Netmodern: Interventions in Digital Sociology

Total Page:16

File Type:pdf, Size:1020Kb

Netmodern: Interventions in Digital Sociology NETMODERN: INTERVENTIONS IN DIGITAL SOCIOLOGY Chris Brauer Goldsmiths Department of Sociology University of London December, 2010 Submission for PhD in Sociology ABSTRACT The techno-economic grid of the Internet looks set to fulfil its autopoietic potentials as a global and multi-dimensionally immersive knowledge and memory archival network. This research project moves through a series of Digital Sociology case studies that mimic the changes in paradigms of the WWW from 2005-2010 in the forms of Web 1.0 to 2.0 and beyond to augmented reality and the cloud. Netmodern social theory is an emergent and speculative product of the research findings of this thesis and the subjective experiences of the researcher in experiencing and explaining digital realities in the research. All of the case studies employ practice-based approaches of original investigation through digital interventions completely immersed in particular waves of innovation and change. The role of the researcher shifts from administrator to mediator and observer as the very fabric of the social web transforms and evolves. The suggestion of the research findings is that you need to actually look at everything differently in order to study the research objects of emergent social agency and forms in digital media. Existing forms of critical analysis and methodological frameworks, particularly those concerned with conceptual models of media literacy or collective intelligence are insufficient as explanatory methods. Studying media literacy is most concerned with ‘how’ we create and interact in online social life beyond issues of simple accessibility. The focus of collective intelligence research is ‘what’ knowledge is available for interaction and a canvas for relationships between agency and knowledge forms. All of the case studies in this research project speak to and critique the intersections and relationships of emergent social agency and forms prevalent in Digital Sociology. The collective case studies explore online academic communities (BlogScholar), agency and popularity in the Twitter social network (Twae) and a variety of representations of collective intelligence in action (Web 2.0 cases studies). The research results suggest that the Internet is not so much intersecting with as it is being culture, economy, and technology. 2 ACKNOWLEDGEMENTS It is a pleasure to thank those who made this research possible. The process of thesis writing is an irregular and uneven act, like seeking firm footing in a rushing river. You find yourself broad upon the narrow banks of learning and new forms of knowledge. You learn to rely on those you trust and hold you up when you slip. I would like to thank my supervisors Brian Alleyne and Robert Zimmer for intellectual challenge and patience and guidance every step of the way. And my wife Jennifer for steadfast love and support and some timely edits in the final draft. She inspires me in the smallest acts and timely interventions of our happy life together. This thesis is dedicated to my parents for a lifetime of warmth and compassion. They taught me not to be afraid to reach out, in every act of life, for that which appears just beyond your grasp. 3 I ABSTRACT 2 ACKNOWLEDGEMENTS 3 List of Figures 7 CHAPTER ONE: INTRODUCTION 8 CHAPTER TWO: DIGITAL SOCIOLOGY, MEDIA LITERACY, AND COLLECTIVE INTELLIGENCE 17 2.1 Introduction 17 2.2 Sociological Relevance 21 2.3 Media Literacy 32 Ways of people understanding media 38 Ways of media understanding people 40 Ways of understanding social life through media 43 2.4 Collective Intelligence 45 2.5 Progressing the Literature 57 CHAPTER THREE: METHODOLOGY 59 3.1 Introduction 59 3.2 Research Paradigm 60 3.3 Research Methods 65 3.4 Critical Realism 71 CHAPTER FOUR: INTRODUCING BLOGSCHOLAR 80 4.1 Introduction 80 4.2 Inspiring BlogScholar – Practical Examples 83 4.3 Managing a Community 87 Getting Started 87 Operations 88 4.4 Participating in a Community 89 BlogScholar statistics 89 Surveying the BlogScholar community 96 4.5 Conclusion 101 Possibilities and Aspirations 103 CHAPTER FIVE: IT TAKES TWAE TO TANGO 106 5.1 Introduction 106 4 5.2 Introducing Twitter 108 5.3 Introducing Twae 112 Emancipatory Potential 117 Spontaneous Creativity 123 Ethics and Etiquette on Twitter 127 5.4 Twae reach and depth 132 Functional Media Literacies 144 Considerations 150 5.5 Conclusion 153 Aspirations and Opportunities 156 CHAPTER SIX: WEB 2.0 CASES – TWEETS AND WHISTLES 160 6.1 Introduction 160 6.2 Digital Hacktivism 165 6.3 Cloud Computing 174 6.4 Augmented Reality 177 6.5 Wikileaks 183 6.6 Netflix 193 6.7 Gold Farming 198 6.8 Conclusion 203 Possibilities and Aspirations 206 CHAPTER SEVEN: CONCLUSION & NETMODERN THEORY 209 7.1 Conclusion 209 Role of the Researcher in Digital Interventions 210 Emergent Collective Intelligences in Digital Sociology 211 Media Literacies in Digital Sociology 212 Qualitative Improvement of Methods 214 Emergent Themes on Reality and Knowledge 215 7.2 Introduction to Netmodern 216 7.3 The Map, the Mapmaker, and the Territories 220 7.4 The Dark Matter of Élan Collective 233 7.5 Quantum Sociology 240 Cause, Effect and Doubt 242 Superpositions and Ideas 243 Fluid dynamics of the Observer and the Observed 244 5 Theory, Objects and Truth 245 Social Uncertainty Principle 247 Duality in Balance 248 Entropy and the Arrow of Time 249 Resolving Hardy’s Paradox in Social Life 251 7.6 Yoga of Knowledge 252 REFERENCES 261 6 List of Figures Figure 1: Netmodern Performance ‘Map’ (NPM) ....................................................................... 11 Figure 2: Thesis project research design ...................................................................................... 61 Figure 3: BlogScholar website traffic by month .......................................................................... 91 Figure 4: BlogScholar website traffic for September, 2006 ........................................................ 92 Figure 5: BlogScholar website traffic by country ........................................................................ 96 Figure 6: BlogScholar Netmodern Performance 'Map' (NPM) .................................................. 102 Figure 7: The Notifcator ............................................................................................................ 109 Figure 8: Most tweets by accounts with approx. 1000 followers .............................................. 110 Figure 9: Accounts joining Twitter from particular countries ................................................... 110 Figure 10: Tweet volume on the Twae account by 2009 month ................................................ 111 Figure 11: WeFollow (http://wefollow.com) category of Fiction .............................................. 113 Figure 12: Twae followers from 17 August to 16 October 2009 ............................................... 114 Figure 13: Days of Twae's tweets .............................................................................................. 115 Figure 14: Times of Twae's tweets (GMT) ................................................................................ 115 Figure 15: From Blogscholar in Broadcast to Twae in Networks & Nodes .............................. 119 Figure 16: Goals, Research, and Depth for the Twae project .................................................... 121 Figure 17: Twae Netmodern Performance ‘Map’ (NPM) ......................................................... 154 Figure 18: Web 2.0 Netmodern Performance ‘Map’ (NPM) ..................................................... 204 Figure 19: Netmodern Performance ‘Map’ (NPM) ................................................................... 224 Figure 20: Model of collective intelligence ............................................................................... 229 Figure 21: IEML semantic dictionary ........................................................................................ 230 7 CHAPTER ONE: INTRODUCTION Existing models for interpreting social life like realism, materialism, idealism, or post- modernism are insufficient to describe and explain the results of digital research conducted in this thesis project. In 2002, Webster argued that it is not just the quantitative leap in digital information that creates an ‘information society’, but that “the character of information is such as to have transformed how we live” (9). This argument suggests we need to look beyond the standard sociological criteria of technological, economic, occupational, spatial, or cultural change to understand innovation and the impact of the Internet on society. From a structural perspective, communications on the Internet through the duration of this research project progressed from the ‘web as platform’ (Web 1.0) to the ‘web as network’ (Web 2.0) and beyond to suggesting various augmented or semantic versions of the ‘web as metaverse’ (Web 3.0?) seamlessly integrating virtual and offline worlds. But the integral reality worldview of Netmodern, the emergent theory of this research, suggests a relationship of equivalency for social life and being virtual. Netmodern theory is an emergent theory of Digital Sociology. As a critical paradigm of reality Netmodern is a response to the lack of interpretive methods for the realities encountered and investigated in this research project and is nothing less than an attempt to rethink particular aspects of social theory and methodology in light of the problem spaces opened up in the work. Just as road repair starts from a theoretical premise of material durability,
Recommended publications
  • Uva-DARE (Digital Academic Repository)
    UvA-DARE (Digital Academic Repository) “API-Based Research” or How can Digital Sociology and Journalism Studies Learn from the Facebook and Cambridge Analytica Data Breach Venturini, T.; Rogers, R. DOI 10.1080/21670811.2019.1591927 Publication date 2019 Document Version Accepted author manuscript Published in Digital Journalism Link to publication Citation for published version (APA): Venturini, T., & Rogers, R. (2019). “API-Based Research” or How can Digital Sociology and Journalism Studies Learn from the Facebook and Cambridge Analytica Data Breach. Digital Journalism, 7(4), 532-540. https://doi.org/10.1080/21670811.2019.1591927 General rights It is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulations If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: https://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. UvA-DARE is a service provided by the library of the University of Amsterdam (https://dare.uva.nl) Download date:28 Sep 2021 “API-based research” or how can digital sociology and journalism studies learn from the Cambridge Analytica affair Tommaso Venturini & Richard Rogers How to cite Venturini, Tommaso, and Richard Rogers.
    [Show full text]
  • GBCC-CIS-1 Page 1 Micro-Soft’S Macro-Impact
    CIS111 GBCC Renee Dodge CIS111 Mid-Term – Fall 2010 For your mid-term, I would like you to conduct some research on the history of computers. Select a milestone or event that you feel had a significant impact on the overall development of computers and how we use computers today. Be sure you not only provide your opinion as to why you feel this milestone is significant, but also provide historical proof - actual facts as to how this event shaped the development and use of computers. For this assignment, please complete the following: 1. Choose a topic 2. Research your topic and locate at least 5 different sources of information, overall. o At least 3 sources should be Internet websites. o Remember: Wikipedia is NOT an acceptable research source. 3. In addition to the Internet, you should also utilize the library online resources (EBSCO database, e-Books, etc). o At least 2 different sources of information should be online library resources. o If you have never used the library online resources before, you may ask me for a brief overview of how to use them or see Becky Clerkin in the library for help. 4. Include your research findings in a 5-page paper and be sure to properly cite where you found your information. If you are not sure how to cite references check out the following link: How to Cite Books, Magazines, and Web Sites in a Research Paper: http://www.lib.duke.edu/libguide/works_cited.htm 5. Upload your research paper to the Digital Drop BoX no later than Wednesday, October 27th at 11:59pm.
    [Show full text]
  • A Guide to Discuss Ethical Issues in Digital Research Second Edition
    Ethical challenges in digital research 2nd edition ETHICAL CHALLENGES IN DIGITAL RESEARCH A guide to discuss ethical issues in digital research Second edition Ethical challenges in digital research 2nd edition Ethical challenges in digital research – A guide to discuss ethical issues in digital research Second edition January 2020 Developed by DIGETIK at Aalborg University as part of DIGHUMLAB Authors Line Lisberg Christensen, Research Assistant Malene Charlotte Larsen, Associate Professor Layout Steffen Madsen, DIGHUMLAB i Ethical challenges in digital research 2nd edition I. Introduction to document The ever-changing development of digital technologies and digital infrastructure makes it necessary for us as researchers to change approaches to digital research within the humanities. In terms of research ethics, we can no longer use traditional laws and guidelines that only match the non-digital world. In a time where it is necessary to change and re-think our ways of doing research, we bring to you this second version of Ethical Challenges in Digital Research to initiate discussions about ethical research and to help guide you in your digital research. The compound may serve you as a guideline to ethical research, a helpful tool to those in need of inspiration or merely as a list of literature that is relevant to your field, whether that is: big data, surveillance, privacy, games and gamification, ethics in studies with children and adolescents, health research, journalism, ethnographic studies, visual methods, vulnerable groups, web archives, economy, risky business for researchers or one of the many other categories in this collection of ethical digital research. We initially created this document with the intention of helping scholars reflect and discuss the ethical dimensions of their digital research, whilst providing guidance and insight about how to deal with these issues.
    [Show full text]
  • Concurrent CP/M-86 User's Guide 1.1 What Concurrent CP/M-86 Is
    Concurrent CP/M-86™ Operating System Concurrent CP/M-86™ Operating System User's Guide Copyright © 1982 Digital Research P.O. Box -579 160 Central Avenue Pacific Grove, CA 93950 (408) 649-3896 TWX 910 360 5001 All Rights Reserved COPYRIGHT Copyr ight © 1982 by Digi tal Research. All r igh ts reserved. No part of this pUblication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or compu ter language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written permiss ion of Digital Research, Post Off ice Box 579, Pacific Grove, California, 93950. This manual is, however, tutorial in nature. Thus, the reader is granted permission to include the example programs, either in whole or in part, in his own programs. DISCLAIMER Digital Research makes no representations or warranties with respect to the contents hereof and specifically disclaims any ,implied warranties of merchantabil i ty or fitness for any particular purpose. Further, Digital Research reserves the right to revise this publication and to make changes f rom time to time in the content hereof wi thou t obligation of Digital Research to notify any person of such revision or changes. TRADEMARKS CP/M is a registered trademark of Digital Research. ASM-86, CP/M-86, Concurrent CP/M-86 and DDT-86 are trademarks of Digital Research. ED and TEX are utilities of Digital Research. Intel is a registered trademark of Intel Corporation. The IBM Personal Computer is a trade name of International Business Machines.
    [Show full text]
  • OS 386 Multiuser/Multitasking Operating System
    OS 386 Multiuser/Multitasking Operating System REFERENCE GUIDE [Q] DIGITAL RESEARCH@ os REFERENCE GUIDE [jill DIGITAL RESEARCH~ COPYRIGHT Copyright © 1987 Digital Research Inc. All rights reserved. No part of this publication may be reproduced, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without the prior written permission of Digital Research Inc, 60 Garden Court, Box DRI, Monterey, California 93942 DISCLAIMER DIGITAL RESEARCH MAKES NO REPRESENTATIONS OR WARRANTIES WITH RESPECT TO THE CONTENTS HEREOF AND SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE. Further Digital Research Inc. reserves the right to revise this publication and to make changes from time to time in the content hereof without obligation of Digital Research Inc to notify any person of such revision or changes. NOTICE TO USER This manual should not be construed as any representation or warranty with respect to the software named herein. Occasionally changes or variations exist in the software that are not reflected in the manual. Generally, if such changes or variations are known to exist and to affect the product significantly, a release note or READ.ME file accompanies the manual and the distribution disks. In that event, be sure to read the release note or READ.ME file before using the product. ii TRADEMARKS Digital Research and its logo, CP/M, and CP/M-86 are registered trademarks of Digital Research Inc. Cardfile, Concurrent, Concurrent DOS 386, Concurrent DOS XM, DR EDIX, DOS Plus and MP/M-86 are trademarks of Digital Research Inc.
    [Show full text]
  • Introducing Digital Sociology
    INTRODUCING DIGITAL SOCIOLOGY Deborah Lupton Department of Sociology and Social Policy, University of Sydney 10 July 2013 Acknowledgement: This document is an earlier version of material that will be published as: Lupton, Deborah (forthcoming) Digital sociology. In Germov, John and Poole, Marilyn (eds), Public Sociology: An Introduction to Australian Society. Crows Nest: Allen & Unwin. This book chapter will have additional teaching material added for its final version. The version here presented may be cited as: Lupton, Deborah (2013) Introducing digital sociology. Sydney: University of Sydney. 1 Introduction: the digital age Digital technologies have become central to the lives of most people living in developed countries and increasing numbers of those in the developing world. Since the introduction of personal computers in the early 1980s and the internet in the early 1990s, those technologies – variously referred to as ‘information communication technologies’ (ICTs) or ‘cyber technologies’ and now frequently called ‘digital technologies’ or ‘the new digital media’ – have reached into many dimensions of everyday life, affecting family and intimate relationships, leisure activities, paid work, education, commerce and the ways in which mass media are presented and consumed. New digital media technologies have had a profound influence on everyday life and social relations for many people in developed societies, and increasingly in developing societies. People across the globe have becoming linked together by digital media and networks
    [Show full text]
  • Fandom, Fanwork Y Aprendizaje No Formal En La Red
    UNIVERSIDAD COMPLUTENSE DE MADRID FACULTAD DE CIENCIAS DE LA INFORMACIÓN TESIS DOCTORAL Fandom, fanwork y aprendizaje no formal en la red MEMORIA PARA OPTAR AL GRADO DE DOCTOR PRESENTADA POR Cristina de los Ríos Izquierdo Directora María Dolores Cáceres Zapatero Madrid © Cristina de los Ríos Izquierdo, 2021 UNIVERSIDAD COMPLUTENSE DE MADRID FACULTAD DE CIENCIAS DE LA INFORMACIÓN FANDOM, FANWORK Y APRENDIZAJE NO FORMAL EN LA RED Cristina de los Ríos Izquierdo. Dirigida por: Dra. María Dolores Cáceres Zapatero. Agradecimientos Gracias a mi directora, por su paciencia infinita y su gran trabajo, sin el cual nunca hubiera podido terminar este proyecto. Gracias a mis padres, que nunca perdieron la fe en que en algún momento la terminaría y me han dado ánimos y apoyo en cada paso del camino. Gracias a mis amigas fans, compañeras infatigables de unos cuantos fandoms , que fueron mis conejillos de indias, que me ayudaron en todo, que no se cansaron de mí en ningún momento. Sois las mejores. Gracias a mis beta-readers , muchísimas gracias. Gracias a todas las aca/fans que conocí en el camino, me ayudasteis muchísimo, un placer y una alegría haberos conocido. Gracias infinitas a todos aquellos fans y miembros de diferentes fandoms que de una manera u otra, me han ayudado a realizar esta tesis. Que me regalaron su tiempo para que los acribillara a preguntas, que contestaron con paciencia un cuestionario larguísimo y aún me animaban y me hacían sugerencias a través de las redes sociales y me seguían retuiteando. Especialmente gracias a Marion, Mrs.Mancuspia, Clara2222, DeyaRedfield, Enia, Agente de Marvel, Sixphanel, Slayerrr, Lizeeeee, Sra.
    [Show full text]
  • DR DOS for the Zfx86
    DR DOS for the ZFx86 Cost Effective, Reliable, Rapid Deployment of Embedded Systems w DR DOS on the ZFx86 gets products to market quickly at the lowest development and ownership cost. w Thousands of compatible applications, drivers and utilities available free or at minimal cost. w Full documentation available. DR DOS 7.03 Key Features of DR DOS Online Manual - DRDOS is supplied with a complete The ideal embedded DOS system, online manual that contains detailed information about all designed for out-of-the-box of the features of the operating system including the basic implementation into ROM or Flash commands, and the advanced utilities. It also has online ROM with tools and associated help available for all its commands. documents available in the DRDOS Memory Management - Memory management features OEM Documentation Kit. include a set of device drivers and commands that enable w 100% MS-DOS 6.22 compatible.. you to manage memory efficiently and make as much memory as possible available to your applications. w Comprehensive DOS utility set DOS Protected Mode Services - DOS Protected Mode w Multitasking, with API for developers Services (DPMS) interface allows specially-implemented w DPMS memory manager in addition to DPMI device drivers and TSRs to operate in extended memory. w Stacker disk compression This makes more memory within the first megabyte w NWCACHE - disk caching program available to applications and other conventionally-written drivers and TSRs. Both Stacker* (the disk compression w EMM386 memory manager program), and NWCACHE (the disk cache) use DPMS. w DOS Protected Mode Services (DPMS) Disk Compression - The disk compression component w Multitasking enables you to store more information by compressing the w DR-DOS provides a full multitasking environment data.
    [Show full text]
  • Visual Social Media and Big Data. Interpreting Instagram Images Posted on Twitter
    Visual Social Media and Big Data Interpreting Instagram Images Posted on Twitter Dhiraj Murthy, Alexander Gross, Marisa McGarry Abstract Social media such as Twitter and Instagram are fast, free, and multi- cast. These attributes make them particularly useful for crisis commu- nication. However, the speed and volume also make them challenging to study. Historically, journalists controlled what/how images repre- sented crises. Large volumes of social media can change the politics of representing disasters. However, methodologically, it is challenging to study visual social media data. Specifically, the process is usually labour-intensive, using human coding of images to discern themes and subjects. For this reason, Studies investigating social media during crises tend to examine text. In addition, application programming interfaces (APIs) for visual social media services such as Instagram and Snapchat are restrictive or even non-existent. Our work uses images posted by Instagram users on Twitter during Hurricane Sandy as a case study. This particular case is unique as it is perhaps the first US disaster where Instagram played a key role in how victims experi- enced Sandy. It is also the last major US disaster to take place before Instagram images were removed from Twitter feeds. Our sample con- sists of 11,964 Instagram images embedded into tweets during a two- week timeline surrounding Hurricane Sandy. We found that the pro- duction and consumption of selfies, food/drink, pets, and humorous macro images highlight possible changes in the politics of representing disasters – a potential turn from top-down understandings of disas- ters to bottom-up, citizen informed views.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • The Softwire Is a Science fiction Novel
    DISCUSSION GUIDE SYNOPSIS DISCUSSION POINTS Thirteen-year-old Johnny Turnbull and his sister, Ketheria, are two of many Before reading: orphans aboard the Renaissance, a spacecraft sailing its way toward a legendary 1. The Softwire is a science fiction novel. Think about the differences and similarities system called the Rings of Orbis. Set to call Orbis their new home after being between science fiction and fantasy. What are some classic science fiction novels raised by the onboard computer since birth, the orphans aren’t sure what to and authors? What makes them classics? Why do certain science fiction novels have such an impact on our culture? expect, but they hope for a life of happiness. 2. Computers and futuristic technology is virtually its own character in The Softwire. To their surprise, however, their arrival brings something much different.The Consider what technological advances have been made in our world in the last orphans quickly discover that they’re to be slaves to their new hosts as a result ten to twenty years. What could our world look like in the future? How has of their parents’ unfulfilled contractual obligations. What’s more, Johnny learns technology made our lives easier and/or more complicated? Be sure to look at that he is a softwire—the first human who can enter computers with his technological changes in your local community, at school, on a national scale, mind — and when Orbis’s central computer begins to malfunction, Johnny and globally. becomes the target of accusations. While reading: 1. Examine the relationship between JT and Switzer.
    [Show full text]
  • Revisiting the Goldenberg Ghosts,Knowing
    Remembering Zindzi, the Other Mandela By Isaac Otidi Amuke On 10 February 1985, the world’s attention was drawn to the courageous defiance of 25-year- old Zindzi Mandela, the youngest of two daughters born to political prisoner Nelson Mandela and anti- apartheid revolutionary Winnie Madikizela-Mandela. The occasion was a rally at Soweto’s Jabulani Stadium organised by the anti-apartheid caucus, the United Democratic Front (UDF), to celebrate the awarding of the Nobel Peace Prize to Johannesburg’s Bishop Desmond Tutu. In the absence of her parents (Mandela in jail and Madikizela-Mandela banned and banished in Brandfort) anti- apartheid stalwart Albertina Sisulu took the role of guardian, standing next to Zindzi. Zindzi sang, danced and occasionally punched her clenched fist into the air to chants of Amandla!, before reading her father’s historic letter to the nation. Apartheid South Africa’s President P.W. Botha had used prison back channels to offer Mandela the option of an early conditional release, having served two decades. In declining Botha’s overtures, Mandela sought to respond through a public communique, hence his decision to deploy Zindzi to the front lines. Zindzi did not disappoint. Having grown into her own as an activist and witness to the barbarism the apartheid state had unleashed on Black South Africans, and especially on the Mandela–Madikizela- Mandela family, Zindzi powerfully delivered the nine-minute message, which was punctuated by recurring recitals of ‘‘my father and his comrades”. Her chosen refrain meant that Zindzi wasn’t only relaying Mandela’s words, but was also speaking on behalf of tens of political prisoners who lacked a medium through which to engage the masses.
    [Show full text]