To see the other types of publications on this topic, follow the link: Luby transform code.

Journal articles on the topic 'Luby transform code'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 48 journal articles for your research on the topic 'Luby transform code.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Wang, Lina, Hang Zhang, Yaoyao Li, and Tianyu An. "Partly systematic Luby transform codes based on improved progressive edge-growth algorithm for Mars communications." Journal of Algorithms & Computational Technology 12, no. 3 (2018): 200–207. http://dx.doi.org/10.1177/1748301818770082.

Full text
Abstract:
The Luby transform code is a forward error correction code and was originally designed for the erasure channel. In this paper, the Luby transform codes over the Mars communication channel are investigated. To guarantee the reliable data transmission over the Mars communication channel which are usually affected by fading and noises, the progressive edge-growth algorithm is improved and used in for encoding the Luby transform codes. And then a partly systematic Luby transform code with an improved progressive edge-growth algorithm is designed to improve the error propagation phenomenon in Mars communications. Performance evaluations of the designed partly systematic Luby transform code based on the random graph, PEG and improved progressive edge-growth algorithms, respectively, are conducted through a series of simulations. Simulation results show that the performance of the partly systematic Luby transform code based on the improved progressive edge-growth algorithm outperforms those of the partly systematic Luby transform code based on two other algorithms and has the lower bit error rate and overhead.
APA, Harvard, Vancouver, ISO, and other styles
2

K., L. Sudha, Gowda Ganesh, K.P Gagan, and Reddy P. Adarsh. "Implementation of Luby Transform Error Correcting Codes on FPGA." International Journal of Innovative Science and Research Technology (IJISRT) 8, no. 7 (2025): 3505–10. https://doi.org/10.5281/zenodo.15001456.

Full text
Abstract:
Luby Transform (LT) codes are rate less codes which are a type of fountain codes. They provide good performance over other fountain codes because, more efficient encoding and decoding algorithms can be devised for this code. These codes are rate less codes because they allow for flexible and adaptive rate allocation during the encoding process. With this, any desired code rate can be achieved by controlling the number of parity symbols generated during the encoding process. This paper explains the encoding and decoding aspects of LT codes in detail and generation and decoding is performed using MATLAB. Hardware implementation of LT code is attempted on FPGA by using Verilog code. As it is shown, the codes are very simple to implement and can be used as a more powerful error correcting codes.
APA, Harvard, Vancouver, ISO, and other styles
3

Nadhir, Ibrahim Abdulkhaleq, Abdul Jalil Salih Nahla, Salih Mohammed Hasan Rajaa, and Jabbar Hasan Ihsan. "A Simulink model for modified fountain codes." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 21, no. 1 (2023): 18–25. https://doi.org/10.12928/telkomnika.v21i1.23274.

Full text
Abstract:
This paper introduces a Simulink model design for a modified fountain code. The code is a new version of the traditional Luby transform (LT) codes. The design constructs the blocks required for generation of the generator matrix of a limited-degree-hopping-segment Luby transform (LDHS-LT) codes. This code is especially designed for short length data files which have assigned a great interest for wireless sensor networks. It generates the degrees in a predetermined sequence but random generation and partitioned the data file in segments. The data packets selection has been made serialy according to the integer generated from both degree and segment generators. The code is tested using Monte Carlo simulation approach with the conventional code generation using robust soliton distribution (RSD) for degree generation, and the simulation results approve better performance with all testing parameter.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Hongyu. "Raptor Codes with LT-LDPC Precoding Performance Analysis and FPGA Optimization." Highlights in Science, Engineering and Technology 97 (May 28, 2024): 55–64. http://dx.doi.org/10.54097/3x6yb210.

Full text
Abstract:
Raptor codes are designed to effectively handle packet loss and erasures as a type of fountain code, capable of generating an unlimited number of encoded symbols from source informations, which is particularly useful in scenarios where the number of transmissions is unknown or variable. Luby Transform (LT) codes, a kind of fountain code encoding method, exhibit linear complexity, and Low-Density Parity-Check (LDPC) codes can be constructed by the generator matrix and the parity-check matrix. The LT-LDPC pre-coding method combines the advantages of both, enhancing encoding and decoding efficiency. Deploying code on Field-Programmable Gate Arrays (FPGAs) involves several steps: synthesis, place and route, and bitstream generation, followed by loading the bitstream onto the FPGA to configure its internal logic according to the coding methods. This paper introduces a method of encoding and decoding Raptor codes, utilizing the intimal LT codes and the peripheral LDPC codes constructed by PEG. It employs a lop-BP decoding method over noise channels based on the Tanner graph for decoding and deploys the optimized algorithm on FPGA to enhance performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Nadhir, Ibrahim Abdulkhaleq, Abbas Abed Faeza, Jabbar Hasan Ihsan, and Hasan Mahdi Falah. "Improving the data recovery for short length LT codes." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1972–79. https://doi.org/10.11591/ijece.v10i2.pp1972-1979.

Full text
Abstract:
Luby Transform (LT) code is considered as an efficient erasure fountain code. The construction of the coded symbols is based on the formation of the degree distribution which played a significant role in ensuring a smooth decoding process. In this paper, we propose a new encoding scheme for LT code generation. This encoding presents a deterministic degree generation (DDG) with time hoping pattern which found to be suitable for the case of short data length where the well-known Robust Soliton Distribution (RSD) witnessed a severe performance degradation. It is shown via computer simulations that the proposed (DDG) has the lowest records for unrecovered data packets when compared to that using random degree distribution like RSD and non-uniform data selection (NUDS). The success interpreted in decreasing the overhead required for data recovery to the order of 25% for a data length of 32 packets.
APA, Harvard, Vancouver, ISO, and other styles
6

Abdulkhaleq, Nadhir Ibrahim, Faeza Abbas Abed, Ihsan Jabbar Hasan, and Falah Hasan Mahdi. "Improving the data recovery for short length LT codes." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 2 (2020): 1972. http://dx.doi.org/10.11591/ijece.v10i2.pp1972-1979.

Full text
Abstract:
Luby Transform (LT) code is considered as an efficient erasure fountain code. The construction of the coded symbols is based on the formation of the degree distribution which played a significant role in ensuring a smooth decoding process. In this paper, we propose a new encoding scheme for LT code generation. This encoding presents a deterministic degree generation (DDG) with time hoping pattern which found to be suitable for the case of short data length where the well-known Robust Soliton Distribution (RSD) witnessed a severe performance degradation. It is shown via computer simulations that the proposed (DDG) has the lowest records for unrecovered data packets when compared to that using random degree distribution like RSD and non-uniform data selection (NUDS). The success interpreted in decreasing the overhead required for data recovery to the order of 25% for a data length of 32 packets.
APA, Harvard, Vancouver, ISO, and other styles
7

Al Wesabi, Mohammed Ahmed, Waled Al-Arashi, and Mohammed Al-Shadadi. "The Performance of Cooperative MIMO Scheme under Slow Fading Channel based on Fountain Code." Journal of Science and Technology 21, no. 2 (2016): 1–12. http://dx.doi.org/10.20428/jst.v21i2.1224.

Full text
Abstract:
Nowadays, the video calling, video on demand (VOD) and more services are desired for users. These services generate large traffic which requires special techniques for transmission without outages or failure during transmission operation. Fountain Code is the newest method in the encoding theory and it is handle designed to large data. Besides, modern MIMO channel gives higher capacity than traditional channel (SISO channel). This paper looks out of the performance of Fountain Code on MIMO Scheme under Slow Fading Channel. The results show the performance is the best on MIMO (DF). In addition, the performance increases by increasing in the number of receiver antennas.
 Keywords: Fountain Code, Luby Transform, Cooperative MIMO, Slow Fading, Bit Error Rate, Decode and Forward (DF).
APA, Harvard, Vancouver, ISO, and other styles
8

Hayajneh, Khaled F. "Memory-Based LT Codes for Efficient 5G Networks and Beyond." Electronics 10, no. 24 (2021): 3169. http://dx.doi.org/10.3390/electronics10243169.

Full text
Abstract:
The next-generation networks (5G and beyond) require robust channel codes to support their high specifications, such as low latency, low complexity, significant coding gain, and flexibility. In this paper, we propose using a fountain code as a promising solution to 5G and 6G networks, and then we propose using a modified version of the fountain codes (Luby transform codes) over a network topology (Y-network) that is relevant in the context of the 5G networks. In such a network, the user can be connected to two different cells at the same time. In addition, the paper presents the necessary techniques for analyzing the system and shows that the proposed scheme enhances the system performance in terms of decoding success probability, error probability, and code rate (or overhead). Furthermore, the analyses in this paper allow us to quantify the trade-off between overhead, on the one hand, and the decoding success probability and error probability, on the other hand. Finally, based on the analytical approach and numerical results, our simulation results demonstrate that the proposed scheme achieves better performance than the regular LT codes and the other schemes in the literature.
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Si, Fanglin Niu, Lizheng Wang, and Ling Yu. "Shifted LT Code Security Scheme for Partial Information Encryption." Entropy 24, no. 12 (2022): 1776. http://dx.doi.org/10.3390/e24121776.

Full text
Abstract:
The existing physical layer security technology based on fountain codes needs to ensure that the legal channel is superior to the eavesdropping channel; when the quality of the legal channel and the eavesdropping channel are close, the information security cannot be guaranteed. Aiming at this problem, this paper proposes a shifted Luby transform (SLT) code security scheme for partial information encryption, which is mainly divided into two stages, partial information encryption transfer and degree distribution adjustment. The main idea is that the source randomly extracts part of the information symbols, and performs XOR encryption with the random sequence containing the main channel noise sent by the legitimate receiver. Afterward, the degree distribution is adjusted using the number of transfer information symbols received by the legitimate receiver to improve the average degree of the encoded codewords. Since the eavesdropper can only obtain fewer information symbols in the initial stage, it is difficult to decode the generated coded symbols after the degree distribution adjustment, thereby ensuring the safe transmission of information. The experimental results show that, compared with other LT anti-eavesdropping schemes, even if the legitimate channel is not dominant, the proposed scheme still has better security performance and less decoding overhead.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Lei, and Li Su. "Design of Improved BP Decoders and Corresponding LT Code Degree Distribution for AWGN Channels." Wireless Communications and Mobile Computing 2020 (October 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/9517840.

Full text
Abstract:
This paper presents the performance of a hard decision belief propagation (HDBP) decoder used for Luby transform (LT) codes over additive white Gaussian noise channels; subsequently, three improved HDBP decoders are proposed. We first analyze the performance improvement of the sorted ripple and delayed decoding process in a HDBP decoder; subsequently, we propose ripple-sorted belief propagation (RSBP) as well as ripple-sorted and delayed belief propagation (RSDBP) decoders to improve the bit error rate (BER). Based on the analysis of the distribution of error encoded symbols, we propose a ripple-sorted and threshold-based belief propagation (RSTBP) decoder, which deletes low-reliability encoded symbols, to further improve the BER. Degree distribution significantly affects the performance of LT codes. Therefore, we propose a method for designing optimal degree distributions for the proposed decoders. Through simulation results, we demonstrate that the proposed RSBP and RSDBP decoders provide significantly better BER performances than the HDBP decoder. RSDBP and RSTDP combined with the proposed degree distributions outperformed state-of-the-art degree distributions in terms of the number of encoded symbols required to recover an input symbol correctly (NERRIC) and the frame error rate (FER). For a hybrid decoder formulated by combining RSDBP with a soft decision belief propagation decoder, the proposed degree distribution outperforms the other degree distributions in terms of decoding complexity.
APA, Harvard, Vancouver, ISO, and other styles
11

ZHAO, YULI, FRANCIS C. M. LAU, ZHILIANG ZHU, and HAI YU. "SCALE-FREE LUBY TRANSFORM CODES." International Journal of Bifurcation and Chaos 22, no. 04 (2012): 1250094. http://dx.doi.org/10.1142/s0218127412500940.

Full text
Abstract:
This paper reports the characteristics and performance of a new type of Luby Transform codes, namely scale-free Luby Transform (SF-LT) codes. In the SF-LT codes, the degree of the encoded symbol follows a modified power-law distribution. Moreover, the complexity and decoding performance of SF-LT codes are compared with LT codes based on robust soliton degree distribution and LT codes based on suboptimal degree distribution. The results show that SF-LT codes outperform other LT codes in terms of the probability of successful decoding over an ideal channel and a binary erasure channel. Moreover, the encoding/decoding complexity for the SF-LT codes is superior.
APA, Harvard, Vancouver, ISO, and other styles
12

Zhao, Yuli, Francis C. M. Lau, Zhiliang Zhu, and Wei Zhang. "Generation of Luby Transform Codes with Low Redundancy." International Journal of Bifurcation and Chaos 25, no. 05 (2015): 1550072. http://dx.doi.org/10.1142/s0218127415500728.

Full text
Abstract:
Given the same number of encoded symbols, a Luby Transform (LT) decoder is more likely to decode successfully when there is little redundancy among the symbols. With the use of a Tanner graph, we describe two kinds of redundancy appearing in LT codes in this paper. We further propose an encoding algorithm called Low Redundancy (LR) algorithm used in the formation of the encoded symbols. The algorithm aims to reduce the redundancy of LT codes and to improve the decoder performance under the same complexity. Simulation results show various LT codes improve in terms of average overhead factor and probability of successful decoding when the codes are encoded using the proposed LR algorithm. Moreover, the encoding complexity remains unchanged.
APA, Harvard, Vancouver, ISO, and other styles
13

Xu, Shengkai, and Dazhuan Xu. "Systematic Luby transform codes with modified grey‐mapped QAM constellation." Electronics Letters 54, no. 12 (2018): 766–68. http://dx.doi.org/10.1049/el.2018.0482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Yan, Wang, and Liu Rongke. "Enhanced unequal error protection coding scheme of Luby transform codes." IET Communications 9, no. 1 (2015): 33–41. http://dx.doi.org/10.1049/iet-com.2014.0537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Deepa, J., K. Hemapriya K.Hemapriya, and S. Kaviarasan S.Kaviarasan. "Counteracting an Active Attack within MANET by Exploiting Luby Transform Codes." International Journal of Computer Applications 113, no. 18 (2015): 30–33. http://dx.doi.org/10.5120/19927-2050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Louis Paul Ignatius, Joe, and Sasirekha Selvakumar. "Enhanced Distributed Storage System Using Lower Triangular Matrix-Luby Transform Codes." Intelligent Automation & Soft Computing 33, no. 3 (2022): 1941–59. http://dx.doi.org/10.32604/iasc.2022.024173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Paul, I. Joe Louis, S. Radha, and J. Raja. "Performance Analysis of Joint Degree Distribution (JDD) in Luby Transform Codes." Journal of Computer Science 11, no. 1 (2015): 166–77. http://dx.doi.org/10.3844/jcssp.2015.166.177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Liang, Gou, Zhang Gengxin, Bian Dongming, Xue Feng, and Hu Jing. "Relay scheme based on Distributed Luby Transform codes for InterPlaNetary Internet." China Communications 10, no. 10 (2013): 1–11. http://dx.doi.org/10.1109/cc.2013.6650315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hayajneh, Khaled F., Mehrdad Valipour, and Shahram Yousefi. "Improved finite-length Luby-transform codes in the binary erasure channel." IET Communications 9, no. 8 (2015): 1122–30. http://dx.doi.org/10.1049/iet-com.2014.0658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Jafarizadeh, Saber, and Abbas Jamalipour. "Data Persistency in Wireless Sensor Networks Using Distributed Luby Transform Codes." IEEE Sensors Journal 13, no. 12 (2013): 4880–90. http://dx.doi.org/10.1109/jsen.2013.2277720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mirrezaei, S. M. "Towards systematic Luby transform codes: optimisation design over binary erasure channel." Electronics Letters 56, no. 11 (2020): 550–53. http://dx.doi.org/10.1049/el.2019.4258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bi, Dadi, Peng Ren, and Zheng Xiang. "Packet Permutation PAPR Reduction for OFDM Systems Based on Luby Transform Codes." Journal of Computer and Communications 06, no. 01 (2018): 219–28. http://dx.doi.org/10.4236/jcc.2018.61022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Lei, Tonghong Li, Jianxin Liao, Qi Qi, and Jingyu Wang. "Design of improved Luby transform codes with decreasing ripple size and feedback." IET Communications 8, no. 8 (2014): 1409–16. http://dx.doi.org/10.1049/iet-com.2013.0864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Fei, Zesong, Congzhe Cao, Ming Xiao, Iqbal Hussain, and Jingming Kuang. "Improved Luby transform codes in low overhead regions for binary erasure channels." Transactions on Emerging Telecommunications Technologies 27, no. 1 (2014): 84–91. http://dx.doi.org/10.1002/ett.2798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Xu, Shengkai, and Dazhuan Xu. "Optimization Design and Asymptotic Analysis of Systematic Luby Transform Codes Over BIAWGN Channels." IEEE Transactions on Communications 64, no. 8 (2016): 3160–68. http://dx.doi.org/10.1109/tcomm.2016.2581806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Cong. "A Novel Model for Large-Scale Online College Learning in Postpandemic Era: AI-Driven Approach." Mobile Information Systems 2021 (December 14, 2021): 1–10. http://dx.doi.org/10.1155/2021/1048186.

Full text
Abstract:
COVID-19 is a pandemic with a wide reach and explosive magnitude, and the world has been bracing itself for impact. Many have lost their jobs and savings, and many are homeless. For better or worse, COVID-19 has permanently changed our lives. For college students, the pandemic means giving up most of the on-campus experience in the postpandemic era and performing online learning instead. Virtual lessons may become a permanent part of college education. Large-scale online learning typically utilizes interactive live video streaming. In this study, we analyzed a codec and video streaming transmission protocol using artificial intelligence. First, we studied an intraframe prediction optimization algorithm for the H.266 codec based on long short-term memory networks. In terms of video streaming transmission protocols, real-time communication optimization based on Quick UDP Internet connections and Luby Transform codes is proposed to improve the quality of interactive live video streaming. Experimental results demonstrate that the proposed strategy outperforms three benchmarks in terms of video streaming quality, video streaming latency, and average throughput.
APA, Harvard, Vancouver, ISO, and other styles
27

Andò, A., S. Mangione, L. Curcio, et al. "Recovery Capabilities of Rateless Codes on Simulated Turbulent Terrestrial Free Space Optics Channel Model." International Journal of Antennas and Propagation 2013 (2013): 1–8. http://dx.doi.org/10.1155/2013/692915.

Full text
Abstract:
Free Space Optics (FSO) links are affected by several impairments: optical turbulence, scattering, absorption, and pointing. In particular, atmospheric optical turbulence generates optical power fluctuations at the receiver that can degrade communications with fading events, especially in high data rate links. Innovative solutions require an improvement of FSO link performances, together with testing models and appropriate channel codes. In this paper, we describe a high-resolution time-correlated channel model able to predict random temporal fluctuations of optical signal irradiance caused by optical turbulence. Concerning the same channel, we also report simulation results on the error mitigation performance of Luby Transform, Raptor, and RaptorQ codes.
APA, Harvard, Vancouver, ISO, and other styles
28

Duan, Pengrui, Liang Liu, and Zhao Zhang. "A Cross Layer Video Transmission Scheme Combining Geographic Routing and Short-Length Luby Transform Codes." International Journal of Distributed Sensor Networks 11, no. 8 (2015): 140212. http://dx.doi.org/10.1155/2015/140212.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jamshidi, Ali, and Saeedeh Moloudi. "Extended Belief Propagation Decoding of Luby Transform Codes for the Small Number of Encoded Packets." Iranian Journal of Science and Technology, Transactions of Electrical Engineering 41, no. 4 (2017): 283–91. http://dx.doi.org/10.1007/s40998-017-0045-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lin, Yong-zhao, Cheng-ke Wu, and Wei Liu. "Application of the Concatenation of q-LDPC and Luby Transform Codes in Deep Communications." Journal of Electronics & Information Technology 32, no. 8 (2010): 1898–903. http://dx.doi.org/10.3724/sp.j.1146.2009.01105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Ngo, H. A., L. Hanzo, and T. D. Nguyen. "Amplify-forward and decode-forward cooperation relying on systematic Luby transform coded Hybrid Automatic-Repeat-reQuest." IET Communications 5, no. 8 (2011): 1096–106. http://dx.doi.org/10.1049/iet-com.2010.0128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Paul, I. Joe Louis, S. Radha, and J. Raja. "THROUGHPUT AND BIT ERROR RATE ANALYSIS OF LUBY TRANSFORM CODES WITH LOW AND MEDIUM NODAL DEGREE DISTRIBUTIONS." American Journal of Applied Sciences 11, no. 9 (2014): 1584–93. http://dx.doi.org/10.3844/ajassp.2014.1584.1593.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cheong, Ho-Young. "On-the-Fly Belief Propagation Decoding of Decentralized Luby Transform Codes for Distributed Storage in a Small-Scale Wireless Sensor Network." Journal of Korea Institute of Information, Electronics, and Communication Technology 9, no. 5 (2016): 503–10. http://dx.doi.org/10.17661/jkiiect.2016.9.5.503.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Chansaeng, Tanagrit, and Chaiyaporn Khemapatapan. "Enhancing Multi-Cloud Storage: A Hybrid Framework Using Interleaving and LT Codes." Journal of Current Science and Technology 14, no. 3 (2024): 69. http://dx.doi.org/10.59796/jcst.v14n2.2024.69.

Full text
Abstract:
This article presents a novel framework for enhancing the integrity and availability of data stored on multi-cloud storage systems. The proposed technique leverages a combination of interleaving and Luby transform (LT) codes, specifically employing either ideal or robust soliton distribution during the LT encoding stage. The proposed technique is rigorously designed, incorporating data preparation facilitated by a cloud broker and culminating in the measurement of key performance indicators (KPIs). A central component of the framework is data processing, which involves interleaving followed by the LT encoding with soliton distribution selection. The performance of the proposed technique is evaluated through data integrity, data availability, and others. The results demonstrate that using the robust soliton distribution offers a pragmatic balance between computational efficiency and robust data integrity, particularly crucial in dynamic multi-cloud environments. Additionally, the proposed technique achieves a high level of data integrity of more than 0.97 and strong resilience with average data availability of 98%. However, further optimization is necessary to address storage overhead, retrieval time, and computational overhead. Despite these considerations, the framework remains significant, especially within the context of confidentiality, integrity, and availability for multi-cloud storage protection. The proposed technique underscores the potential of integrating interleaving and LT codes to revolutionize data storage and access within cloud environments, paving the way for future innovations in the field.
APA, Harvard, Vancouver, ISO, and other styles
35

Ng, Soon Hock, Vijayakumar Anand, Molong Han, et al. "Computational Imaging at the Infrared Beamline of the Australian Synchrotron Using the Lucy–Richardson–Rosen Algorithm." Applied Sciences 13, no. 23 (2023): 12948. http://dx.doi.org/10.3390/app132312948.

Full text
Abstract:
The Fourier transform infrared microspectroscopy (FTIRm) system of the Australian Synchrotron has a unique optical configuration with a peculiar beam profile consisting of two parallel lines. The beam is tightly focused using a 36× Schwarzschild objective to a point on the sample and the sample is scanned pixel by pixel to record an image of a single plane using a single pixel mercury cadmium telluride detector. A computational stitching procedure is used to obtain a 2D image of the sample. However, if the imaging condition is not satisfied, then the recorded object’s information is distorted. Unlike commonly observed blurring, the case with a Schwarzschild objective is unique, with a donut like intensity distribution with three distinct lobes. Consequently, commonly used deblurring methods are not efficient for image reconstruction. In this study, we have applied a recently developed computational reconstruction method called the Lucy–Richardson–Rosen algorithm (LRRA) in the online FTIRm system for the first time. The method involves two steps: training step and imaging step. In the training step, the point spread function (PSF) library is recorded by temporal summation of intensity patterns obtained by scanning the pinhole in the x-y directions across the path of the beam using the single pixel detector along the z direction. In the imaging step, the process is repeated for a complicated object along only a single plane. This new technique is named coded aperture scanning holography. Different types of samples, such as two pinholes; a number 3 USAF object; a cross shaped object on a barium fluoride substrate; and a silk sample are used for the demonstration of both image recovery and 3D imaging applications.
APA, Harvard, Vancouver, ISO, and other styles
36

Puddu, Fabio, Casper K. Lumby, Nick Harding, et al. "Abstract 6602: Refining liquid biopsy: generating more information from cell free DNA." Cancer Research 83, no. 7_Supplement (2023): 6602. http://dx.doi.org/10.1158/1538-7445.am2023-6602.

Full text
Abstract:
Abstract Liquid biopsy for profiling of cell free DNA (cfDNA) in blood holds huge promise to transform how we experience and manage cancer by early detection and identification of residual disease and subtype. However, a standard blood draw yields an average of only 10 ng of cfDNA, of which DNA derived from the tumor is a small minority. Therefore, we are faced with a dilemma when utilizing the limited sample to obtain maximum information. Genetic sequencing provides information on actionable somatic mutations but detection of a few loci in a minority of the sample is challenging. Modified cytosine profiles of cancer are differential from non-cancer at many more loci and so provide a stronger signal. Moreover, they can be used to distinguish tissue-of-origin of the tumor. However, methods such as bisulfite sequencing, EM-seq and TAPS sacrifice genetic information (namely C->T mutations, which are the most common mutation in cancer) to measure modified cytosine. Genetic and modified cytosine data together have been shown to be more powerful for the detection of early cancer than either alone. Here we present a technology, which sequences at base resolution the complete genetic sequence integrated with modified cytosine from low nanogram amounts of cfDNA. It consists of (i) a single pre-sequencing workflow, which creates a copy of the original DNA and performs enzymatic base conversions which discriminate genetic and epigenetic states and (ii) post-sequencing data processing which resolves the resultant sequencing data to an information-rich 16-state code and derives genetic variants integrated with modified cytosine levels, within easy-to-use software. It is, in principle, compatible with any sequencing methodology and is shown here optimized for the Illumina fleet. In cfDNA we show accuracy of modC measurement is higher than that of bisulfite sequencing and EM-seq; and the accuracy of genetic sequencing is higher than that of Illumina alone. Accuracy of measurement is extremely important for liquid biopsy where tumor DNA is in the minority and observed in a small number of reads. We demonstrate the impact of varying base calling error rate on limit of detection for rare alleles in cfDNA samples. Further we show derivation of cfDNA fragment characteristics and that this is produced in combination with genetic and modC information. This further increases the signal available from cfDNA in only one workflow. We suggest this method will help advance the field of liquid biopsy towards its promise. Citation Format: Fabio Puddu, Casper K. Lumby, Nick Harding, David J. Morley, Jamie Scotcher, Robert Crawford, Jens Füllgrabe, Walraj S. Gosal, Shirong Yu, Daniel Brudzewsky, Jane Haywood, Andrada Tomoni, Philippa Burns, Joanna D. Holbrook, Paidi Creed. Refining liquid biopsy: generating more information from cell free DNA [abstract]. In: Proceedings of the American Association for Cancer Research Annual Meeting 2023; Part 1 (Regular and Invited Abstracts); 2023 Apr 14-19; Orlando, FL. Philadelphia (PA): AACR; Cancer Res 2023;83(7_Suppl):Abstract nr 6602.
APA, Harvard, Vancouver, ISO, and other styles
37

"Design, Analysis and Implementation of Modified Luby Transform Code." IOSR Journal of Electronics and Communication Engineering 7, no. 2 (2013): 37–39. http://dx.doi.org/10.9790/2834-0723739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Yang, Xu, Xiaolong Shi, Langwen Lai, Congzhou Chen, Huaisheng Xu, and Ming Deng. "Towards long double-stranded chains and robust DNA-based data storage using the random code system." Frontiers in Genetics 14 (June 13, 2023). http://dx.doi.org/10.3389/fgene.2023.1179867.

Full text
Abstract:
DNA has become a popular choice for next-generation storage media due to its high storage density and stability. As the storage medium of life’s information, DNA has significant storage capacity and low-cost, low-power replication and transcription capabilities. However, utilizing long double-stranded DNA for storage can introduce unstable factors that make it difficult to meet the constraints of biological systems. To address this challenge, we have designed a highly robust coding scheme called the “random code system,” inspired by the idea of fountain codes. The random code system includes the establishment of a random matrix, Gaussian preprocessing, and random equilibrium. Compared to Luby transform codes (LT codes), random code (RC) has better robustness and recovery ability of lost information. In biological experiments, we successfully stored 29,390 bits of data in 25,700 bp chains, achieving a storage density of 1.78 bits per nucleotide. These results demonstrate the potential for using long double-stranded DNA and the random code system for robust DNA-based data storage.
APA, Harvard, Vancouver, ISO, and other styles
39

Jiang, Wei, and Junjie Yang. "A Degree Distribution Optimization Algorithm for Image Transmission." Journal of Optical Communications 37, no. 3 (2016). http://dx.doi.org/10.1515/joc-2015-0079.

Full text
Abstract:
AbstractLuby Transform (LT) code is the first practical implementation of digital fountain code. The coding behavior of LT code is mainly decided by the degree distribution which determines the relationship between source data and codewords. Two degree distributions are suggested by Luby. They work well in typical situations but not optimally in case of finite encoding symbols. In this work, the degree distribution optimization algorithm is proposed to explore the potential of LT code. Firstly selection scheme of sparse degrees for LT codes is introduced. Then probability distribution is optimized according to the selected degrees. In image transmission, bit stream is sensitive to the channel noise and even a single bit error may cause the loss of synchronization between the encoder and the decoder. Therefore the proposed algorithm is designed for image transmission situation. Moreover, optimal class partition is studied for image transmission with unequal error protection. The experimental results are quite promising. Compared with LT code with robust soliton distribution, the proposed algorithm improves the final quality of recovered images obviously with the same overhead.
APA, Harvard, Vancouver, ISO, and other styles
40

Schwarz, Peter Michael, and Bernd Freisleben. "NOREC4DNA: using near-optimal rateless erasure codes for DNA storage." BMC Bioinformatics 22, no. 1 (2021). http://dx.doi.org/10.1186/s12859-021-04318-x.

Full text
Abstract:
Abstract Background DNA is a promising storage medium for high-density long-term digital data storage. Since DNA synthesis and sequencing are still relatively expensive tasks, the coding methods used to store digital data in DNA should correct errors and avoid unstable or error-prone DNA sequences. Near-optimal rateless erasure codes, also called fountain codes, are particularly interesting codes to realize high-capacity and low-error DNA storage systems, as shown by Erlich and Zielinski in their approach based on the Luby transform (LT) code. Since LT is the most basic fountain code, there is a large untapped potential for improvement in using near-optimal erasure codes for DNA storage. Results We present NOREC4DNA, a software framework to use, test, compare, and improve near-optimal rateless erasure codes (NORECs) for DNA storage systems. These codes can effectively be used to store digital information in DNA and cope with the restrictions of the DNA medium. Additionally, they can adapt to possible variable lengths of DNA strands and have nearly zero overhead. We describe the design and implementation of NOREC4DNA. Furthermore, we present experimental results demonstrating that NOREC4DNA can flexibly be used to evaluate the use of NORECs in DNA storage systems. In particular, we show that NORECs that apparently have not yet been used for DNA storage, such as Raptor and Online codes, can achieve significant improvements over LT codes that were used in previous work. NOREC4DNA is available on https://github.com/umr-ds/NOREC4DNA. Conclusion NOREC4DNA is a flexible and extensible software framework for using, evaluating, and comparing NORECs for DNA storage systems.
APA, Harvard, Vancouver, ISO, and other styles
41

Luo, Junzhou, Zhuqing Xu, Jingkai Lin, Ciyuan Chen, and Runqun Xiong. "CH-MAC: Achieving Low-latency Reliable Communication via Coding and Hopping in LPWAN." ACM Transactions on Internet of Things, August 25, 2023. http://dx.doi.org/10.1145/3617505.

Full text
Abstract:
Wireless sensing has emerged as a powerful environmental sensing technology that is vulnerable to the impact of all kinds of ambient noises. LoRa is a novel interference-resilient technology of low-power wide-area networks (LPWAN), which has attracted wide attention from scientific and industrial communities. However, LoRa transmission suffers from serious latency in those complex wireless sensing environments requiring transmission reliability. In this paper, we present CH-MAC, the first MAC-layer protocol based on the local corruption nature of packets and the time-varying nature of channels to reduce end-to-end transmission latency in LPWAN with reliable communication requirements. Specifically, CH-MAC employs Luby Transform code to divide and encode the payload into several blocks such that the receiver can retain part of the coded information in the corrupted packets. In addition, CH-MAC utilizes hopping to transmit different blocks of a packet with various channels to avoid sudden noise collision. Moreover, CH-MAC adopts a dynamic packet length adjustment mechanism to mitigate network congestion. Extensive evaluations on a real-world hardware testbed and a simulation platform show that CH-MAC can reduce end-to-end transmission latency by 2.63 × with a communication success rate requirement of > \(95\% \) compared with state-of-the-art methods.
APA, Harvard, Vancouver, ISO, and other styles
42

Gaeta, Rossano, and Marco Grangetto. "On the robustness of three classes of rateless codes against pollution attacks in P2P networks." Peer-to-Peer Networking and Applications, June 24, 2021. http://dx.doi.org/10.1007/s12083-021-01206-2.

Full text
Abstract:
AbstractRateless codes (a.k.a. fountain codes, digital fountain) have found their way in numerous peer-to-peer based applications although their robustness to the so called pollution attack has not been deeply investigated because they have been originally devised as a solution for dealing with block erasures and not for block modification. In this paper we provide an analysis of the intrinsic robustness of three rateless codes algorithms, i.e., random linear network codes (RLNC), Luby transform (LT), and band codes (BC) against intentional data modification. By intrinsic robustness we mean the ability of detecting as soon as possible that modification of at least one equation has occurred as well as the possibility a receiver can decode from the set of equations with and without the modified ones. We focus on bare rateless codes where no additional information is added to equations (e.g., tags) or higher level protocol are used (e.g., verification keys to pre-distribute to receivers) to detect and recover from data modification. We consider several scenarios that combine both random and targeted selection of equations to alter and modification of an equation that can either change the rank of the coding matrix or not. Our analysis reveals that a high percentage of attacks goes undetected unless a minimum code redundancy is achieved, LT codes are the most fragile in virtually all scenarios, RLNC and BC are quite insensitive to the victim selection and type of alteration of chosen equations and exhibit virtually identical robustness although BC offer a low complexity of the decoding algorithm.
APA, Harvard, Vancouver, ISO, and other styles
43

Hua, Jie, and Dazhuan Xu. "Asymptotic Throughput of Luby Transform Codes Over the Binary Erasure Channel." DEStech Transactions on Engineering and Technology Research, iect (November 18, 2016). http://dx.doi.org/10.12783/dtetr/iect2016/3766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Beyer, Sue. "Metamodern Spell Casting." M/C Journal 26, no. 5 (2023). http://dx.doi.org/10.5204/mcj.2999.

Full text
Abstract:
There are spells in the world: incantations that can transform reality through the power of procedural utterances. The marriage vow, the courtroom sentence, the shaman’s curse: these words are codes that change reality. (Finn 90) Introduction As a child, stories on magic were “opportunities to escape from reality” (Brugué and Llompart 1), or what Rosengren and Hickling describe as being part of a set of “causal belief systems” (77). As an adult, magic is typically seen as being “pure fantasy” (Rosengren and Hickling 75), while Bever argues that magic is something lost to time and materialism, and alternatively a skill that Yeats believed that anyone could develop with practice. The etymology of the word magic originates from magein, a Greek word used to describe “the science and religion of the priests of Zoroaster”, or, according to philologist Skeat, from Greek megas (great), thus signifying "the great science” (Melton 956). Not to be confused with sleight of hand or illusion, magic is traditionally associated with learned people, held in high esteem, who use supernatural or unseen forces to cause change in people and affect events. To use magic these people perform rituals and ceremonies associated with religion and spirituality and include people who may identify as Priests, Witches, Magicians, Wiccans, and Druids (Otto and Stausberg). Magic as Technology and Technology as Magic Although written accounts of the rituals and ceremonies performed by the Druids are rare, because they followed an oral tradition and didn’t record knowledge in a written form (Aldhouse-Green 19), they are believed to have considered magic as a practical technology to be used for such purposes as repelling enemies and divining lost items. They curse and blight humans and districts, raise storms and fogs, cause glamour and delusion, confer invisibility, inflict thirst and confusion on enemy warriors, transform people into animal shape or into stone, subdue and bind them with incantations, and raise magical barriers to halt attackers. (Hutton 33) Similarly, a common theme in The History of Magic by Chris Gosden is that magic is akin to science or mathematics—something to be utilised as a tool when there is a need, as well as being used to perform important rituals and ceremonies. In TechGnosis: Myth, Magic & Mysticism in the Age of Information, Davis discusses ideas on Technomysticism, and Thacker says that “the history of technology—from hieroglyphics to computer code—is itself inseparable from the often ambiguous exchanges with something nonhuman, something otherworldly, something divine. Technology, it seems, is religion by other means, then as now” (159). Written language, communication, speech, and instruction has always been used to transform the ordinary in people’s lives. In TechGnosis, Davis (32) cites Couliano (104): historians have been wrong in concluding that magic disappeared with the advent of 'quantitative science.’ The latter has simply substituted itself for a part of magic while extending its dreams and its goals by means of technology. Electricity, rapid transport, radio and television, the airplane, and the computer have merely carried into effect the promises first formulated by magic, resulting from the supernatural processes of the magician: to produce light, to move instantaneously from one point in space to another, to communicate with faraway regions of space, to fly through the air, and to have an infallible memory at one’s disposal. Non-Fungible Tokens (NFTs) In early 2021, at the height of the pandemic meta-crisis, blockchain and NFTs became well known (Umar et al. 1) and Crypto Art became the hot new money-making scheme for a small percentage of ‘artists’ and tech-bros alike. The popularity of Crypto Art continued until initial interest waned and Ether (ETH) started disappearing in the manner of a classic disappearing coin magic trick. In short, ETH is a type of cryptocurrency similar to Bitcoin. NFT is an acronym for Non-Fungible Token. An NFT is “a cryptographic digital asset that can be uniquely identified within its smart contract” (Myers, Proof of Work 316). The word Non-Fungible indicates that this token is unique and therefore cannot be substituted for a similar token. An example of something being fungible is being able to swap coins of the same denomination. The coins are different tokens but can be easily swapped and are worth the same as each other. Hackl, Lueth, and Bartolo define an NFT as “a digital asset that is unique and singular, backed by blockchain technology to ensure authenticity and ownership. An NFT can be bought, sold, traded, or collected” (7). Blockchain For the newcomer, blockchain can seem impenetrable and based on a type of esoterica or secret knowledge known only to an initiate of a certain type of programming (Cassino 22). The origins of blockchain can be found in the research article “How to Time-Stamp a Digital Document”, published by the Journal of Cryptology in 1991 by Haber, a cryptographer, and Stornetta, a physicist. They were attempting to answer “epistemological problems of how we trust what we believe to be true in a digital age” (Franceschet 310). Subsequently, in 2008, Satoshi Nakamoto wrote The White Paper, a document that describes the radical idea of Bitcoin or “Magic Internet Money” (Droitcour). As defined by Myers (Proof of Work 314), a blockchain is “a series of blocks of validated transactions, each linked to its predecessor by its cryptographic hash”. They go on to say that “Bitcoin’s innovation was not to produce a blockchain, which is essentially just a Merkle list, it was to produce a blockchain in a securely decentralised way”. In other words, blockchain is essentially a permanent record and secure database of information. The secure and permanent nature of blockchain is comparable to a chapter of the Akashic records: a metaphysical idea described as an infinite database where information on everything that has ever happened is stored. It is a mental plane where information is recorded and immutable for all time (Nash). The information stored in this infinite database is available to people who are familiar with the correct rituals and spells to access this knowledge. Blockchain Smart Contracts Blockchain smart contracts are written by a developer and stored on the blockchain. They contain the metadata required to set out the terms of the contract. IBM describes a smart contract as “programs stored on a blockchain that run when predetermined conditions are met”. There are several advantages of using a smart contract. Blockchain is a permanent and transparent record, archived using decentralised peer-to-peer Distributed Ledger Technology (DLT). This technology safeguards the security of a decentralised digital database because it eliminates the intermediary and reduces the chance of fraud, gives hackers fewer opportunities to access the information, and increases the stability of the system (Srivastava). They go on to say that “it is an emerging and revolutionary technology that is attracting a lot of public attention due to its capability to reduce risks and fraud in a scalable manner”. Despite being a dry subject, blockchain is frequently associated with magic. One example is Faustino, Maria, and Marques describing a “quasi-religious romanticism of the crypto-community towards blockchain technologies” (67), with Satoshi represented as King Arthur. The set of instructions that make up the blockchain smart contracts and NFTs tell the program, database, or computer what needs to happen. These instructions are similar to a recipe or spell. This “sourcery” is what Chun (19) describes when talking about the technological magic that mere mortals are unable to comprehend. “We believe in the power of code as a set of magical symbols linking the invisible and visible, echoing our long cultural tradition of logos, or language as an underlying system of order and reason, and its power as a kind of sourcery” (Finn 714). NFTs as a Conceptual Medium In a “massively distributed electronic ritual” (Myers, Proof of Work 100), NFTs became better-known with the sale of Beeple’s Everydays: The First 5000 Days by Christie’s for US$69,346,250. Because of the “thousandfold return” (Wang et al. 1) on the rapidly expanding market in October 2021, most people at that time viewed NFTs and cryptocurrencies as the latest cash cow; some artists saw them as a method to become financially independent, cut out the gallery intermediary, and be compensated on resales (Belk 5). In addition to the financial considerations, a small number of artists saw the conceptual potential of NFTs. Rhea Myers, a conceptual artist, has been using the blockchain as a conceptual medium for over 10 years. Myers describes themselves as “an artist, hacker and writer” (Myers, Bio). A recent work by Myers, titled Is Art (Token), made in 2023 as an Ethereum ERC-721 Token (NFT), is made using a digital image with text that says “this token is art”. The word ‘is’ is emphasised in a maroon colour that differentiates it from the rest in dark grey. The following is the didactic for the artwork. Own the creative power of a crypto artist. Is Art (Token) takes the artist’s power of nomination, of naming something as art, and delegates it to the artwork’s owner. Their assertion of its art or non-art status is secured and guaranteed by the power of the blockchain. Based on a common and understandable misunderstanding of how Is Art (2014) works, this is the first in a series of editions that inscribe ongoing and contemporary concerns onto this exemplar of a past or perhaps not yet realized blockchain artworld. (Myers, is art editions). This is a simple example of their work. A lot of Myers’s work appears to be uncomplicated but hides subtle levels of sophistication that use all the tools available to conceptual artists by questioning the notion of what art is—a hallmark of conceptual art (Goldie and Schellekens 22). Sol LeWitt, in Paragraphs on Conceptual Art, was the first to use the term, and described it by saying “the idea itself, even if not made visual, is as much a work of art as any finished product”. According to Bailey, the most influential American conceptual artists of the 1960s were Lucy Lippard, Sol LeWitt, and Joseph Kosuth, “despite deriving from radically diverse insights about the reason for calling it ‘Conceptual Art’” (8). Instruction-Based Art Artist Claudia Hart employs the instructions used to create an NFT as a medium and artwork in Digital Combines, a new genre the artist has proposed, that joins physical, digital, and virtual media together. The NFT, in a digital combine, functions as a type of glue that holds different elements of the work together. New media rely on digital technology to communicate with the viewer. Digital combines take this one step further—the media are held together by an invisible instruction linked to the object or installation with a QR code that magically takes the viewer to the NFT via a “portal to the cloud” (Hart, Digital Combine Paintings). QR codes are something we all became familiar with during the on-and-off lockdown phase of the pandemic (Morrison et al. 1). Denso Wave Inc., the inventor of the Quick Response Code or QR Code, describes them as being a scannable graphic that is “capable of handling several dozen to several hundred times more information than a conventional bar code that can only store up to 20 digits”. QR Codes were made available to the public in 1994, are easily detected by readers at nearly any size, and can be reconfigured to fit a variety of different shapes. A “QR Code is capable of handling all types of data, such as numeric and alphabetic characters, Kanji, Kana, Hiragana, symbols, binary, and control codes. Up to 7,089 characters can be encoded in one symbol” (Denso Wave). Similar to ideas used by the American conceptual artists of the 1960s, QR codes and NFTs are used in digital combines as conceptual tools. Analogous to Sol LeWitt’s wall drawings, the instruction is the medium and part of the artwork. An example of a Wall Drawing made by Sol LeWitt is as follows: Wall Drawing 11A wall divided horizontally and vertically into four equal parts. Within each part, three of the four kinds of lines are superimposed.(Sol LeWitt, May 1969; MASS MoCA, 2023) The act or intention of using an NFT as a medium in art-making transforms it from being solely a financial contract, which NFTs are widely known for, to an artistic medium or a standalone artwork. The interdisciplinary artist Sue Beyer uses Machine Learning and NFTs as conceptual media in her digital combines. Beyer’s use of machine learning corresponds to the automatic writing that André Breton and Philippe Soupault of the Surrealists were exploring from 1918 to 1924 when they wrote Les Champs Magnétiques (Magnetic Fields) (Bohn 7). Automatic writing was popular amongst the spiritualist movement that evolved from the 1840s to the early 1900s in Europe and the United States (Gosden 399). Michael Riffaterre (221; in Bohn 8) talks about how automatic writing differs from ordinary texts. Automatic writing takes a “total departure from logic, temporality, and referentiality”, in addition to violating “the rules of verisimilitude and the representation of the real”. Bohn adds that although “normal syntax is respected, they make only limited sense”. An artificial intelligence (AI) hallucination, or what Chintapali (1) describes as “distorted reality”, can be seen in the following paragraph that Deep Story provided after entering the prompt ‘Sue Beyer’ in March 2022. None of these sentences have any basis in truth about the person Sue Beyer from Melbourne, Australia. Suddenly runs to Jen from the bedroom window, her face smoking, her glasses shattering. Michaels (30) stands on the bed, pale and irritated. Dear Mister Shut Up! Sue’s loft – later – Sue is on the phone, looking upset. There is a new bruise on her face. There is a distinction between AI and machine learning. According to ChatGPT 3.5, “Machine Learning is a subset of AI that focuses on enabling computers to learn and make predictions or decisions without being explicitly programmed. It involves the development of algorithms and statistical models that allow machines to automatically learn from data, identify patterns, and make informed decisions or predictions”. Using the story generator Deep Story, Beyer uses the element of chance inherent in Machine Learning to create a biography on herself written by the alien other of AI. The paragraphs that Deep Story produces are nonsensical statements and made-up fantasies of what Beyer suspects AI wants the artist to hear. Like a psychic medium or oracle, providing wisdom and advice to a petitioner, the words tumble out of the story generator like a chaotic prediction meant to be deciphered at a later time. This element of chance might be a short-lived occurrence as machine learning is evolving and getting smarter exponentially, the potential of which is becoming very evident just from empirical observation. Something that originated in early modernist science fiction is quickly becoming a reality in our time. A Metamodern Spell Casting Metamodernism is an evolving term that emerged from a series of global catastrophes that occurred from the mid-1990s onwards. The term tolerates the concurrent use of ideas that arise in modernism and postmodernism without discord. It uses oppositional aspects or concepts in art-making and other cultural production that form what Dember calls a “complicated feeling” (Dember). These ideas in oscillation allow metamodernism to move beyond these fixed terms and encompass a wide range of cultural tendencies that reflect what is known collectively as a structure of feeling (van den Akker et al.). The oppositional media used in a digital combine oscillate with each other and also form meaning between each other, relating to material and immaterial concepts. These amalgamations place “technology and culture in mutual interrogation to produce new ways of seeing the world as it unfolds around us” (Myers Studio Ltd.). The use of the oppositional aspects of technology and culture indicates that Myers’s work can also be firmly placed within the domain of metamodernism. Advancements in AI over the years since the pandemic are overwhelming. In episode 23 of the MIT podcast Business Lab, Justice stated that “Covid-19 has accelerated the pace of digital in many ways, across many types of technologies.” They go on to say that “this is where we are starting to experience such a rapid pace of exponential change that it’s very difficult for most people to understand the progress” (MIT Technology Review Insights). Similarly, in 2021 NFTs burst forth in popularity in reaction to various conditions arising from the pandemic meta-crisis. A similar effect was seen around cryptocurrencies after the Global Financial Crisis (GFC) in 2007-2008 (Aliber and Zoega). “The popularity of cryptocurrencies represents in no small part a reaction to the financial crisis and austerity. That reaction takes the form of a retreat from conventional economic and political action and represents at least an economic occult” (Myers, Proof of Work 100). When a traumatic event occurs, like a pandemic, people turn to God, spirituality (Tumminio Hansen), or possibly the occult to look for answers. NFTs took on the role of precursor, promising access to untold riches, esoteric knowledge, and the comforting feeling of being part of the NFT cult. Similar to the effect of what Sutcliffe (15) calls spiritual “occultures” like “long-standing occult societies or New Age healers”, people can be lured by “the promise of secret knowledge”, which “can assist the deceptions of false gurus and create opportunities for cultic exploitation”. Conclusion NFTs are a metamodern spell casting, their popularity borne by the meta-crisis of the pandemic; they are made using magical instruction that oscillates between finance and conceptual abstraction, materialism and socialist idealism, financial ledger, and artistic medium. The metadata in the smart contract of the NFT provide instruction that combines the tangible and intangible. This oscillation, present in metamodern artmaking, creates and maintains a liminal space between these ideas, objects, and media. The in-between space allows for the perpetual transmutation of one thing to another. These ideas are a work in progress and additional exploration is necessary. An NFT is a new medium available to artists that does not physically exist but can be used to create meaning or to glue or hold objects together in a digital combine. Further investigation into the ontological aspects of this medium is required. The smart contract can be viewed as a recipe for the spell or incantation that, like instruction-based art, transforms an object from one thing to another. The blockchain that the NFT is housed in is a liminal space. The contract is stored on the threshold waiting for someone to view or purchase the NFT and turn the objects displayed in the gallery space into a digital combine. Alternatively, the intention of the artist is enough to complete this alchemical process. References Aldhouse-Green, Miranda. Caesar’s Druids: Story of an Ancient Priesthood. New Haven: Yale UP, 2010. Aliber, Robert Z., and Gylfi Zoega. “A Retrospective on the 2008 Global Financial Crisis.” The 2008 Global Financial Crisis in Retrospect: Causes of the Crisis and National Regulatory Responses. Eds. Robert Z. Aliber and Gylfi Zoega. Cham: Springer International Publishing, 2019. , 1–15. 9 June 2023 <https://doi.org/10.1007/978-3-030-12395-6_1>. Belk, Russell. “The Digital Frontier as a Liminal Space.” Journal of Consumer Psychology (2023): 1–7. Bailey, Robert. “Introduction: A Theory of Conceptualism.” Durham: Duke UP, 2017. 1–36. 28 July 2023 <https://read.dukeupress.edu/books/book/1938/chapter/234969/IntroductionA-Theory-of-Conceptualism>. Bever, Edward. “Witchcraft Prosecutions and the Decline of Magic.” Journal of Interdisciplinary History 40.2 (2009): 263–293. 27 July 2023 <https://muse.jhu.edu/pub/6/article/315257>. Beyer, S. “Digital Combines.” Sue Beyer | Visual artist, 2023. 22 July 2023 <https://www.suebeyer.com.au/combines.html>. ———. “Digital Combines: A Metamodern Oscillation of Oppositional Objects and Concepts in Contemporary Interdisciplinary Art Practice.” International Journal of Contemporary Humanities 6 (2022). Bohn, Willard. One Hundred Years of Surrealist Poetry: Theory and Practice. New York: Bloomsbury Academic, 2022. Brugué, Lydia, and Auba Llompart. Contemporary Fairy-Tale Magic: Subverting Gender and Genre. Boston: Brill, 2020. Cassino, Dan. “Crypto, Meme Stocks, and Threatened Masculinity.” Contexts 22.2 (2023): 18–23. ChatGPT 3.5. “ML vs AI.” Chat.openai.com, 18 June 2023. <https://chat.openai.com/share/4e425ff8-8610-4960-99d1-16e0451d517a>. Chintapali, Rohit. “Simplest Guardrail for AI Hallucinations? Be Skeptical, Double Check Outcomes & Don’t Anthropomorphise AI.” Business World 24 Mar. 2023. 28 June 2023 <https://www.proquest.com/docview/2790033991/abstract/9FD03495815D4956PQ/1>. Christie’s. “Beeple (b. 1981), EVERYDAYS: THE FIRST 5000 DAYS.” Christie’s, 2023. 7 June 2023 <https://onlineonly.christies.com/s/beeple-first-5000-days/beeple-b-1981-1/112924>. Chun, Wendy Hui Kyong. Programmed Visions: Software and Memory. Cambridge: MIT P, 2011. Davis, E. “TechGnosis: Magic, Memory and the Angels of Information.” Magic. Ed. J. Sutcliffe. Cambridge, Mass.: MIT P, 2021. 114–121 ———. TechGnosis: Myth, Magic & Mysticism in the Age of Information. 2nd ed. Berkeley: North Atlantic Books, 2015. DeepStory.ai. “DeepStory.” DeepStory, 2023. 18 June 2023 <https://www.deepstory.ai/#!/>. Dember, G. “What Is Metamodernism and Why Does It Matter?” The Side View, 2020. 22 July 2023 <https://thesideview.co/journal/what-is-metamodernism-and-why-does-it-matter/>. Denso Wave Inc. “History of QR Code.” QRcode.com, n.d. 27 June 2023 <https://www.qrcode.com/en/history/>. Droitcour, Brian. “The Outland Review, Vol. 01.” Outland, 4 May 2023. 20 July 2023 <https://outland.art/the-outland-review-vol-01-julian-opie-taproot-wizards/>. Faustino, Sandra, Inês Faria, and Rafael Marques. “The Myths and Legends of King Satoshi and the Knights of Blockchain.” Journal of Cultural Economy 15.1 (2022): 67–80. 23 July 2023 <https://www.tandfonline.com/doi/full/10.1080/17530350.2021.1921830>. Finn, Ed. What Algorithms Want: Imagination in the Age of Computing. EPub Version 1.0. Cambridge, Mass.: MIT P, 2017. Franceschet, Massimo. “The Sentiment of Crypto Art.” CEUR Workshop Proceedings. Aachen: RWTH Aachen, n.d. 310–318. 25 Nov. 2022 <https://ceur-ws.org/Vol-2989/long_paper10.pdf>. Goldie, Peter, and Elisabeth Schellekens. Who’s Afraid of Conceptual Art? Florence: Taylor and Francis, 2009. Gordon, Melton J. “Magic.” Encyclopedia of Occultism and Parapsychology. Ed Melton J. Gordon. 5th ed. Detroit, MI: Gale, 2001. 956–960. 21 July 2023 <https://link.gale.com/apps/doc/CX3403802897/GVRL?sid=bookmark-GVRL&xid=00061628>. Gosden, Chris. The History of Magic: From Alchemy to Witchcraft, from the Ice Age to the Present. London: Penguin, 2020. Haber, S., and W.S. Stornetta. “How to Time-Stamp a Digital Document.” Journal of Cryptology 3.2 (1991): 99–111. Hackl, Cathy, Dirk Lueth, and Tommaso di Bartolo. Navigating the Metaverse: A Guide to Limitless Possibilities in a Web 3.0 World. Ed. John Arkontaky. Hoboken, NJ: John Wiley & Sons, 2022. Hart, Claudia. “Digital Combine Paintings – Claudia Hart.” Claudia Hart, 2021. 15 Nov. 2022 <https://claudiahart.com/Digital-Combine-Paintings>. ———. “The Ruins Timeline – Claudia Hart.” Claudia Hart, 2020. 3 June 2023 <https://claudiahart.com/The-Ruins-timeline>. IBM. “What Are Smart Contracts on Blockchain?” IBM, n.d. 5 June 2023 <https://www.ibm.com/topics/smart-contracts>. LeWitt, Sol. “Paragraphs on Conceptual Art.” Art Forum (1967): n.p. 28 July 2023 <http://arteducation.sfu-kras.ru/files/documents/lewitt-paragraphs-on-conceptual-art1.pdf>. ———. “Wall Drawing 11.” Massachusetts Museum of Contemporary Art. MASS MoCA, 2023. 16 June 2023 <https://massmoca.org/event/walldrawing11/>. MIT Technology Review Insights. “Embracing the Rapid Pace of AI.” Business Lab, 20 May 2021. 28 July 2023 <https://www.technologyreview.com/2021/05/19/1025016/embracing-the-rapid-pace-of-ai/>. Morrison, Benjamin A., et al. “Life after Lockdown: The Experiences of Older Adults in a Contactless Digital World.” Frontiers in Psychology 13 (2023): 1–14. 28 July 2023 <https://www.frontiersin.org/articles/10.3389/fpsyg.2022.1100521>. Myers, Rhea. “Bio.” rhea.art, n.d. 1 July 2023 <https://rhea.art/bio>. ———. “is art editions.” rhea.art, 2023. 22 July 2023 <https://rhea.art/is-art-editions>. ——— [@rheaplex]. “My Little Penny: Bitcoin is Magic.” Tweet. Twitter, 2014. 8 June 2023 <https://twitter.com/rheaplex/status/439534733534298112>. ———. Proof of Work: Blockchain Provocations 2011-2021. UK: Urbanomic Media, 2023. Myers Studio Ltd. “The Home Base of Rhea and Seryna Myers.” Myers Studio, 2021. 17 Nov. 2022 <http://myers.studio/>. Nash, Alex. “The Akashic Records: Origins and Relation to Western Concepts.” Central European Journal for Contemporary Religion 3 (2020): 109–124. Otto, Bernd-Christian, and Michael Stausberg. Defining Magic: A Reader. London: Taylor & Francis Group, 2014. Riffaterre, Michael. Text Production. Trans. Terese Lyons. New York: Columbia UP, 1983. Rosengren, Karl S., and Anne K. Hickling. “Metamorphosis and Magic: The Development of Children’s Thinking about Possible Events and Plausible Mechanisms.” Imagining the Impossible. Ed. Karl S. Rosengren, Carl N. Johnson, and Paul L. Harris, 75–98. Cambridge UP, 2000. Srivastava, N. “What Is Blockchain Technology, and How Does It Work?” Blockchain Council, 23 Oct. 2020. 17 Nov. 2022 <https://www.blockchain-council.org/blockchain/what-is-blockchain-technology-and-how-does-it-work/>. Sutcliffe, J., ed. Magic. Cambridge, Mass.: MIT P, 2021. Thacker, Eugene. “Foreword (2015): ‘We Cartographers of Old…’” TechGnosis: Myth, Magic & Mysticism in the Age of Information. Kindle Edition. Berkeley: North Atlantic Books, 2015. Location 111-169. Tumminio Hansen, D. “Do People Become More Religious in Times of Crisis?” The Conversation, 2021. 9 June 2023 <http://theconversation.com/do-people-become-more-religious-in-times-of-crisis-158849>. Van den Akker, R., A. Gibbons, and T. Vermeulen. Metamodernism: Historicity, Affect, and Depth after Postmodernism. London: Rowman & Littlefield, 2019. Umar, Zaghum, et al. “Covid-19 Impact on NFTs and Major Asset Classes Interrelations: Insights from the Wavelet Coherence Analysis.” Finance Research Letters 47 (2022). 27 July 2023 <https://linkinghub.elsevier.com/retrieve/pii/S1544612322000496>. Wang, Qin, et al. “Non-Fungible Token (NFT): Overview, Evaluation, Opportunities and Challenges.” arXiv, 24 Oct. 2021. 28 July 2023 <http://arxiv.org/abs/2105.07447>. Yeats, W.B. “Magic.” Essays and Introductions. Ed. W.B. Yeats. London: Palgrave Macmillan, 1961. 28–52. 27 July 2023 <https://doi.org/10.1007/978-1-349-00618-2_3>.
APA, Harvard, Vancouver, ISO, and other styles
45

Dwyer, Tim. "Transformations." M/C Journal 7, no. 2 (2004). http://dx.doi.org/10.5204/mcj.2339.

Full text
Abstract:
The Australian Government has been actively evaluating how best to merge the functions of the Australian Communications Authority (ACA) and the Australian Broadcasting Authority (ABA) for around two years now. Broadly, the reason for this is an attempt to keep pace with the communications media transformations we reduce to the term “convergence.” Mounting pressure for restructuring is emerging as a site of turf contestation: the possibility of a regulatory “one-stop shop” for governments (and some industry players) is an end game of considerable force. But, from a public interest perspective, the case for a converged regulator needs to make sense to audiences using various media, as well as in terms of arguments about global, industrial, and technological change. This national debate about the institutional reshaping of media regulation is occurring within a wider global context of transformations in social, technological, and politico-economic frameworks of open capital and cultural markets, including the increasing prominence of international economic organisations, corporations, and Free Trade Agreements (FTAs). Although the recently concluded FTA with the US explicitly carves out a right for Australian Governments to make regulatory policy in relation to existing and new media, considerable uncertainty remains as to future regulatory arrangements. A key concern is how a right to intervene in cultural markets will be sustained in the face of cultural, politico-economic, and technological pressures that are reconfiguring creative industries on an international scale. While the right to intervene was retained for the audiovisual sector in the FTA, by contrast, it appears that comparable unilateral rights to intervene will not operate for telecommunications, e-commerce or intellectual property (DFAT). Blurring Boundaries A lack of certainty for audiences is a by-product of industry change, and further blurs regulatory boundaries: new digital media content and overlapping delivering technologies are already a reality for Australia’s media regulators. These hypothetical media usage scenarios indicate how confusion over the appropriate regulatory agency may arise: 1. playing electronic games that use racist language; 2. being subjected to deceptive or misleading pop-up advertising online 3. receiving messaged imagery on your mobile phone that offends, disturbs, or annoys; 4. watching a program like World Idol with SMS voting that subsequently raises charging or billing issues; or 5. watching a new “reality” TV program where products are being promoted with no explicit acknowledgement of the underlying commercial arrangements either during or at the end of the program. These are all instances where, theoretically, regulatory mechanisms are in place that allow individuals to complain and to seek some kind of redress as consumers and citizens. In the last scenario, in commercial television under the sector code, no clear-cut rules exist as to the precise form of the disclosure—as there is (from 2000) in commercial radio. It’s one of a number of issues the peak TV industry lobby Commercial TV Australia (CTVA) is considering in their review of the industry’s code of practice. CTVA have proposed an amendment to the code that will simply formalise the already existing practice . That is, commercial arrangements that assist in the making of a program should be acknowledged either during programs, or in their credits. In my view, this amendment doesn’t go far enough in post “cash for comment” mediascapes (Dwyer). Audiences have a right to expect that broadcasters, production companies and program celebrities are open and transparent with the Australian community about these kinds of arrangements. They need to be far more clearly signposted, and people better informed about their role. In the US, the “Commercial Alert” <http://www.commercialalert.org/> organisation has been lobbying the Federal Communications Commission and the Federal Trade Commission to achieve similar in-program “visual acknowledgements.” The ABA’s Commercial Radio Inquiry (“Cash-for-Comment”) found widespread systemic regulatory failure and introduced three new standards. On that basis, how could a “standstill” response by CTVA, constitute best practice for such a pervasive and influential medium as contemporary commercial television? The World Idol example may lead to confusion for some audiences, who are unsure whether the issues involved relate to broadcasting or telecommunications. In fact, it could be dealt with as a complaint to the Telecommunication Industry Ombudsman (TIO) under an ACA registered, but Australian Communications Industry Forum (ACIF) developed, code of practice. These kind of cross-platform issues may become more vexed in future years from an audience’s perspective, especially if reality formats using on-screen premium rate service numbers invite audiences to participate, by sending MMS (multimedia messaging services) images or short video grabs over wireless networks. The political and cultural implications of this kind of audience interaction, in terms of access, participation, and more generally the symbolic power of media, may perhaps even indicate a longer-term shift in relations with consumers and citizens. In the Internet example, the Australian Competition and Consumer Commission’s (ACCC) Internet advertising jurisdiction would apply—not the ABA’s “co-regulatory” Internet content regime as some may have thought. Although the ACCC deals with complaints relating to Internet advertising, there won’t be much traction for them in a more complex issue that also includes, say, racist or religious bigotry. The DVD example would probably fall between the remits of the Office of Film and Literature Classification’s (OFLC) new “convergent” Guidelines for the Classification of Film and Computer Games and race discrimination legislation administered by the Human Rights and Equal Opportunity Commission (HREOC). The OFLC’s National Classification Scheme is really geared to provide consumer advice on media products that contain sexual and violent imagery or coarse language, rather than issues of racist language. And it’s unlikely that a single person would have the locus standito even apply for a reclassification. It may fall within the jurisdiction of the HREOC depending on whether it was played in public or not. Even then it would probably be considered exempt on free speech grounds as an “artistic work.” Unsolicited, potentially illegal, content transmitted via mobile wireless devices, in particular 3G phones, provide another example of content that falls between the media regulation cracks. It illustrates a potential content policy “turf grab” too. Image-enabled mobile phones create a variety of novel issues for content producers, network operators, regulators, parents and viewers. There is no one government media authority or agency with a remit to deal with this issue. Although it has elements relating to the regulatory activities of the ACA, the ABA, the OFLC, the TIO, and TISSC, the combination of illegal or potentially prohibited content and its carriage over wireless networks positions it outside their current frameworks. The ACA may argue it should have responsibility for this kind of content since: it now enforces the recently enacted Commonwealth anti-Spam laws; has registered an industry code of practice for unsolicited content delivered over wireless networks; is seeking to include ‘adult’ content within premium rate service numbers, and, has been actively involved in consumer education for mobile telephony. It has also worked with TISSC and the ABA in relation to telephone sex information services over voice networks. On the other hand, the ABA would probably argue that it has the relevant expertise for regulating wirelessly transmitted image-content, arising from its experience of Internet and free and subscription TV industries, under co-regulatory codes of practice. The OFLC can also stake its claim for policy and compliance expertise, since the recently implemented Guidelines for Classification of Film and Computer Games were specifically developed to address issues of industry convergence. These Guidelines now underpin the regulation of content across the film, TV, video, subscription TV, computer games and Internet sectors. Reshaping Institutions Debates around the “merged regulator” concept have occurred on and off for at least a decade, with vested interests in agencies and the executive jockeying to stake claims over new turf. On several occasions the debate has been given renewed impetus in the context of ruling conservative parties’ mooted changes to the ownership and control regime. It’s tended to highlight demarcations of remit, informed as they are by historical and legal developments, and the gradual accretion of regulatory cultures. Now the key pressure points for regulatory change include the mere existence of already converged single regulatory structures in those countries with whom we tend to triangulate our policy comparisons—the US, the UK and Canada—increasingly in a context of debates concerning international trade agreements; and, overlaying this, new media formats and devices are complicating existing institutional arrangements and legal frameworks. The Department of Communications, Information Technology & the Arts’s (DCITA) review brief was initially framed as “options for reform in spectrum management,” but was then widened to include “new institutional arrangements” for a converged regulator, to deal with visual content in the latest generation of mobile telephony, and other image-enabled wireless devices (DCITA). No other regulatory agencies appear, at this point, to be actively on the Government’s radar screen (although they previously have been). Were the review to look more inclusively, the ACCC, the OFLC and the specialist telecommunications bodies, the TIO and the TISSC may also be drawn in. Current regulatory arrangements see the ACA delegate responsibility for broadcasting services bands of the radio frequency spectrum to the ABA. In fact, spectrum management is the turf least contested by the regulatory players themselves, although the “convergent regulator” issue provokes considerable angst among powerful incumbent media players. The consensus that exists at a regulatory level can be linked to the scientific convention that holds the radio frequency spectrum is a continuum of electromagnetic bands. In this view, it becomes artificial to sever broadcasting, as “broadcasting services bands” from the other remaining highly diverse communications uses, as occurred from 1992 when the Broadcasting Services Act was introduced. The prospect of new forms of spectrum charging is highly alarming for commercial broadcasters. In a joint submission to the DCITA review, the peak TV and radio industry lobby groups have indicated they will fight tooth and nail to resist new regulatory arrangements that would see a move away from the existing licence fee arrangements. These are paid as a sliding scale percentage of gross earnings that, it has been argued by Julian Thomas and Marion McCutcheon, “do not reflect the amount of spectrum used by a broadcaster, do not reflect the opportunity cost of using the spectrum, and do not provide an incentive for broadcasters to pursue more efficient ways of delivering their services” (6). An economic rationalist logic underpins pressure to modify the spectrum management (and charging) regime, and undoubtedly contributes to the commercial broadcasting industry’s general paranoia about reform. Total revenues collected by the ABA and the ACA between 1997 and 2002 were, respectively, $1423 million and $3644.7 million. Of these sums, using auction mechanisms, the ABA collected $391 million, while the ACA collected some $3 billion. The sale of spectrum that will be returned to the Commonwealth by television broadcasters when analog spectrum is eventually switched off, around the end of the decade, is a salivating prospect for Treasury officials. The large sums that have been successfully raised by the ACA boosts their position in planning discussions for the convergent media regulatory agency. The way in which media outlets and regulators respond to publics is an enduring question for a democratic polity, irrespective of how the product itself has been mediated and accessed. Media regulation and civic responsibility, including frameworks for negotiating consumer and citizen rights, are fundamental democratic rights (Keane; Tambini). The ABA’s Commercial Radio Inquiry (‘cash for comment’) has also reminded us that regulatory frameworks are important at the level of corporate conduct, as well as how they negotiate relations with specific media audiences (Johnson; Turner; Gordon-Smith). Building publicly meaningful regulatory frameworks will be demanding: relationships with audiences are often complex as people are constructed as both consumers and citizens, through marketised media regulation, institutions and more recently, through hybridising program formats (Murdock and Golding; Lumby and Probyn). In TV, we’ve seen the growth of infotainment formats blending entertainment and informational aspects of media consumption. At a deeper level, changes in the regulatory landscape are symptomatic of broader tectonic shifts in the discourses of governance in advanced information economies from the late 1980s onwards, where deregulatory agendas created an increasing reliance on free market, business-oriented solutions to regulation. “Co-regulation” and “self-regulation’ became the preferred mechanisms to more direct state control. Yet, curiously contradicting these market transformations, we continue to witness recurring instances of direct intervention on the basis of censorship rationales (Dwyer and Stockbridge). That digital media content is “converging” between different technologies and modes of delivery is the norm in “new media” regulatory rhetoric. Others critique “visions of techno-glory,” arguing instead for a view that sees fundamental continuities in media technologies (Winston). But the socio-cultural impacts of new media developments surround us: the introduction of multichannel digital and interactive TV (in free-to-air and subscription variants); broadband access in the office and home; wirelessly delivered content and mobility, and, as Jock Given notes, around the corner, there’s the possibility of “an Amazon.Com of movies-on-demand, with the local video and DVD store replaced by online access to a distant server” (90). Taking a longer view of media history, these changes can be seen to be embedded in the global (and local) “innovation frontier” of converging digital media content industries and its transforming modes of delivery and access technologies (QUT/CIRAC/Cutler & Co). The activities of regulatory agencies will continue to be a source of policy rivalry and turf contestation until such time as a convergent regulator is established to the satisfaction of key players. However, there are risks that the benefits of institutional reshaping will not be readily available for either audiences or industry. In the past, the idea that media power and responsibility ought to coexist has been recognised in both the regulation of the media by the state, and the field of communications media analysis (Curran and Seaton; Couldry). But for now, as media industries transform, whatever the eventual institutional configuration, the evolution of media power in neo-liberal market mediascapes will challenge the ongoing capacity for interventions by national governments and their agencies. Works Cited Australian Broadcasting Authority. Commercial Radio Inquiry: Final Report of the Australian Broadcasting Authority. Sydney: ABA, 2000. Australian Communications Information Forum. Industry Code: Short Message Service (SMS) Issues. Dec. 2002. 8 Mar. 2004 <http://www.acif.org.au/__data/page/3235/C580_Dec_2002_ACA.pdf >. Commercial Television Australia. Draft Commercial Television Industry Code of Practice. Aug. 2003. 8 Mar. 2004 <http://www.ctva.com.au/control.cfm?page=codereview&pageID=171&menucat=1.2.110.171&Level=3>. Couldry, Nick. The Place of Media Power: Pilgrims and Witnesses of the Media Age. London: Routledge, 2000. Curran, James, and Jean Seaton. Power without Responsibility: The Press, Broadcasting and New Media in Britain. 6th ed. London: Routledge, 2003. Dept. of Communication, Information Technology and the Arts. Options for Structural Reform in Spectrum Management. Canberra: DCITA, Aug. 2002. ---. Proposal for New Institutional Arrangements for the ACA and the ABA. Aug. 2003. 8 Mar. 2004 <http://www.dcita.gov.au/Article/0,,0_1-2_1-4_116552,00.php>. Dept. of Foreign Affairs and Trade. Australia-United States Free Trade Agreement. Feb. 2004. 8 Mar. 2004 <http://www.dfat.gov.au/trade/negotiations/us_fta/outcomes/11_audio_visual.php>. Dwyer, Tim. Submission to Commercial Television Australia’s Review of the Commercial Television Industry’s Code of Practice. Sept. 2003. Dwyer, Tim, and Sally Stockbridge. “Putting Violence to Work in New Media Policies: Trends in Australian Internet, Computer Game and Video Regulation.” New Media and Society 1.2 (1999): 227-49. Given, Jock. America’s Pie: Trade and Culture After 9/11. Sydney: U of NSW P, 2003. Gordon-Smith, Michael. “Media Ethics After Cash-for-Comment.” The Media and Communications in Australia. Ed. Stuart Cunningham and Graeme Turner. Sydney: Allen and Unwin, 2002. Johnson, Rob. Cash-for-Comment: The Seduction of Journo Culture. Sydney: Pluto, 2000. Keane, John. The Media and Democracy. Cambridge: Polity, 1991. Lumby, Cathy, and Elspeth Probyn, eds. Remote Control: New Media, New Ethics. Melbourne: Cambridge UP, 2003. Murdock, Graham, and Peter Golding. “Information Poverty and Political Inequality: Citizenship in the Age of Privatized Communications.” Journal of Communication 39.3 (1991): 180-95. QUT, CIRAC, and Cutler & Co. Research and Innovation Systems in the Production of Digital Content and Applications: Report for the National Office for the Information Economy. Canberra: Commonwealth of Australia, Sept. 2003. Tambini, Damian. Universal Access: A Realistic View. IPPR/Citizens Online Research Publication 1. London: IPPR, 2000. Thomas, Julian and Marion McCutcheon. “Is Broadcasting Special? Charging for Spectrum.” Conference paper. ABA conference, Canberra. May 2003. Turner, Graeme. “Talkback, Advertising and Journalism: A cautionary tale of self-regulated radio”. International Journal of Cultural Studies 3.2 (2000): 247-255. ---. “Reshaping Australian Institutions: Popular Culture, the Market and the Public Sphere.” Culture in Australia: Policies, Publics and Programs. Ed. Tony Bennett and David Carter. Melbourne: Cambridge UP, 2001. Winston, Brian. Media, Technology and Society: A History from the Telegraph to the Internet. London: Routledge, 1998. Web Links http://www.aba.gov.au http://www.aca.gov.au http://www.accc.gov.au http://www.acif.org.au http://www.adma.com.au http://www.ctva.com.au http://www.crtc.gc.ca http://www.dcita.com.au http://www.dfat.gov.au http://www.fcc.gov http://www.ippr.org.uk http://www.ofcom.org.uk http://www.oflc.gov.au Links http://www.commercialalert.org/ Citation reference for this article MLA Style Dwyer, Tim. "Transformations" M/C: A Journal of Media and Culture <http://www.media-culture.org.au/0403/06-transformations.php>. APA Style Dwyer, T. (2004, Mar17). Transformations. M/C: A Journal of Media and Culture, 7, <http://www.media-culture.org.au/0403/06-transformations.php>
APA, Harvard, Vancouver, ISO, and other styles
46

Musgrove, Brian Michael. "Recovering Public Memory: Politics, Aesthetics and Contempt." M/C Journal 11, no. 6 (2008). http://dx.doi.org/10.5204/mcj.108.

Full text
Abstract:
1. Guy Debord in the Land of the Long WeekendIt’s the weekend – leisure time. It’s the interlude when, Guy Debord contends, the proletarian is briefly free of the “total contempt so clearly built into every aspect of the organization and management of production” in commodity capitalism; when workers are temporarily “treated like grown-ups, with a great show of solicitude and politeness, in their new role as consumers.” But this patronising show turns out to be another form of subjection to the diktats of “political economy”: “the totality of human existence falls under the regime of the ‘perfected denial of man’.” (30). As Debord suggests, even the creation of leisure time and space is predicated upon a form of contempt: the “perfected denial” of who we, as living people, really are in the eyes of those who presume the power to legislate our working practices and private identities.This Saturday The Weekend Australian runs an opinion piece by Christopher Pearson, defending ABC Radio National’s Stephen Crittenden, whose program The Religion Report has been axed. “Some of Crittenden’s finest half-hours have been devoted to Islam in Australia in the wake of September 11,” Pearson writes. “Again and again he’s confronted a left-of-centre audience that expected multi-cultural pieties with disturbing assertions.” Along the way in this admirable Crusade, Pearson notes that Crittenden has exposed “the Left’s recent tendency to ally itself with Islam.” According to Pearson, Crittenden has also thankfully given oxygen to claims by James Cook University’s Mervyn Bendle, the “fairly conservative academic whose work sometimes appears in [these] pages,” that “the discipline of critical terrorism studies has been captured by neo-Marxists of a postmodern bent” (30). Both of these points are well beyond misunderstanding or untested proposition. If Pearson means them sincerely he should be embarrassed and sacked. But of course he does not and will not be. These are deliberate lies, the confabulations of an eminent right-wing culture warrior whose job is to vilify minorities and intellectuals (Bendle escapes censure as an academic because he occasionally scribbles for the Murdoch press). It should be observed, too, how the patent absurdity of Pearson’s remarks reveals the extent to which he holds the intelligence of his readers in contempt. And he is not original in peddling these toxic wares.In their insightful—often hilarious—study of Australian opinion writers, The War on Democracy, Niall Lucy and Steve Mickler identify the left-academic-Islam nexus as the brain-child of former Treasurer-cum-memoirist Peter Costello. The germinal moment was “a speech to the Australian American Leadership Dialogue forum at the Art Gallery of NSW in 2005” concerning anti-Americanism in Australian schools. Lucy and Mickler argue that “it was only a matter of time” before a conservative politician or journalist took the plunge to link the left and terrorism, and Costello plunged brilliantly. He drew a mental map of the Great Chain of Being: left-wing academics taught teacher trainees to be anti-American; teacher trainees became teachers and taught kids to be anti-American; anti-Americanism morphs into anti-Westernism; anti-Westernism veers into terrorism (38). This is contempt for the reasoning capacity of the Australian people and, further still, contempt for any observable reality. Not for nothing was Costello generally perceived by the public as a politician whose very physiognomy radiated smugness and contempt.Recycling Costello, Christopher Pearson’s article subtly interpellates the reader as an ordinary, common-sense individual who instinctively feels what’s right and has no need to think too much—thinking too much is the prerogative of “neo-Marxists” and postmodernists. Ultimately, Pearson’s article is about channelling outrage: directing the down-to-earth passions of the Australian people against stock-in-trade culture-war hate figures. And in Pearson’s paranoid world, words like “neo-Marxist” and “postmodern” are devoid of historical or intellectual meaning. They are, as Lucy and Mickler’s War on Democracy repeatedly demonstrate, mere ciphers packed with the baggage of contempt for independent critical thought itself.Contempt is everywhere this weekend. The Weekend Australian’s colour magazine runs a feature story on Malcolm Turnbull: one of those familiar profiles designed to reveal the everyday human touch of the political classes. In this puff-piece, Jennifer Hewett finds Turnbull has “a restless passion for participating in public life” (20); that beneath “the aggressive political rhetoric […] behind the journalist turned lawyer turned banker turned politician turned would-be prime minister is a man who really enjoys that human interaction, however brief, with the many, many ordinary people he encounters” (16). Given all this energetic turning, it’s a wonder that Turnbull has time for human interactions at all. The distinction here of Turnbull and “many, many ordinary people” – the anonymous masses – surely runs counter to Hewett’s brief to personalise and quotidianise him. Likewise, those two key words, “however brief”, have an unfortunate, unintended effect. Presumably meant to conjure a picture of Turnbull’s hectic schedules and serial turnings, the words also convey the image of a patrician who begrudgingly knows one of the costs of a political career is that common flesh must be pressed—but as gingerly as possible.Hewett proceeds to disclose that Turnbull is “no conservative cultural warrior”, “onfounds stereotypes” and “hates labels” (like any baby-boomer rebel) and “has always read widely on political philosophy—his favourite is Edmund Burke”. He sees the “role of the state above all as enabling people to do their best” but knows that “the main game is the economy” and is “content to play mainstream gesture politics” (19). I am genuinely puzzled by this and imagine that my intelligence is being held in contempt once again. That the man of substance is given to populist gesturing is problematic enough; but that the Burke fan believes the state is about personal empowerment is just too much. Maybe Turnbull is a fan of Burke’s complex writings on the sublime and the beautiful—but no, Hewett avers, Turnbull is engaged by Burke’s “political philosophy”. So what is it in Burke that Turnbull finds to favour?Turnbull’s invocation of Edmund Burke is empty, gestural and contradictory. The comfortable notion that the state helps people to realise their potential is contravened by Burke’s view that the state functions so “the inclinations of men should frequently be thwarted, their will controlled, and their passions brought into subjection… by a power out of themselves” (151). Nor does Burke believe that anyone of humble origins could or should rise to the top of the social heap: “The occupation of an hair-dresser, or of a working tallow-chandler, cannot be a matter of honour to any person… the state suffers oppression, if such as they, either individually or collectively, are permitted to rule” (138).If Turnbull’s main game as a would-be statesman is the economy, Burke profoundly disagrees: “the state ought not to be considered as nothing better than a partnership agreement in a trade of pepper and coffee, callico or tobacco, or some other such low concern… It is a partnership in all science; a partnership in all art; a partnership in every virtue, and in all perfection”—a sublime entity, not an economic manager (194). Burke understands, long before Antonio Gramsci or Louis Althusser, that individuals or social fractions must be made admirably “obedient” to the state “by consent or force” (195). Burke has a verdict on mainstream gesture politics too: “When men of rank sacrifice all ideas of dignity to an ambition without a distinct object, and work with low instruments and for low ends, the whole composition [of the state] becomes low and base” (136).Is Malcolm Turnbull so contemptuous of the public that he assumes nobody will notice the gross discrepancies between his own ideals and what Burke stands for? His invocation of Burke is, indeed, “mainstream gesture politics”: on one level, “Burke” signifies nothing more than Turnbull’s performance of himself as a deep thinker. In this process, the real Edmund Burke is historically erased; reduced to the status of stage-prop in the theatrical production of Turnbull’s mass-mediated identity. “Edmund Burke” is re-invented as a term in an aesthetic repertoire.This transmutation of knowledge and history into mere cipher is the staple trick of culture-war discourse. Jennifer Hewett casts Turnbull as “no conservative culture warrior”, but he certainly shows a facility with culture-war rhetoric. And as much as Turnbull “confounds stereotypes” his verbal gesture to Edmund Burke entrenches a stereotype: at another level, the incantation “Edmund Burke” is implicitly meant to connect Turnbull with conservative tradition—in the exact way that John Howard regularly self-nominated as a “Burkean conservative”.This appeal to tradition effectively places “the people” in a power relation. Tradition has a sublimity that is bigger than us; it precedes us and will outlast us. Consequently, for a politician to claim that tradition has fashioned him, that he is welded to it or perhaps even owns it as part of his heritage, is to glibly imply an authority greater than that of “the many, many ordinary people”—Burke’s hair-dressers and tallow-chandlers—whose company he so briefly enjoys.In The Ideology of the Aesthetic, Terry Eagleton assesses one of Burke’s important legacies, placing him beside another eighteenth-century thinker so loved by the right—Adam Smith. Ideology of the Aesthetic is premised on the view that “Aesthetics is born as a discourse of the body”; that the aesthetic gives form to the “primitive materialism” of human passions and organises “the whole of our sensate life together… a society’s somatic, sensational life” (13). Reading Smith’s Theory of Moral Sentiments, Eagleton discerns that society appears as “an immense machine, whose regular and harmonious movements produce a thousand agreeable effects”, like “any production of human art”. In Smith’s work, the “whole of social life is aestheticized” and people inhabit “a social order so spontaneously cohesive that its members no longer need to think about it.” In Burke, Eagleton discovers that the aesthetics of “manners” can be understood in terms of Gramscian hegemony: “in the aesthetics of social conduct, or ‘culture’ as it would later be called, the law is always with us, as the very unconscious structure of our life”, and as a result conformity to a dominant ideological order is deeply felt as pleasurable and beautiful (37, 42). When this conservative aesthetic enters the realm of politics, Eagleton contends, the “right turn, from Burke” onwards follows a dark trajectory: “forget about theoretical analysis… view society as a self-grounding organism, all of whose parts miraculously interpenetrate without conflict and require no rational justification. Think with the blood and the body. Remember that tradition is always wiser and richer than one’s own poor, pitiable ego. It is this line of descent, in one of its tributaries, which will lead to the Third Reich” (368–9).2. Jean Baudrillard, the Nazis and Public MemoryIn 1937, during the Spanish Civil War, the Third Reich’s Condor Legion of the Luftwaffe was on loan to Franco’s forces. On 26 April that year, the Condor Legion bombed the market-town of Guernica: the first deliberate attempt to obliterate an entire town from the air and the first experiment in what became known as “terror bombing”—the targeting of civilians. A legacy of this violence was Pablo Picasso’s monumental canvas Guernica – the best-known anti-war painting in art history.When US Secretary of State Colin Powell addressed the United Nations on 5 February 2003 to make the case for war on Iraq, he stopped to face the press in the UN building’s lobby. The doorstop was globally televised, packaged as a moment of incredible significance: history in the making. It was also theatre: a moment in which history was staged as “event” and the real traces of history were carefully erased. Millions of viewers world-wide were undoubtedly unaware that the blue backdrop before which Powell stood was specifically designed to cover the full-scale tapestry copy of Picasso’s Guernica. This one-act, agitprop drama was a splendid example of politics as aesthetic action: a “performance” of history in the making which required the loss of actual historical memory enshrined in Guernica. Powell’s performance took its cues from the culture wars, which require the ceaseless erasure of history and public memory—on this occasion enacted on a breathtaking global, rather than national, scale.Inside the UN chamber, Powell’s performance was equally staged-crafted. As he brandished vials of ersatz anthrax, the power-point behind him (the theatrical set) showed artists’ impressions of imaginary mobile chemical weapons laboratories. Powell was playing lead role in a kind of populist, hyperreal production. It was Jean Baudrillard’s postmodernism, no less, as the media space in which Powell acted out the drama was not a secondary representation of reality but a reality of its own; the overheads of mobile weapons labs were simulacra, “models of a real without origins or reality”, pictures referring to nothing but themselves (2). In short, Powell’s performance was anchored in a “semiurgic” aesthetic; and it was a dreadful real-life enactment of Walter Benjamin’s maxim that “All efforts to render politics aesthetic culminate in one thing: war” (241).For Benjamin, “Fascism attempts to organize the newly created proletarian masses without affecting the property structure which the masses strive to eliminate.” Fascism gave “these masses not their right, but instead a chance to express themselves.” In turn, this required “the introduction of aesthetics into politics”, the objective of which was “the production of ritual values” (241). Under Adolf Hitler’s Reich, people were able to express themselves but only via the rehearsal of officially produced ritual values: by their participation in the disquisition on what Germany meant and what it meant to be German, by the aesthetic regulation of their passions. As Frederic Spotts’ fine study Hitler and the Power of Aesthetics reveals, this passionate disquisition permeated public and private life, through the artfully constructed total field of national narratives, myths, symbols and iconographies. And the ritualistic reiteration of national values in Nazi Germany hinged on two things: contempt and memory loss.By April 1945, as Berlin fell, Hitler’s contempt for the German people was at its apogee. Hitler ordered a scorched earth operation: the destruction of everything from factories to farms to food stores. The Russians would get nothing, the German people would perish. Albert Speer refused to implement the plan and remembered that “Until then… Germany and Hitler had been synonymous in my mind. But now I saw two entities opposed… A passionate love of one’s country… a leader who seemed to hate his people” (Sereny 472). But Hitler’s contempt for the German people was betrayed in the blusterous pages of Mein Kampf years earlier: “The receptivity of the great masses is very limited, their intelligence is small, but their power of forgetting is enormous” (165). On the back of this belief, Hitler launched what today would be called a culture war, with its Jewish folk devils, loathsome Marxist intellectuals, incitement of popular passions, invented traditions, historical erasures and constant iteration of values.When Theodor Adorno and Max Horkheimer fled Fascism, landing in the United States, their view of capitalist democracy borrowed from Benjamin and anticipated both Baudrillard and Guy Debord. In their well-know essay on “The Culture Industry”, in Dialectic of Enlightenment, they applied Benjamin’s insight on mass self-expression and the maintenance of property relations and ritual values to American popular culture: “All are free to dance and enjoy themselves”, but the freedom to choose how to do so “proves to be the freedom to choose what is always the same”, manufactured by monopoly capital (161–162). Anticipating Baudrillard, they found a society in which “only the copy appears: in the movie theatre, the photograph; on the radio, the recording” (143). And anticipating Debord’s “perfected denial of man” they found a society where work and leisure were structured by the repetition-compulsion principles of capitalism: where people became consumers who appeared “s statistics on research organization charts” (123). “Culture” came to do people’s thinking for them: “Pleasure always means not to think about anything, to forget suffering even where it is shown” (144).In this mass-mediated environment, a culture of repetitions, simulacra, billboards and flickering screens, Adorno and Horkheimer concluded that language lost its historical anchorages: “Innumerable people use words and expressions which they have either ceased to understand or employ only because they trigger off conditioned reflexes” in precisely the same way that the illusory “free” expression of passions in Germany operated, where words were “debased by the Fascist pseudo-folk community” (166).I know that the turf of the culture wars, the US and Australia, are not Fascist states; and I know that “the first one to mention the Nazis loses the argument”. I know, too, that there are obvious shortcomings in Adorno and Horkheimer’s reactions to popular culture and these have been widely criticised. However, I would suggest that there is a great deal of value still in Frankfurt School analyses of what we might call the “authoritarian popular” which can be applied to the conservative prosecution of populist culture wars today. Think, for example, how the concept of a “pseudo folk community” might well describe the earthy, common-sense public constructed and interpellated by right-wing culture warriors: America’s Joe Six-Pack, John Howard’s battlers or Kevin Rudd’s working families.In fact, Adorno and Horkheimer’s observations on language go to the heart of a contemporary culture war strategy. Words lose their history, becoming ciphers and “triggers” in a politicised lexicon. Later, Roland Barthes would write that this is a form of myth-making: “myth is constituted by the loss of the historical quality of things.” Barthes reasoned further that “Bourgeois ideology continuously transforms the products of history into essential types”, generating a “cultural logic” and an ideological re-ordering of the world (142). Types such as “neo-Marxist”, “postmodernist” and “Burkean conservative”.Surely, Benjamin’s assessment that Fascism gives “the people” the occasion to express itself, but only through “values”, describes the right’s pernicious incitement of the mythic “dispossessed mainstream” to reclaim its voice: to shout down the noisy minorities—the gays, greenies, blacks, feminists, multiculturalists and neo-Marxist postmodernists—who’ve apparently been running the show. Even more telling, Benjamin’s insight that the incitement to self-expression is connected to the maintenance of property relations, to economic power, is crucial to understanding the contemptuous conduct of culture wars.3. Jesus Dunked in Urine from Kansas to CronullaAmerican commentator Thomas Frank bases his study What’s the Matter with Kansas? on this very point. Subtitled How Conservatives Won the Heart of America, Frank’s book is a striking analysis of the indexation of Chicago School free-market reform and the mobilisation of “explosive social issues—summoning public outrage over everything from busing to un-Christian art—which it then marries to pro-business policies”; but it is the “economic achievements” of free-market capitalism, “not the forgettable skirmishes of the never-ending culture wars” that are conservatism’s “greatest monuments.” Nevertheless, the culture wars are necessary as Chicago School economic thinking consigns American communities to the rust belt. The promise of “free-market miracles” fails ordinary Americans, Frank reasons, leaving them in “backlash” mode: angry, bewildered and broke. And in this context, culture wars are a convenient form of anger management: “Because some artist decides to shock the hicks by dunking Jesus in urine, the entire planet must remake itself along the lines preferred” by nationalist, populist moralism and free-market fundamentalism (5).When John Howard received the neo-conservative American Enterprise Institute’s Irving Kristol Award, on 6 March 2008, he gave a speech in Washington titled “Sharing Our Common Values”. The nub of the speech was Howard’s revelation that he understood the index of neo-liberal economics and culture wars precisely as Thomas Frank does. Howard told the AEI audience that under his prime ministership Australia had “pursued reform and further modernisation of our economy” and that this inevitably meant “dislocation for communities”. This “reform-dislocation” package needed the palliative of a culture war, with his government preaching the “consistency and reassurance” of “our nation’s traditional values… pride in her history”; his government “became assertive about the intrinsic worth of our national identity. In the process we ended the seemingly endless seminar about that identity which had been in progress for some years.” Howard’s boast that his government ended the “seminar” on national identity insinuates an important point. “Seminar” is a culture-war cipher for intellection, just as “pride” is code for passion; so Howard’s self-proclaimed achievement, in Terry Eagleton’s terms, was to valorise “the blood and the body” over “theoretical analysis”. This speaks stratospheric contempt: ordinary people have their identity fashioned for them; they need not think about it, only feel it deeply and passionately according to “ritual values”. Undoubtedly this paved the way to Cronulla.The rubric of Howard’s speech—“Sharing Our Common Values”—was both a homage to international neo-conservatism and a reminder that culture wars are a trans-national phenomenon. In his address, Howard said that in all his “years in politics” he had not heard a “more evocative political slogan” than Ronald Reagan’s “Morning in America”—the rhetorical catch-cry for moral re-awakening that launched the culture wars. According to Lawrence Grossberg, America’s culture wars were predicated on the perception that the nation was afflicted by “a crisis of our lack of passion, of not caring enough about the values we hold… a crisis of nihilism which, while not restructuring our ideological beliefs, has undermined our ability to organise effective action on their behalf”; and this “New Right” alarmism “operates in the conjuncture of economics and popular culture” and “a popular struggle by which culture can lead politics” in the passionate pursuit of ritual values (31–2). When popular culture leads politics in this way we are in the zone of the image, myth and Adorno and Horkheimer’s “trigger words” that have lost their history. In this context, McKenzie Wark observes that “radical writers influenced by Marx will see the idea of culture as compensation for a fragmented and alienated life as a con. Guy Debord, perhaps the last of the great revolutionary thinkers of Europe, will call it “the spectacle”’ (20). Adorno and Horkheimer might well have called it “the authoritarian popular”. As Jonathan Charteris-Black’s work capably demonstrates, all politicians have their own idiolect: their personally coded language, preferred narratives and myths; their own vision of who “the people” might or should be that is conjured in their words. But the language of the culture wars is different. It is not a personal idiolect. It is a shared vocabulary, a networked vernacular, a pervasive trans-national aesthetic that pivots on the fact that words like “neo-Marxist”, “postmodern” and “Edmund Burke” have no historical or intellectual context or content: they exist as the ciphers of “values”. And the fact that culture warriors continually mouth them is a supreme act of contempt: it robs the public of its memory. And that’s why, as Lucy and Mickler’s War on Democracy so wittily argues, if there are any postmodernists left they’ll be on the right.Benjamin, Adorno, Horkheimer and, later, Debord and Grossberg understood how the political activation of the popular constitutes a hegemonic project. The result is nothing short of persuading “the people” to collaborate in its own oppression. The activation of the popular is perfectly geared to an age where the main stage of political life is the mainstream media; an age in which, Charteris-Black notes, political classes assume the general antipathy of publics to social change and act on the principle that the most effective political messages are sold to “the people” by an appeal “to familiar experiences”—market populism (10). In her substantial study The Persuaders, Sally Young cites an Australian Labor Party survey, conducted by pollster Rod Cameron in the late 1970s, in which the party’s message machine was finely tuned to this populist position. The survey also dripped with contempt for ordinary people: their “Interest in political philosophy… is very low… They are essentially the products (and supporters) of mass market commercialism”. Young observes that this view of “the people” was the foundation of a new order of political advertising and the conduct of politics on the mass-media stage. Cameron’s profile of “ordinary people” went on to assert that they are fatally attracted to “a moderate leader who is strong… but can understand and represent their value system” (47): a prescription for populist discourse which begs the question of whether the values a politician or party represent via the media are ever really those of “the people”. More likely, people are hegemonised into a value system which they take to be theirs. Writing of the media side of the equation, David Salter raises the point that when media “moguls thunder about ‘the public interest’ what they really mean is ‘what we think the public is interested in”, which is quite another matter… Why this self-serving deception is still so sheepishly accepted by the same public it is so often used to violate remains a mystery” (40).Sally Young’s Persuaders retails a story that she sees as “symbolic” of the new world of mass-mediated political life. The story concerns Mark Latham and his “revolutionary” journeys to regional Australia to meet the people. “When a political leader who holds a public meeting is dubbed a ‘revolutionary’”, Young rightly observes, “something has gone seriously wrong”. She notes how Latham’s “use of old-fashioned ‘meet-and-greet’campaigning methods was seen as a breath of fresh air because it was unlike the type of packaged, stage-managed and media-dependent politics that have become the norm in Australia.” Except that it wasn’t. “A media pack of thirty journalists trailed Latham in a bus”, meaning, that he was not meeting the people at all (6–7). He was traducing the people as participants in a media spectacle, as his “meet and greet” was designed to fill the image-banks of print and electronic media. Even meeting the people becomes a media pseudo-event in which the people impersonate the people for the camera’s benefit; a spectacle as artfully deceitful as Colin Powell’s UN performance on Iraq.If the success of this kind of “self-serving deception” is a mystery to David Salter, it would not be so to the Frankfurt School. For them, an understanding of the processes of mass-mediated politics sits somewhere near the core of their analysis of the culture industries in the “democratic” world. I think the Frankfurt school should be restored to a more important role in the project of cultural studies. Apart from an aversion to jazz and other supposedly “elitist” heresies, thinkers like Adorno, Benjamin, Horkheimer and their progeny Debord have a functional claim to provide the theory for us to expose the machinations of the politics of contempt and its aesthetic ruses.ReferencesAdorno, Theodor and Max Horkheimer. "The Culture Industry: Enlightenment as Mass Deception." Dialectic of Enlightenment. London: Verso, 1979. 120–167.Barthes Roland. “Myth Today.” Mythologies. Trans. Annette Lavers. St Albans: Paladin, 1972. 109–58.Baudrillard, Jean. Simulations. New York: Semiotext(e), 1983.Benjamin, Walter. “The Work of Art in the Age of Mechanical Reproduction.” Illuminations. Ed. Hannah Arendt. Trans. Harry Zorn. New York: Schocken Books, 1969. 217–251.Burke, Edmund. Reflections on the Revolution in France. Ed. Conor Cruise O’Brien. Harmondsworth: Penguin, 1969.Charteris-Black, Jonathan. Politicians and Rhetoric: The Persuasive Power of Metaphor. Houndmills: Palgrave Macmillan, 2006.Debord, Guy. The Society of the Spectacle. Trans. Donald Nicholson-Smith. New York: Zone Books, 1994.Eagleton, Terry. The Ideology of the Aesthetic. Oxford: Basil Blackwell, 1990.Frank, Thomas. What’s the Matter with Kansas?: How Conservatives Won the Heart of America. New York: Henry Holt and Company, 2004.Grossberg, Lawrence. “It’s a Sin: Politics, Post-Modernity and the Popular.” It’s a Sin: Essays on Postmodern Politics & Culture. Eds. Tony Fry, Ann Curthoys and Paul Patton. Sydney: Power Publications, 1988. 6–71.Hewett, Jennifer. “The Opportunist.” The Weekend Australian Magazine. 25–26 October 2008. 16–22.Hitler, Adolf. Mein Kampf. Trans. Ralph Manheim. London: Pimlico, 1993.Howard, John. “Sharing Our Common Values.” Washington: Irving Kristol Lecture, American Enterprise Institute. 5 March 2008. ‹http://www.theaustralian.news.com.au/story/0,25197,233328945-5014047,00html›.Lucy, Niall and Steve Mickler. The War on Democracy: Conservative Opinion in the Australian Press. Crawley: University of Western Australia Press, 2006.Pearson, Christopher. “Pray for Sense to Prevail.” The Weekend Australian. 25–26 October 2008. 30.Salter, David. The Media We Deserve: Underachievement in the Fourth Estate. Melbourne: Melbourne UP, 2007. Sereny, Gitta. Albert Speer: His Battle with Truth. London: Picador, 1996.Spotts, Frederic. Hitler and the Power of Aesthetics. London: Pimlico, 2003.Wark, McKenzie. The Virtual Republic: Australia’s Culture Wars of the 1990s. St Leonards: Allen & Unwin, 1997.Young, Sally. The Persuaders: Inside the Hidden Machine of Political Advertising. Melbourne: Pluto Press, 2004.
APA, Harvard, Vancouver, ISO, and other styles
47

Foith, Michael. "Virtually Witness Augmentation Now: Video Games and the Future of Human Enhancement." M/C Journal 16, no. 6 (2013). http://dx.doi.org/10.5204/mcj.729.

Full text
Abstract:
Introduction Ever-enduring advancements in science and technology promise to offer solutions to problems or simply to make life a bit easier. However, not every advancement has only positive effects, but can also have undesired, negative ramifications. This article will take a closer look at Deus Ex: Human Revolution (DXHR), a dystopian video game which promises to put players in the position of deciding whether the science of human enhancement is a way to try to play God, or whether it enables us “to become the Gods we’ve always been striving to be” (Eidos Montreal, “Deus Ex: Human Revolution”). In this article I will argue that DXHR creates a space in which players can virtually witness future technologies for human performance enhancement without the need to alter their own bodies. DXHR is special particularly in two respects: first, the developers have achieved a high credibility and scientific realism of the enhancement technologies depicted in the game which can be described as being “diegetic prototypes” (Kirby, “The Future Is Now ” 43); second, the game directly invites players to reflect upon the impact and morality of human enhancement. It does so through a story in line with the cyberpunk genre, which envisions not only the potential benefits of an emergent technology, but has an even stronger focus on the negative contingencies. The game and its developers foresee a near-future society that is split into two fractions due to human enhancement technologies which come in the form of neuro-implants and mechanical prosthetics; and they foresee a near-future setting in which people are socially and economically forced to undergo enhancement surgery in order to keep up with the augmented competition. DXHR is set in the year 2027 and the player takes control of Adam Jensen, an ex-SWAT police officer who is now the chief of security of Sarif Industries, one of the world's leading biotechnology companies that produce enhancement technologies. Augmented terrorists attack Sarif Industries, abduct the head scientists, and nearly kill Jensen. Jensen merely survives because his boss puts him through enhancement surgery, which replaces many parts of his body with mechanical augmentations. In the course of the game it becomes clear that Jensen has been augmented beyond any life-saving necessity that grants him superhuman abilities and allows him to find and defeat the terrorists, but the augmentations also challenge his humanity. Is Jensen a human, a cyborg, or has he become more machine than man? DXHR grants players the illusion of immersion into a virtual world in which augmentations exist as a matter of fact and in which a certain level of control can be practiced. Players take up the role of a character distinctly more powerful and capable than the person in control, exceeding the limits of human abilities. The superior abilities are a result of scientific and technological advancements implying that every man or woman is able to attain the same abilities by simply acquiring augmentations. Thus, with the help of the playable character, Adam Jensen, the game lets players experience augmentations without any irreparable damages done to their bodies, but the experience will leave a lasting impression on players regarding the science of human enhancement. The experience with augmentations happens through and benefits from the effect of “virtual witnessing”: The technology of virtual witnessing involves the production in a reader’s mind of such an image of an experimental scene as obviates the necessity for either direct witness or replication. Through virtual witnessing the multiplication of witnesses could be, in principle, unlimited. (Shapin and Schaffer 60) In other words, simply by reading about and/or seeing scientific advancements, audiences can witness them without having to be present at the site of creation. The video game, hereby, is itself the medium of virtual witnessing whereby audiences can experience scientific advancements. Nevertheless, the video game is not just about reading or seeing potential future enhancement technologies, but permits players to virtually test-drive augmentations—to actually try out three-dimensionally rendered prototypes on a virtual body. In order to justify this thesis, a couple of things need to be clarified that explain in which ways the virtual witnessing of fictional enhancements in DXHR is a valid claim. Getting into the Game First I want to briefly describe how I investigated the stated issue. I have undertaken an auto-ethnography (Ellis, Adams, and Bochner) of DXHR, which concretely means that I have analytically played DXHR in an explorative fashion (Aarseth) trying to discover as many elements on human enhancement that the game has to offer. This method requires not only close observation of the virtual environment and documentation through field notes and screenshots, but also self-reflection of the actions that I chose to take and that were offered to me in the course of the game. An essential part of analytically playing a game is to be aware that the material requires “the activity of an actual player in order to be accessible for scrutiny” (Iversen), and that the player’s input fundamentally shapes the gaming experience (Juul 42). The meaning of the game is contingent upon the contribution of the player, especially in times in which digital games grant players more and more freedom in terms of narrative construction. In contrast to traditional narrative, the game poses an active challenge to the player which entails the need to become better in relation to the game’s mechanics and hence “studying games … implies interacting with the game rules and exploring the possibilities created by these rules, in addition to studying the graphical codes or the narration that unfolds” (Malliet). It is important to highlight that, although the visual representation of human enhancement technologies has an enormous potential impact on the player’s experience, it is not the only crucial element. Next to the representational shell, the core of the game, i.e. “how game rules and interactions with game objects and other players are structured” (Mäyrä 165), shapes the virtual witnessing of the augmentations in just an important way. Finally, the empirical material that was collected was analyzed and interpreted with the help of close-reading (Bizzocchi and Tanenbaum 395). In addition to the game itself, I have enriched my empirical material with interviews of developers of the game that are partly freely available on the Internet, and with the promotional material such as the trailers and a website (Eidos Montreal, “Sarif Industries”) that was released prior to the game. Sociotechnical Imaginaries In this case study of DXHR I have not only investigated how augmented bodies and enhancement technologies are represented in this specific video game, but also attempted to uncover which “sociotechnical imaginaries” (Jasanoff and Kim) underlie the game and support the virtual witnessing experience. Sociotechnical imaginaries are defined as “collectively imagined forms of social life and social order reflected in the design and fulfillment of nation-specific scientific and/or technological projects” (Jasanoff and Kim 120). The concept appeared to be suitable for this study as it covers and includes “promises, visions and expectations of future possibilities” (Jasanoff and Kim 122) of a technology as well as “implicit understandings of what is good or desirable in the social world writ large” (Jasanoff and Kim 122–23). The game draws upon several imaginaries of human enhancement. For example, the most basic imaginary in the game is that advanced engineered prosthetics and implants will be able to not only remedy dysfunctional parts of the human body, but will be able to upgrade these. Apart from this idea, the two prevailing sociotechnical imaginaries that forward the narrative can be subsumed as the transhumanist and the purist imaginary. The latter views human enhancement, with the help of science and technology, as unnatural and as a threat to humanity particularly through the power that it grants to individuals, while the former transports the opposing view. Transhumanism is: the intellectual and cultural movement that affirms the possibility and desirability of fundamentally improving the human condition through applied reason, especially by developing and making widely available technologies to eliminate aging and to greatly enhance human intellectual, physical, and psychological capacities. (Chrislenko et al.) The transhumanist imaginary in the game views technological development of the body as another step in the human evolution, not as something abhorrent to nature, but a fundamental human quality. Similar ideas can be found in the writings of Sigmund Freud and Arnold Gehlen, who both view the human being’s need to improve as part of its culture. Gehlen described the human as a “Mängelwesen”—a ‘deficient’ creature—who is, in contrast to other species, not specialized to a specific environment, but has the ability to adapt to nearly every situation because of this deficiency (Menne, Trutwin, and Türk). Freud even denoted the human as a “Prothesengott”—a god of prostheses: By means of all his tools, man makes his own organs more perfect—both the motor and the sensory—or else removes the obstacles in the way of their activity. Machinery places gigantic power at his disposal which, like his muscles, he can employ in any direction; ships and aircraft have the effect that neither air nor water can prevent his traversing them. With spectacles he corrects the defects of the lens in his own eyes; with telescopes he looks at far distances; with the microscope he overcomes the limitations in visibility due to the structure of his retina. (Freud 15) Returning to DXHR, how do the sociotechnical imaginaries matter for the player? Primarily, the imaginaries cannot be avoided as they pervade nearly every element in the game, from the main story that hinges upon human enhancement over the many optional side missions, to contextual elements such as a conference on “the next steps in human evolution” (Eidos Montreal, “Deus Ex: Human Revolution”). Most importantly, it impacts the player’s view in a crucial way. Human enhancement technologies are presented as controversial, neither exclusively good nor bad, which require reflection and perhaps even legal regulation. In this way, DXHR can be seen as offering the player a restricted building set of sociotechnical imaginaries of human enhancement, whereby the protagonist, Adam Jensen, becomes the player’s vessel to construct one’s own individual imaginary. In the end the player is forced to choose one of four outcomes to complete the game, and this choice can be quite difficult to make. Anticipation of the Future It is not unusual for video games to feature futuristic technologies that do not exist in the real world, but what makes DXHR distinct from others is that the developers have included an extent of information that goes beyond any game playing necessity (see Figures 1 & 2). Moreover, the information is not fictional but the developers have taken strategic steps to make it credible. Mary DeMarle, the narrative designer, explained at the San Diego Comic-Con in 2011, that a timeline of augmentation was created during the production phase in which the present state of technology was extrapolated into the future. In small incremental steps the developers have anticipated which enhancement technologies might be potentially feasible by the year 2027. Their efforts were supported by the science consultant, Will Rosellini, who voluntarily approached the development team to help. Being a neuroscientist, he could not have been a more fitting candidate for the job as he is actively working and researching in the biotechnology sector. He has co-founded two companies, MicroTransponder Inc., which produces tiny implantable wireless devices to interface with the nervous system to remedy diseases (see Rosellini’s presentation at the 2011 Comic-Con) and Rosellini Scientific, which funds, researches and develops advanced technological healthcare solutions (Rosellini; Rosellini Scientific). Due to the timeline which has been embedded explicitly and implicitly, no augmentation appears as a disembodied technology without history in the game. For example, although the protagonist wears top-notch military arm prostheses that appear very human-like, this prosthesis is depicted as one of the latest iterations and many non-playable characters possess arm prostheses that appear a lot older, cruder and more industrial than those of Jensen. Furthermore, an extensive description employing scientific jargon for each of the augmentations can be read on the augmentation overview screen, which includes details about the material composition and bodily locations of the augmentations. Figure 1: More Info Section of the Cybernetic Arm Prosthesis as it appears in-game (all screenshots taken with permission from Deus Ex: Human Revolution (2011), courtesy of Eidos Montreal) More details are provided through eBooks, which are presented in the form of scientific articles or conference proceedings, for which the explorative gamer is also rewarded with valuable experience points upon finding which are used to activate and upgrade augmentations. The eBooks also reflect the timeline as each eBook is equipped with a year of publication between 2001 and 2022. Despite the fact that these articles have been supposedly written by a fictional character, the information is authentic and taken from actual scientific research papers, whereby some of these articles even include a proper scientific citation. Figure 2: Example of a Darrow eBook The fact that a scientist was involved in the production of the game allows classifying the augmentations as “diegetic prototypes” which are “cinematic depictions of future technologies … that demonstrate to large public audiences a technology’s need, benevolence and viability” (“The Future Is Now” 43). Diegetic prototypes are fictional, on-screen depictions of technologies that do not exist in that form in real life and have been created with the help of a science consultant. They have been placed in movies to allay anxieties and doubts and perhaps to even provoke a longing in audiences to see depicted technologies become reality (Kirby, “The Future Is Now” 43). Of course the aesthetic appearance of the prototypes has an impact on audiences’s desire, and particularly the artificial arms of Jensen that have been designed in an alluring fashion as can be seen in the following figure: Figure 3: Adam Jensen and arm prosthesis An important fact about diegetic prototypes—and about prototypes (see Suchman, Trigg, and Blomberg) in general—is that they are put to specific use and are embedded and presented in an identifiable social context. Technological objects in cinema are at once both completely artificial—all aspects of their depiction are controlled—and normalized as practical objects. Characters treat these technologies as a ‘natural’ part of their landscape and interact with these prototypes as if they are everyday parts of their world. … fictional characters are ‘socializing’ technological artifacts by creating meanings for the audience, ‘which is tantamount to making the artifacts socially relevant’. (Kirby, “Lab Coats” 196) The power of DXHR is that the diegetic prototypes—the augmentations—are not only based on real world scientific developments and contextualized in a virtual social space, but that the player has the opportunity to handle the augmentations. Virtual Testing Virtual witnessing of the not-yet-existent augmentations is supported by scientific descriptions, articles, and the appearance of the technologies in DXHR, but the moral and ethical engagement is established by the player’s ability to actively use the augmentations and by the provision of choice how to use them. As mentioned, most of the augmentations are inactive and must first be activated by accumulating and spending experience points on them. This requires the player to make reflections on the potential usage and how a particular augmentation will lead to the successful completion of a mission. This means that the player has to constantly decide how s/he wants to play the game. Do I want to be able to hack terminals and computers or do I rather prefer getting mission-critical information by confronting people in conversation? Do I want to search for routes where I can avoid enemy detection or do I rather prefer taking the direct route through the enemy lines with heavy guns in hands? This recurring reflection of which augmentation to choose and their continuous usage throughout the game causes the selected augmentations to become valuable and precious to the player because they transform from augmentations into frequently used tools that facilitate challenge and reduce difficulty of certain situations. In addition, the developers have ensured that no matter which approach is taken, it will always lead to success. This way the role-playing elements of the game are accentuated and each player will construct their own version of Jensen. However, it may be argued that DXHR goes beyond mere character building. There is a breadth of information and opinions on human enhancement offered, but also choices that are made invite players to reflect upon the topic of human enhancement. Among the most conspicuous instances in the game, that involve the player’s choice, are the conversations with other non-playable characters. These are events in the game which require the player to choose one out of three responses for Jensen, and hence, these determine to some extent Jensen’s attitude towards human enhancement. Thus, in the course of the game players might discover their own conviction and might compose their own imaginary of human enhancement. Conclusion This article has explored that DXHR enables players to experience augmentations without being modified themselves. The game is filled with various sociotechnical imaginaries of prosthetic and neurological human enhancement technologies. The relevance of these imaginaries is increased by a high degree of credibility as a science consultant has ensured that the fictional augmentations are founded upon real world scientific advancements. The main story, and much of the virtual world, hinge upon the existence and controversy of these sorts of technologies. Finally, the medium ‘videogame’ allows taking control of an individual, who is heavily augmented with diegetic prototypes of future enhancement technologies, and it also allows using and testing the increased abilities in various situations and challenges. All these elements combined enable players to virtually witness not-yet-existent, future augmentations safely in the present without the need to undertake any alterations of their own bodies. This, in addition to the fact that the technologies are depicted in an appealing fashion, may create a desire in players to see these augmentations become reality. Nevertheless, DXHR sparks an important incentive to critically think about the future of human enhancement technologies.References Aarseth, Espen. “Playing Research: Methodological Approaches to Game Analysis.” DAC Conference, Melbourne, 2003. 14 Apr. 2013 ‹http://hypertext.rmit.edu.au/dac/papers/Aarseth.pdf›. Bizzocchi, J., and J. Tanenbaum. “Mass Effect 2: A Case Study in the Design of Game Narrative.” Bulletin of Science, Technology & Society 32.5 (2012): 393-404. Chrislenko, Alexander, et al. “Transhumanist FAQ.” humanity+. 2001. 18 July 2013 ‹http://humanityplus.org/philosophy/transhumanist-faq/#top›. Eidos Montreal. “Deus Ex: Human Revolution.” Square Enix. 2011. PC. ———. “Welcome to Sarif Industries: Envisioning a New Future.” 2011. 14 Apr. 2013 ‹http://www.sarifindustries.com›. Ellis, Carolyn, Tony E. Adams, and Arthur P. Bochner. “Autoethnography: An Overview.” Forum Qualitative Sozialforschung 12.1 (2010): n. pag. 9 July 2013 ‹http://www.qualitative-research.net/index.php/fqs/article/view/1589/3095›. Freud, Sigmund. Civilization and Its Discontents. Aylesbury, England: Chrysoma Associates Limited, 1929. Iversen, Sara Mosberg. “In the Double Grip of the Game: Challenge and Fallout 3.” Game Studies 12.2 (2012): n. pag. 5 Feb. 2013 ‹http://gamestudies.org/1202/articles/in_the_double_grip_of_the_game›. Jasanoff, Sheila, and Sang-Hyun Kim. “Containing the Atom: Sociotechnical Imaginaries and Nuclear Power in the United States and South Korea.” Minerva 47.2 (2009): 119–146. Juul, Jesper. “A Clash between Game and Narrative.” MA thesis. U of Copenhagen, 1999. 29 May 2013 ‹http://www.jesperjuul.net/thesis/›. Kirby, David A. Lab Coats in Hollywood. Cambridge, Massachusetts: MIT Press, 2011. ———. “The Future Is Now : Diegetic Prototypes and the Role of Popular Films in Generating Real-World Technological Development.” Social Studies of Science 40.1 (2010): 41-70. Malliet, Steven. “Adapting the Principles of Ludology to the Method of Video Game Content Analysis Content.” Game Studies 7.1 (2007): n. pag. 28 May 2013 ‹http://gamestudies.org/0701/articles/malliet›. Mäyrä, F. An Introduction to Game Studies. London: Sage, 2008. Menne, Erwin, Werner Trutwin, and Hans J. Türk. Philosophisches Kolleg Band 4 Anthropologie. Düsseldorf: Patmos, 1986. Rosellini, Will, and Mary DeMarle. “Deus Ex: Human Revolution.” Comic Con. San Diego, 2011. Panel. Rosellini Scientific. “Prevent. Restore. Enhance.” 2013. 25 May 2013 ‹http://www.roselliniscientific.com›. Shapin, Steven, and Simon Schaffer. Leviathan and the Air Pump: Hobbes, Boyle and the Experimental Life. Princeton: Princeton University Press, 1985. Suchman, Lucy, Randall Trigg, and Jeanette Blomberg. “Working Artefacts: Ethnomethods of the Prototype.” The British Journal of Sociology 53.2 (2002): 163-79. Image Credits All screenshots taken with permission from Deus Ex: Human Revolution (2011), courtesy of Eidos Montreal.
APA, Harvard, Vancouver, ISO, and other styles
48

Rose, Megan Catherine. "The Future Is Furby." M/C Journal 26, no. 2 (2023). http://dx.doi.org/10.5204/mcj.2955.

Full text
Abstract:
Fig. 1: “Pink Flamingo Furby” (2000), “Peachy Furby Baby” (1999), and “Owl Furby” (1999) Sunlight Up (“Dah-ay-loh oo-tye”): Introduction As playthings at the junction of human experience and imagination, toys like Furby present an interesting touch point to explore cultural imaginations, hopes, and fears about zoomorphic robots and AI toys. This year marks their 25th anniversary. Created by Dave Hampton and Caleb Chung, Furby publicly debuted at the American International Toy Fair in 1998. Originally released by Tiger Electronics, this toy was later sold to Hasbro in 2005 to 2007. Since their introduction to the market, Furbys have been occupying our shelves and basements, perceived as “annoying little owl-like dolls with embedded sound-recording chips” (Gullin) that speak their own language “furbish” (shown throughout in parenthesis). Early reportage likened Furby to all kinds of cute critters: mogwais, hamsters, and Star Trek’s tribbles. Narratively Furbys are framed as a benevolent, alien species, living in space in a cloud known as Furbyland. For motivations not revealed, Furbys, in looking down on our planet, were so struck by the beautiful view of nature and its signs of peacefulness — “no worry (boo boh-bay)” — that they jumped, plummeting to us like tiny fluffy asteroids. Little did they know that their arrival would spark an intergalactic diplomatic incident. During its introduction in 1998, the initial discourse in media reportage emphasised anxieties of the unknown. What lies beneath the surface of Furby, as a toy that might blur the line between the real and imagined for children? What technologies might it harbour? As a hybrid of technology and animal, Furby appeared as a creepy-cute cultural icon that simultaneously delighted and horrified children and adults alike. Today adult fans reimagine Furby through play and customisation as part of their reflections on their childhood experiences of this cultural moment, and as a way of exploring new futures. Furby provides an opportunity to reflect on adults’ interactions with toys, including parents, members of the public, and fans motivated by nostalgia. At the time of its release Furby presented adults with moments of “dissonance” towards new horrifying technologies that “might occur at the seams [of] … monumental cultural shifts” (Powell 4). But for adult fans today, as a childhood memory, the toy represents both strangeness and future possibilities; it has become a tool of “disrupt[ing] and challeng[ing] beliefs and connections” (Rand 9). In this article I primarily analyse the “original” Furbys of 1998 to 2002, but also mention a range of later versions. This includes: the Emoto-tronic Furbys (2006) which were designed to have more expressive faces; the Furby Boom (2003), a toy whose personality changes according to the level of care it is provided with; and the Furby Connect (2016), which has bluetooth capacity. This discussion is supported by a thematic analysis of 3800 news articles about Furby from 1998 to 2000, visual analysis of both the original and customised iterations of Furby, as well as my reflections as a member of the Furby fandom community. You Play? (U-nye-loo-lay-doo?): Furby Encounters A key part of the discourse around Furby since its introduction in 1998 was, “who would want one?” Indeed, the answer at the time appeared to be “several million of us, the toy demons hope” (Weeks). After their release in American toy stores on 2 October 1998 in limited supplies, a Furbish frenzy ensued, resulting in altercations between shoppers and staff (e.g. Munroe; Warmbir; Associated Press). Aged 10, I recall my little black and white Furby, Coco, waiting for me on the shelves of the electronics section of Big W in Australia, fortunately with no such commotion. Furby is classed by the Guinness World Records as the world’s first AI toy, but it was certainly not the first electronic toy to enter the market; at the time of Furby’s release, Tickle Me Elmo and My Interactive Pooh presented competition, and by the late 1980s there was already concern about how electronic pet toys might erode emotion and connection (Turkle, “Authenticity”; Turkle, “Nascent”). Speculation over the reason for the Furby mass hysteria ensued. Some suggested the appeal was the toy’s status symbol status (Beck), whereas others cited its broad appeal: “it's not gender specific; it doesn't appeal to a particular age group; and most important, it's affordable and doesn't require additional equipment or a computer” (Davis). Some experts offered their commentary of the cyberpet phenomena in general, suggesting that it is a way of dealing with isolation and loneliness (Yorkshire Post). Indeed, all of these features are important to note when we consider the transformation of Furby into queer icon. Central to Furby’s cultural narrative is the idea of contact, or a meeting between robot and user; through play children “teach” their new pet Earth’s new ways (Marsh, “Coded”; Marsh, “Uncanny”). And with this contact also comes a sense of the unknown: what lies beneath the creature’s surface? In their study of zoomorphic robots, Hirofumi Katsumi and Daniel White suggest that Donna Haraway’s work on animal encounters might help us understand this idea of contact. As “animal-like” creature, Furby recalls the transformative potentials of meeting with the more-than-human. Furby’s presence on toy shelves, in classrooms and in homes was one of the first times society had to consider what it meant to “enter the world of becoming with” zoomorphic robots, and to reflect on “who or what ... is precisely at stake” in this entanglement (Haraway 19). What do we learn about ourselves and the unknown through our encounters with Furby? “Monster” (Moh-moh): Technological Threat, Monstrous Other In media reportage, Furby is framed as both new and innovative, but also as a threatening fluffy anarchist. With its technology largely unknown, Furby at the time of its release presented society with a sense of “technohorror” and “imaginings of [social] collapse” (Powell 24). A common concern was that Furby might record and repeat inappropriate language in an act of rebellion. Occasionally tabloid newspapers would report claims such as, "MUM … was horrified when she sat down to play with her daughter's new Furby toy and it squeaked: "F*** me" (The Sun). Some concerns were quite serious, including that Furby could emit electromagnetic fields that would create interference for medical devices and aircraft instruments; this was later disproven by engineers (Tan and Hinberg; Basky; Computer Security). Other urban myths pointed to a more whimsical Furby, whose sensors had the capacity to launch spacecraft (Watson). One persistent concern was the surveillance potentials of Furby. In 1999 the US National Security Agency (NSA) issued a ban on Furby in their Fort Mead headquarters, with concern that they might record and repeat confidential information (Gullin; Ramalho; Borger). This was denied by Tiger Electronics, who emphatically stated “Furby is not a spy” (Computer Security). Engineers performing “autopsies” on Furbys quickly put much of this anxiety to rest (Phobe). This was met with mirthful rebuttals of how future Furbys might be transformed into cute and ubiquitous “wireless furby transmitters” to gather intelligence in warzones (Gullin). As a result, the initial anxiety about surveillance and toys dissipated. However, academics continue to remind us of the real risks of smart toys (e.g. Lupton; Milkaite and Lievens). The 2016 Furby Connect, equipped with voice recognition and Bluetooth capacities has been shown to be hackable (Williams). Further, Maria Ramalho has reported Snowden’s 2014 claims that both NSA and the UK Government Communication Headquarters have been accessing the data collected. In this context, Furby has become “Big Brother transmogrified into ambiguous, cute” unaccountable creature (Ramalho). Through this, we can see how our entanglement with Furby as an object of technohorror speaks both to our anxieties and the real possibilities of technology. In order to craft a narrative around Furby that speaks to this monstrous potential, many have drawn comparisons between Furby and the character Gizmo from the Gremlins franchise. This reference to Gizmo appears in the majority of the media articles sampled for this research. Gizmo is a “mogwai” (trans. demon) with both cute and monstrous potential; like Furby, it also has the potential to transform into a threat to “good society” (Chesher 153-4). This comparison speaks to Gremlins as an anti-technology statement (Sale). However, when we consider how media rhetoric has framed Furby as something to be tamed and controlled, it’s important we approach this comparison with caution in light of the Orientalist underpinnings of the Gremlins franchise. Wendy Allison Lee highlights how Gremlins reflects xenophobic themes of invasion and assimilation. While Gizmo is a “cute, well-behaved” character who “strives to assimilate” much like how Furby might, through play with children, it also harbours a threat to order. In this encounter are resonances of “racist love” that can sometimes underpin our affection for cuteness (Bow). Further reflection is needed on how we might unentangle ourselves from this framing and imagine more inclusive futures with toys like Furby. Fig. 2: Interactive Gizmo, a “Furby Friend” produced by Hasbro, Tiger and Warner Bros in 1999 Big Fun! (Dah doo-ay wah!): Queer Re-Imaginings of Furby Fig. 3: Party time! Adult fans around the world now gather under the “Furby” banner, participating in a colourful array of playful mischief. Reddit forum r/furby (11,200 subscribers) creates a fun space to enjoy the whimsy of Furby, transforming the figure into a sweet and kind companion. Under this umbrella, r/oddbodyfurby (997 subscribers) explore the horrifying potentials of Furby to its playful and surprising ends, which I discuss in this section. In other forums, such as Furby Collectors and Customisers (4.1k members) on Facebook, these different interests come together in a playful and creative space. There was also an active community on Tumblr, where some of the most creatively generative activities around Furby have occurred (Tiffany). In Japan, there is a lively community of fans on Twitter who dress and photograph Emoto-tronic Furbys in a range of cute and charming ways. This forms part of a broader network of creatives, such as “Circuit Benders” who tear down toys and rework them into instruments in a process known as “frankensteining”, such as Look Mum No Computer’s Furby Organ (Deahl). As fans and artists, people act as “queer accessories” to help Furby escape the world and narrative that sought to enclose it, so it might enact its revenge or transcend as a non-binary queer icon (Rand 9-11). As small, collectible and customisable friends, images of happy and creepy Furbys are part of a network of cute media that provides my generation with a source of comfort during times of precarity, occupying our spaces with their own vitality and presence as soothing companions (e.g. Stevens; Allison; Yano). Cuteness as media also lends itself to hybridisation; a mixing and matching with seemingly “opposing” aesthetics. For many fans, the charm of Furby lies in its nostalgic pull as a creature of childhood creepy-cute nightmares. Indeed, it seems that early concerns that Furby may “blur the line between the real and imagined for many children” were in fact valid (Knowlton). While we knew they weren’t “alive” in the true sense, to us they appeared “sort of alive” as our everyday environments became increasingly technological with a dazzling array of electronics (Turkle, “Authenticity”). As Allison (179) explains, we had to “adjust to a world where the border between the imaginary and the real” began to shift rapidly, leaving us open to dream, imagine, and craft narratives populated by a fear of the mechanised undead. Many Millennials were convinced as children that their Furby was waiting for them in the dark, watching, chuckling (“he he heeeee”). Patrick Lenton, diarising his adventures with a rescue Furby this year recalls his childhood toy as “a riot of noise and fury, the kind of demonic household terror”. Some adults, recalling these memories now refer to Furby as “it” or “evil” (Marsh, “Uncanny” 59). In 2020, adult Furby fans, thinking back to their childhood toys, speculated if the positioning of Furby’s eyes at the front of its head meant it was a predator (Watson). Some suggested that their short legs meant they are ambush predators, their infra-red sensor enabling them to detect prey in the dark. Other playful lore suggested that they were made of real cat and dog fur. Through this act of imaginative play, adults reach back to the playful horrors of their childhoods, combining their sense of dread with glee. This has been recently animated by films such as The Mitchells vs. The Machines (2021), where Furbys equipped with “PAL” chips transmogrify into a horrific pack of menacing creatures, and exact revenge. The main contributing factor to this experience is in part the puppetry of Furby. The 1999 Furby presents an exaggerated performance that is both “alive” and “unalive”, its wild rocking, owlish blinking, and cackling creating a sense of “dread and creeping horror” (Freud 2; Marsh, “Uncanny”). Through a blend of animation and imagination, agency is diffused between toy and child to give Furby “life” (Silvio 423). Interestingly, studies of the 2016 Furby Connect and its friendly and social programming that is designed to encourage positive care and engagement has counteracted some of this experience for children (Marsh, “Uncanny” 54). Likewise, in discussing the 2013 Furby Boom Chesher (151) describes this animation as “zany”, working with Sianne Ngai’s conceptualisation of this aesthetic and its relationship to cuteness. While some might praise these later developments in the Furby franchise as having saved another generation of children from nightmares, compared to the original Furby these later editions are less popular among fans; perhaps there is less “material” to work with. Fans as adults now draw on Furby as a playful and cute text to experiment with and hybridise with a variety of horrifying and surprising potentials. This leans into Furby’s design as a chimera, as it uses a combination of cute features to create a “short-hand” for life and also evoke the “idea” or “character” of appealing animals that form part of cultures “charismatic megafauna” (Nishimura 179; Stuck and Rogers; Gn). With cat-like ears, a tuft of hair that drifts with sympathetic movement, two wide eyes, framed with coquettish false lashes, a bird’s beak, and two paws, Furby both suspends and confounds our disbelief. Following the principles of the Kindchenschema (Lorenz) to a “100% ratio” its body is reduced to a round form, its most dominant feature its large eyes (Borgi, Cogliati-Dezza, Brelsford Meints, and Cirulli). While large eyes generally are thought to have an affective pull to them (Harris 4), their fixed placement in the original Furby’s skull creates a dead-pan gaze, that morphs into a Kubrik stare as the toy tilts forward to greet the viewer. Fig. 4: Kindschenschema at work in Furby’s design Furby fans mischievously extend this hybridisation of Furby’s body further through a range of customisation practices. Through “skinning”, Furby’s faux fur surfaces are removed and replaced with a fantastic array of colours and textures. Through breaking into their mechatronic shell – a practice known as “shucking” – their parts are repaired or modified. This results in a range of delightfully queer, non-binary representations of Furby with a range of vibrant furs, piercings, and evocative twinkling and gentle eyes (“tee-wee-lah!”). These figures act as both avatars and as companions for fans. Sporting earrings and rainbow bead necklaces, they are photographed resting in grassy fields, soft crochet rainbows, and bookshelves: they are an expression of all that is joyful in the world. Some fans push the customisation further to create whimsical creatures from another dimension. Some Furbys appear with moss and lichen for fur, sprouting tiny toadstools. Furbys are also transformed into “oddbodies” of varying species. Some appear both as winged fairies, and as transcendental multi-eyed and winged “biblically accurate” angels. Others are hybridised with plush toys or are reworked into handbags. Some veer into the realm of body horror, using doll limbs and bodies to create humanoid forms. The most iconic is the “long furby”, created by Tumblr user FurbyFuzz in 2018. Elongated and insect-like, the Long Furby wriggles into homes and curls up on soft furnishings. Collectors gather “haunted photos from the dark recesses of the internet” to document their escapades (Long Furby). Sometimes, hybridised Furbys appear not through creator interventions but rather emerge from nature itself. One such mythical creature is Murby, an original Furby unearthed in 2013 on an old farm property. Once toy, now woodland spirit, Murby gazes upon and blesses fans with dreamy, clouded eyes, its body an entanglement of thick moss, rich earth and time. Furby’s queerness, strangeness, and hybridity speaks to fans in different ways. Personally, as a neurodivergent person, I experience the coding and the playful reimaginings of Furby as a reflection of my own life experience. Neurodivergent people have a high capacity for care and empathy for objects as curiosities, supports, and friends (e.g. Atherton and Cross; White and Remington; Clutterbuck, Shah and Livingston). Like Furby, I am an alien whom people want to tame. My body and movement are treated with the same infantilising bemusement and suspicion. I feel like a chimera myself; an entanglement of many parts that make a whole, each on their own charming, but together forming a chaotic attempt to connect with neurotypicals. For me, what lies beneath Furby’s surface is my own psyche; rescuing and customising Furbys is a symbolic act, a creative expression of my desire to transcend and resist ableist forces. Together my Furbys and I revel in our strangeness in solidarity, plotting our mischievous revenge (“party time!”). This micro-level resistance will not overturn ableism but brings me a sense of reprieve as I work with my allies to bring socio-cultural change. Fig. 5: The author, Furby Queen. Photo by Sherbet Birdie Photography. Through their creative work, fans explore how Furbys could be reimagined. While fannish activities may at first glance appear fringe or frivolous, they hold up a mirror to our own limitations, anxieties, and practices as a society. The future is Furby. Go to Sleep Now (U-nye-way-loh-nee-way): Conclusions As a source of technohorror and queer potential, Furby provides a vessel by which we can imagine the futures of toys. Through encounter and contact, this seemingly harmless fluffy robot brought about disruption and chaos as a threat to securities and social fabrics. Adult fans, now recalling this cultural moment, lean into this creature’s promise of new possibilities, queering its cultural narrative. Through exploring adults’ interactions with toys, we explore new potentials for change and futures that are playful and creative. Acknowledgments This article was produced with the support of a Vitalities Lab Scholarship and the Australian Research Council Centre of Excellence for Automated Decision-Making and Society. I also thank Deborah Lupton and David Eastwood for their support in the production of an arts-based project that draws on this research into cyberpet histories. References Allison, Anne. Millennial Monsters: Japanese Toys and the Global Imagination. Berkeley: U of California P, 2006. Associated Press. “Two Injured in Flurry over Furby.” Charleston Daily Mail 28 Nov. 1998. Atherton, Gray, and Liam Cross. “Seeing More than Human: Autism and Anthropomorphic Theory of Mind.” Frontiers in Psychology 9 (2018): 1–18. Basky, Greg. “Furby Not Guilty as ‘Charged’.” The Western Journal of Medicine 172 (2000): 59. Beck, Rachel. “‘Must-Have’ Toys Created by Intense Publicity Campaigns.” AP Business Writer 16 Oct. 1998. Borgi, Marta, Irene Cogliati-Dezza, Victoria Brelsford, Kerstin Meints, and Francesca Cirulli. “Baby Schema in Human and Animal Faces Induces Cuteness Perception and Gaze Allocation in Children.” Frontiers in Psychology 5 (2014): 1–12. Borger, Julian. “Secret Agent Furby Sneaks into Spies’ Inner Sanctum.” The Guardian 14 Jan. 1999. <https://www.theguardian.com/world/1999/jan/14/julianborger1>. Bow, Leslie. Racist Love: Asian Abstraction and the Pleasures of Fantasy. Durham: Duke UP. Chesher, Chris. “Toy Robots on YouTube: Consumption and Peer Production at the Robotic Moment.” Convergence 25 (2019): 148–160. Clutterbuck, Rachel A., Punit Shah, and Lucy A. Livingston. “Anthropomorphic Tendencies in Autism: A Conceputal Replication and Extension of White and Remington (2019) and Preliminary Development of a Novel Anthropomorphism Measure.” Autism 26.4 (2021): 940–950. Computer Security. “Furby Alert: A National Security Concern?” Computer Security 36 (1999): 87–88. Davis, Pamela. “Too Cute to Mute?” St. Petersburg Times 9 Nov. 1998. Deahl, Dani. “Circuit Bending: Hacking a Furby in the Name of Music.” The Verge 14 Sep. 2018. Francescani, Christopher, and Tracy Connor. “Hot Toy’s a Doll Order; $30 Cuddlers Now Going for $100.” New York Post 29 Nov. 1998: 5. Freud, Sigmund. The Uncanny. Trans. D. McLintok. London: Penguin, 1919 [2003]. Gn, Joel. “Designing Affection: On the Curious Case of Machine Cuteness.” The Aesthetics and Affects of Cuteness. Eds. Joshua Paul Dale, Joyce Goggin, Julia Leyda, Anthony McIntyre, and Diane Negra. New York: Routledge, 2017. Gremlins. Dir. Joe Dante. Warner Bros, 1984. Gremlins 2. Dir. Joe Dante. Warner Bros, 1990. Guinness World Records. “First AI Robot Toy.” Guinness World Records, 2023. <https://www.guinnessworldrecords.com/world-records/100867-first-ai-robot-toy>. Gullin, Paul. “The Future Is Furbys.” Computerworld 33 (1999): 30. Harris, David. Cute, Quaint, Hungry and Romantic: The Aesthetics of Consumerism. New York: Basic. Katsuno, Hirofumi, and Daniel White. “Haptic Creatures: Tactile Affect and Human-Robot Intimacy in Japan.” Consumer Culture Theory in Asia: History and Contemporary Issues. Eds. Yuko Minowa and Russell Belk. New York: Routledge. 242–262. Knowlton, Brian. “If Raggedy Ann Could Talk.” International Herald Tribune 9. Nov 1998. Long Furby. 2018. <https://www.longfurby.com/>. Lorenz, Konrad. “Die angeborenen Formen möglicher Erfahrung [The Innate Condition of the Possibility of Experience].” Zeitschrift für Tierpsychologie 5.2 (1943): 245–409. Lupton, Deborah, and Ben Williamson. “The Datafied Child: The Dataveillance of Children and Implications for Their Rights.” New Media & Society 19 (2017): 780–794. Marsh, Alison. “Coded for Cuteness.” IEE Spectrum 56.1 (2019): 60. Marsh, Jackie. “The Uncanny Valley Revisited: Play with the Internet of Toys.” The Internet of Toys: Practices, Affordances and the Political Economy of Children’s Smart Play. Eds. Giovanna Mascheroni and Donell Holloway. London: Palgrave Macmillan, 2019. Milkaite, Ingrida, and Eva Lievens. “The Internet of Toys: Playing Games with Children’s Data?” The Internet of Toys: Practices, Affordances and the Political Economy of Children’s Smart Play. Eds. Giovanna Mascheroni and Donell Holloway. London: Palgrave Macmillan, 2019. Lee, Wendy Allison. “Cute. Dangerous. Asian American. 'Gremlins' @ 35.” Public Books, 2019. <https://www.publicbooks.org/cute-dangerous-asian-american-gremlins-35/>. Lenton, Patrick. “Happy 25th Birthday Furby, the Toy That Stole a Generation’s Hearts.” Sydney Morning Herald 6 Apr. 2023. <https://www.smh.com.au/culture/comedy/happy-25th-birthday-furby-the-toy-that-stole-a-generation-s-hearts-20230403-p5cxoe.html>. The Mitchells vs. The Machines. Dir. Mike Rianda. Sony Pictures Animation, 2021 Munroe, Tony. “Fur Flies at Mass. Malls over Hasbro’s Furby Doll.” Reuters, 28 Nov. 1998. Ngai, Sianne. Our Aesthetic Categories: Zany, Cute, Interesting. Cambridge: Harvard UP, 2012. Nishimura, Keiko. Communication Robot: Animating a Technological Solution in Twenty-First Century Japan. Dissertation. University of North Carolina at Chapel Hill, 2021. Phobe. Furby Autopsy, 1998. <http://www.phobe.com/furby/>. Powell, Daniel. Horror Culture in the New Millennium: Digital Dissonance and Technohorror. Washington, D.C.: Lexington, 2018. Ramalho, Maria Irene. “The Private Is Public or Furbies Are Us.” e-cadernos 27 (2017). <http://journals.openedition.org/eces/2199>. Rand, Erica. Barbie’s Queer Accessories. Carolina: Duke UP. Sale, Kirkpatrick. Rebels against the Future. London: Quartet Books, 1996. Silvio, Terry. “Animation: The New Performance.” Journal of Linguistic Anthropology 20: 422–438. Stevens, Carolyn. “Cute But Relaxed: Ten Years of Rilakkuma in Precarious Japan.” M/C Journal 17.2 (2014). <https://doi.org/10.5204/mcj.783>. Stuck, Rachel E., and Wendy A. Rogers. “Older Adults Perceptions of Supporting Factors of Trust in a Robot Care Providers.” Journal of Robotics (2018): 6519713. The Sun. “Frisky Furby Fun.” 31 Dec. 1999. Tan, Kok-Swang, and Irwin Hinberg, “Furby Does Not Interfere with Medical Devices.” Canadian Medical Association Journal 161 (1999): 971. Tiffany, Kaitlyn. “Every Furby Gets a Home.” Vox, 21 Dec. 2018. <https://www.vox.com/the-goods/2018/12/21/18149004/furby-collectors-tumblr-vintage-robots-fandom>. Turkle, Sherry. “Authenticity in the Age of Digital Companions.” Interaction Studies: Social Behaviour and Communication in Biological and Artificial Systems 8 (2007): 501–517. Turkle, Sherry. “A Nascent Robotics Culture: New Complicities for Companionship.” Machine Ethics and Robot Ethics. London: Routledge, 2017. Warmbir, Steve. “Mild Weather Draws Shoppers Out into the Sun. But Furby Frenzy Drives Desperate into Long Lines.” Chicago Daily Herald, 28 Nov. 1998: 4. Watson, Averie. “A Dark Furby Theory May Reveal Them as Flesh-Devouring Predators.” CBR, 20 Nov. 2021. <https://www.cbr.com/dark-furby-predator-theory/>. White, Rebecca, and Anna Remington. “Object Personification in Autism: This Paper Will Be Very Sad If You Don’t Read It.” Autism 23.4 (2018): 1042–1045. Williams, Al. “Mission Impossible: Infiltrating Furby.” Hackaday, 26 Nov. 2017. <https://hackaday.com/2017/11/26/mission-impossible-infiltrating-furby/>. Weeks, Linton. “The Great Furby Fuss.” The Washington Post, 24 Nov. 1998. <https://www.washingtonpost.com/archive/lifestyle/1998/11/24/the-great-furby-fuss/30a0a340-658a-4609-ae07-f38ff368c7c4/>. Yano, Christine. “Reach Out and Touch Someone: Thinking through Sanrio’s Social Communication Empire.” Japanese Studies 31.1 (2011): 23–36. Yorkshire Post. “Cyberpets – Harmless Fun or Addictive Craze?” 9 Nov. 1998: 9.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography