 and was initially limited to essentially Latin script only.
    [Show full text]
  • Chapter 1 Chapter 2 Chapter 3
    Notes Chapter 1 1. The various threads of the critical analysis of technology are commonly referred to as “science and technology studies” and include the social shaping of technol- ogy, the social construction of technology, and actor-network theory (see, for example, MacKenzie 1996; MacKenzie and Wajcman 1999; Law and Hassard 1999; Latour 2005; and Bijker, Hughes, and Pinch 1989). Chapter 2 1. Since its inaugural issue, Wired has christened McLuhan as its “patron saint.” Chapter 3 1. The article later appeared in an extended book form with the same title (1998). References in the chapter refer to book pages. 2. Throughout this book emphasis is always in the original, unless specified otherwise. 3. By arguing that the digital discourse constructs individual nodes as irrational, I do not mean that the individual nodes are constructed as decidedly antirational, but simply that they are devoid of system-wide, big-picture, theoretical, and abstract rationality. 4. It is worthwhile to point out the rhetorical tool used here in order to legitimize the idea of chaos. It is reminiscent of a joke about a borrowed kettle evoked by Freud (1963)—and recently retold by Žižek (2005)—to account for the nature of logic in dreams. In the joke, the kettle owner accuses his friend of returning the kettle damaged, an accusation to which the friend replies, “I have never borrowed your kettle; I retuned it to you unbroken; it was already broken when I borrowed it.” In a similar fashion, Kelly suggests flux, chaos, and churn- ing (along with their corollary social effects of instability and unpredictability) should not be opposed to or mitigated for three reasons: this cannot be done (flux in the network economy is inevitable; a transfer of a natural phenomenon into the social realm through network technology), it is better not to do it (flux is benevolent, yielding good results for everyone); and it is dangerous to do it (since it will result in knocking the system out of its self-regulating, natural imbalance).
    [Show full text]
  • UC Santa Cruz Electronic Theses and Dissertations
    UC Santa Cruz UC Santa Cruz Electronic Theses and Dissertations Title Unbecoming Silicon Valley: Techno Imaginaries and Materialities in Postsocialist Romania Permalink https://escholarship.org/uc/item/0vt9c4bq Author McElroy, Erin Mariel Brownstein Publication Date 2019 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA SANTA CRUZ UNBECOMING SILICON VALLEY: TECHNO IMAGINARIES AND MATERIALITIES IN POSTSOCIALIST ROMANIA A dissertation submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in FEMINIST STUDIES by Erin Mariel Brownstein McElroy June 2019 The Dissertation of Erin McElroy is approved: ________________________________ Professor Neda Atanasoski, Chair ________________________________ Professor Karen Barad ________________________________ Professor Lisa Rofel ________________________________ Professor Megan Moodie ________________________________ Professor Liviu Chelcea ________________________________ Lori Kletzer Vice Provost and Dean of Graduate Studies Copyright © by Erin McElroy 2019 Table of Contents Abstract, iv-v Acknowledgements, vi-xi Introduction: Unbecoming Silicon Valley: Techno Imaginaries and Materialities in Postsocialist Romania, 1-44 Chapter 1: Digital Nomads in Siliconizing Cluj: Material and Allegorical Double Dispossession, 45-90 Chapter 2: Corrupting Techno-normativity in Postsocialist Romania: Queering Code and Computers, 91-127 Chapter 3: The Light Revolution, Blood Gold, and
    [Show full text]
  • Sustainable Economic Development the Neo-Capitalist Assault in Mexico
    The Jus Semper Global Alliance Living Wages North and South Sustainable Economic Development February 2004 A TLWNSI ISSUE ESSAY The Neo-Capitalist electoral process, we have only vindicated the ruling class so that it can keep subjecting the Assault in Mexico: country to its usufruct and we are still quite far from real democracy. In this way, this essay Democracy vis-à-vis the logic of reflects on the manner in which the oligarchy the market operates, and it disserts about its connivance with the first world to impose neoliberalism in Mexico, within a global context, and on how it pretends to a By Álvaro J. de Regil consolidate it. Lastly, it poses the urgent need to organize a civil society, strong and supportive of the socially disadvantaged, which incorporates all Periodically, TJSGA publishes essays of relevance ranks of society, gets fully and permanently for The Living Wages North and South Initiative involved in the public matter and commits itself (LISDINYS). This essay explores what lies behind to the common good in order to build a real the growing pauperization and disintegration of democracy and a new country. Otherwise, we the social fabric that Mexico has experienced in would be left to deal with an increasingly brutal the last quarter century as a consequence of a ethos –always in a global context– reminiscent of change of economic paradigm imposed by those times that were assumed we have long ago who wield power in Mexico. It argues that only if transcended. there is success in building an organized civil so- ciety, inclusive of and in solidarity with the disad- vantage, would it be possible to stop the dictates of the market and force a paradigmatic change.
    [Show full text]
  • Geometry and Art LACMA | | April 5, 2011 Evenings for Educators
    Geometry and Art LACMA | Evenings for Educators | April 5, 2011 ALEXANDER CALDER (United States, 1898–1976) Hello Girls, 1964 Painted metal, mobile, overall: 275 x 288 in., Art Museum Council Fund (M.65.10) © Alexander Calder Estate/Artists Rights Society (ARS), New York/ADAGP, Paris EOMETRY IS EVERYWHERE. WE CAN TRAIN OURSELVES TO FIND THE GEOMETRY in everyday objects and in works of art. Look carefully at the image above and identify the different, lines, shapes, and forms of both GAlexander Calder’s sculpture and the architecture of LACMA’s built environ- ment. What is the proportion of the artwork to the buildings? What types of balance do you see? Following are images of artworks from LACMA’s collection. As you explore these works, look for the lines, seek the shapes, find the patterns, and exercise your problem-solving skills. Use or adapt the discussion questions to your students’ learning styles and abilities. 1 Language of the Visual Arts and Geometry __________________________________________________________________________________________________ LINE, SHAPE, FORM, PATTERN, SYMMETRY, SCALE, AND PROPORTION ARE THE BUILDING blocks of both art and math. Geometry offers the most obvious connection between the two disciplines. Both art and math involve drawing and the use of shapes and forms, as well as an understanding of spatial concepts, two and three dimensions, measurement, estimation, and pattern. Many of these concepts are evident in an artwork’s composition, how the artist uses the elements of art and applies the principles of design. Problem-solving skills such as visualization and spatial reasoning are also important for artists and professionals in math, science, and technology.
    [Show full text]
  • L2/14-274 Title: Proposed Math-Class Assignments for UTR #25
    L2/14-274 Title: Proposed Math-Class Assignments for UTR #25 Revision 14 Source: Laurențiu Iancu and Murray Sargent III – Microsoft Corporation Status: Individual contribution Action: For consideration by the Unicode Technical Committee Date: 2014-10-24 1. Introduction Revision 13 of UTR #25 [UTR25], published in April 2012, corresponds to Unicode Version 6.1 [TUS61]. As of October 2014, Revision 14 is in preparation, to update UTR #25 and its data files to the character repertoire of Unicode Version 7.0 [TUS70]. This document compiles a list of characters proposed to be assigned mathematical classes in Revision 14 of UTR #25. In this document, the term math-class is being used to refer to the character classification in UTR #25. While functionally similar to a UCD character property, math-class is applicable only within the scope of UTR #25. Math-class is different from the UCD binary character property Math [UAX44]. The relation between Math and math-class is that the set of characters with the property Math=Yes is a proper subset of the set of characters assigned any math-class value in UTR #25. As of Revision 13, the set relation between Math and math-class is invalidated by the collection of Arabic mathematical alphabetic symbols in the range U+1EE00 – U+1EEFF. This is a known issue [14-052], al- ready discussed by the UTC [138-C12 in 14-026]. Once those symbols are added to the UTR #25 data files, the set relation will be restored. This document proposes only UTR #25 math-class values, and not any UCD Math property values.
    [Show full text]
  • CARLA GANNIS [email protected] :: :: Twitter: @Carlagannis CV
    CARLA GANNIS [email protected] :: www.carlagannis.com :: twitter: @carlagannis CV SOLO & TWO PERSON EXHIBITIONS 2017 Carla Gannis, DAM Gallery, Berlin, Germany The Selfie Drawings : An Augmented Reality Artist Book and Installation, Pratt Institute Libraries, Brooklyn, NY Augmented Gardens and Other Emoji Delights, New Media Artspace, Baruch College, New York, NY, curated by Katherine Behar 2016 A Subject Self-Defined, Cyberfest 10, NY Media Center, Brooklyn, NY La Emoji Lujuria, Sedition Art, Online Exhibition A Subject Self-Defined, Transfer Gallery, Brooklyn, NY 2015 The Garden of Emoji Delights, Real Art Ways, Hartford, CT The Garden of Emoji Delights, EBK Gallery, Hartford, CT Robbi Carni, Digital Sweat Gallery, curated by Christian Petersen, Online Exhibition The Garden of Emoji Delights, Hudson River Museum, Yonkers, NY 2014 The Garden of Emoji Delights Kasia Kay Gallery, Chicago, Il The Garden of Emoji Delights, Transfer Gallery, Brooklyn, NY The Non-Facial Recognition Project, Center for the Digital Arts, Peekskill, New York 2013 <legend> </legend> | Carla Gannis & Justin Petropoulos (two-person collaboration), Transfer Gallery, Brooklyn, New York in conjunction with book publication by Jaded Ibis Press of Gannis/ Petropoulos collaboration 2012 The Multiversal Hippozoonomadon & Prismenagerie, Pablo’s Birthday, New York, NY The Non Facial Recognition, Edelman Gallery, New York, NY Pop Noir: Carla Gannis & Sandra Bermudez (two-person), The George Gallery, Laguna Beach, CA 2010 What is not on my mind, Pablo’s Birthday, New
    [Show full text]
  • The Case of Basic Geometric Shapes
    International Journal of Progressive Education, Volume 15 Number 3, 2019 © 2019 INASED Children’s Geometric Understanding through Digital Activities: The Case of Basic Geometric Shapes Bilal Özçakır i Kırşehir Ahi Evran University Ahmet Sami Konca ii Kırşehir Ahi Evran University Nihat Arıkan iii Kırşehir Ahi Evran University Abstract Early mathematics education bases a foundation of academic success in mathematics for higher grades. Studies show that introducing mathematical contents in preschool level is a strong predictor of success in mathematics for children during their progress in other school levels. Digital technologies can support children’s learning mathematical concepts by means of the exploration and the manipulation of concrete representations. Therefore, digital activities provide opportunities for children to engage with experimental mathematics. In this study, the effects of digital learning tools on learning about geometric shapes in early childhood education were investigated. Hence, this study aimed to investigate children progresses on digital learning activities in terms of recognition and discrimination of basic geometric shapes. Participants of the study were six children from a kindergarten in Kırşehir, Turkey. Six digital learning activities were engaged by children with tablets about four weeks in learning settings. Task-based interview sessions were handled in this study. Results of this study show that these series of activities helped children to achieve higher cognitive levels. They improved their understanding through digital activities. Keywords: Digital Learning Activities, Early Childhood Education, Basic Geometric Shape, Geometry Education DOI: 10.29329/ijpe.2019.193.8 ------------------------------- i Bilal Özçakır, Res. Assist Dr., Kırşehir Ahi Evran University, Mathematics Education. Correspondence: [email protected] ii Ahmet Sami Konca, Res.
    [Show full text]
  • RISD Graduate Studies Term
    Experimental Publishing Studio NewHive version of this syllabus here ​ Dept: RISD Graduate Studies Term: Spring 2015 Course number: GRAD-206G-01 Classroom: AUD 522 Days / time: Wednesday 1:10PM — 6:10PM Instructor: Paul Soulellis [email protected] Office hours: By appointment Course Description Publishing has never been a fixed notion. “What is publishing today?” remains a relevant inquiry, but with an expanding field of response, as platforms, channels and modes of production mutate and multiply. Let’s begin with “the post,” exposing its origins as a physical note publicly nailed to a piece of wood. Its descendents persist today, plainly visible on the wall, in the feed and in the stream as traces of a deeper history of documents — the scriptural economy. Is posting (always) publishing? We’ll examine substrate, blankness and the possibility of saying nothing as a post-media publishing strategy. And as certain legacies recede (privacy, authorship, copyright), how is publishing still “making public?” Let’s unpack (and entangle) these and other ways to explore the public circulation of work in a post-digital space. We’ll draw trajectories to and from the emergence of the networked artist in the 20th century, into the last twenty years, and particularly around the last two, as self-publishing becomes more and more inseparable from the artist’s ambient practice (and work) itself. The semester will be devoted to the creation of our own “performing publishing” studio, disseminating work as a highly diffused, ongoing performance, rather than discrete events. The development of publishing manifestos and projects, working in public, research-based exploration, non-traditional tools and platforms, experimentation and collaboration will be encouraged.
    [Show full text]
  • Political Conflict and Power Sharing in the Origins of Modern Colombia
    Political Conflict and Power Sharing in the Origins of Modern Colombia Sebastián Mazzuca and James A. Robinson Colombia has not always been a violent country. In fact, for the first half of the twentieth century, Colombia was one of the most peaceful countries in Latin America, standing out in the region as a highly stable and competitive bipartisan democracy. When faced with the critical test for political stability in that epoch, the Great Depression of 1930, Colombia was the only big country in South America in which military interventions were not even considered. While an armed coup interrupted Argentina’s until then steady path to democracy, and Getulio Vargas installed the first modern dictatorship in Brazil, Colombia cele brated elections as scheduled. Moreover, the ruling party lost the contest, did not make any move to cling to power, and calmly transferred power to the opposition. However, Colombia was not born peaceful. That half-century of peaceful political existence was a major novelty in Colombian history. Colombia’s nine- teenth century was politically chaotic even by Hispanic American standards: the record includes nine national civil wars, dozens of local revolts and mutinies, material destruction equivalent to the loss of several years of economic output, and at least 250,000 deaths due to political violence. How did Colombia make the transition from political chaos to political order? What were the causes of conflict before the turn of the century, and what were the bases of internal peace after it? The emergence of order in Colombia was temporally correlated with a major transformation of political institutions: the introduction of special mechanisms for power sharing between Liberals and Conservatives, Colombia’s two dominant political forces.
    [Show full text]
  • Protest at the Pyramid: the 1968 Mexico City Olympics and the Politicization of the Olympic Games Kevin B
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2003 Protest at the Pyramid: The 1968 Mexico City Olympics and the Politicization of the Olympic Games Kevin B. Witherspoon Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES PROTEST AT THE PYRAMID: THE 1968 MEXICO CITY OLYMPICS AND THE POLITICIZATION OF THE OLYMPIC GAMES By Kevin B. Witherspoon A Dissertation submitted to the Department of History in partial fulfillment of the requirements for the degree of Doctor of Philosophy Degree Awarded: Fall Semester, 2003 The members of the Committee approve the dissertation of Kevin B. Witherspoon defended on Oct. 6, 2003. _________________________ James P. Jones Professor Directing Dissertation _____________________ Patrick O’Sullivan Outside Committee Member _________________________ Joe M. Richardson Committee Member _________________________ Valerie J. Conner Committee Member _________________________ Robinson Herrera Committee Member The Office of Graduate Studies has verified and approved the above named committee members. ii ACKNOWLEDGEMENTS This project could not have been completed without the help of many individuals. Thanks, first, to Jim Jones, who oversaw this project, and whose interest and enthusiasm kept me to task. Also to the other members of the dissertation committee, V.J. Conner, Robinson Herrera, Patrick O’Sullivan, and Joe Richardson, for their time and patience, constructive criticism and suggestions for revision. Thanks as well to Bill Baker, a mentor and friend at the University of Maine, whose example as a sports historian I can only hope to imitate. Thanks to those who offered interviews, without which this project would have been a miserable failure: Juan Martinez, Manuel Billa, Pedro Aguilar Cabrera, Carlos Hernandez Schafler, Florenzio and Magda Acosta, Anatoly Isaenko, Ray Hegstrom, and Dr.
    [Show full text]
  • The Comprehensive LATEX Symbol List
    The Comprehensive LATEX Symbol List Scott Pakin <[email protected]>∗ 22 September 2005 Abstract This document lists 3300 symbols and the corresponding LATEX commands that produce them. Some of these symbols are guaranteed to be available in every LATEX 2ε system; others require fonts and packages that may not accompany a given distribution and that therefore need to be installed. All of the fonts and packages used to prepare this document—as well as this document itself—are freely available from the Comprehensive TEX Archive Network (http://www.ctan.org/). Contents 1 Introduction 6 1.1 Document Usage . 6 1.2 Frequently Requested Symbols . 6 2 Body-text symbols 7 Table 1: LATEX 2ε Escapable “Special” Characters . 7 Table 2: Predefined LATEX 2ε Text-mode Commands . 7 Table 3: LATEX 2ε Commands Defined to Work in Both Math and Text Mode . 7 Table 4: AMS Commands Defined to Work in Both Math and Text Mode . 7 Table 5: Non-ASCII Letters (Excluding Accented Letters) . 8 Table 6: Letters Used to Typeset African Languages . 8 Table 7: Letters Used to Typeset Vietnamese . 8 Table 8: Punctuation Marks Not Found in OT1 . 8 Table 9: pifont Decorative Punctuation Marks . 8 Table 10: tipa Phonetic Symbols . 9 Table 11: tipx Phonetic Symbols . 10 Table 13: wsuipa Phonetic Symbols . 10 Table 14: wasysym Phonetic Symbols . 11 Table 15: phonetic Phonetic Symbols . 11 Table 16: t4phonet Phonetic Symbols . 12 Table 17: semtrans Transliteration Symbols . 12 Table 18: Text-mode Accents . 12 Table 19: tipa Text-mode Accents . 12 Table 20: extraipa Text-mode Accents .
    [Show full text]