Skip to main content

Home/ Writing about Literature in the Digital Age/ Group items tagged Of

Rss Feed Group items tagged

Audrey B

Electronic Civil Disobedience and the World Wide Web of Hacktivism: - 1 views

  • In the spring of 1998, a young British hacker known as "JF" accessed about 300 web sites and placed anti-nuclear text and imagery. He entered, changed and added HTML code. At that point it was the biggest political hack of its kind. Since then, and increasingly over the course of the year, there were numerous reports of web sites being accessed and altered with political content.
  • By no means was 1998 the first year of the browser wars, but it was the year when electronic civil disobedience and hacktivism came to the fore, evidenced by a front page New York Times article on the subject by the end of October. Since then the subject has continued to move through the media sphere.
  • computerized activism, grassroots infowar, electronic civil disobedience, politicized hacking, and resistance to future war
  • ...47 more annotations...
  • these five portals seem to provide a useful starting point for a more in-depth, yet to come, examination of the convergence of activism, art, and computer-based communication and media.
  • PeaceNet enabled - really for the first time - political activists to communicate with one another across international borders with relative ease and speed.
  • The international role of email communication, coupled to varying degrees with the use of the Fax machine, was highlighted in both the struggles of pro-democracy Chinese students and in broader trans-national movements that lead to the dissolution of the Soviet Union.
  • the role of international email communication in linking together the world.
  • an overarching dominant paradigm that privileges discourse, dialogue, discussion and open and free access.
  • So the first portal of Computerized Activism is important for understanding the roots of today’s extraparliamentarian,
  • Computerized activism, defined more purely as the use of the Internet infrastructure as a means for activists to communicate with one another, across international borders or not, is less threatening to power than the other types of uses we see emerging in which the Internet infrastructure is not only a means toward or a site for communication, but the Internet infrastructure itself becomes an object or site for action.
    • Audrey B
       
      Twitter, YouTube, other forms of social networking that provide communication within the Internet infrastructure to become an "object or site for action"...
  • Infowar here refers to a war of words, a propaganda war. Grassroots infowar is the first step, the first move away from the Internet as just a site for communication and the beginning of the transformation from word to deed.
  • emerge fully cognizant they are on a global stage, telepresent across borders, in many locations simultaneously.
  • a desire to push words towards action. Internet media forms become vehicles for inciting action as opposed to simply describing or reporting.
  • war of words
  • war of words
  • war of words
  • lists, newsgroups, discussion lists, and web sites
  • A primary distinction, then, between earlier forms of computerized activism and forms of grassroots infowar is in the degree of intensity. Coupled with that is the degree to which the participants are noticed and seen as a force.
  • in grassroots infowar comes the desire to incite action and the ability to do so at a global scale.
  • Within a matter of days there were protests and actions at Mexican consulates and embassies all over the world
  • At the end of 1997, news of the Acteal massacre in Chiapas, in which 45 indigenous people were killed, quickly spread through global pro-Zapatista Internet networks.
  • following there has been a shift, the beginning of the move toward accepting the Internet infrastructure as both a channel for communication and a site for action.
    • Audrey B
       
      channel for communication=computerized activism. a Site for action= grassroots infowar...Combining the two leads to Electronic Civil Disobedience
  • tactics of trespass and blockade from these earlier social movements and are experimentally applying them to the Internet.
  • A typical civil disobedience tactic has been for a group of people to physically blockade, with their bodies, the entranceways of an opponent's office or building or to physically occupy an opponent's office -- to have a sit-in.
  • utilizes virtual blockades and virtual sit-ins
  • an ECD actor can participate in virtual blockades and sit-ins from home, from work, from the university, or from other points of access to the Net.
  • a theoretical exploration of how to move protests from the streets onto the Internet.
  • street protest, on-the-ground disruptions and disturbance of urban infrastructure and they hypothesize how such practices can be applied to the Internet infrastructure
  • after the 1997 Acteal Massacre in Chiapas, there was a shift toward a more hybrid position that views the Internet infrastructure as both a means for communication and a site for direct action.
  • Electronic Civil Disobedience is the first transgression, making Politicized Hacking the second transgression and Resistance to Future War the third.
  • The realization and legitimization of the Internet infrastructure as a site for word and deed opens up new possibilities for Net politics, especially for those already predisposed to extraparliamentarian and direct action social movement tactics.
  • In early 1998 a small group calling themselves the Electronic Disturbance Theater had been watching other people experimenting with early forms of virtual sit-ins. The group then created software called FloodNet and on a number of occasions has invited mass participation in its virtual sit-ins against the Mexican government.
  • FloodNet to direct a "symbolic gesture" against an opponent's web site.
  • it launched a three-pronged FloodNet disturbance against web sites of the Mexican presidency, the Frankfurt Stock Exchange, and the Pentagon, to demonstrate international support for the Zapatistas, against the Mexican government, against the U.S. military, and against a symbol of international capital.
  • hacks into Mexican government web sites where political messages have been added to those sites.
  • the young British hacker named "JF" who hacked into around 300 web sites world wide and placed anti-nuclear imagery and text. This method has been tried by a number of groups.
  • while ECD actors don’t hide their names, operating freely and above board, most political hacks are done by people who wish to remain anonymous. It is also likely political hacks are done by individuals rather than by specific groups.
  • As already stated there are critiques aimed at the effectiveness and the appropriateness of cyber-protests. In terms of effectiveness, three closely related types of questions have appeared regarding political, tactical, and technical effectiveness. Concerning appropriateness there are ethical questions, that may be also considered as political questions, and of course there are legal questions. Some of the legal concerns raise issues of enforceability and prosecuteability.
  • Are these methods of computerized activism effective?
  • If the desired goal of hacktivism is to draw attention to particular issues by engaging in actions that are unusual and will attract some degree of media coverage, then effectiveness can be seen as being high.
  • Rather hacktivism appears to be a means to augment or supplement existing organizing efforts, a way to make some noise and focus attention.
  • a period of expansion, rather than contraction.
  • To judge blocking a web site, or clogging the pipelines leading up to a web site, is to take an ethical position. If the judgement goes against such activity, such an ethical position is likely to be derived from an ethical code that values free and open access to information.
  • While it is true that some forms of hacktivity are fairly easy to see as being outside the bounds of law - such as entering into systems to destroy data - there are other forms that are more ambiguous and hover much closer to the boundary between the legal and the illegal. Coupled with this ambiguity are other factors that tend to cloud the enforceability or prosecuteability of particular hacktivist offenses. Jurisdictional factors are key here. The nature of cyberspace is extraterritorial. People can easily act across geographic political borders, as those borders do not show themselves in the terrain. Law enforcement is still bound to particular geographic zones. So there is a conflict between the new capabilities of political actors and the old system to which the law is still attached. This is already beginning to change and legal frameworks, at the international level, will be mapped on to cyberspace.
  • It seems that hacktivity has met and will meet resistance from many quarters. It doesn't seem as if opposition to hacktivist ideas and practices falls along particular ideological lines either.
  • hacktivism represents a spectrum of possibilities that exists in some combination of word and deed.
  • What remains unclear about hacktivism emerges when we start to ask questions like: what does this mean and where is this going?
    • Audrey B
       
      Twitter. At 3:30 people log/hack on to Twitter and form blockades so that Iranians can voice their beliefs and feelings towards the government in 140 characters. People are also hacking and creating proxy sites that allow Iranians to get online.
  • Theorizing about grassroots or bottom-up Information Warfare doesn't nearly get as much attention as the dominant models and as a consequence there is not much written on the subject. 11 The case of the global pro-Zapatista networks of solidarity and resistance offers a point of departure for further examination of grassroots infowar. One feature of Zapatista experience over the course of the last 5 years is that it has been a war of words, as opposed to a prolonged military conflict. This is not to say there isn't a strong Mexican military presence in the state of Chiapas. Quite the contrary is true. But fighting technically ended on January 12, 1994 and since then there has been a ceasefire and numerous attempts at negotiation.12 What scholars, activists, and journalists, on both the left and the right, have said is that the Zapatistas owe their survival at this point largely to a war of words. This war of words, in part, is the propaganda war that has been successfully unleashed by Zapatista leaders like Subcommandante Marcos as well as non-Zapatista supporters throughout Mexico and the world. Such propaganda and rhetoric has, of course, been transmitted through more traditional mass communication means, like through the newspaper La Jornada. 13 But quite a substantial component of this war of words has taken place on the Internet. Since January 1, 1994 there has been an explosion of the Zapatista Internet presence in the forms of email Cc:
  • Because of the more secret, private, low key, and anonymous nature of the politicized hacks, this type of activity expresses a different kind of politics. It is not the politics of mobilization, nor the politics that requires mass participation. This is said not to pass judgement, but to illuminate that there are several important forms of direct action Net politics already being shaped.
  • hackers' desires to make information free.
  •  
    Concrete article for paper
Allison Frost

China's Orwellian Internet | The Heritage Foundation - 0 views

  • However, for China's 79 million Web surfers-the most educated and prosperous segment of the country's popula­tion-the Internet is now a tool of police surveil­lance and official disinformation.
  • Democratic reform in China is highly unlikely to come from the top down, that is, from the Chi­nese Communist Party. It will have to emerge from the grass roots. If the Internet is to be a medium of that reform, ways will need to be found to counter China's official censorship and manipulation of digital communications. The cultivation of demo­cratic ideals in China therefore requires that the U.S. adopt policies that promote freedom of infor­mation and communication by funding the devel­opment of anti-censorship technologies and restricting the export of Internet censoring and monitoring technologies to police states.[
  • As the central propaganda organs and police agencies maintain and tighten their grips on information flow and private digital communications, the average Chinese citizen now realizes that political speech on the Internet is no longer shrouded in anonymity: Private contacts with like-minded citizens in chat rooms, or even via e-mail text messaging, are not likely to escape police notice.
  • ...5 more annotations...
  • On July 31, 2004, hundreds of villagers of Shiji­ahecun hamlet in rural Henan province demon­strated against local corruption. Provincial police from the capital at Zhengzhou dispatched a large anti-riot unit to the village, which attacked the crowd with rubber bullets, tear gas, and electric prods.[12] Propaganda officials immediately banned media coverage of the incident, and the outside world might not have learned of the clash if an intrepid local "netizen" had not posted news of it on the Internet. The Web correspondent was quickly identified by Chinese cybercops and arrested during a telephone interview with the Voice of America on August 2. While the infor­mant was on the phone with VOA interviewers in Washington, D.C., he was suddenly cut short, and the voice of a relative could be heard in the back­ground shouting that authorities from the Internet office of the Zhengzhou public security bureau (Shi Gonganju Wangluchu) had come to arrest the interviewee. After several seconds of noisy strug­gle, the telephone connection went dead
  • In January 2004, Amnesty International documented 54 cases of individuals arrested for "cyberdissent," but concluded that the 54 cases were probably just "a fraction" of the actual number detained.[
  • In April 2004, The Washington Post described a typical cyberdissidence case involving a group of students who were arrested for participating in an informal discussion forum at Beijing University. It was a chilling report that covered the surveillance, arrest, trial, and conviction of the dissidents and police intimidation of witnesses. Yang Zili, the group's coordinator, and other young idealists in his Beijing University circle were influenced by the writings of Vaclav Havel, Friedrich Hayek, and Samuel P. Huntington. Yang questioned the abuses of human rights permitted in the "New China." His popular Web site was monitored by police, and after letting him attract a substantial number of like-minded others, China's cyberpolice swept up the entire group. Relentlessly interrogated, beaten, and pressured to sign confessions implicat­ing each other, the core members nevertheless with­stood the pressure. The case demonstrated that stamping out cyberdissent had become a priority state function. According to the Post, Chinese leader Jiang Zemin considered "the investigation as one of the most important in the nation." In March 2003, the arrestees were each sentenced to prison terms of between eight and ten years-all for exchanging opinions on the Internet.[9] Then there is the case of Liu Di, a psychology student at Beijing Normal University who posted Internet essays under the screen name of Stainless Steel Mouse. She is an exception among cyberdis­sidents-after a year behind bars, she is now out of jail. The then 23-year-old Liu was influenced by George Orwell's 1984 and became well known for her satirical writing and musings on dissidents in the former Soviet Union. She defended other cyberdissidents, supported intellectuals arrested for organizing reading groups, attacked Chinese chauvinists, and, in a spoof, called for a new polit­ical party in which anyone could join and every­one could be "chairman." Arrested in November 2002 and held for nearly one year without a trial, she became a cause célèbre for human rights and press freedom groups overseas and apparently gained some notoriety within China as well. Although she had been held without trial and was never formally charged, she was imprisoned in a Beijing jail cell with three criminals. In December 2003, she was released in anticipation of Premier Wen Jiabao's visit to the U.S. Yet nine months after returning to the Beijing apartment that she shares with her grandmother, Liu still finds police secu­rity officers posted at her home. She has found it impossible to find a regular job, and police moni­tors block her screen name Stainless Steel Mouse from Web sites
  • Although President Hu's anti-porn crusade has superficially lofty goals, the nationwide crackdown conveniently tightens state control over the spread of digital information. In fact, more than 90 per­cent of the articles in China's legal regime govern­ing Internet sites is "news and information," and less than 5 percent is "other inappropriate con­tent."[
  • In February 2003, a mysterious virus swept through the southern Chinese province of Guang­dong, decimating the staffs of hospitals and clinics. According to The Washington Post, "there were 900 people sick with SARS [sudden acute respiratory syndrome] in Guangzhou and 45 percent of them were health care professionals." The Chinese media suppressed news of the disease, apparently in the belief that the public would panic, but: [News] reached the Chinese public in Guangdong through a short-text message, sent to mobile phones in Guangzhou around noon on Feb. 8. "There is a fatal flu in Guangzhou," it read. This same message was resent 40 million times that day, 41 million times the next day and 45 million times on Feb. 10.[36] The SARS epidemic taught the Chinese security services that mobile phone text messages are a powerful weapon against censorship and state control of the media. The Chinese government announced in 2003 new plans to censor text mes­sages distributed by mobile telephone.
  •  
    written in 2004, a bit outdated, but gives great background into China's stance on internet censorship and individual accounts of citizens arrested and held (sometimes years without trail) for crimes committed online
Audrey B

Digital Zapatismo and the Threatened Persecution of Prof. Ricardo Dominguez (UCSD) | Ca... - 0 views

  • The EDT and other Digital Zapatistas succeeded in furthering the message of the EZLN and the indigenous peoples of Mexico, but they never physically harmed anyone or anything, in spite of the government violence directed at them.
    • Audrey B
       
      nonviolent electronic civil disobedience
  • As an artist, Dominguez has always looked to open “disturbance spaces” inside our contemporary communication platforms. He is a former member of the Critical Art Ensemble (CAE), a group of artists and activists whose focus is “the exploration of the intersections between art, critical theory, technology, and political activism.” Later Dominguez helped found the Electronic Disturbance Theater (EDT) which sought to expand the work of the CAE into cyberspace. They developed the idea of Electronic Civil Disobedience (ECD), which just as the name suggests is an electronic extension of Thoreau’s old idea.
  • With black tape across their mouths, surgical masks marked with X’s, and holding signs that read “Art is not a Crime,” and “Academic Freedom,” over 200 students gathered on Thursday, April 8th at the Silent Tree on library walk.
  • ...15 more annotations...
  • In 2009 Dominguez was named by CNN one of its “Most Interesting People” for his work in developing the Transborder Immigrant Tool (TBT
  • Professor Dominguez’s work, first with Critical Art Ensemble and then with Electronic Disturbance Theater, has been highly cited, and he has been invited to lecture on the work across a host of important international venues…The esteemed status of Professor Dominguez’s field-defining work has been duly noted by the external referees, who include major international intellectuals working in performance art, new media and globalization.
  • EDT illuminates a new set of possibilities for understanding the relation between performance, embodiment, and spatial practice in cyberspace. Unlike a number of other performance artists, who have explored the relation of the body to technology through the literal encounter of individual physical bodies to machines, those working at EDT have placed the very notion of “embodiment” under question. Rather, they have sought to understand the specific possibilities for constituting presence in digital space that is both collective and politicized.
  • taking known forms and then augmenting or subverting their messages in order to provoke thought, discussion and emotion. What made the EDT different is how they applied these age-old principles of artistic expression to “new” media and digital technology.
  • performances and interventions were based upon questioning (but never fully answering) contemporary social problems and injustices.
  • Members of the EDT, including Dominguez, contributed to the artistic front of the EZLN’s fight for the indigenous people of Mexico. They crafted themselves as Digital Zapatistas, “attacking” the websites of the Mexican government and the agencies of the US government, which were supporting the oppression of the people in Chiapas. But the “attacks” were never effective… only affective.
  • developments of EDT was FloodNet — the technology behind Virtual Sit-Ins such as the one against the UCOP website for which Dominguez is now under investigation.
  • EDT’s goal was to take the long respected tradition of a peaceful sit-in to the virtual space of a website.
  • And, just like an embodied sit-in, to be effective the virtual sit-in must be open and transparent.
  • There are key differences between the virtual sit-in and a “Distributed Denial of Service Attack,” which Dominguez has been accused of launching. With the latter, computers of unknowing individuals become conduits to increase traffic to a particular Internet address, therefore rendering it inoperable, threatening the potential crash of the system itself. In this type of attack the identity of the perpetrators remains obscured in a prolonged assault usually motivated either by retribution, financial gain, and/or attempts to censor free speech.
  • In contrast, with the virtual sit-in, the goals of the action are stated, grievances described, participants known and once it is over no physical damage is done. FloodNet is a Java applet that is the code equivalent of going to the target website and constantly clicking the “reload” button. It also allows the participants to leave messages in the server’s error log by looking for non-existent URLs in the target server, which will then generate error messages. For example, a search for “human_rights” will generate an error message “File not found. ‘human_rights’ does not exist on this .gov server.”
  • by the same administration, which is now threatening him.
    • Audrey B
       
      So let me get this right, basically UCSD hired him after they knew that he co-founded EDT, had participated in ECD, and they knew what he was capable. So they were fine with him "attacking" the Mexican government. But when he and students non-violently protest through a virtual sit-in, because it is aimed towards them, they get mad and are now trying to take his tenure away? Hello, Dr. Dominguez is a professor teaching ECD. Are they going to fire him and take him to court for something he teaches their students?
  • Also among his scholarly and artistic accomplishments cited as reasons to grant Dominguez tenure were the various uses of FloodNet technology to conduct virtual sit-ins on websites run by governments, international finance organizations, anti-immigrant sites and even UCOP’s website.
  • In the hour to come Professor Dominguez would frame his encounter with the administration “Zapatista style,” transforming a closed meeting, the purpose of which was to conduct “fact finding” in relation to his March 4th actions, into a collective meeting or “consulta.”
  • Rejoining the crowd of supporters he sat quietly listening to faculty and students as they read letters that spanned the globe, and which voiced solidarity, alliance, and outrage at the administration’s criminalization of his work.
Sarah Eeee

Dissent Magazine - Arguing The World - Are English Departments Killing the Humanities? - - 0 views

  • The focus of this post is not the thousand-and-one times told tale of how the corporatization of the university and state divestment from higher education has had a particularly disastrous impact upon humanities departments
  • We can treat these realities as facts to be taken for granted.
  • We might wonder if there are conditions of intellectual deprivation for which the institutional structures governing the humanities are partly to blame.
  • ...10 more annotations...
  • For Arnoldians, literature would play the cultural role once occupied by religion, with beauty civilizing the modern individual.
  • The avatar of that attitude was Harvard’s Douglas Bush, who speaking in 1944 identified the cultural tradition running from the ancient Greeks through Milton as “that heritage for which the war has been fought.”
  • To put it another way, the English department currently labors under a deep paradox: it devotes much of its intellectual energy to declaring the limits of Anglo-American culture while being structurally wedded to that culture in a way that necessarily privileges it.
  • At the risk of being impolite, I will be pointed about their implications: this is not a progressive program of higher education, but is in fact a perniciously anti-progressive one. It confirms the casual undergraduate presupposition that nothing occurring before 1980 is of real significance, that the free market is the culmination of the human desire for liberty, and that digital fora for blather are now fundamental to meditations on our role in the universe.
  • In its youth it promised an education in literature without the hard work of learning languages, much to the dismay of classicists. In its middle age it offered a stripped-down version of philosophy under the banner of critical theory, an intrusion that philosophers bore with Stoic calm. Now in its senescence, the English department is being beaten by communications at its own game of watering down curriculum and reducing humanist traditions to what today’s adolescent will find—to use the favorite malapropism of the text-messaging generation—“relatable.”
  • In an age more forthright in its bigotries, Irving Babbitt advocated a New Humanism that readily embraced a meritocracy of learning. The humanitarian, in Babbitt’s phrase, “has sympathy for mankind in the lump,” where a humanist “is interested in the perfecting of the individual.” The return to the classics, or to great texts traditionally conceived, never seems in my mind fully to dispense with such patrician sensibilities.
  • The humanities programs of the next century might rather be structured around “world humanisms.” In such programs the phrase “great texts” would evoke the Bhagavad Gita every bit as much as it does The Iliad. The learning of at least one world language would be required, be it Arabic, French, or Mandarin. At its center would be neither the vernacular nor an artificially constructed “Western tradition.”
  • Instead it would explore on their own terms, and in their rich cross-fertilization, millenia of world traditions offering insight on the relationships between individual and society; on our ethical obligations to our fellow beings, human and non-human; and on flourishing and justice.
  • An example of a “world humanisms” approach is suggested by a conference that I recently attended in Istanbul, which brought together philosophers and theologians from North America and Turkey. One of the many rich portraits that emerged was of first-century Alexandria, where the Neoplatonism of the Jewish philosopher Philo directly influenced the early Christians Clement and Origen, as well as laying the foundations of Islamic philosophy through al-Kindi and al-Farabi. We are blinded to the study of this kind of influence by a focus on “Western Civilization” that favors Athens and Rome to Alexandria and treats Origen only as a precursor to Saint Augustine, that supposed inventor of an exclusively Christian syncretism between philosophy and theology.
  • Our task as humanists of the twenty-first century is to make those long and deep traditions visible, and to do so in the teeth of those forces that would strip them away, be those forces technological, commercial, political, or intellectual.
  •  
    An alternate take on the "future of the humanities" argument. This author proposes a revamped sort of literature study incorporating modern languages and a fervently international approach to literature, thought, and culture.
  •  
    This one skirts the edges of the digital humanities, by proposing a vision of future literature study. Explicitly digital projects could be useful for finding the international connections this author calls for.
Weiye Loh

Skepticblog » Why are textbooks so expensive? - 0 views

  • In some cases, the costs are driven up because the market has gotten highly competitive with more and expensive features, like pricey full color throughout, and lots of ancillaries (website for the book, CD-ROM of Powerpoints or images, study guide for students, instructor’s guide, test banks, and many other extras). In the high-volume markets, like the introductory courses taken by hundreds of non-majors, these silly extras seem to make a big difference in enticing faculty to change their preferences and adopt a different book, so publishers must pull out all the stops on these expensive frills or lose in a highly competitive market. And, like any other market, the cost per unit is a function of how many you sell. In the huge introductory markets, there are tens of thousands of copies sold, and they can afford to keep their prices competitive but still must add every possible bell and whistle to lure instructors to adopt them. But in the upper-level undergraduate or the graduate courses, where there may only be a few hundred or a few thousand copies sold each year, they cannot afford expensive color, and each copy must be priced to match the anticipated sales. Low volume = higher individual cost per unit. It’s simple economics.
  • the real culprit is something most students don’t suspect: used book recyclers, and students’ own preferences for used books that are cheaper and already marked with someone else’s highlighter marker!
  • As an author, I’ve seen how the sales histories of textbooks work. Typically they have a big spike of sales for the first 1-2 years after they are introduced, and that’s when most the new copies are sold and most of the publisher’s money is made. But by year 3  (and sometimes sooner), the sales plunge and within another year or two, the sales are miniscule. The publishers have only a few options in a situation like this. One option: they can price the book so that the first two years’ worth of sales will pay their costs back before the used copies wipe out their market, which is the major reason new copies cost so much. Another option (especially with high-volume introductory textbooks) is to revise it within 2-3 years after the previous edition, so the new edition will drive all the used copies off the shelves for another two years or so. This is also a common strategy. For my most popular books, the publisher expected me to be working on a new edition almost as soon as the previous edition came out, and 2-3 years later, the new edition (with a distinctive new cover, and sometimes with significant new content as well) starts the sales curve cycle all over again. One of my books is in its eighth edition, but there are introductory textbooks that are in the 15th or 20th edition.
  • ...2 more annotations...
  • For over 20 years now, I’ve heard all sorts of prophets saying that paper textbooks are dead, and predicting that all textbooks would be electronic within a few years. Year after year, I  hear this prediction—and paper textbooks continue to sell just fine, thank you.  Certainly, electronic editions of mass market best-sellers, novels and mysteries (usually cheaply produced with few illustrations) seem to do fine as Kindle editions or eBooks, and that market is well established. But electronic textbooks have never taken off, at least in science textbooks, despite numerous attempts to make them work. Watching students study, I have a few thoughts as to why this is: Students seem to feel that they haven’t “studied” unless they’ve covered their textbook with yellow highlighter markings. Although there are electronic equivalents of the highlighter marker pen, most of today’s students seem to prefer physically marking on a real paper book. Textbooks (especially science books) are heavy with color photographs and other images that don’t often look good on a tiny screen, don’t print out on ordinary paper well, but raise the price of the book. Even an eBook is going to be a lot more expensive with lots of images compared to a mass-market book with no art whatsoever. I’ve watched my students study, and they like the flexibility of being able to use their book just about anywhere—in bright light outdoors away from a power supply especially. Although eBooks are getting better, most still have screens that are hard to read in bright light, and eventually their battery will run out, whether you’re near a power supply or not. Finally, if  you drop your eBook or get it wet, you have a disaster. A textbook won’t even be dented by hard usage, and unless it’s totally soaked and cannot be dried, it does a lot better when wet than any electronic book.
  • A recent study found that digital textbooks were no panacea after all. Only one-third of the students said they were comfortable reading e-textbooks, and three-fourths preferred a paper textbook to an e-textbook if the costs were equal. And the costs have hidden jokers in the deck: e-textbooks may seem cheaper, but they tend to have built-in expiration dates and cannot be resold, so they may be priced below paper textbooks but end up costing about the same. E-textbooks are not that much cheaper for publishers, either, since the writing, editing, art manuscript, promotion, etc., all cost the publisher the same whether the final book is in paper or electronic. The only cost difference is printing and binding and shipping and storage vs. creating the electronic version.
  •  
    But in the 1980s and 1990s, the market changed drastically with the expansion of used book recyclers. They set up shop at the bookstore door near the end of the semester and bought students' new copies for pennies on the dollar. They would show up in my office uninvited and ask if I want to sell any of the free adopter's copies that I get from publishers trying to entice me. If you walk through any campus bookstore, nearly all the new copies have been replaced by used copies, usually very tattered and with broken spines. The students naturally gravitate to the cheaper used books (and some prefer them because they like it if a previous owner has highlighted the important stuff). In many bookstores, there are no new copies at all, or just a few that go unsold. What these bargain hunters don't realize is that every used copy purchased means a new copy unsold. Used copies pay nothing to the publisher (or the author, either), so to recoup their costs, publishers must price their new copies to offset the loss of sales by used copies. And so the vicious circle begins-publisher raises the price on the book again, more students buy used copies, so a new copy keeps climbing in price.
jardinejn

Stuart Moulthrop - You Say You Want a Revolution? Hypertext and the Laws of Media - Pos... - 0 views

  • . But
  • But
  • But
  • ...8 more annotations...
  • Stoll excoriates "cyberpunks," virtual vandals who abuse the openness of scientific computing environments. Their unsportsmanlike conduct spoils the information game, necessitating cumbersome restrictions on the free flow of data.
  • Orthodox McLuhanite doctrine holds that "every form, pushed to the limit of its potential, reverses its characteristics" (Laws of Media viii).
  • Electronic information, as Stoll sees it, lies in strict analogy with material and private property.
  • The telos of the electronic society-of-text is anarchy in its true sense: local autonomy based on consensus, limited by a relentless disintegration of global authority. Since information is now virtually an equivalent of capital, and since textuality is our most powerful way of shaping information, it follows that Xanadu might indeed change the world.
  • Who decides what information "belongs" to whom? Stoll's "popular elite" is restricted to academic scientists, a version of "the people" as nomenklatura, those whose need to know is defined by their professional affiliation.
  •   "Cyberspace. A consensual hallucination experienced daily by billions of legitimate operators, in every nation... A graphic representation of data abstracted from the banks of every computer in the human system" (Gibson 51).
  • The vision of Xanadu as cyberspatial New Jerusalem is conceivable and perhaps eligible, but by no stretch of the imagination is it inevitable.
  • But it seems equally possible that our engagement with interactive media will follow the path of reaction, not revolution
  •  
    Pros and Cons of the newly evolving concept of networking information back in the early 90s
  •  
    Some interesting questions and speculations about potential controls on media from an early 90s perspective
Katherine H

The Englewood Review of Books: Featured: The Sublime by Simon Morley - 0 views

  •  
    "the full effect of the terror Burke stresses in the sublime hadn't taken shape for me until recently, watching over and over the first 30-second video clip of the Deepwater Horizon oil leak. This is a frightful image in its murky greenness. And the scope of what this simple video loop suggests is nearly beyond the capacity to describe. It certainly follows several of Burke's qualifications of the sublime - the terror of the scope, the obscurity and privation of the bottom of the ocean, the suggestion of infinity - but it also raises even more questions in regard to what a particularly contemporary sublime might encompass. "
  •  
    This post is reviewing a book, but includes a personal anecdote about finding the 'terror' aspect of the sublime in an internet video.
Amanda Giles

I'm So Totally, Digitally Close to You - Clive Thompson - NYTimes.com - 2 views

  • Facebook and Twitter may have pushed things into overdrive, but the idea of using communication tools as a form of “co-presence” has been around for a while. The Japanese sociologist Mizuko Ito first noticed it with mobile phones: lovers who were working in different cities would send text messages back and forth all night — tiny updates like “enjoying a glass of wine now” or “watching TV while lying on the couch.” They were doing it partly because talking for hours on mobile phones isn’t very comfortable (or affordable). But they also discovered that the little Ping-Ponging messages felt even more intimate than a phone call.
  • capable
  • A lot of this is just social norms catching up with what technology is capable of.”
  • ...18 more annotations...
  • ambient awareness
  • very much like being physically near someone
  • paradox of ambient awareness
  • insignificant on its own
  • he little snippets coalesce into a surprisingly sophisticated portrait of your friends’ and family members’ lives
  • Facebook and Twitter may have pushed things into overdrive, but the idea of using communication tools as a form of “co-presence” has been around for a while. The Japanese sociologist Mizuko Ito first noticed it with mobile phones: lovers who were working in different cities would send text messages back and forth all night — tiny updates like “enjoying a glass of wine now” or “watching TV while lying on the couch.” They were doing it partly because talking for hours on mobile phones isn’t very comfortable (or affordable). But they also discovered that the little Ping-Ponging messages felt even more intimate than a phone call.
  • the growing popularity of online awareness as a reaction to social isolation
  • human groupings naturally tail off at around 150 people: the “Dunbar number,” as it is known. Are people who use Facebook and Twitter increasing their Dunbar number, because they can so easily keep track of so many more people?
  • Constant online contact had made those ties immeasurably richer, but it hadn’t actually increased the number of them; deep relationships are still predicated on face time, and there are only so many hours in the day for that.
  • If you’re reading daily updates from hundreds of people about whom they’re dating and whether they’re happy, it might, some critics worry, spread your emotional energy too thin, leaving less for true intimate relationships.
  • Parasocial relationships can use up some of the emotional space in our Dunbar number, crowding out real-life people.
  • hey can observe you, but it’s not the same as knowing you.”
  • people in their 20s who were in college when Facebook appeared and have never lived as adults without online awareness. For them, participation isn’t optional. If you don’t dive in, other people will define who you are.
  • if only to ensure the virtual version of you is accurate, or at least the one you want to present to the world.
  • he dynamics of small-town life,
  • If anything, it’s identity-constraining now
  • result of all this incessant updating: a culture of people who know much more about themselves
  • t’s like the Greek dictum to “know thyself,” or the therapeutic concept of mindfulness.
Weiye Loh

BBC News - Belle de Jour's history of anonymity - 0 views

  • In the internet age, we have become increasingly concerned about the effects of anonymous online commentary. Anonymous bloggers can have enormous global audiences. "Trolls" can bring criticism straight to the computer screens of the people they disagree with. These trends are solidly in the tradition of literary anonymity - from unsigned political tracts to biting satirical graffiti, we've seen it all before.
  • the effects of anonymity are more important for the anonymous writer than they are for the audience. We'd still be dotty over Jane Austen's books if, like her contemporary audience, we never knew her name. The writing has enough authority and detail to carry us along in her inner world. Knowing her name, where she lived, and seeing the piecrust table where she painstakingly wrote out her manuscripts is interesting, but it's trivia. It's not what makes her novels sing.
  • Anonymous is one of our greatest writers. "From the medieval period to the modern period there have been authors who have enjoyed playing with and experimenting with anonymity, and it never really goes out of fashion," says Marcy North, author of The Anonymous Renaissance: Cultures of Discretion in Tudor-Stuart England.
  •  
    "Anon was, as Virginia Woolf noted in one of her final unpublished essays, "the voice that broke the silence of the forest". Elsewhere she suggested that "Anonymous was a woman". For anonymity has definitely been widely used by women throughout the ages, whether they're writing about relationships, sex or anything else. Without Anonymous, there are so many classics we would not have had - Gawain and the Green Knight, virtually all of the Bible and other religious texts. Anon is allowed a greater creative freedom than a named writer is, greater political influence than a common man can ever attain, and far more longevity than we would guess. Obviously, I'm a great fan of Anon's work, but then, as a formerly anonymous author, I would say that, wouldn't I?"
Audrey B

In Iran, Cyber-activism Without the Middle-man - PCWorld - 1 views

  • Twitter, which are giving Iranian citizens and supporters of the government protests there new ways of involving themselves in the political struggle.
  • They've let Iranians and supporters of the protesters share information, even within the centrally controlled Internet service in Iran and connected people like Papillon to a country on the other side of the world.
  • Proxy servers are Web sites that let people visit parts of the Internet that would normally be blocked to them.
    • Audrey B
       
      Allowing people in Iran to speak up!
  • ...9 more annotations...
  • Web 2.0 is paving new routes around Internet censorship.
  • Nowhere is Internet activism more visible than on Twitter
  • t's amazing how naturally people who are not necessarily technical have found ways to organize information on-line and decide who to trust using things as simple as Twitter -- a 140 character micro-blogging service with a basic search feature. "It's a pretty incredible counter-intelligence network," he said.
  • proxy servers have become a critical conduit for information.
  • In recent days these social media networks are getting more important as mainstream reporters have been confined to their hotel rooms on government orders or forced to head home when their visas expire.On YouTube users can find street scenes in Iran, including videos of protesters being beaten and shot by police. "The traditional media is in some ways not able to provide it because there are restrictions placed on them by the Iranian government," said YouTube spokesman Scott Rubin ."It's the citizens stealing the story."
    • Audrey B
       
      News reporters assist in allowing civil disobedience. It mentions that on YouTube, there are certain videos that would not be shown on public television. However, by using the web, we are not limited in what we can see in the world. Things are not hidden from us. The web tells it how it is and doesn't beat around the bush. This is important. Citizens are telling the story. Afterall, shouldn't government be run by the people? This is what Thoreau believed and what he practiced resulting in the writing of his revolutionary essay "Civil Disobedience". Hearing, Tweeting, and Viewing the stories of the citizens, of those being attacked or denied certain rights creates an appeal to unite and defy government (in this case). But to do so civily.
  • "Twitter is such a cut-out-the middleman type of situation,"
  • This has made information available to a wider group of people, but it in addition to spreading information about proxy servers, it has made home-grown attack tools available to a wider audience.
  • But soon the anti-government activists realized that DOS attacks were maybe not such a good idea. Not only is it illegal in many countries to launch a DOS attack, but this type of activity also slows down the network throughout Iran, making it hard to get messages out.
  • Twitter, in particular, has proven particularly adept at organizing people and information, said Zittrain. Although Proxies are the most popular way of reaching Twitter, updates can also be sent via other Web applications, SMS (Short Message Service) or even e-mail. "It's a byproduct of the way Twitter was built," he said. "The fact that the APIs are so open has meant that there are already lots of ways to get data in and out of Twitter, that do not rely on direct access to Twitter.com."
  •  
    Twitter and YouTube both revolutionizing the way to civily defy government.
Weiye Loh

Asymptote: Literary Encounters Between Languages and Cultures  | the kent rid... - 0 views

  • Asymptote is a new, international literary journal dedicated to the translation of literary works, both from various languages to English as well as from English to other languages. It was founded by our very own Singaporean writer, Lee Yew Leong, whose editorial team spans various continents and cultures – South Asia, the Middle East, Europe, America and East Asia – and is a veritable international, multi-cultural and multilingual task force.
  • A ‘classic’ metaphor comes from the Italian – “traduttore, traditore”, which means “translator, traitor”. My teacher had written this phrase on the board in my first translation class, demonstrating her (rather cynical) philosophical stance on the whole project of translation – something is always ‘lost in translation’, and the translator necessarily interferes in this gap of meaning guided her own bias, conscious or unconscious, political or philosophical.
  • In philosophy classes my charismatic and wildly esoteric professor once railed on about the possibility (or impossibility) of commensuration between various little narratives ( petits récits ), given the rejection of ‘modernist’ grand or meta-narratives. But translation, he declared dramatically, the possibility of translation hints at the possibility of commensurability between the little narratives. In his view, little narratives were understood as discrete cultures (Japanese, Iranian, Russian) and inter-cultural communication (and consequent kindness and friendliness amongst humankind) is only possible if translation is possible.
  • ...3 more annotations...
  • The Asymptote raison d’être is much more optimistic than my translation teacher’s stance, and much less abstruse than that of my philosophy professor’s. The editors write, “We are interested in encounters between languages and the consequences of these encounters. Though a translation may never fully replicate the original in effect (thus our name, “asymptote”: the dotted line on a graph that a mathematical function may tend towards but never reach), it is in itself an act of creation. … The value of translation is that it unleashes from latency ideas and emotions to a vast sea of others who do not have access to the language in which these ideas and emotions reside.”
  • With the asymptote, the y-axis and the x-axis will never get lonely, pairing off into the infinite distance and the distant infinity; the original text and its companion translations proliferate in the blinker-free world wide net, reaching a broader readership and our earthly community grows closer with a shared cache of stories, tales, imaginations.
  • In addition, “[n]ot only will [Asymptote] display work in its original language after the English translation, [but they] also encourage translators (especially of poems) to provide audio recordings of the original work so that the reader has access as well to the sounds of that language, via a “Press PLAY” audio option whenever such an MP3 recording is available.” This project straddles cultures, languages as well as media – writing, audio and even visual
  •  
    Koh Choon Hwee
Weiye Loh

Paris Review - Falling Men: On Don DeLillo and Terror, Chris Cumming - 0 views

  • inexplicable violence committed by a nobody in the context of ubiquitous media coverage. A mountain of evidence, testimony, and theory that hides the event itself. Images of the event endlessly replayed. An imbalance between the significance of the act and the insignificance of the person who committed it. Absurdity, in other words.
  • By introducing conspiracy and chaos into the world, a terrorist hopes to make himself equal to the overwhelming world surrounding him. The idea isn’t to change history but to enact one’s dream life. The person who blows up the Boston marathon instantly becomes the equal of his act. What other mythic ambition can a loser instantly achieve, just by deciding to do it? “In America it is the individual himself, floating on random streams of disaffection, who tends to set the terms of the absurd,” DeLillo wrote. “Set the terms” is right: an individual terrorist creates the absurdity in which the rest of us have to live. Whether or not Oswald or the Tsarnaevs achieved what they hoped they would achieve, their dream lives now overlap with reality. Violence gives weight to the meaningless. “This is what guns are for, to bring balance to the world,” DeLillo wrote, speaking, once again, of Oswald.
  •  
    "Long before it became obvious, DeLillo argued that terrorists and gunmen have rearranged our sense of reality. He has become better appreciated as the world has come to resemble his work, incrementally, with every new telegenic catastrophe, every bombing and mass shooting. Throughout DeLillo's work we encounter young men who plot violence to escape the plotlessness of their own lives. He has done more than any writer since Dostoevsky to explain them."
Weiye Loh

Our Greatest Political Novelist? : The New Yorker - 0 views

  • Science fiction is an inherently political genre, in that any future or alternate history it imagines is a wish about How Things Should Be (even if it’s reflected darkly in a warning about how they might turn out). And How Things Should Be is the central question and struggle of politics. It is also, I’d argue, an inherently liberal genre (its many conservative practitioners notwithstanding), in that it sees the status quo as contingent, a historical accident, whereas conservatism holds it to be inevitable, natural, and therefore just. The meta-premise of all science fiction is that nothing can be taken for granted. That it’s still anybody’s ballgame.
  • Robinson argues that, now that climate change has become a matter of life and death for the species, it’s time for scientists to abandon their scrupulous neutrality and enter into the messy arena of politics. Essentially, Robinson attempts to apply scientific thinking to politics, approaching it less like pure physics, in which one infallible equation / ideology explains and answers everything, than like engineering—a process of what F.D.R. once called “bold, persistent experimentation,” finding out what works and combining successful elements to synthesize something new.
  •  
    "When we call literary writers "political" today, we're usually talking about identity politics. If historians or critics fifty years from now were to read most of our contemporary literary fiction, they might well infer that our main societal problems were issues with our parents, bad relationships, and death. If they were looking for any indication that we were even dimly aware of the burgeoning global conflict between democracy and capitalism, or of the abyssal catastrophe our civilization was just beginning to spill over the brink of, they might need to turn to books that have that embarrassing little Saturn-and-spaceship sticker on the spine. That is, to science fiction.2"
Krista S

Internet Use and Child Development - 0 views

shared by Krista S on 16 Jun 10 - No Cached
  •  
    In the context of middle class families, elements in the techno-subsystem (e.g., Internet access) may not necessarily facilitate child cognitive development; effective use of those elements, highly dependent upon parent behavior, may promote development. For example, Cho and Cheon (2005) surveyed families and found that parents' perceived control, obtained through shared web activities and family cohesion, reduced children's exposure to negative Internet content. Using the Internet at home to learn was reported in 65 cases, to play was reported in 57 cases, to browse in 35 cases, and to communicate in 27 cases. Fuchs and Wößmann (2005) inferred, having controlled for socioeconomic status, "a negative relationship between home computer availability and academic achievement, but a positive relationship between home computer use for Internet communication" (p. 581). DeBell and Chapman (2006) concluded that Internet use promotes cognitive development in children, "specifically in the area of visual intelligence, where certain computer activities -- particularly games -- may enhance the ability to monitor several visual stimuli at once, to read diagrams, recognize icons, and visualize spatial relationships" (p. 3). Van Deventer and White (2002) observed proficient 10- and 11-year-old video gamers and noted extremely high levels of self-monitoring, pattern recognition, and visual memory. In a comprehensive review of the literature of the time (when interactive digital games were relatively unsophisticated), Subrahmanyam, Kraut, Greenfield, and Gross (2000) concluded that "children who play computer games can improve their visual intelligence" (p. 128). It should be noted, however, that playing video games has also been linked to childhood distractibility, over-arousal, hostility, and aggression (Anderson, Gentile, & Buckley, 2007; Funk, Chan, Brouwer, & Curtiss, 2006).
Allison Frost

Censorship causing brain drain in China? | Chicago Press Release Services - 0 views

  • Students are leaving mainland China for the opportunity to study in Hong Kong instead.
  • “We are a small elite who can afford freedom beyond China’s great firewall,” says “Li Cheng” from Shanghai.
  • Li, a student at the University of Hong Kong, did not want to disclose his real name or details about his study program, fearing consequences back home. “I live in one country, but it feels like having two identities,” Li said. “In Shanghai, I use special software to access sites blacklisted by the government, like Twitter or the uncensored version of Google.
  • ...4 more annotations...
  • “In Hong Kong, I am taught to integrate these tools in my research.”
  • Hong Kong is nothing like mainland China in terms of its free flow of information, freedom of speech and multiparty political system.
  • The exodus of students such as Li could signify a brain drain for mainland China, according to Bandurski. “Without political reform, economic growth in China will decline,” he said. “Talents will leave China. Students and teachers who want to have more access to information are not dissidents anymore. They are becoming the mainstream.”
  • With new freedom at hand, only a few fresh HKU graduates have returned to the mainland. Last year, only 3 percent of HKU graduates from mainland China returned home to look for a job. That matches the trend of Chinese students studying overseas. More than 70 percent of the more than 1 million Chinese students abroad did not return home after graduation between 1978 and 2006, according to a report by the Chinese Academy of Social Sciences
  •  
    many students leaving beijing to study in hong kong. access to google and other sources of information, emphasis on information to further education, preference
Weiye Loh

Victorian Literature, Statistically Analyzed With New Process - NYTimes.com - 1 views

  • A decline in references to “God,” “Christian” and “universal” is consonant with the conventional view that the 19th century was a time of rising secularism and skepticism.
  • Yet large searches can also challenge some pet theories of close reading, he said: for example, that the Victorians were obsessed with the nature and origins of evil. As it turns out, books with the word “evil” in the title bumped along near the bottom of the graph, accounting for less than 0.1 percent — a thousandth — of those published during the Victorian era.
  • As Mr. Cohen is quick to acknowledge, the meaning of those numbers is anything but clear. Perhaps authors didn’t like to use the word “evil” in the title; perhaps there were other, more common synonyms; perhaps the context points to another subject altogether.
  • ...1 more annotation...
  • Ms. Martin at Princeton knows firsthand how electronic searches can unearth both obscure texts and dead ends. She has spent the last 10 years compiling a list of books, newspaper and journal articles about the technical aspects of poetry. She recalled finding a sudden explosion of the words “syntax” and “prosody” in 1832, suggesting a spirited debate about poetic structure. But it turned out that Dr. Syntax and Prosody were the names of two racehorses.
  •  
    A decline in references to "God," "Christian" and "universal" is consonant with the conventional view that the 19th century was a time of rising secularism and skepticism.
Weiye Loh

Victorian Literature, Statistically Analyzed With New Process - NYTimes.com - 0 views

  • The titles of every British book published in English in and around the 19th century — 1,681,161, to be exact — are being electronically scoured for key words and phrases that might offer fresh insight into the minds of the Victorians.
  • This research, which has only recently become possible, thanks to a new generation of powerful digital tools and databases, represents one of the many ways that technology is transforming the study of literature, philosophy and other humanistic fields that haven’t necessarily embraced large-scale quantitative analysis.
  • There is also anxiety, however, about the potential of electronic tools to reduce literature and history to a series of numbers, squeezing out important subjects that cannot be easily quantified.
  • ...2 more annotations...
  • Some scholars are wary of the control an enterprise like Google can exert over digital information. Google’s plan to create a voluminous online library and store has raised alarms about a potential monopoly over digital books and the hefty pricing that might follow. But Jon Orwant, the engineering manager for Google Books, Magazines and Patents, said the plan was to make collections and searching tools available to libraries and scholars free. “That’s something we absolutely will do, and no, it’s not going to cost anything,” he said.
  • Mr. Houghton sought to capture what he called a “general sense” of how middle- and upper-class Victorians thought, partly by closely reading scores of texts written during the era and methodically counting how many times certain words appeared. The increasing use of “hope,” “light” and “sunlight,” for instance, was interpreted as a sign of the Victorians’ increasing optimism.
Heather D

http://jcmc.indiana.edu/vol10/issue2/huffaker.html - 2 views

  • One place that adolescents now spend a considerable amount of time is in online settings, and these online venues, such as multi-user domains (MUDs), have been linked to identity exploration (Turkle, 1995).
  • ). Identity also involves a sense of continuity of self images over time
  • unitary sense of identity is constructed after a successful search for who one is.
  • ...12 more annotations...
  • a unitary sense of identity is constructed
  • constructed after a successful search for who one is.
  • ),  a unitary sense of identity is  constructed after a successful search for who one is. However, other perspectives of adolescent development view the construction of self as one that involves multiple "public" selves which are presented according to the demands and constraints of particular situations
  • for who one is. However, other perspectives of adolescent development view the construction of self as one that involves
  • search for who one is.
  • However, other perspectives of adolescent development
  • search for who one is.
  • for who one is.
  • for who one is.
  • anonymity
  • exploring their identity
  • , constructing identity can be a continual process for adolescents,
Weiye Loh

Why I Am Teaching a Course Called "Wasting Time on the Internet" - The New Yorker - 0 views

  • The vast amount of the Web’s language is perfect raw material for literature. Disjunctive, compressed, decontextualized, and, most important, cut-and-pastable, it’s easily reassembled into works of art.
  • What they’ve been surreptitiously doing throughout their academic career—patchwriting, cutting-and-pasting, lifting—must now be done in the open, where they are accountable for their decisions. Suddenly, new questions arise: What is it that I’m lifting? And why? What do my choices about what to appropriate tell me about myself? My emotions? My history? My biases and passions? The critiques turn toward formal improvement: Could I have swiped better material? Could my methods in constructing these texts have been better? Not surprisingly, they thrive. What I’ve learned from these years in the classroom is that no matter what we do, we can’t help but express ourselves.
  •  
    "Web surfing as a form of self-expression. Every click is indicative of who we are: indicative of our likes, our dislikes, our emotions, our politics, our world view. Of course, marketers have long recognized this, but literature hasn't yet learned to treasure-and exploit-this situation. The idea for this class arose from my frustration with reading endless indictments of the Web for making us dumber. I've been feeling just the opposite. We're reading and writing more than we have in a generation, but we are reading and writing differently-skimming, parsing, grazing, bookmarking, forwarding, retweeting, reblogging, and spamming language-in ways that aren't yet recognized as literary."
Weiye Loh

Balderdash: Anne Rice on writing about Others - 0 views

  •  
    "The bottom line is, you go where the intensity is for you as a writer; you give birth to characters for deep, complex reasons. And this should never be politicized by anyone. Your challenge is to do a fine and honest and effective job. Don't ever let anyone insist you give up without even trying. Two of the greatest novels about women that I've ever read, Anna Karenina and Madame Bovary were written by men. One of the finest novels about men that I've ever read, The Last of the Wine, was written by a woman. That was Mary Renault. And her novel, The Persian Boy, about a Persian eunuch is a classic. The vital literature we possess today was created by men and women of immense imagination, personal courage and personal drive. Ignore all attempts to politicize or police your imagination and your literary ambition."
  •  
    It's actually pretty cool, and I found out about a lot of interesting literature on a number of subjects, including geography. I discovered an cheap essay writing service https://order.studentshare.org/ , which you may peruse, study, and, of course, strive to improve as much as possible. I already know that these articles are superb, and that you will gain a lot from them, both academically and in terms of your personal development in this or that field.
  •  
    To write even an ordinary essay is not enough effort. And at the university there are quite voluminous tasks. So I decided to turn for help with capstone project https://www.capstoneproject.net/ and my dissertation. I can imagine if I was given the task to write a book. It would be a nightmare. I wouldn't have done it.
1 - 20 of 205 Next › Last »
Showing 20 items per page