Article-01-Final

Total Page:16

File Type:pdf, Size:1020Kb

Article-01-Final Biblio Tech Editor: Marc Donner, [email protected] AI Bites Man? ver the years, people have explored the broader Cyberpunk MARC and its roots DONNER implications of many seminal ideas in technology These works naturally evolved into a Department scarier version of the future. Cyber- Editor through the medium of speculative fiction. Some punk, one of the most fascinating threads in speculative fiction, is epito- of these works tremendously influenced the tech- mized in the work of William Gib- O son, who startled us many years ago nical community, as evidenced by the broad suffusion of terms into with a short story called “Johnny Mnemonic,” now included in the 1986 collection Burning Chrome (and its working vocabulary. When that is clearly derived from our own made into an unsuccessful 1995 Robert Morris disrupted the bur- but that makes a few technically plau- movie starring Keanu Reeves). Cy- geoning Internet in 1988, for ex- sible changes to our underlying as- berpunk stories generally feature a ample, the computer scientists try- sumptions. Vernor Vinge’s True dystopic world in the near or distant ing to understand and counteract Names represents such a world, in future in which technologies emerg- his attack quickly deemed the of- which the size and power of com- ing today have changed the ground fending software a “worm,” after a puter systems has grown to the point rules of life. term first introduced in John where artificial intelligence capable of Brunner’s seminal 1975 work, The passing the Turing test is beginning to 1949 Shockwave Rider. Brunner’s book emerge. Vinge’s most fascinating There isn’t a straight line from worlds launched several terms that became speculations involve the genesis and that resemble ours to cyberpunk. The standard labels for artifacts we see utility of these artificial intelligences, genre morphed over the years and today, including “virus.” and he explores the notion that AI decades through a variety of novels. In future installments of this de- might emerge accidentally, a theme Although cyberpunk is most strongly partment we’ll look at the important that appears elsewhere in books like identified with William Gibson, its writers, thinkers, works, and ideas in Robert A. Heinlein’s The Moon is a roots go much further back—all the speculative fiction that have got us Harsh Mistress and in Thomas J. way to George Orwell’s Nineteen thinking about the way technological Ryan’s The Adolescence of P-1. Eighty-Four. change could affect our lives. This is In True Names, Vinge suggests a In 1949, when Orwell published not to imply that science fiction writ- radical use for such AI capabilities, the book that is now a staple of US ers represent a particularly prescient namely the preservation of the self high-school curricula, television was bunch—I think the norm is ray guns beyond the body’s death. Forget still a novelty in most households, al- and spaceships—but when they’re cryogenically freezing your brain or though the technology itself had good, they’re very good. And what- body in hope that someone will been around for 20 years. With TV’s ever gets us thinking is good. “cure” old age, he says—instead, fig- successful integration into modern To get started, let’s take a look at ure out how to save the contents of life, Orwell’s vision of a totalitarian some of the key subgenres and eras in your memory and the framework of future in which governmental con- science fiction’s history (see the “In- your personality in a big enough trol is mediated through two-way fluential Books” sidebar, p. 65). computer. If this AI passes the Turing television feels somewhat dated. test, then certainly your friends and Anyway, Orwell’s mastery of the lan- Worlds relatives won’t be able to tell the dif- guage and deep insights into many like our own ference. But will you know you’re human issues, including the relation- Some of the best (and earliest) science there? Will this AI be self-aware? ship between memory and truth (as fiction work speculates on a world Will it have a soul? Winston Smith discovers when he PUBLISHED BY THE IEEE COMPUTER SOCIETY I 1540-7993/03/$17.00 © 2003 IEEE I IEEE SECURITY & PRIVACY 63 Biblio Tech those of the 1969 world that pub- lished the book. Editor’s Intro Brunner, writing six years later, explores more fundamental ques- n this department, we will explore a range of thinking about the way techno- tions of identity and human relation- Ilogical change might affect our lives. We won’t consider just any science fiction ships in a future world in which a vast story that seems attractive. We want a set of works and authors proved to be sig- global network of computers has nificant, even if they only speculate on a world that is clearly derived from our own. changed the dynamic. This world is We seek submissions from engineers, scientists, and writers on these topics. scary and alien, although not as scary Reviews of individual works or of groups of related works are welcome. We would and alien as the one that Gibson like interesting interviews with prominent creators of speculative fiction, whether would reveal just six years later. authors, screenwriters, or directors. Any work that relates or did relate current Brunner makes clear the scariness of events in technology to possible future impacts is fair game. an entirely digitally mediated iden- Send your submissions, ideas, and comments to Marc Donner, donner@ tity early in the book when Nicky tinho.net. Halflinger’s entire world—electric power, telephone, credit, bank ac- counts, the works—is turned off in starts a diary and discovers the sub- ine living and finding happiness. I revenge for a verbal insult. versive power of a historical record) cherish the humor and the optimism Like Star Wars two years later, the have prevented obscurity. about relationships between artificial technological marvels of The Shock- An open question is whether new and natural intelligences that led wave Rider are a bit creaky and imper- technology tips the balance toward Heinlein to name the leading human fect, rendering them adjuncts to a central control, as Orwell feared, or character Manuel just so Mike the plausible future world rather than toward liberty, as many have specu- computer could say things to him central artifacts worthy of attention lated when considering the role of like, “Man, my best friend.” themselves. This is characteristic of faxes, photocopiers, and even the In- Things were changing rapidly in this genre’s best writing—it validates ternet in the collapse of the former the technical world in 1969 as well. the importance of technology by pay- Soviet Union. Dating back to that year, all the docu- ing only peripheral attention to the ments that have described and de- technology itself. 1969 fined the Internet have been numbers In the technical world, Vint Cerf, Heinlein’s thinly veiled romance of in the RFC (Requests for Com- Yogen Dalal, and Carl Sunshine pub- the American Revolution, The Moon ments) series. Each document is lished RFC 675 “Specification of In- is a Harsh Mistress, begins with Manuel numbered sequentially, starting with ternet Transmission Control Pro- Garcia O’Kelly’s discovery that the RFC 1. RFC 4 (see www.faqs.org/ gram” in December 1974, making it Lunar Authority’s central computer rfcs/rfc4.html) is dated 24 March the earliest RFC with the word “In- (“Mike”) has become conscious and is 1969. It documents the Arpanet, ternet” in the title. In November developing a sense of humor. I still use which would later become known as 1975, Jon Postel published RFC 706 Heinlein’s observation that some jokes the Internet, as having four nodes. “On the Junk Mail Problem.” are “funny once” in teaching my own Two years later, Intel would introduce young son about humor. its 4004, the first commercial micro- 1977 As with True Names, Mike acci- processor. The 4004 had a 4-bit-wide In 1977, Macmillan published Thomas dentally reaches a level of complexity arithmetic logic unit (ALU) and was J. Ryan’s novel The Adolescence of P-1. It that mystically tips it over the edge developed for use in a calculator. was an age when vinyl records had to from being a machine to being a per- be turned over, when everyone son. Among Mike’s numerous 1975 smoked (although not tobacco), when achievements that anticipate contem- The Shockwave Rider is more about the 256 Mbytes of core was an amount be- porary technological progress is the potential role of computers, net- yond imagination, and when a charac- creation of a synthetic person, Adam works, and technology in society than ter in a book could refer to 20,000 ma- Selene, presented entirely through The Moon is a Harsh Mistress. In Hein- chines as “all the computers in the video and audio. lein’s work, the computer’s role is not country.” Unlike the cyberpunk main- much different than that of a person In Ryan’s book, as in Heinlein’s, stream, which Heinlein anticipated with magical powers. The computer’s computer intelligence emerges acci- by over a decade, Mistress shows a accomplishments are technically dentally, although in this case by the world vastly different from this one plausible, but the operational aspects networking of many computers but in which most of us could imag- of Heinlein’s society are much like rather than through the assembly of a 64 JANUARY/FEBRUARY 2003 I http://computer.org/security/ Biblio Tech large single machine.
Recommended publications
  • The Transhumanist Reader Is an Important, Provocative Compendium Critically Exploring the History, Philosophy, and Ethics of Transhumanism
    TH “We are in the process of upgrading the human species, so we might as well do it E Classical and Contemporary with deliberation and foresight. A good first step is this book, which collects the smartest thinking available concerning the inevitable conflicts, challenges and opportunities arising as we re-invent ourselves. It’s a core text for anyone making TRA Essays on the Science, the future.” —Kevin Kelly, Senior Maverick for Wired Technology, and Philosophy “Transhumanism has moved from a fringe concern to a mainstream academic movement with real intellectual credibility. This is a great taster of some of the best N of the Human Future emerging work. In the last 10 years, transhumanism has spread not as a religion but as a creative rational endeavor.” SHU —Julian Savulescu, Uehiro Chair in Practical Ethics, University of Oxford “The Transhumanist Reader is an important, provocative compendium critically exploring the history, philosophy, and ethics of transhumanism. The contributors anticipate crucial biopolitical, ecological and planetary implications of a radically technologically enhanced population.” M —Edward Keller, Director, Center for Transformative Media, Parsons The New School for Design A “This important book contains essays by many of the top thinkers in the field of transhumanism. It’s a must-read for anyone interested in the future of humankind.” N —Sonia Arrison, Best-selling author of 100 Plus: How The Coming Age of Longevity Will Change Everything IS The rapid pace of emerging technologies is playing an increasingly important role in T overcoming fundamental human limitations. The Transhumanist Reader presents the first authoritative and comprehensive survey of the origins and current state of transhumanist Re thinking regarding technology’s impact on the future of humanity.
    [Show full text]
  • Cyberpunk and Dystopia: William Gibson, Neuromancer (1984)
    13. CYBERPUNK AND DYSTOPIA: WILLIAM GIBSON, NEUROMANCER (1984) LARS SCHMEINK 1. Background 1.1 Terminologies and Definitions As with any literary genre, a clear-cut definition of cyberpunk is hard to find. Among scholars of science fiction (sf), many differentiate between a historical group of writers who met at the beginning of the 1980s, were originally known as ‘the Movement’, and consisted of William Gibson (*1948), Bruce Sterling (*1954), John Shirley (*1953), Rudy Rucker (*1946) and Lewis Shiner (*1950), and a sub-genre of science fiction that emerged at that time with that group but soon expanded beyond it. Its themes were appropriated and re-imagined by other authors, its tropes transported into other media and the subculture became absorbed into the mainstream, something that the propo- nents of the Movement deemed the death of cyberpunk (cf. Sterling 1998; Shiner 1991). Thomas Foster, however, points out, that “the transformation of cyberpunk into a full-fledged concept rather than a loose association of writers” needs to be under- stood not as its death but rather as “a sea change into a more generalized cultural for- mation” (2005: xiv). The term itself originated in the title of a short story by Bruce Bethke, but was used to refer to a specific sub-genre of sf writing by Gardner Dozois in order to describe an “80s generation in sf” adhering to a specific set of “goals and aesthetics” (1984: 9; cf. Heuser 2003: 7). These goals and aesthetics have been best documented by author Bruce Sterling, who as a preface to his Mirrorshades anthology has written the ultimate “Cyberpunk Manifesto” (1986).
    [Show full text]
  • True Nyms and Crypto Anarchy
    True Nyms and Crypto Anarchy Timothy C. May One of the biggest issues in cyberspace these days, one that will continue to be an issue as long as there is such a venue as the Internet, is the safety of communication from prying eyes. In the detailed and persuasive essay that follows, Tim May, formerly a physicist at Intel and one of the founding members of the Cypherpunks, discusses the big issues involved—invasion of privacy, the specter of government interference in personal affairs, the use of electronically forwarded information by a variety of people, entities, and organizations for purposes other than those intended by the forwarder … these are all issues of tremendous importance to anyone who uses the Internet —and that means just about everyone, in one way or another. In a previous age, these issues were not of such great importance, for there was never the possibility that anyone could find and gather enough information to do harm to others in the ways that are now possible with the Internet. Today, however … Read Tim May’s essay and you’ll never feel quite as safe as you did a moment before you read these pages. This article was written in 1996. 25 The Impact of True Names “True Names” came to my attention in 1986, when a friend of mine gave me a dog-eared Xerox copy and said “You need to read this.” But before I even started reading this samizdat edition, the Bluejay Books trade paperback edition appeared and that’s what I read, saving my eyesight and giving Vernor Vinge his proper cut of the action.
    [Show full text]
  • The Cyberspace Concept Cyberpunk: the Idea William Gibson Computer
    Cyberpunk: The Idea Term coined in by Bruce Bethke The Cyberspace Concept punk part reflects streetwise attitude Tone tends to be dark, cynical Immersion in computer generated, shared worlds is a key theme Social Informatics Other themes Alteration of human bodies, genes Thomas Haigh Popular culture, music, media power Week 10 Critical of corporate power Often romantic, rebellious Social Informatics - Cyberspace 1 Social Informatics - Cyberspace 2 William Gibson Computer Technology in SF Creates idea of cyberspace Common by mid-1950s Best known in novel Necromancer, 1984 Futuristic technology lags history Early appearance in short story “Burning Chrome” Big, expensive, central computers Science fiction writer then living in Used mostly for mathematics Canada Nobody much predicts No particular knowledge of computers Personal computer Writes Neuromancer & earlier stories on manual typewriter Microchips, miniaturization Imagines technology in very visual, Interactive graphics impressionistic kind of way Main extrapolation is artificial intelligence Vivid, spatial, seedy (film noir influence) Often arrives spontaneously Social Informatics - Cyberspace 3 Social Informatics - Cyberspace 4 Networking: Science Fiction Gibson’s Cyberspace Famously defined as “consensual hallucination” for Little realistic treatment pre-1980 exchange of data Very much like real space John Brunner, Shockwave Rider, 1975 invents idea of computer “worm” Big mainframes are like skyscrapers Valuable data is protected Vernor Vinge, “True
    [Show full text]
  • True Names: and the Opening of the Cyberspace Frontier Pdf, Epub, Ebook
    TRUE NAMES: AND THE OPENING OF THE CYBERSPACE FRONTIER PDF, EPUB, EBOOK Vernor Vinge | 352 pages | 01 Jan 2002 | St Martins Press | 9780312862077 | English | New York, United States True Names: and the Opening of the Cyberspace Frontier PDF Book May "Eventful History: Version 1. The author hints at some beginning of global order because of this and that some part of Erythrina will live even after she's dead. They're academic though and by comparison, the essays seem ponderous and inflated. I'm listening to two podcasts covering Gene Wolfe. The basic idea in True Names is simplified, and popularised, in the Terminator series of movies. VV: In , I had been teaching computer science courses for several years; I did a lot of what is now called telecommuting. Tldr I can't complain about the ideas. Heath , Hardcover 4. Or that they will even want to. Dave Hutchinson: Acadie 1 story, completed. Every porthole shed light. Made up of: The Language of Clifford D. Is this future on schedule? VV: There are many things in the Zones stories -- and most of my other stories -- that were inspired by Poul's ideas. Vinge established himself as a genre leader with this novella. At the same time, government attempts to restrict or control aspects of the Internet raised concerns over the abrogation of First Amendment rights. Jul 26, Peter Birdsall rated it really liked it. The only habitable planet in the system is Arachna which has a race of beings that resemble, and are nicknamed, Spiders. Gillies, James, and R. Readers also enjoyed.
    [Show full text]
  • PDF Download True Names and the Opening of the Cyberspace
    TRUE NAMES AND THE OPENING OF THE CYBERSPACE FRONTIER 2ND EDITION PDF, EPUB, EBOOK Vernor Vinge | 9780312862077 | | | | | True Names and the Opening of the Cyberspace Frontier 2nd edition PDF Book Goodreads helps you keep track of books you want to read. Here is a quick description and cover image of book True Names and the Opening of the Cyberspace Frontier written by Vernor Vinge which was published in About Vernor Vinge. While frontier villagers sometimes welcome the assurance of safety that the Hellknights bring, free thinkers and historians chafe at the restrictions on movement and expression that armigers enforce. Bob Walters Illustrator ,. Yeah, I'm getting old. Picture if Hackers used World Of Warcraft nowadays to take control of the cyber world. No trivia or quizzes yet. Vernor Vinge. All the excitement about how innovative True Names was becaus I imagine the ideas presented were pretty cool at the time. In Vinge projected networked computing into fantasy worlds, anonymity, privacy, digitally distributed information, distributed computing, and computational power overthrowing political power. Add to cart. April 28, The novella is a fun and interesting read, and the foreword by Vinge and afterword by Marvin Minsky made this book worth 10x the price of admission. Vernor Vinge, a man as unusual as his name which looks as if it came from the science-fiction props cupboard , was, by day, a distinguished mathematician. But, as I do not judge a book by its covers, I decided to judge True Names by its core novelette, which is visionary and smart. Other aspects of the plot are also well done, and I found the female protagonist Erythrina well written.
    [Show full text]
  • Being in the World (Of Warcraft): Raiding, Realism, and Knowledge Production in a Massively Multiplayer Online Game
    Being in the World (of Warcraft): Raiding, Realism, and Knowledge Production in a Massively Multiplayer Online Game Alex Golub University of Hawaii Anthropological Quarterly, Vol. 83, No. 1, pp. 17–46, ISSN 0003-549. © 2010 by the Institute for Ethnographic Research (IFER) a part of the George Washington University. All rights reserved. Abstract This paper discusses two main claims made about virtual worlds: first, that people become “immersed” in virtual worlds because of their sensorial realism, and second, because virtual worlds appear to be “places” they can be studied without reference to the lives that their inhabitants live in the actual world. This paper argues against both of these claims by using data from an ethnographic study of knowledge production in World of Warcraft. First, this data demonstrates that highly-committed (“immersed”) players of World of Warcraft make their interfaces less sensorially realistic (rather than more so) in order to obtain useable knowledge about the game world. In this case, immersion and sensorial realism may be inversely correlated. Second, their commitment to the game leads them to engage in knowledge-making activities outside of it. Drawing loosely on phenomenology and contemporary theorizations of Oceania, I argue that what makes games truly “real” for players is the extent to which they create collective projects of action that people care about, not their imitation of sensorial qualia. Additionally, I argue that while purely in-game research is methodologically legitimate, a full account of member’s lives must study the articulation of in-game and out-of-game worlds and trace people’s engagement with virtual worlds across multiple domains, some virtual and some actual.
    [Show full text]
  • True Names, True Nyms. the Power of Technology and the Future of Identity
    Messages, Sages and Ages, Vol. 6, No. 1, (2019) DOI: 10.5281/zenodo.3365564 Enrico Beltramini Department of Religious Studies, Notre Dame de Namur University, Belmont, California, United States [email protected] TRUE NAMES, TRUE NYMS. THE POWER OF TECHNOLOGY AND THE FUTURE OF IDENTITY “There's a truism among science–fiction writers that science fiction may look like it's talking about the future but really it's just a mirror of the present.” Vernor Vinge (Yonck, 2008)1 Abstract This essay argues that for cypherpunk activists, the power of technology over individuals and the nature of people’s identity provide the points of difference with cyberpunk writers. For the cyberpunks, identities are framed in context, so that an aggressive elite can adopt technology to disempower the mass of citizens. For the cypherpunks, identities are instead autonomous from context; therefore, citizens can use technology for self-empowerment. The paper also deals with the future of identity. Key words: cyberpunk, cypherpunk, name, pseudonym, identity Introduction In the early nineties, a group of cryptography experts, electronic engineers, technology entrepreneurs, and political writers called ‘cypherpunks’ gave life to ideas like online self-organized communities promoted through the use of encrypted technologies. The ‘cypher’ part of the word relates to the British spelling of ‘cypher.’ The ‘punk’ part of the word comes from the cultural movement of the 1970s, where ‘punk’ in this context means streetwise, aggressive, and offensive to the establishment. A punk is the result both of reaction to a corrupted establishment and disillusion towards the countercultural utopias. Thus, the cyberpunks aggressively resisted the rise of political and corporate control over the cyberspace through an aggressive use of encrypted technologies.
    [Show full text]
  • Techno-Innocence and Cyber-Rapture in William Gibson's Neuromancer
    Techno-Innocence and Cyber-Rapture in William Gibson’s Neuromancer 117 Krzysztof K. Kietzman Between Eden and Utopia: Techno-Innocence and Cyber-Rapture in William Gibso n’s Neuromancer Constructs of Innocence in Cyberpunk Fiction Cyberpunk surfaced as a subgenre of science fiction in the 1980s to popular and critical acclaim. Among the writers who laid the genre’s foundations were Pat Cadigan, William Gibson, and Bruce Sterling. In the 90s, the flagship writers of cyberpunk and its latest offspring—postcyberpunk—were Greg Egan and Neal Stephenson. As of the most recent decade, its legacies are continued in the writings of Paolo Bacigalupi, Ian McDonald, and Charles Stross. Furthermore, cyberpunk has garnered considerable interest among postmodernist critics. Brian McHale asserts that while “there are few . absolute novelties in cyberpunk SF” and all its motifs have had “precedents in earlier SF,” the subgenre’s novel character stems rather from its “shift of dominance” to particular motifs and its dismissal of outmoded motifs within the general science-fiction repertoire (150). In other words, cyber- punk foregrounded a specific “motif complex” (McHale 150), one neither featured nor practiced before in this particular fashion within science-fiction literature. Scholars appreciated cyberpunk for its foregrounding of (dis)embodiedness, its social-liberationist political potential (D. Haraway), and its textual exploration of ontological motifs (B. McHale). Despite cyberpunk’s stellar success, the subgenre had been in fact born out of failure—the failure of science-fiction literature prior to the 1980s1 to live up to its core promise. For the dedicated readers of science fiction, its touchstone had always been its successful efforts at extrapolating from the present and making accurate predictions about the future.
    [Show full text]
  • “STARING INTO the SINGULARITY” and OTHER POSTHUMAN TALES: TRANSHUMANIST STORIES of FUTURE CHANGE
    History and Theory 60, no. 2 (June 2021), 215-233 © 2021 The Author. History and Theory published by Wiley Periodicals LLC on behalf of Wesleyan University DOI: 10.1111/hith.12203 ITERATIONS HISTORICAL FUTURES “STARING INTO THE SINGULARITY” AND OTHER POSTHUMAN TALES: TRANSHUMANIST STORIES OF FUTURE CHANGE APOLLINE TAILLANDIER1 ABSTRACT In this article, I conduct a contextual analysis of transhumanist conceptions of posthuman futures. Focusing on cryonics, nanotechnology, and artificial superintelligence technological projects through a study of primarily American sources from the 1960s onward, I identify three distinct conceptualizations of the posthuman future: Promethean, spontaneous, and scalar. I argue that transhumanists envision posthumanity as resulting from a transition that involves both continuity and radical change. Although these three posthuman futures appear to share an interest in predicting a superior “cosmic” realization of human destiny, they involve distinct “liberal” conceptions of historical agency. These include the unlimited indi- vidual liberty of the technologized self, the knowledge-ordering properties of the market, and the rational aggregation of individual interests over the long term. I locate these heterogeneous and partly conflicting conceptions of historical agency in the context of the postwar crisis and remaking of liberalism’s future. I argue that transhumanist ideas about the transition toward a more-than-human or beyond-human future are best understood as manifesting a wide range of attempts at thinking about horizons of unprecedented change within the terms of postwar liberal projects. Ultimately, transhumanist futures shed light on the multiplicity of political temporalities that are required for thinking and writing stories about unprecedented futures. Keywords: humanity, posthumanity, transhumanism, cosmic futures, connective and discon- nective futures The Singularity may be counterintuitive to you, but you grew up in Real Life, where the Laws are constant and things change over decades.
    [Show full text]
  • The Politics of Magic: Fantasy Media, Technology, and Nature in the 21St Century Ted Friedman, Georgia State University, USA
    The Politics of Magic: Fantasy Media, Technology, and Nature in the 21st Century Ted Friedman, Georgia State University, USA The 2000s have been a decade of fantasy media. Two fantasy film series begun in 2001, The Lord of the Rings and Harry Potter, have now combined to produce eight of the twenty highest-grossing films of all time (Box Office Mojo, 2008). Fantasy authors such as Neil Gaiman, Susannah Clarke, and Philip Pullman have crossed over beyond the SF/fantasy niche to produce bestselling, critically acclaimed books. And massively multiplayer role-playing games such as World of Warcraft have hooked millions of subscribers and generated entire virtual societies. Fantasy has become so ubiquitous, so quickly, that we may forget how unprecedented its prominence is. While the fantasy genre sports a rich literary history -- one could argue that it is the modern inheritor of the vast traditions of mythology -- it spent the bulk of the twentieth century as a marginalized field, dismissed as escapism for children and arrested adolescents. Even within the genre ghetto, it rarely achieved the crossover success or critical respectability of its doppelganger, science fiction. While SF novelists such as Isaac Asimov, Ray Bradbury, and Robert Heinlein reached mass audiences, only J.R.R. Tolkien among fantasy writers found similar influence. While classic SF films such as 2001: A Space Odyssey (1968) and Blade Runner (1982) were acclaimed as prescient masterworks, no parallel canon of fantasy film emerged. The critical literature on fantasy film is dwarfed by the work on science fiction film. (Two rare exceptions are Bellin [2005] and Worley [2005].) And while the most commercially successful film series of the century, Star Wars (begun in 1977), borrowed much from fantasy, it transformed its swords and sorcery into light sabers and spaceships, disavowing the genre trappings of fantasy for the seemingly more relevant world of science fiction.
    [Show full text]
  • Singular Visionary
    Singular Visionary Sci­fi master/math nerd Vernor Vinge believes that machines are about to rule the human race as humans have ruled the animal kingdom. By Kevin Kelly Three years before William Gibson described cyberspace so convincingly in his novel Neuromancer, science fiction writer Vernor Vinge had envisioned a visual MUD­like cyberspace in his landmark novella, True Names. In Vinge's world, virtual agents mingle among automata and people operating behind elaborate personae. Many Net veterans cite True Names as a seminal influence that shaped their ideas about Net policy. First published in 1981, True Names grappled with the tricky issues now spreading over the Net: Can there be privacy? Should anonymity be tolerated? Why not have multiple identities? And who should know your true name? Author Vinge is a mathlete ­ an associate professor of math sciences at San Diego State University; he sold his first science fiction story in 1964. Besides True Names, he has written A Fire Upon the Deep (which won a Hugo in 1993 for best novel) and is working on that story's prequel. Wired: In True Names, you describe a global computer network that, by providing the graphical illusion of an artificial world, allows users to interact with people thousands of miles away without knowing their true identities. It became a cult classic among hackers and presaged everything from Internet interactive games to Neuromancer. Where did the idea come from? Vinge: In '78 or '79, our university got a little PDP­11/44 with a few dial­in lines. In order to work from home, I bought myself an enormously expensive display with a keyboard and a 300­baud modem.
    [Show full text]