Academic literature on the topic 'Person-Name Queries'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Person-Name Queries.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Person-Name Queries"

1

Merkley, Cari. "Music Information Seeking Behaviour Poses Unique Challenges for the Design of Information Retrieval Systems." Evidence Based Library and Information Practice 5, no. 4 (December 17, 2010): 90. http://dx.doi.org/10.18438/b8t621.

Full text
Abstract:
Objective – To better understand music information seeking behaviour in a real life situation and to create a taxonomy relating to this behaviour to facilitate better comparison of music information retrieval studies in the future. Design – Content analysis of natural language queries. Setting – Google Answers, a fee based online service. Subjects – 1,705 queries and their related answers and comments posted in the music category of the Google Answers website before April 27, 2005. Methods – A total of 2,208 queries were retrieved from the music category on the Google Answers service. Google Answers was a fee based service in which users posted questions and indicated what they were willing to pay to have them answered. The queries selected for this study were posted prior to April 27, 2005, over a year before the service was discontinued completely. Of the 2208 queries taken from the site, only 1,705 were classified as relevant to the question of music information seeking by the researcher. The off-topic queries were not included in the study. Each of the 1,705 queries was coded according to the needs expressed by the user and the information provided to assist researchers in answering the question. The initial coding framework used by the researcher was informed by previous studies of music information retrieval to facilitate comparison, but was expanded and revised to reflect the evidence itself. Only the questions themselves were subjected to this iterative coding process. The answers provided by the Google Answer researchers and online comments posted by other users were examined by the author, but not coded for inclusion in the study. User needs in the questions were coded for their form and topic. Each question was assigned at least one form and one topic. Form refers to the type of question being asked and consisted of the following 10 categories: identification, location, verification, recommendation, evaluation, ready reference, reproduction, description, research, and other. Reproduction in this context is defined as “questions asking for text” and referred most often to questions looking for song lyrics, while evaluation typically meant the user was seeking reviews of works (p. 1029). Sixteen question topics were outlined in the coding framework. They included lyrics, translation, meaning (i.e., of lyrics), score, work, version, recording (e.g., where is an album available for purchase), related work, genre, artist, publisher, instrument, statistics, background (e.g. definitions), resource (i.e. sources of music information) and other. The questions were also coded for their features or the information provided by the user. The final coding framework outlined 57 features, some of which were further subdivided by additional attributes. For example, a feature with attributes was title. The researcher further clarified the attribute of title by indicating whether the user mentioned the title of a musical work, recording, printed material or related work in their question. More than one feature could appear in a user query. Main Results – Overall, the most common questions posted on the Google Answers service relating to music involved identifying works or artists, finding recordings, or retrieving lyrics. The most popular query forms were identification (43.8%), location (33.3%), and reproduction (10.9%). The most common topics were work (49.1%), artist (36.4%), recording (16.7%), and lyrics (10.4%). The most common features provided by users in their posted questions were person name (53%), title (50.9%), date (45.6%), genre (37.2%), role (33.8%), and lyric (27.6%). The person name usually referred to an artist’s name (in 95.6% of cases) and title most often referred to the title of a musical work. Another feature that appeared in 25.6% of queries was place reference, almost half of which referred to the place where the user encountered the music they were enquiring about. While the coding framework eventually encompassed 57 different features, a small number of features dominated, with seven features used in over 25% of the queries posted and 33 features appearing in less than 10%. The seven most common features were person name, title, date, genre, role, lyric, and place reference. Lee categorized most of the queries as “known-item searches,” even though at times users provided incorrect information and many were looking for information about the musical item but not the item itself (p. 1035). Other interesting features identified by the author were the presence of “dormant searches,” long standing questions a user had about a musical item, sometimes for years, which were reawakened by hearing the song again or other events (p. 1037). Multiple versions of musical works and the provision of information gleaned third hand by users were also identified as complicating factors in correctly meeting musical information needs. Conclusion – While certain types of questions dominated among music queries posted on the Google Answers service, there were a wide variety of music information needs expressed by users. In some cases, the features provided by the user as clues to answering the query were very personal, and related to the context in which they encountered the work or the mood a particular work or artist evoked. Such circumstances are not currently or adequately covered by existing bibliographic record standards, which focus on qualities inherent in the music itself. The author suggests that user context should play a greater role in the testing and development of music information retrieval systems, although the instability and variability of this type of information is acknowledged. In some cases this context could apply to other works (film, television, etc.) in which a musical work is featured. Another potential implication for music information retrieval system development is a need to re-evaluate the terminology employed in testing to ensure that it is the language most often employed by users. For example, the 128 different terms used in this study to describe how a musical item made the user feel did not significantly overlap with terms employed in a previous music information retrieval task involving mood classification conducted through MIREX, the Music Information Retrieval Evaluation Exchange, in 2007. The author also argues that while most current music information retrieval testing is task-specific – e.g., how can a user search for a particular work by humming a few bars or searching for a work based on its genre, in real life, users come to their search with information that is not neatly parsed into separate tasks. The study affirms a need for systems that can combine tasks and/or consolidate the results of separate tasks for users.
APA, Harvard, Vancouver, ISO, and other styles
2

Butler, Judith. "Helen, Angel of History." PMLA/Publications of the Modern Language Association of America 130, no. 1 (January 2015): 150–54. http://dx.doi.org/10.1632/pmla.2015.130.1.150.

Full text
Abstract:
How quickly and how often those who heard about the sudden death of helen tartar asked, did i let her know how much her support meant to me? Did I express adequately my gratitude for all the work she did for me and for others in literature, philosophy, critical theory, visual culture, poetry, and religion, to name but a few of her fields? I do not think it was a reflex of self-punishment as much as the upsurge of another kind of remorse, the wishing to have said more. At the American Comparative Literature Association's memorial for Helen Tartar, person after person testified to the extraordinary support she offered—soliciting a manuscript; reading it actively and critically; sometimes productively quarreling with its ideas or formulations; finding the right readers; collaborating on the material form, including cover and font; and sending the work forth into the world of readers, “worlding” it, if you will. Some at that event spoke about the race against tenure and the acute anxiety it produces, and how crucial Helen was in expediting a review and presenting the work before the board for approval. Others talked about her frank and sensitive evaluations, which let us know what had to change before the manuscript became a book—always delivered with an affirmation of the project. But because Helen was a committed intellectual with her own philosophical, literary, and religious archive, she also contested conclusions and queried moves. I remember how, when she copyedited The Psychic Life of Power (in the days when she handled every aspect of production at Stanford), she quarreled with my reading of Freud and sent me to new sources to correct my view. To Haun Saussy, with whom she worked on several projects, she wrote, “When I read this argument, I felt I needed to take hold of it like a twisted sock and pull it inside-out.” She was our first reader, and we were incredibly lucky because she paid attention.
APA, Harvard, Vancouver, ISO, and other styles
3

Abbt, Christine. "Recht auf Vergessen? Ethik der zweiten Chance?" Deutsche Zeitschrift für Philosophie 64, no. 6 (January 1, 2016). http://dx.doi.org/10.1515/dzph-2016-0068.

Full text
Abstract:
AbstractThe notion of ‘forgetting’ has assumed a new dimension in the digital age. Here I will examine a particular kind of forgetting as reflected in a ruling of the European Court of Justice (ECJ). What the ruling of the ECJ of May 13, 2014 (C-131/12) formulates and invokes as a “right to be forgotten” encompasses the right to co-determine whether certain personal data in the Web should immediately show up or not when a first name and surname is entered as part of a search. When a user has invoked the “right to be forgotten”, and it is determined that it applies, information is, however, not made irretrievable. It continues to remain possible to find this information in a roundabout way, i.e., by means of more precise search queries, although the information should not immediately become visible the moment a person’s full name is typed into a search engine. I will argue that this ruling can be seen as corroborating the fundamental rights of the individual. The idea of the “right to be forgotten” is to give a person a second chance in society. Not all forms of forgetting and remembering can be subsumed under this idea. As will be expounded, this court decision offers a useful normative fundament for the distinction between (1) legitimate attempts at reintegration, (2) legitimate attempts at rehabilitation and (3) unjustified recourse to a right to be forgotten.
APA, Harvard, Vancouver, ISO, and other styles
4

Cabeza, Rafale. "Localización de Datos de Contactos Personales Utilizando Técnicas de Minería Web y Redes Sociales." Investigacion e Innovación en Ingenierias 4, no. 1 (January 1, 2016). http://dx.doi.org/10.17081/invinno.4.1.2020.

Full text
Abstract:
En este artículo se muestran los resultados de nuestro proyecto de investigación con relación a la localización de datos de contactos de personas con características específicas de la sociedad utilizando las redes sociales, La tarea de este proyecto consiste en mostrar una guía de organización de resultados de búsqueda para el nombre de la persona utilizando la minería web, con la ayuda de varias herramientas tales como PIPL, YAHOO, GOOGLE, DUCKDUCK, entre otras, para sí, sentar bases de cómo se encuentran los diferentes desarrollos e implementaciones en esta área, valiéndonos de consultas de artículos relacionados en diferentes bases de datos e investigación de metodologías diseñadas para fines similares prefiriendo las implementadas en países en desarrollo. Se realizó la identificación de los trabajos y/o metodologías empleados por otros investigadores, con sus respectivos hallazgos y conclusiones. AbstractIn this paper show the results of our Research Project With Regard to Location Data Contacts of Persons scam Specific Features of society using social networks , task de este Project is to show A Guide Organization search results for the name of the person using web mining, con Tools Help Many tales as Pipl , YAHOO , GOOGLE , DUCKDUCK , Among Others, If paragraph , laying the foundations of Como itself are the Different Development and implementations in this area , availing of related queries in different databases designed and Research Methodology para fines Similar preferring implemented in Developing Countries items . Identification of the work performed and / or methodologies used by other researchers, air THEIR respective Findings and Conclusions.
APA, Harvard, Vancouver, ISO, and other styles
5

Piirainen, Esko, Eija-Leena Laiho, Tea von Bonsdorff, and Tapani Lahti. "Managing Taxon Data in FinBIF." Biodiversity Information Science and Standards 3 (June 26, 2019). http://dx.doi.org/10.3897/biss.3.37422.

Full text
Abstract:
The Finnish Biodiversity Information Facility, FinBIF (https://species.fi), has developed its own taxon database. This allows FinBIF taxon specialists to maintain their own, expert-validated view of Finnish species. The database covers national needs and can be rapidly expanded by our own development team. Furthermore, in the database each taxon is given a globally unique persistent URI identifier (https://www.w3.org/TR/uri-clarification), which refers to the taxon concept, not just to the name. The identifier doesn’t change if the taxon concept doesn’t change. We aim to ensure compatibility with checklists from other countries by linking taxon concepts as Linked Data (https://www.w3.org/wiki/LinkedData) — a work started as a part of the Nordic e-Infrastructure Collaboration (NeIC) DeepDive project (https://neic.no/deepdive). The database is used as a basis for observation/specimen searches, e-Learning and identification tools, and it is browsable by users of the FinBIF portal. The data is accessible to everyone under CC-BY 4.0 license (https://creativecommons.org/licenses/by/4.0) in machine readable formats. The taxon specialists maintain the taxon data using a web application. Currently, there are 60 specialists. All changes made to the data go live every night. The nightly update interval allows the specialists a grace period to make their changes. Allowing the taxon specialists to modify the taxonomy database themselves leads to some challenges. To maintain the integrity of critical data, such as lists of protected species, we have had to limit what the specialists can do. Changes to critical data is carried out by an administrator. The database has special features for linking observations to the taxonomy. These include hidden species aggregates and tools to override how a certain name used in observations is linked to the taxonomy. Misapplied names remain an unresolved problem. The most precise way to record an observation is to use a taxon concept: Most observations are still recorded using plain names, but it is possible for the observer to pick a concept. Also, when data is published in FinBIF from other information systems, the data providers can link their observations to the concepts using the identifiers of concepts. The ability to use taxon concepts as basis of observations means we have to maintain the concepts over time — a task that may become arduous in the future (Fig. 1). As it stands now, the FinBIF taxon data model — including adjacent classes such as publication, person, image, and endangerment assessments — consists of 260 properties. If the data model were stored in a normalized relational database, there would be approximately 56 tables, which could be difficult to maintain. Keeping track of a complete history of data is difficult in relational databases. Alternatively, we could use document storage to store taxon data. However, there are some difficulties associated with document storages: (1) much work is required to implement a system that does small atomic update operations; (2) batch updates modifying multiple documents usually require writing a script; and (3) they are not ideal for doing searches. We use a document storage for observation data, however, because they are well suited for storing large quantities of complex records. In FinBIF, we have decided to use a triplestore for all small datasets, such as taxon data. More specifically, the data is stored according to the RDF specification (https://www.w3.org/RDF). An RDF Schema defines the allowed properties for each class. Our triplestore implementation is an Oracle relational database with two tables (resource and statement), which gives us the ability to do SQL queries and updates. Doing small atomic updates is easy as only a small subset of the triplets can be updated instead of the entire data entity. Maintaining a complete record of history comes without much effort, as it can be done on an individual triplet level. For performance-critical queries, the taxon data is loaded into an Elasticsearch (https://www.elastic.co) search engine.
APA, Harvard, Vancouver, ISO, and other styles
6

Shorthouse, David. "Slinging With Four Giants on a Quest to Credit Natural Historians for our Museums and Collections." Biodiversity Information Science and Standards 4 (October 2, 2020). http://dx.doi.org/10.3897/biss.4.59167.

Full text
Abstract:
Bionomia, https://bionomia.net previously called Bloodhound Tracker, was launched in August 2018 with the aim of illustrating the breadth and depth of expertise required to collect and identify natural history specimens represented in the Global Biodiversity Information Facility (GBIF). This required that specimens and people be uniquely identified and that a granular expression of actions (e.g. "collected", "identified") be adopted. The Darwin Core standard presently combines agents and their actions into the conflated terms recordedBy and identifiedBy whose values are typically unresolved and unlinked text strings. Bionomia consists of tools, web services, and a responsive website, which are all used to efficiently guide users to resolve and unequivocally link people to specimens via first-class actions collected or identified. It also shields users from the complexity of casting together and seamlessly integrating the services of four giant initiatives: ORCID, Wikidata, GBIF, and Zenodo. All of these initiatives are financially sustainable and well-used by many stakeholders, well-outside this narrow user-case. As a result, the links between person and specimen made by users of Bionomia are given every opportunity to persist, to represent credit for effort, and to flow into collection management systems as meaningful new entries. To date, 13M links between people and specimens have been made including 2M negative associations on 12.5M specimen records. These links were either made by the collectors themselves or by 84 people who have attributed specimen records to their peers, mentors and others they revere. Integration With ORCID and Wikidata People are identified in Bionomia through synchronization with ORCID and Wikidata by reusing their unique identifiers and drawing in their metadata. ORCID identifiers are used by living researchers to link their identites to their research outputs. ORCID services include OAuth2 pass-through authentication for use by developers and web services for programmatic access to its store of public profiles. These contain elements of metadata such as full name, aliases, keywords, countries, education, employment history, affiliations, and links to publications. Bionomia seeds its search directory of people by periodically querying ORCID for specific user-assigned keywords as well as directly though account creation via OAuth2 authentication. Deceased people are uniquely identified in Bionomia through integration with Wikidata by caching unique 'Q' numbers (identifiers), full names and aliases, countries, occupations, as well as birth and death dates. Profiles are seeded from Wikidata through daily queries for properties that are likely to be assigned to collectors of natural history specimens such as "Entomologists of the World ID" (= P5370) or "Harvard Index of Botanists ID" (= P6264). Because Wikidata items may be merged, Bionomia captures these merge events, re-associates previously made links to specimen records, and mirrors Wikidata's redirect behaviour. A Wikidata property called "Bionomia ID" (= P6944), whose values are either ORCID identifiers or Wikidata 'Q' numbers, helps facilitate additional integration and reuse. Integration with GBIF Specimen data are downloaded wholesale as Darwin Core Archives from GBIF every two weeks. The purpose of this schedule is to maintain a reasonable synchrony with source data that balances computation time with the expections of users who desire the most up-to-date view of their specimen records. Collectors with ORCID accounts who have elected to receive notice, are informed via email message when the authors of newly published papers have made use of their specimen records downloaded from GBIF. Integration with Zenodo Finally, users of Bionomia may integrate their ORCID OAuth2 authentication with Zenodo, an industry-recognized archive for research data, which enjoys support from the Conseil Européen pour la Recherche Nucléaire (CERN). At the user's request, their specimen data represented as CSV (comma-separated values) and JSON-LD (JavaScript Object Notation for Linked Data) documents are pushed into Zenodo, a DataCite DOI is assigned, and a formatted citation appears on their Bionomia profile. New versions of these files are pushed to Zenodo on the user's behalf when new specimen records are linked to them. If users have configured their ORCID account to listen for new entries in DataCite, a new work entry will also be made in their ORCID profile, thus sealing a perpetual, semi-automated loop betwen GBIF and ORCID that tidily showcases their efforts at collecting and identifying natural history specimens. Technologies Used Bionomia uses Apache Spark via scripts written in Scala, a human name parser written in Ruby called dwc_agent, queues of jobs executed through Sidekiq, scores of pairwise similarities in the structure of human names stored in Neo4j, data persistence in MySQL, and a search layer in Elasticsearch. Here, I expand on lessons learned in the construction and maintenance of Bionomia, emphasize the criticality of recognizing the early efforts made by a fledgling community of enthusiasts, and describe useful tools and services that may be integrated into collection management systems to help churn strings of unresolved, unlinked collector and determiner names into actionable identifiers that are gateways to rich sources of information.
APA, Harvard, Vancouver, ISO, and other styles
7

Leaver, Tama. "The Social Media Contradiction: Data Mining and Digital Death." M/C Journal 16, no. 2 (March 8, 2013). http://dx.doi.org/10.5204/mcj.625.

Full text
Abstract:
Introduction Many social media tools and services are free to use. This fact often leads users to the mistaken presumption that the associated data generated whilst utilising these tools and services is without value. Users often focus on the social and presumed ephemeral nature of communication – imagining something that happens but then has no further record or value, akin to a telephone call – while corporations behind these tools tend to focus on the media side, the lasting value of these traces which can be combined, mined and analysed for new insight and revenue generation. This paper seeks to explore this social media contradiction in two ways. Firstly, a cursory examination of Google and Facebook will demonstrate how data mining and analysis are core practices for these corporate giants, central to their functioning, development and expansion. Yet the public rhetoric of these companies is not about the exchange of personal information for services, but rather the more utopian notions of organising the world’s information, or bringing everyone together through sharing. The second section of this paper examines some of the core ramifications of death in terms of social media, asking what happens when a user suddenly exists only as recorded media fragments, at least in digital terms. Death, at first glance, renders users (or post-users) without agency or, implicitly, value to companies which data-mine ongoing social practices. Yet the emergence of digital legacy management highlights the value of the data generated using social media, a value which persists even after death. The question of a digital estate thus illustrates the cumulative value of social media as media, even on an individual level. The ways Facebook and Google approach digital death are examined, demonstrating policies which enshrine the agency and rights of living users, but become far less coherent posthumously. Finally, along with digital legacy management, I will examine the potential for posthumous digital legacies which may, in some macabre ways, actually reanimate some aspects of a deceased user’s presence, such as the Lives On service which touts the slogan “when your heart stops beating, you'll keep tweeting”. Cumulatively, mapping digital legacy management by large online corporations, and the affordances of more focussed services dealing with digital death, illustrates the value of data generated by social media users, and the continued importance of the data even beyond the grave. Google While Google is universally synonymous with search, and is the world’s dominant search engine, it is less widely understood that one of the core elements keeping Google’s search results relevant is a complex operation mining user data. Different tools in Google’s array of services mine data in different ways (Zimmer, “Gaze”). Gmail, for example, uses algorithms to analyse an individual’s email in order to display the most relevant related advertising. This form of data mining is comparatively well known, with most Gmail users knowingly and willingly accepting more personalised advertising in order to use Google’s email service. However, the majority of people using Google’s search engine are unaware that search, too, is increasingly driven by the tracking, analysis and refining of results on the basis of user activity (Zimmer, “Externalities”). As Alexander Halavais (160–180) quite rightly argues, recent focus on the idea of social search – the deeper integration of social network information in gauging search results – is oxymoronic; all search, at least for Google, is driven by deep analysis of personal and aggregated social data. Indeed, the success of Google’s mining of user data has led to concerns that often invisible processes of customisation and personalisation will mean that the supposedly independent or objective algorithms producing Google’s search results will actually yield a different result for every person. As Siva Vaidhyanathan laments: “as users in a diverse array of countries train Google’s algorithms to respond to specialized queries with localised results, each place in the world will have a different list of what is important, true, or ‘relevant’ in response to any query” (138). Personalisation and customisation are not inherently problematic, and frequently do enhance the relevance of search results, but the main objection raised by critics is not Google’s data mining, but the lack of transparency in the way data are recorded, stored and utilised. Eli Pariser, for example, laments the development of a ubiquitous “filter bubble” wherein all search results are personalised and subjective but are hidden behind the rhetoric of computer-driven algorithmic objectivity (Pariser). While data mining informs and drives many of Google’s tools and services, the cumulative value of these captured fragments of information is best demonstrated by the new service Google Now. Google Now is a mobile app which delivers an ongoing stream of search results but without the need for user input. Google Now extrapolates the rhythms of a person’s life, their interests and their routines in order to algorithmically determine what information will be needed next, and automatically displays it on a user’s mobile device. Clearly Google Now is an extremely valuable and clever tool, and the more information a user shares, the better the ongoing customised results will be, demonstrating the direct exchange value of personal data: total personalisation requires total transparency. Each individual user will need to judge whether they wish to share with Google the considerable amount of personal information needed to make Google Now work. The pressing ethical question that remains is whether Google will ensure that users are sufficiently aware of the amount of data and personal privacy they are exchanging in order to utilise such a service. Facebook Facebook began as a closed network, open only to students at American universities, but has transformed over time to a much wider and more open network, with over a billion registered users. Facebook has continually reinvented their interface, protocols and design, often altering both privacy policies and users’ experience of privacy, and often meeting significant and vocal resistance in the process (boyd). The data mining performed by social networking service Facebook is also extensive, although primarily aimed at refining the way that targeted advertising appears on the platform. In 2007 Facebook partnered with various retail loyalty services and combined these records with Facebook’s user data. This information was used to power Facebook’s Beacon service, which added details of users’ retail history to their Facebook news feed (for example, “Tama just purchased a HTC One”). The impact of all of these seemingly unrelated purchases turning up in many people’s feeds suddenly revealed the complex surveillance, data mining and sharing of these data that was taking place (Doyle and Fraser). However, as Beacon was turned on, without consultation, for all Facebook users, there was a sizable backlash that meant that Facebook had to initially switch the service to opt-in, and then discontinue it altogether. While Beacon has been long since erased, it is notable that in early 2013 Facebook announced that they have strengthened partnerships with data mining and profiling companies, including Datalogix, Epsilon, Acxiom, and BlueKai, which harness customer information from a range of loyalty cards, to further refine the targeting ability offered to advertisers using Facebook (Hof). Facebook’s data mining, surveillance and integration across companies is thus still going on, but no longer directly visible to Facebook users, except in terms of the targeted advertisements which appear on the service. Facebook is also a platform, providing a scaffolding and gateway to many other tools and services. In order to use social games such as Zynga’s Farmville, Facebook users agree to allow Zynga to access their profile information, and use Facebook to authenticate their identity. Zynga has been unashamedly at the forefront of user analytics and data mining, attempting to algorithmically determine the best way to make virtual goods within their games attractive enough for users to pay for them with real money. Indeed, during a conference presentation, Zynga Vice President Ken Rudin stated outright that Zynga is “an analytics company masquerading as a games company” (Rudin). I would contend that this masquerade succeeds, as few Farmville players are likely to consider how their every choice and activity is being algorithmically scrutinised in order to determine what virtual goods they might actually buy. As an instance of what is widely being called ‘big data’, the data miing operations of Facebook, Zynga and similar services lead to a range of ethical questions (boyd and Crawford). While users may have ostensibly agreed to this data mining after clicking on Facebook’s Terms of Use agreement, the fact that almost no one reads these agreements when signing up for a service is the Internet’s worst kept secret. Similarly, the extension of these terms when Facebook operates as a platform for other applications is a far from transparent process. While examining the recording of user data leads to questions of privacy and surveillance, it is important to note that many users are often aware of the exchange to which they have agreed. Anders Albrechtslund deploys the term ‘social surveillance’ to usefully emphasise the knowing, playful and at times subversive approach some users take to the surveillance and data mining practices of online service providers. Similarly, E.J. Westlake notes that performances of self online are often not only knowing but deliberately false or misleading with the aim of exploiting the ways online activities are tracked. However, even users well aware of Facebook’s data mining on the site itself may be less informed about the social networking company’s mining of offsite activity. The introduction of ‘like’ buttons on many other Websites extends Facebook’s reach considerably. The various social plugins and ‘like’ buttons expand both active recording of user activity (where the like button is actually clicked) and passive data mining (since a cookie is installed or updated regardless of whether a button is actually pressed) (Gerlitz and Helmond). Indeed, because cookies – tiny packets of data exchanged and updated invisibly in browsers – assign each user a unique identifier, Facebook can either combine these data with an existing user’s profile or create profiles about non-users. If that person even joins Facebook, their account is connected with the existing, data-mined record of their Web activities (Roosendaal). As with Google, the significant issue here is not users knowingly sharing their data with Facebook, but the often complete lack of transparency in terms of the ways Facebook extracts and mines user data, both on Facebook itself and increasingly across applications using Facebook as a platform and across the Web through social plugins. Google after Death While data mining is clearly a core element in the operation of Facebook and Google, the ability to scrutinise the activities of users depends on those users being active; when someone dies, the question of the value and ownership of their digital assets becomes complicated, as does the way companies manage posthumous user information. For Google, the Gmail account of a deceased person becomes inactive; the stored email still takes up space on Google’s servers, but with no one using the account, no advertising is displayed and thus Google can earn no revenue from the account. However, the process of accessing the Gmail account of a deceased relative is an incredibly laborious one. In order to even begin the process, Google asks that someone physically mails a series of documents including a photocopy of a government-issued ID, the death certificate of the deceased person, evidence of an email the requester received from the deceased, along with other personal information. After Google have received and verified this information, they state that they might proceed to a second stage where further documents are required. Moreover, if at any stage Google decide that they cannot proceed in releasing a deceased relative’s Gmail account, they will not reveal their rationale. As their support documentation states: “because of our concerns for user privacy, if we determine that we cannot provide the Gmail content, we will not be able to share further details about the account or discuss our decision” (Google, “Accessing”). Thus, Google appears to enshrine the rights and privacy of individual users, even posthumously; the ownership or transfer of individual digital assets after death is neither a given, nor enshrined in Google’s policies. Yet, ironically, the economic value of that email to Google is likely zero, but the value of the email history of a loved one or business partner may be of substantial financial and emotional value, probably more so than when that person was alive. For those left behind, the value of email accounts as media, as a lasting record of social communication, is heightened. The question of how Google manages posthumous user data has been further complicated by the company’s March 2012 rationalisation of over seventy separate privacy policies for various tools and services they operate under the umbrella of a single privacy policy accessed using a single unified Google account. While this move was ostensibly to make privacy more understandable and transparent at Google, it had other impacts. For example, one of the side effects of a singular privacy policy and single Google identity is that deleting one of a recently deceased person’s services may inadvertently delete them all. Given that Google’s services include Gmail, YouTube and Picasa, this means that deleting an email account inadvertently erases all of the Google-hosted videos and photographs that individual posted during their lifetime. As Google warns, for example: “if you delete the Google Account to which your YouTube account is linked, you will delete both the Google Account AND your YouTube account, including all videos and account data” (Google, “What Happens”). A relative having gained access to a deceased person’s Gmail might sensibly delete the email account once the desired information is exported. However, it seems less likely that this executor would realise that in doing so all of the private and public videos that person had posted on YouTube would also permanently disappear. While material possessions can be carefully dispersed to specific individuals following the instructions in someone’s will, such affordances are not yet available for Google users. While it is entirely understandable that the ramification of policy changes are aimed at living users, as more and more online users pass away, the question of their digital assets becomes increasingly important. Google, for example, might allow a deceased person’s executor to elect which of their Google services should be kept online (perhaps their YouTube videos), which traces can be exported (perhaps their email), and which services can be deleted. At present, the lack of fine-grained controls over a user’s digital estate at Google makes this almost impossible. While it violates Google’s policies to transfer ownership of an account to another person, if someone does leave their passwords behind, this provides their loved ones with the best options in managing their digital legacy with Google. When someone dies and their online legacy is a collection of media fragments, the value of those media is far more apparent to the loved ones left behind rather than the companies housing those media. Facebook Memorialisation In response to users complaining that Facebook was suggesting they reconnect with deceased friends who had left Facebook profiles behind, in 2009 the company instituted an official policy of turning the Facebook profiles of departed users into memorial pages (Kelly). Technically, loved ones can choose between memorialisation and erasing an account altogether, but memorialisation is the default. This entails setting the account so that no one can log into it, and that no new friends (connections) can be made. Existing friends can access the page in line with the user’s final privacy settings, meaning that most friends will be able to post on the memorialised profile to remember that person in various ways (Facebook). Memorialised profiles (now Timelines, after Facebook’s redesign) thus become potential mourning spaces for existing connections. Since memorialised pages cannot make new connections, public memorial pages are increasingly popular on Facebook, frequently set up after a high-profile death, often involving young people, accidents or murder. Recent studies suggest that both of these Facebook spaces are allowing new online forms of mourning to emerge (Marwick and Ellison; Carroll and Landry; Kern, Forman, and Gil-Egui), although public pages have the downside of potentially inappropriate commentary and outright trolling (Phillips). Given Facebook has over a billion registered users, estimates already suggest that the platform houses 30 million profiles of deceased people, and this number will, of course, continue to grow (Kaleem). For Facebook, while posthumous users do not generate data themselves, the fact that they were part of a network means that their connections may interact with a memorialised account, or memorial page, and this activity, like all Facebook activities, allows the platform to display advertising and further track user interactions. However, at present Facebook’s options – to memorialise or delete accounts of deceased people – are fairly blunt. Once Facebook is aware that a user has died, no one is allowed to edit that person’s Facebook account or Timeline, so Facebook literally offers an all (memorialisation) or nothing (deletion) option. Given that Facebook is essentially a platform for performing identities, it seems a little short-sighted that executors cannot clean up or otherwise edit the final, lasting profile of a deceased Facebook user. As social networking services and social media become more ingrained in contemporary mourning practices, it may be that Facebook will allow more fine-grained control, positioning a digital executor also as a posthumous curator, making the final decision about what does and does not get kept in the memorialisation process. Since Facebook is continually mining user activity, the popularity of mourning as an activity on Facebook will likely mean that more attention is paid to the question of digital legacies. While the user themselves can no longer be social, the social practices of mourning, and the recording of a user as a media entity highlights the fact that social media can be about interactions which in significant ways include deceased users. Digital Legacy Services While the largest online corporations have fairly blunt tools for addressing digital death, there are a number of new tools and niche services emerging in this area which are attempting to offer nuanced control over digital legacies. Legacy Locker, for example, offers to store the passwords to all of a user’s online services and accounts, from Facebook to Paypal, and to store important documents and other digital material. Users designate beneficiaries who will receive this information after the account holder passes away, and this is confirmed by preselected “verifiers” who can attest to the account holder’s death. Death Switch similarly provides the ability to store and send information to users after the account holder dies, but tests whether someone is alive by sending verification emails; fail to respond to several prompts and Death Switch will determine a user has died, or is incapacitated, and executes the user’s final instructions. Perpetu goes a step further and offers the same tools as Legacy Locker but also automates existing options from social media services, allowing users to specify, for example, that their Facebook, Twitter or Gmail data should be downloaded and this archive should be sent to a designated recipient when the Perpetu user dies. These tools attempt to provide a more complex array of choices in terms of managing a user’s digital legacy, providing similar choices to those currently available when addressing material possessions in a formal will. At a broader level, the growing demand for these services attests to the ongoing value of online accounts and social media traces after a user’s death. Bequeathing passwords may not strictly follow the Terms of Use of the online services in question, but it is extremely hard to track or intervene when a user has the legitimate password, even if used by someone else. More to the point, this finely-grained legacy management allows far more flexibility in the utilisation and curation of digital assets posthumously. In the process of signing up for one of these services, or digital legacy management more broadly, the ongoing value and longevity of social media traces becomes more obvious to both the user planning their estate and those who ultimately have to manage it. The Social Media Afterlife The value of social media beyond the grave is also evident in the range of services which allow users to communicate in some fashion after they have passed away. Dead Social, for example, allows users to schedule posthumous social media activity, including the posting of tweets, sending of email, Facebook messages, or the release of online photos and videos. The service relies on a trusted executor confirming someone’s death, and after that releases these final messages effectively from beyond the grave. If I Die is a similar service, which also has an integrated Facebook application which ensures a user’s final message is directly displayed on their Timeline. In a bizarre promotional campaign around a service called If I Die First, the company is promising that the first user of the service to pass away will have their posthumous message delivered to a huge online audience, via popular blogs and mainstream press coverage. While this is not likely to appeal to everyone, the notion of a popular posthumous performance of self further complicates that question of what social media can mean after death. Illustrating the value of social media legacies in a quite different but equally powerful way, the Lives On service purports to algorithmically learn how a person uses Twitter while they are live, and then continue to tweet in their name after death. Internet critic Evgeny Morozov argues that Lives On is part of a Silicon Valley ideology of ‘solutionism’ which casts every facet of society as a problem in need of a digital solution (Morozov). In this instance, Lives On provides some semblance of a solution to the problem of death. While far from defeating death, the very fact that it might be possible to produce any meaningful approximation of a living person’s social media after they die is powerful testimony to the value of data mining and the importance of recognising that value. While Lives On is an experimental service in its infancy, it is worth wondering what sort of posthumous approximation might be built using the robust data profiles held by Facebook or Google. If Google Now can extrapolate what a user wants to see without any additional input, how hard would it be to retool this service to post what a user would have wanted after their death? Could there, in effect, be a Google After(life)? Conclusion Users of social media services have differing levels of awareness regarding the exchange they are agreeing to when signing up for services provided by Google or Facebook, and often value the social affordances without necessarily considering the ongoing media they are creating. Online corporations, by contrast, recognise and harness the informatic traces users generate through complex data mining and analysis. However, the death of a social media user provides a moment of rupture which highlights the significant value of the media traces a user leaves behind. More to the point, the value of these media becomes most evident to those left behind precisely because that individual can no longer be social. While beginning to address the issue of posthumous user data, Google and Facebook both have very blunt tools; Google might offer executors access while Facebook provides the option of locking a deceased user’s account as a memorial or removing it altogether. Neither of these responses do justice to the value that these media traces hold for the living, but emerging digital legacy management tools are increasingly providing a richer set of options for digital executors. While the differences between material and digital assets provoke an array of legal, spiritual and moral issues, digital traces nevertheless clearly hold significant and demonstrable value. For social media users, the death of someone they know is often the moment where the media side of social media – their lasting, infinitely replicable nature – becomes more important, more visible, and casts the value of the social media accounts of the living in a new light. For the larger online corporations and service providers, the inevitable increase in deceased users will likely provoke more fine-grained controls and responses to the question of digital legacies and posthumous profiles. It is likely, too, that the increase in online social practices of mourning will open new spaces and arenas for those same corporate giants to analyse and data-mine. References Albrechtslund, Anders. “Online Social Networking as Participatory Surveillance.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/article/view/2142/1949›. boyd, danah. “Facebook’s Privacy Trainwreck: Exposure, Invasion, and Social Convergence.” Convergence 14.1 (2008): 13–20. ———, and Kate Crawford. “Critical Questions for Big Data.” Information, Communication & Society 15.5 (2012): 662–679. Carroll, Brian, and Katie Landry. “Logging On and Letting Out: Using Online Social Networks to Grieve and to Mourn.” Bulletin of Science, Technology & Society 30.5 (2010): 341–349. Doyle, Warwick, and Matthew Fraser. “Facebook, Surveillance and Power.” Facebook and Philosophy: What’s on Your Mind? Ed. D.E. Wittkower. Chicago, IL: Open Court, 2010. 215–230. Facebook. “Deactivating, Deleting & Memorializing Accounts.” Facebook Help Center. 2013. 7 Mar. 2013 ‹http://www.facebook.com/help/359046244166395/›. Gerlitz, Carolin, and Anne Helmond. “The Like Economy: Social Buttons and the Data-intensive Web.” New Media & Society (2013). Google. “Accessing a Deceased Person’s Mail.” 25 Jan. 2013. 21 Apr. 2013 ‹https://support.google.com/mail/answer/14300?hl=en›. ———. “What Happens to YouTube If I Delete My Google Account or Google+?” 8 Jan. 2013. 21 Apr. 2013 ‹http://support.google.com/youtube/bin/answer.py?hl=en&answer=69961&rd=1›. Halavais, Alexander. Search Engine Society. Polity, 2008. Hof, Robert. “Facebook Makes It Easier to Target Ads Based on Your Shopping History.” Forbes 27 Feb. 2013. 1 Mar. 2013 ‹http://www.forbes.com/sites/roberthof/2013/02/27/facebook-makes-it-easier-to-target-ads-based-on-your-shopping-history/›. Kaleem, Jaweed. “Death on Facebook Now Common as ‘Dead Profiles’ Create Vast Virtual Cemetery.” Huffington Post. 7 Dec. 2012. 7 Mar. 2013 ‹http://www.huffingtonpost.com/2012/12/07/death-facebook-dead-profiles_n_2245397.html›. Kelly, Max. “Memories of Friends Departed Endure on Facebook.” The Facebook Blog. 27 Oct. 2009. 7 Mar. 2013 ‹http://www.facebook.com/blog/blog.php?post=163091042130›. Kern, Rebecca, Abbe E. Forman, and Gisela Gil-Egui. “R.I.P.: Remain in Perpetuity. Facebook Memorial Pages.” Telematics and Informatics 30.1 (2012): 2–10. Marwick, Alice, and Nicole B. Ellison. “‘There Isn’t Wifi in Heaven!’ Negotiating Visibility on Facebook Memorial Pages.” Journal of Broadcasting & Electronic Media 56.3 (2012): 378–400. Morozov, Evgeny. “The Perils of Perfection.” The New York Times 2 Mar. 2013. 4 Mar. 2013 ‹http://www.nytimes.com/2013/03/03/opinion/sunday/the-perils-of-perfection.html?pagewanted=all&_r=0›. Pariser, Eli. The Filter Bubble: What the Internet Is Hiding from You. London: Viking, 2011. Phillips, Whitney. “LOLing at Tragedy: Facebook Trolls, Memorial Pages and Resistance to Grief Online.” First Monday 16.12 (2011). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/3168›. Roosendaal, Arnold. “We Are All Connected to Facebook … by Facebook!” European Data Protection: In Good Health? Ed. Serge Gutwirth et al. Dordrecht: Springer, 2012. 3–19. Rudin, Ken. “Actionable Analytics at Zynga: Leveraging Big Data to Make Online Games More Fun and Social.” San Diego, CA, 2010. Vaidhyanathan, Siva. The Googlization of Everything. 1st ed. Berkeley: University of California Press, 2011. Westlake, E.J. “Friend Me If You Facebook: Generation Y and Performative Surveillance.” TDR: The Drama Review 52.4 (2008): 21–40. Zimmer, Michael. “The Externalities of Search 2.0: The Emerging Privacy Threats When the Drive for the Perfect Search Engine Meets Web 2.0.” First Monday 13.3 (2008). 21 Apr. 2013 ‹http://firstmonday.org/ojs/index.php/fm/article/view/2136/1944›. ———. “The Gaze of the Perfect Search Engine: Google as an Infrastructure of Dataveillance.” Web Search. Eds. Amanda Spink & Michael Zimmer. Berlin: Springer, 2008. 77–99.
APA, Harvard, Vancouver, ISO, and other styles
8

Shiloh, Ilana. "Adaptation, Intertextuality, and the Endless Deferral of Meaning." M/C Journal 10, no. 2 (May 1, 2007). http://dx.doi.org/10.5204/mcj.2636.

Full text
Abstract:
Film adaptation is an ambiguous term, both semantically and conceptually. Among its multiple connotations, the word “adaptation” may signify an artistic composition that has been recast in a new form, an alteration in the structure or function of an organism to make it better fitted for survival, or a modification in individual or social activity in adjustment to social surroundings. What all these definitions have in common is a tacitly implied hierarchy and valorisation: they presume the existence of an origin to which the recast work of art is indebted, or of biological or societal constraints to which the individual should conform in order to survive. The bias implied in the very connotations of the word has affected the theory and study of film adaptation. This bias is most noticeably reflected in the criterion of fidelity, which has been the major standard for evaluating film adaptations ever since George Bluestone’s 1957 pivotal Novels into Films. “Fidelity criticism,” observes McFarlane, “depends on a notion of the text as having and rendering up to the (intelligent) reader a single, correct ‘meaning’ which the film-maker has either adhered to or in some sense violated or tampered with” (7). But such an approach, Leitch argues, is rooted in several unacknowledged but entrenched misconceptions. It privileges literature over film, casts a false aura of originality on the precursor text, and ignores the fact that all texts, whether literary or cinematic, are essentially intertexts. As Kristeva, along with other poststructuralist theorists, has taught us, any text is an amalgam of others, a part of a larger fabric of cultural discourse (64-91). “A text is a multidimensional space in which a variety of writings, none of them original, blend and clash”, writes Barthes in 1977 (146), and 15 years later film theoretician Robert Stam elaborates: “The text feeds on and is fed into an infinitely permutating intertext, which is seen through evershifting grids of interpretation” (57). The poststructuralists’ view of texts draws on the structuralists’ view of language, which is conceived as a system that pre-exists the individual speaker and determines subjectivity. These assumptions counter the Romantic ideology of individualism, with its associated concepts of authorial originality and a text’s single, unified meaning, based on the author’s intention. “It is language which speaks, not the author,” declares Barthes, “to write is to reach the point where only language acts, ‘performs’, and not me” (143). In consequence, the fidelity criterion of film adaptation may be regarded as an outdated vestige of the Romantic world-view. If all texts quote or embed fragments of earlier texts, the notion of an authoritative literary source, which the cinematic version should faithfully reproduce, is no longer valid. Film adaptation should rather be perceived as an intertextual practice, contributing to a dynamic interpretive exchange between the literary and cinematic texts, an exchange in which each text can be enriched, modified or subverted. The relationship between Jonathan Nolan’s short story “Memento Mori” and Christopher Nolan’s film Memento (2001) is a case in point. Here there was no source text, as the writing of the story did not precede the making of the film. The two processes were concurrent, and were triggered by the same basic idea, which Jonathan discussed with his brother during a road trip from Chicago to LA. Christopher developed the idea into a film and Jonathan turned it into a short story; he also collaborated in the film script. Moreover, Jonathan designed otnemem> (memento in reverse), the official Website, which contextualises the film’s fictional world, while increasing its ambiguity. What was adapted here was an idea, and each text explores in different ways the narrative, ontological and epistemological implications of that idea. The story, the film and the Website produce a multi-layered intertextual fabric, in which each thread potentially unravels the narrative possibilities suggested by the other threads. Intertextuality functions to increase ambiguity, and is therefore thematically relevant, for “Memento Mori”, Memento and otnemem> are three fragmented texts in search of a coherent narrative. The concept of narrative may arguably be one of the most overused and under-defined terms in academic discourse. In the context of the present paper, the most productive approach is that of Wilkens, Hughes, Wildemuth and Marchionini, who define narrative as a chain of events related by cause and effect, occurring in time and space, and involving agency and intention. In fiction or in film, intention is usually associated with human agents, who can be either the characters or the narrator. It is these agents who move along the chain of causes and effects, so that cause-effect and agency work together to make the narrative. This narrative paradigm underpins mainstream Hollywood cinema in the years 1917-1960. In Narration in the Fiction Film, David Bordwell writes: The classical Hollywood film presents psychologically defined individuals who struggle to solve a clear-cut problem or to attain specific goals. … The story ends with a decisive victory or defeat, a resolution of the problem, and a clear achievement, or non achievement, of the goals. The principal causal agency is thus the character … . In classical fabula construction, causality is the prime unifying principle. (157) The large body of films flourishing in America between the years 1941 and 1958 collectively dubbed film noir subvert this narrative formula, but only partially. As accurately observed by Telotte, the devices of flashback and voice-over associated with the genre implicitly challenge conventionally linear narratives, while the use of the subjective camera shatters the illusion of objective truth and foregrounds the rift between reality and perception (3, 20). Yet in spite of the narrative experimentation that characterises the genre, the viewer of a classical film noir film can still figure out what happened in the fictional world and why, and can still reconstruct the story line according to sequential and causal schemata. This does not hold true for the intertextual composite consisting of Memento, “Memento Mori” and otnemem>. The basic idea that generated the project was that of a self-appointed detective who obsessively investigates and seeks to revenge his wife’s rape and murder, while suffering from a total loss of short term memory. The loss of memory precludes learning and the acquisition of knowledge, so the protagonist uses scribbled notes, Polaroid photos and information tattooed onto his skin, in an effort to reconstruct his fragmented reality into a coherent and meaningful narrative. Narrativity is visually foregrounded: the protagonist reads his body to make sense of his predicament. To recap, the narrative paradigm relies on a triad of terms: connectedness (a chain of events), causality, and intentionality. The basic situation in Memento and “Memento Mori”, which involves a rupture in the protagonist’s/narrator’s psychological time, entails a breakdown of all three pre-requisites of narrativity. Since the protagonists of both story and film are condemned, by their memory deficiency, to living in an eternal present, they are unable to experience the continuity of time and the connectedness of events. The disruption of temporality inevitably entails the breakdown of causality: the central character’s inability to determine the proper sequence of events prevents him from being able to distinguish between cause and effect. Finally, the notion of agency is also problematised, because agency implies the existence of a stable, identifiable subject, and identity is contingent on the subject’s uninterrupted continuity across time and change. The subversive potential of the basic narrative situation is heightened by the fact that both Memento and “Memento Mori” are focalised through the consciousness and perception of the main character. This means that the story, as well as the film, is conveyed from the point of view of a narrator who is constitutionally unable to experience his life as a narrative. This conundrum is addressed differently in the story and in the film, both thematically and formally. “Memento Mori” presents, in a way, the backdrop to Memento. It focuses on the figure of Earl, a brain damaged protagonist suffering from anterograde amnesia, who is staying in a blank, anonymous room, that we assume to be a part of a mental institution. We also assume that Earl’s brain damage results from a blow to the head that he received while witnessing the rape and murder of his wife. Earl is bent on avenging his wife’s death. To remind himself to do so, he writes messages to himself, which he affixes on the walls of his room. Leonard Shelby is Memento’s cinematic version of Earl. By Leonard’s own account, he has an inability to form memories. This, he claims, is the result of neurological damage sustained during an attack on him and his wife, an attack in which his wife was raped and killed. To be able to pursue his wife’s killers, he has recourse to various complex and bizarre devices—Polaroid photos, a quasi-police file, a wall chart, and inscriptions tattooed onto his skin—in order to replace his memory. Hampered by his affliction, Leonard trawls the motels and bars of Southern California in an effort to gather evidence against the killer he believes to be named “John G.” Leonard’s faulty memory is deviously manipulated by various people he encounters, of whom the most crucial are a bartender called Natalie and an undercover cop named Teddy, both involved in a lucrative drug deal. So far for a straightforward account of the short story and the film. But there is nothing straightforward about either Memento or “Memento Mori”. The basic narrative premise, consisting of a protagonist/narrator suffering from a severe memory deficit, is a condition entailing far-reaching psychological and philosophical implications. In the following discussion, I would like to focus on these two implications and to tie them in to the notions of narrativity, intertextuality, and eventually, adaptation. The first implication of memory loss is the dissolution of identity. Our sense of identity is contingent on our ability to construct an uninterrupted personal narrative, a narrative in which the present self is continuous with the past self. In Oneself as Another, his philosophical treatise on the concept of selfhood, Paul Ricoeur queries: “do we not consider human lives to be more readable when they have been interpreted in terms of the stories that people tell about them?” He concludes by observing that “interpretation of the self … finds in narrative, among others signs and symbols, a privileged form of mediation” (ft. 114). Ricoeur further suggests that the sense of selfhood is contingent on four attributes: numerical identity, qualitative identity, uninterrupted continuity across time and change, and finally, permanence in time that defines sameness. The loss of memory subverts the last two attributes of personal identity, the sense of continuity and permanence over time, and thereby also ruptures the first two. In “Memento Mori” and Memento, the disintegration of identity is formally rendered through the fragmentation of the literary and cinematic narratives, respectively. In Jonathan Nolan’s short story, traditional linear narrative is disrupted by shifts in point of view and by graphic differences in the shape of the print on the page. “Memento Mori” is alternately narrated in the first and in the third person. The first person segments, which constitute the present of the story, are written by Earl to himself. As his memory span is ten-minute long, his existence consists of “just the same ten minutes, over and over again” (Nolan, 187). Fully aware of the impending fading away of memory, Earl’s present-version self leaves notes to his future-version self, in an effort to situate him in time and space and to motivate him to the final action of revenge. The literary device of alternating points of view formally subverts the notion of identity as a stable unity. Paradoxically, rather than setting him apart from the rest of us, Earl’s brain damage foregrounds his similarity. “Every man is broken into twenty-four-hour fractions,” observes Earl, comforting his future self by affirming his basic humanity, “Your problem is a little more acute, maybe, but fundamentally the same thing” (Nolan, 189). His observation echoes Beckett’s description of the individual as “the seat of a constant process of decantation … to the vessel containing the fluid of past time” (Beckett, 4-5). Identity, suggests Jonathan Nolan, following Beckett, among other things, is a theoretical construct. Human beings are works in progress, existing in a state of constant flux. We are all fragmented beings—the ten-minute man is only more so. A second strategy employed by Jonathan to convey the discontinuity of the self is the creation of visual graphic disunity. As noted by Yellowlees Douglas, among others, the static, fixed nature of the printed page and its austere linearity make it ideal for the representation of our mental construct of narrative. The text of “Memento Mori” appears on the page in three different font types: the first person segments, Earl’s admonitions to himself, appear in italics; the third person segments are written in regular type; and the notes and signs are capitalised. Christopher Nolan obviously has recourse to different strategies to reach the same ends. His principal technique, and the film’s most striking aspect, is its reversed time sequence. The film begins with a crude Polaroid flash photograph of a man’s body lying on a decaying wooden floor. The image in the photo gradually fades, until the camera sucks the picture up. The photograph presents the last chronological event; the film then skips backwards in ten-minute increments, mirroring the protagonist’s memory span. But the film’s time sequence is not simply a reversed linear structure. It is a triple-decker narrative, mirroring the three-part organisation of the story. In the opening scene, one comes to realise that the film-spool is running backwards. After several minutes the film suddenly reverses and runs forward for a few seconds. Then there is a sudden cut to a different scene, in black and white, where the protagonist (who we have just learned is called Leonard) begins to talk, out of the blue, about his confusion. Soon the film switches to a color scene, again unconnected, in which the “action” of the film begins. In the black and white scenes, which from then on are interspersed with the main action, Leonard attempts to understand what is happening to him and to explain (to an unseen listener) the nature of his condition. The “main action” of the film follows a double temporal structure: while each scene, as a unit of action, runs normally forward, each scene is triggered by the following, rather than by the preceding scene, so that we are witnessing a story whose main action goes back in time as the film progresses (Hutchinson and Read, 79). A third narrative thread, interspersed with the other two, is a story that functions as a foil to the film’s main action. It is the story of Sammy Jankis: one of the cases that Leonard worked on in his past career as an insurance investigator. Sammy was apparently suffering from anterograde amnesia, the same condition that Leonard is suffering from now. Sammy’s wife filed an insurance claim on his behalf, a claim that Leonard rejected on the grounds that Sammy’s condition was merely psychosomatic. Hoping to confirm Leonard’s diagnosis, Sammy’s diabetic wife puts her husband to the test. He fails the test as he tenderly administers multiple insulin injections to her, thereby causing her death. As Leonard’s beloved wife also suffered from diabetes, and as Teddy (the undercover cop) eventually tells Leonard that Sammy never had a wife, the Sammy Jankis parable functions as a mise en abyme, which can either corroborate or subvert the narrative that Leonard is attempting to construct of his own life. Sammy may be seen as Leonard’s symbolic double in that his form of amnesia foreshadows the condition with which Leonard will eventually be afflicted. This interpretation corroborates Leonard’s personal narrative of his memory loss, while tainting him with the blame for the death of Sammy’s wife. But the camera also suggests a more unsettling possibility—Leonard may ultimately be responsible for the death of his own wife. The scene in which Sammy, condemned by his amnesia, administers to his wife a repeated and fatal shot of insulin, is briefly followed by a scene of Leonard pinching his own wife’s thigh before her insulin shot, a scene recurring in the film like a leitmotif. The juxtaposition of the two scenes suggests that it is Leonard who, mistakenly or deliberately, has killed his wife, and that ever since he has been projecting his guilt onto others: the innocent victims of his trail of revenge. In this ironic interpretive twist, it is Leonard, rather than Sammy, who has been faking his amnesia. The parable of Sammy Jankis highlights another central concern of Memento and “Memento Mori”: the precarious nature of truth. This is the second psychological and philosophical implication of what Leonard persistently calls his “condition”, namely his loss of memory. The question explicitly raised in the film is whether memory records or creates, if it retains the lived life or reshapes it into a narrative that will confer on it unity and meaning. The answer is metaphorically suggested by the recurring shots of a mirror, which Leonard must use to read his body inscriptions. The mirror, as Lacan describes it, offers the infant his first recognition as a coherent, unique self. But this recognition is a mis-recognition, for the reflection has a coherence and unity that the subject both lacks and desires. The body inscriptions that Leonard can read only in the mirror do not necessarily testify to the truth. But they do enable him to create a narrative that makes his life worth living. A Lacanian reading of the mirror image has two profoundly unsettling implications. It establishes Leonard as a morally deficient, rather than neurologically deficient, human being, and it suggests that we are not fundamentally different from him. Leonard’s intricate system of notes and body inscriptions builds up an inventory of set representations to which he can refer in all his future experiences. Thus when he wakes up naked in bed with a woman lying beside him, he looks among his Polaroid photographs for a picture which he can match with her, which will tell him what the woman’s name is and what he can expect from her on the basis of past experience. But this, suggest Hutchinson and Read, is an external representation of operations that all of us perform mentally (89). We all respond to sensory input by constructing internal representations that form the foundations of our psyche. This view underpins current theories of language and of the mind. Semioticians tell us that the word, the signifier, refers to a mental representation of an object rather than to the object itself. Cognitivists assume that cognition consists in the operation of mental items which are symbols for real entities. Leonard’s apparently bizarre method of apprehending reality is thus essentially an externalisation of memory. But if, cognitively and epistemologically speaking, Lennie is less different from us than we would like to think, this implication may also extend to our moral nature. Our complicity with Leonard is mainly established through the film’s complex temporal structure, which makes us viscerally share the protagonist’s/narrator’s confusion and disorientation. We become as unable as he is to construct a single, coherent and meaningful narrative: the film’s obscurity is built in. Memento’s ambiguity is enhanced by the film’s Website, which presents a newspaper clipping about the attack on Leonard and his wife, torn pages from police and psychiatric reports, and a number of notes from Leonard to himself. While blurring the boundaries between story and film by suggesting that Leonard, like Earl, may have escaped from a mental institution, otnemem> also provides evidence that can either confirm or confound our interpretive efforts, such as a doctor’s report suggesting that “John G.” may be a figment of Leonard’s imagination. The precarious nature of truth is foregrounded by the fact that the narrative Leonard is trying to construct, as well as the narrative in which Christopher Nolan has embedded him, is a detective story. The traditional detective story proceeds from a two-fold assumption: truth exists, and it can be known. But Memento and “Memento Mori” undermine this epistemological confidence. They suggest that truth, like identity, is a fictional construct, derived from the tales we tell ourselves and recount to others. These tales do not coincide with objective reality; they are the prisms we create in order to understand reality, to make our lives bearable and worth living. Narratives are cognitive patterns that we construct to make sense of the world. They convey our yearning for coherence, closure, and a single unified meaning. The overlapping and conflicting threads interweaving Memento, “Memento Mori” and the Website otnemem> simultaneously expose and resist our nostalgia for unity, by evoking a multiplicity of meanings and creating an intertextual web that is the essence of all adaptation. References Barthes, Roland. Image-Music-Text. London: Fontana, 1977. Beckett, Samuel. Proust. London: Chatto and Windus, 1931. Bluestone, George. Novels into Film. Berkley and Los Angeles: California UP, 1957. Bordwell, David. Narration in the Fiction Film. Madison: Wisconsin UP, 1985. Hutchinson, Phil, and Rupert Read. “Memento: A Philosophical Investigation.” Film as Philosophy: Essays in Cinema after Wittgenstein and Cavell. Ed. Rupert Read and Jerry Goodenough. Hampshire: Palgrave, 2005. 72-93. Kristeva, Julia. “World, Dialogue and Novel.” Desire in Language: A Semiotic Approach to Literature and Art. Ed. Leon S. Rudiez. Trans. Thomas Gora. New York: Columbia UP, 1980. 64-91. Lacan, Jacques. “The Mirror Stage as Formative of the Function of the I as Revealed in Psychoanalytic Experience.” Ēcrits: A Selection. New York: Norton 1977. 1-7. Leitch, Thomas. “Twelve Fallacies in Contemporary Adaptation Theory.” Criticism 45.2 (2003): 149-71. McFarlane, Brian. Novel to Film: An Introduction to the Theory of Adaptation. Oxford: Clarendon Press, 1996. Nolan, Jonathan. “Memento Mori.” The Making of Memento. Ed. James Mottram. London: Faber and Faber, 2002. 183-95. Nolan, Jonathan. otnemem. 24 April 2007 http://otnemem.com>. Ricoeur, Paul. Oneself as Another. Chicago: Chicago UP, 1992. Stam, Robert. “Beyond Fidelity: The Dialogics of Adaptation.” Film Adaptation. Ed. James Naremore. New Brunswick: Rutgers UP, 2000. 54-76. Telotte, J.P. Voices in the Dark: The Narrative Patterns of Film Noir. Urbana and Chicago: Illinois UP, 1989. Wilkens, T., A. Hughes, B.M. Wildemuth, and G. Marchionini. “The Role of Narrative in Understanding Digital Video.” 24 April 2007 http://www.open-video.org/papers/Wilkens_Asist_2003.pdf>. Yellowlees Douglass, J. “Gaps, Maps and Perception: What Hypertext Readers (Don’t) Do.” 24 April 2007 http://www.pd.org/topos/perforations/perf3/douglas_p3.html>. Citation reference for this article MLA Style Shiloh, Ilana. "Adaptation, Intertextuality, and the Endless Deferral of Meaning: Memento." M/C Journal 10.2 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0705/08-shiloh.php>. APA Style Shiloh, I. (May 2007) "Adaptation, Intertextuality, and the Endless Deferral of Meaning: Memento," M/C Journal, 10(2). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0705/08-shiloh.php>.
APA, Harvard, Vancouver, ISO, and other styles
9

Pont, Antonia Ellen. "With This Body, I Subtract Myself from Neoliberalised Time: Sub-Habituality, Relaxation and Affirmation After Deleuze." M/C Journal 22, no. 6 (December 4, 2019). http://dx.doi.org/10.5204/mcj.1605.

Full text
Abstract:
IntroductionThis article proposes that the practice of relaxation—a mode of bodily self-organisation within time—provides a way to diversify times as political and creative intervention. Relaxation, which could seem counter-intuitive, may function as intentional temporal intervention and means to slip some of the binds of neoliberal, surveillance capitalist logics. Noting the importance of decision-making (resonant with what Zuboff has called “promising”) as political, ethical capacity (and what dilutes it), I will argue here that relaxation precedes and invites a more active relation to the future. Relaxing and deciding are contrasted, in turn, with something dubbed ‘sub-habituality.’ This neologism would work as a critical poetics for the kind of (non)time in which we may be increasingly living. If, in Discipline and Punish, 1970s Foucault explored the various strategies of coupling time constraints/‘refining’ of time periods (150) with surveillance, I argue here that we might reconsider these same elements—time, constraint, intentionality—aslant and anew, as we approach the third decade of the 21st century (nearly 20 years after Google began opportunistically gathering the data exhaust of its searches). If in a disciplinary society, the organisation of bodies in time served various orders of domination, is it possible that in a control society (as Deleuze has named it), time and bodily composure may be harnessed otherwise to evade surreptitious logics of a neoliberal flavour?The elements noted by Foucault (i.e. structured time, bodily organisation) can—when rendered decisive, coupled with relaxation (to be defined), and with surveillance muddled or subtracted—become tools and modes for questioning, resisting and unsettling various mechanisms of domination and the dilutions of ethical capacity that accompany them in the current moment. We may, in other words, decide to structure our time when unobserved (for example with Flight Mode or connectivity off on laptops, etc.) for intentional, onto-political ends. A later Foucault, incidentally, went on to connect certain practices of care of the self to ethics, as ethical obligations (Foucault, “Ethics”). Time plays a role in such practices. With this as background, this article will read atmospherically some of Gilles Deleuze’s ontological offerings regarding time from his 1968 work Difference and Repetition. However, before this, I wish to clarify the article’s understanding of neoliberalisation in a digital moment.A neoliberalising moment, to use Springer’s preferred nomenclature (5), co-exists presently with a ubiquity of digital media engagement and co-opts it and exacerbates its reach for its manoeuvres. The former’s logics—which digital practices might at once support and/or contest—involve well-known imperatives of ‘efficiency’, aesthetics of striving, untrammelled growth, logics of scarcity and competition, privatisation of community assets, the so-called autonomy of the market, and so on. In his essay on control societies (which notably, after World War II, eclipse the disciplinary societies described by Foucault), Deleuze puts it like this:the corporation constantly presents the brashest rivalry as a healthy form of emulation, an excellent motivational force that opposes individuals against one another and runs through each, dividing each within. (5, my emphasis)Neoliberalism, where corporations have tended to replace factories, relies variously on competition between peers, dubious forms of (often ludicrous) motivation, fluctuating salaries and debt (in the place of explicit enclosures), so as to reduce the capacity and the lived expansiveness of the human (and non-human) beings who exist within its order.With this as background, I’m interested in the ways that personal electronic devices (PEDs) and the apps they house may—if used mostly compliantly and uncritically—impact what I would like to call our temporal diversity. This would involve a whittling-down of our access to atmospheres, thus to more impoverished constellations of living, and finally to profound disenablings in many spheres. PEDs provide a monetisable means of pervasive surveillance and increasingly-normalised "veillance" (Lupton 44). Certain modes of domination—if we read this term to mean a reduction of (ethical, creative, political) capacity—furthermore mobilise very specifically a co-opting of time (in the form of ‘engagement’, our eyes on a screen) and time’s strategic fragmentation. The latter is facilitated variously by monetised, gamified apps, and social media Skinner-box effects, entwined with the veillance made possible by the data exhaust of our searches and other trackable online behaviours, self-loggings, and so on. Recalling the way, in disciplinary societies, that power relations play out via the enclosure and regulation of bodies and their movement—the latter imposed externally and with the imperative of a ‘useful time’ or with the aim of self-optimising—I’m curious about how self-selected modes of resistant bodily organisation might operate to insulate or shelter humans living under and within various intensities of neoliberalisation, its discourse and its gaze. Sheltered, one might recover a creative or robust response. To use temporal strategies and understandings, we may subtract ourselves (even just sometimes) from stealthy modes of control or ‘nudging’, from ways of being which are increasingly marketed as ‘common sense’ approaches to activity and spendings of time.With regard to neoliberalisation (defined according to Springer, 37-38) and its coupling with digital life, I query if we may be finding ourselves too-often dipping below the threshold of what ought to be our most assumed temporality: namely, Deleuze’s ‘living’ or habitual present (from the second chapter of his Difference and Repetition). The moniker of ‘temporal diversity’ seeks to flag that—in a moment where we observe and resist the shutting down of diversity in numerous spheres, of species, eco-systems, cultures and languages, and their eclipse by modes produced for our consumption by globalisation—we could easily miss another register at which diversity is threatened. We might arguably be facing the loss of something which, after the fact, we may struggle to name—since it is not a ‘thing’—and whose trajectory of disappearance might wholly elude us. This diversity is that of times.Deleuze’s Three Syntheses in Difference and RepetitionIn Chapter 2 of his 1968 work, Deleuze explores three ways in which time can synthesise. Each synthesis involves a kind of weaving of the basic operations of difference and repetition. One way to read Deleuze in this work is that he (among other things) effectively sketches three kinds of atmospheres of time. Each of these, I argue, if seen as frame, contributes a richness and diversity to what a life—and what our shared life—can be and feel like.The first kind of time is called the habitual or ‘living’ present. It synthesises from a stitching together, drawing together, of the retaining of disappearing, disparate instances that otherwise bear no basic relation to one another (Deleuze, Difference 97). As a ‘present’, it has a stretch, a ‘reach’ which depends somewhat on our organism’s capacity to contract discontinuous instants. As Hughes beautifully puts it: “Our contractile range is the index of our finitude” (110). As we’ll see below, it would be a crumbling of this ‘range’ that sub-habituality designates. This living present of Deleuze also has a past inflection, marked by the just-gone and by a mode of memory, as well as by a future aspect, marked—not always constructively—by anticipation.One way to read the ‘living’ present is as being akin to our temporal ‘food and shelter’, a basic synthesis in which to dwell basically. Not thrilling or obviously creative, seductive or vast, it is the time—I’d suggest—in which we establish routine, in which we maintain a liveable life. Theorists such as Grosz have argued—in this tradition with Deleuze which positively evaluates habit—that habit, as mode of time, frees the organism up so that invention and innovation can then seed (see Grosz).The ‘living’ present turns out, however, not to be assumable in every case. For example, in cases of PTSD, I’d contend, it may be interrupted, lost, thus is not to be taken for granted under all conditions. Its status under a gamified neoliberalisation or surveillance capitalism is of interest to me and thus I offer this poetics of sub-habituality as a way to designate its vulnerability—that we might slip below its steadying threshold.Neither does the habitual present constitute much of a diversity; it would not cut it, let’s say, as enough for an abundant or varied temporal life. The habitual present contributes to the conditions that would enable me to form intentions (as a cohering ‘self’), to fashion basic schedules with my own initiative, to order an adult life. For a truly rich temporal life, however, we’d wish to include the poetics intimated by Deleuze’s two other syntheses, their more diverse atmospheres and the arguably political capacities they open to us.The second (passive) synthesis pertains to a vast and insisting past, in the lineage of Henri Bergson, and which, Deleuze notes, might be accessed or ‘saved for ourselves’ via that which we call reminiscence (Difference 107)—a dreamy, expansive and often-pleasurable state (except, for example, in cases of PTSD, or even perhaps versions of dementia, where the person may not be able to leave or surface from it). To dig, in thought, ‘down’ into the register of this vast past and to unearth a rigorous account of it, one goes via a series of paradoxes (see Deleuze, Difference 101-105). If the first passive synthesis is constituted by habit’s mechanisms, the second passive synthesis is constituted by memory’s: “memory is the fundamental synthesis of time which constitutes the being of the past (that which causes the present to pass)” (Deleuze, Difference 101). Hughes puts it thus: “the pure past in general [is] a horizon of having-been-ness, in which what was apprehended [in the first synthesis] finds the conditions of its reproducibility” (108). If such a pastness designates one moment in how selves and their being-as-time synthesise, one might want to know how to include this rich, languorous, sometimes lost and meandering, atmosphere in a life. This might assist an understanding of what distorts or precludes it, and thus our learning for how to invite it in, alongside our more habitual modes.No mode of time, therefore, is simplistically inflected as positive or negative. Without their multiplicity, I’m arguing, we are left temporally less endowed. I wish to articulate not the swapping of one kind of time for another—as if one would only favour productive ‘times’, or efficient ‘times’, or competitive ‘times’, or steady ‘times’, or dreamy, meandering ‘times’—but a diversity. When we feel wildly dissatisfied and imagine that a tangible thing, situation or acquisition—content in time, in other words—would serve as a salve for this uneasiness, we might also consider that what’s missing could be a temporal mode. Which one have we lost the capacity to access or drift into? I’ll now turn to the third synthesis which Deleuze explores, which pertains to the future and its opening up.For the purposes of my argument here, I want to use this third synthesis to gesture towards the future as a possible mode—empty, sheer—and which distinguishes itself entirely from the future ‘aspects’ of the first two syntheses. I both take a poetic cue from Deleuze, as well as note that this synthesis is the least obvious or accessible in a usual life, one in which habit’s organisation is established, and even in which perhaps there are pockets of the ‘erotic’ (Deleuze, Difference 107) and/or expansive driftings of the second synthesis of memory. The third synthesis, then—associated with Deleuze’s take on thought—marks the moment when something becomes active. Deleuze presents it to the reader of Difference and Repetition in relation to Nietzsche’s Eternal Return:that is why it is properly called a belief of the future, a belief in the future. Eternal Return affects only the new, what is produced under the condition of default and by the intermediary of metamorphosis. However it causes neither the condition nor the agent to return: on the contrary, it repudiates these and expels them with all its centrifugal force. (Difference 113, emphasis original)When habit dominates our temporal palette, the future appears to be possible only in habit’s guise of it—that is, in the mode of anticipation, which then morphs to prediction as this synthesis moves into its more active modes. Anticipation is a pragmatic but weak future. It is useful, without doubt, since habit’s future mode knows to say: at three o’clock I need to get my shoes on, grab keys and wallet, and drive to pick up X. I anticipate that they will be waiting on this corner, and so on. Habit’s internally available ‘future’ is crucial and steadying. Knowing how to manoeuvre within it is part of learning to live some kind of organised life. In sub-habituality I’d argue, we may not even have that. Zuboff intimates this when in Chapter 11 she speaks of a right to a future tense.Deleuze’s third synthesis opens the self precisely onto that which-cannot-be-anticipated. The Nietzschean mode of the future that Deleuze explores at length is not akin to habit’s ordering and stabilising; it is not to be compared to the reminiscent climes of pure memory, to the vast dilations and contractions of its insisting topographies. The third synthesis asks more of us. It asks us to forget the versions of ourselves we have been (in the very moment that we affirm the repetition of everything that has been, to the letter) and to stare unblinkingly into a roaring Nothingness, or better into the strange weathers of a Not-Determined-Yet.My own practice-based creative research into these matters confirms Deleuze’s architectures. I say: we need the two other temporal syntheses and rely on them in order to dramatise something new in the third synthesis. The is the ability, in other words, to decide and to forget enough to be able to dance forward into an unknown future.Sub-Habituality: Or Less than a ‘Living’ PresentKorean thinker Byung-Chul Han links our use of devices, and the necessity of engaging with them for our social/economic survival, to the kind of dispersed and fretful awareness needed by animals surviving predators in the wild. He sees ‘multitasking’ in no way as any kind of evolution, but names it provocatively a regression, which precludes the kind of contemplation upon which sophisticated cultural practices and fields, such as art and philosophy, arguably depend (Han 26-29). Habit involves the crucial notion of a ‘range’ of, or a capacity for, contracting disparate instants—so as to make possible their being stitched together, via contemplation’s passivity (Deleuze 100), and thereby to synthesise a (stable, even liveable) present. Recall that Hughes called it the index of our finitude. How do digital engagements—specifically with apps and their intentionally gamified designs, and which involve a certain velocity of uncadenced movement and gesture (eyes, hands, neck position)—impact an ability to synthesise a steady-enough present? Sub-habituality, as name, seeks a poetics to bring to articulation an un-ease that would be specifically temporal, not psychological, or even merely physiological.To know about the stability offered by habit’s time allows the cultivation of temporal atmospheres that are pleasant and stable, as well as having the potential to open onto creative/erotic modes of a vast past, as well as not be closed to the pure future. This would be a curation of the present, learning how to ‘play’ its mechanisms such that the most expansive and interesting aspects of this mode—which can condition and court other modes—can come forth.Sub-habituality is that time where the gathering of instants into any stretch is hindered, shattering the operations of coherence and narrowing aperture for certain experiences. No stretch in which to dwell. The vast and calming surfaces of our attention breaking into shards. Sub-habituality would be anti-contemplative, in an ontological sense. No instant could hold for long enough to relate to its temporal peers. Teetering there on the edge of a non-time, any ‘subject’ who might intend is undermined.Next, I turn to the notion of relaxation as bodily practice and strategy to insulate or shelter humans living under and within various intensities of digitalised neoliberalisation. Instead of offering oneself up for monetised organisation, one organises oneself via the nuanced effort that is a ‘dropping of excess effort’. The latter is relaxation and may thwart surreptitious modes of (imposed temporal) (dis)organisation, or what tends to appear increasingly as ‘common sense’ approaches to activity and spendings of time. We practise deciding to structure blocks of time, so that within their bounds we can risk experimenting with relaxation, its erotics and its vectors of transformation.RelaxationNeoliberalisation, after Springer, involves the becoming common-sensical of numerous logics: competitiveness in every sphere of life, ubiquity of free market logics, supposed scarcity (of time, opportunity), rationalisation and instrumentalisation of processes and attitudes to doing, and an emphasis on a discourse of efficiency (even when it is not, in actuality, what obtains). For Deleuze, in a control society, similarlymany young people strangely boast of being “motivated”; they re-request apprenticeships and permanent training. It’s up to them to discover what they are being made to serve, just as their elders discovered, not without difficulty, the telos of the disciplines. ("Postscript", 7)How can we serve less this current telos? What (counter or subtractive) practices might undermine the conditions for the entrenching of such logics? My contention in this article is that practices of the body that also involve the intentional organising of time, along with approaches to movement generally that forgo striving and forcing (that is: kinds of violent ‘work’), may counter some of the impacts (especially of a temporal nature, as discussed above) that align with and allow for neoliberal logics’ pervading of all spheres of life. Relaxation is a useful shorthand for such strategies.In my work elsewhere on practising, I’ve argued that relaxation is the third (of four) criteria that constitute the specific approach to ‘doing’ that can be designated practising (see Pont; Attiwill et al.). Relaxation is a very particular approach to any behaviour or movement, whereby the ‘doer’ pays close attention and seeks to use only the necessary amount of effort for the activity in question. This dropping of ‘natural’ (or knee-jerk) effort is itself a kind of unusual effort. The word ‘natural’ here comes from writings by Vachaspati Mishra (192) and makes the subtle point that relaxation intervenes on what is ‘natural’ or on what has acquired inertia, on that which enacts itself without decision or intention. In this strictly ontological/temporal intervention, relaxation refuses to collude with common-sense approval for striving-as-new-piety that dominate neoliberalised discourses and their motivational propagandas.Relaxation constitutes an enacted—repeatedly enacted—decision at the level of the body to organise movement/doing in ways subtracted from neoliberalised discourse, reawakening intention. It is a quiet intervention, precise and difficult, that works to counter a widespread fundamentalism of doing with excess (or Leistung with its inevitable flipside of collapse and exhaustion, as critiqued by Han 24-25). This dovetails with the ubiquity of digital engagements/behavioural training, which effectively constitute an unending labour for many. Counter-intuitively, relaxation (when understood strictly as practice, not in its lay inflection as compensatory ‘collapse’) can establish a minimum membrane hindering the penetration of this labour into all spheres of a life. Once PEDs are intentionally used—very difficult to do—and limited in terms of the proportion of time they are engaged with, they pose a reduced threat to times’ diversity. (To organise my time, curiously too, I make use of PED timer features, on flight mode, and so on. Others use apps specifically designed to help them use fewer apps.)We find ourselves here faced with various and emergent practices of saying ‘no’ to serve a process that experiments with affirming something else—perhaps this ‘else’ would be the conditions for that which does yet exist, that is: truly open futures, creativity, robustness in the face of change. Promising? Deciding? My argument is that a body immersed too much in sub-habituality is less capable overall of withstanding the atmospheres of the third synthesis (and, if we follow Han, too dispersed and fragmented to access certain atmospheres that we might associate with the second). It may not even have a sense of a living present. It becomes less and less intentional, more malleable, very tired.There is—in the work of the body that resists complying with the logics of neoliberalisation, that resists a certain corrosion of Deleuze’s first time (and of the subsequent two times that in Deleuze open from them)—a clear practice of dropping, letting fall, not picking up in the first place. We forgo then certain modes of, or approaches to, action when we work to subtract ourselves from an encroaching (a)temporality that is none at all. To foil reactivity we have two obvious options: we learn to activate our reactivity—to act it; or we pause just before enacting from within its logic. Relaxation is more about the latter.ConclusionThe sub-habitual discussed in this article is, most importantly, a grim affective/temporal register to inhabit. For many, its unpleasantness is met with queries about mental health, since it naturally impacts us in a register that feels like bad thinking, like bad feeling. By introducing an onto-temporal inflection into such queries, I suggest there might be a certain kind of ‘health’ or better still a ‘pleasure’ in a life that can obtain with the cultivation of a diversity of times. Deleuze’s model of three kinds of temporal synthesis tempts me as one way to track what might be going missing in a moment when certain technologies, serving particular economic and political agendas and ideologies, can coax our rhythms, behaviours and preoccupations down particular paths. The fleshy, energetic and thinking body, as a site of affirmation, as a vehicle for practices that subtract themselves from dominant logics, can—I’ve argued here—be a crucial factor in working with temporality in such a way that one is not left with an homogenised non-time in which we are not-quite-subjects or diluted selves vulnerable to being worked on by logics that drive neoliberalisation and its sufferings. Relaxation is among a suite of strategies that may keep our times (and ourselves as modes of time) diverse: stable, pleasure-capable, imaginative and fierce.ReferencesAttiwill, Suzie, Terri Bird, Andrea Eckersley, Antonia Pont, Jon Roffe, and Philipa Rothfield. Practising with Deleuze. Edinburgh: Edinburgh University Press, 2017.Deleuze, Gilles. Difference and Repetition. Trans. Paul Patton. London: Continuum, 2004.———. “Postscript on the Societies of Control.” October 59 (1992): 3-7.Foucault, Michel. Discipline and Punish: The Birth of the Prison. Trans. Alan Sheridan. New York: Vintage Books, 1995.———. “The Ethics of the Concern for Self as a Practice of Freedom.” The Essential Works of Michel Foucault, Vol. 1: Ethics: Subjectivity and Truth. Ed. Paul Rabinow. New York: New Press, 1997. 281-302.Grosz, Elizabeth. “Habit Today: Ravaisson, Bergson, Deleuze and Us.” Body and Society 19(2&3): 2013. 217-239.Han, Byung-Chul. Müdigkeitsgesellschaft Burnoutgesellschaft Hoch-Zeit. Berlin: Matthes & Seitz, 2016.Hughes, Joe. Deleuze’s Difference and Repetition: A Reader’s Guide. New York: Bloomsbury, 2009. Lupton, Deborah. The Quantified Self. Cambridge: Polity Press, 2016.Mishra, Vachaspati. The Yoga System of Patanjali. Trans. J. Haughton Woods. Delhi: Motilal Banarsidass, 1914 (by arrangement with Harvard University Press).Pont, Antonia. “An Exemplary Operation: Shikantaza and Articulating Practice via Deleuze.” Transcendence, Immanence and Intercultural Philosophy. Eds. Nahum Brown & William Franke. Cham, Switzerland: Palgrave Macmillan, 2016. 207-236.Springer, Simon. The Discourse of Neoliberalism. London: Rowman & Littlefield, 2016.Zuboff, Shoshana. The Age of Surveillance Capitalism. New York: PublicAffairs, 2019. (Kindle Edition.)
APA, Harvard, Vancouver, ISO, and other styles
10

Andrade, Walter. "Fado ou frevo no Carnaval dos Bichos? – A folia do Taboquinhas / Fado or frevo? - The Taboquinhas’ Group." AntHropológicas Visual 3, no. 1 (July 21, 2017). http://dx.doi.org/10.51359/2526-3781.2017.24102.

Full text
Abstract:
Sinopse: Esse vídeo foi apresentado como parte do trabalho de conclusão de curso (TCC) em Ciências Sociais pela Universidade Federal de Pernambuco (UFPE). O estudo se debruçou sobre o grupo Taboquinhas, fundado em 1924 no interior de Pernambuco, mais especificamente na cidade de Vitória de Santo Antão, um dos polos da folia no interior do estado e local conhecido também por seu “carnaval de bichos”, devido às agremiações carnavalescas que possuem nomes de animais. O Taboquinhas é único remanescente ativo dos antigos “clubes de fado” que existiam na cidade. Segundo o historiador José Aragão (1983), os fados, juntamente aos clubes de manobras (ou de pedestres), foram os primeiros clubes organizados em Vitória, surgidos nas duas últimas décadas do século XIX. Algumas características do Taboquinhas, são apresentadas ao longo do vídeo, através de depoimentos, filmagens de dois dias de desfiles no ano de 2016 e através do uso de material histórico. O nome do grupo faz referência à batalha das Tabocas, que aconteceu no Monte das Tabocas, em Vitória, nos anos de 1645 e que resultou no início da expulsão dos holandeses do estado de Pernambuco. A peculiaridade da agremiação reside no fato de tratar-se de um fado carnavalesco, elemento que o torna — pelo menos até então — a única agremiação do tipo ainda em atividade no carnaval do estado de Pernambuco, além de ser uma agremiação tipicamente vitoriense, não sendo encontrada em outras cidades. O título do trabalho faz referência a suposto “fado” do grupo Taboquinhas, questionando se haveria uma relação com o fado (gênero musical) português ou com o frevo. O Taboquinhas é formado em maioria por adultos e idosos, mas conta com participação de jovens, alguns filhos, netos e sobrinhos dos mais velhos. A disposição para o desfile é feita por dois “cordões” de homens e mulheres vestindo trajes (e cores) de camponeses portugueses, um porta-estandarte, as duas figuras principais Senhora Helena, Sinhá Pequena e por uma pequena orquestra de pau e corda, composta por bandolim, pandeiro, rabeca e violões. Embora se trate de um clube de fados, a sonoridade é próxima da de um frevo de bloco (aquele tocado pelos blocos líricos). Apesar disso, o Taboquinhas não é um bloco lírico, embora toque frevo de bloco ou marcha de bloco. Tanto ele quantos clubes de fados apresentam certas características específicas, o que não o torna um caso isolado de bloco lírico com personagens diferentes ou algo do tipo. Eles apresentam a peculiaridade de os membros trajarem vestes do tipo português, de ter a taboca – um tipo de vara de bambu que vai sendo batida no chão ao longo do desfile – como elemento presente na performance, além de possuírem duas figuras centrais: senhora Helena e sinhá Pequena, que não estão presentes nos blocos líricos. Por fim, este vídeo pode ser considerado com uma introdução a este tipo de agremiação até então pouco estudada e denominada de clube de fado, voltado mais especificamente para a Taboquinhas, enquanto remanescente e grupo muito querido, presente no imaginário da população local como um patrimônio de seu carnaval. Synopsis: This short movie was presented how part of the final work to received the diploma in Social Sciences at Universidade Federal de Pernambuco (UFPE). This study it’s about Taboquinhas’ Group, founded in 1924 in the city of Vitória de Santo Antão (PE), one the places most popular in the carnival times and called “carnaval dos bichos” (carnival of the animals), due to groups named like animals. The Taboquinhas’ is the only “clube de fado” in activity. There was some groups in the past, but now just the Taboquinhas’. According to José Aragão (1983), the fado’s groups was the first organized carnival groups in Vitória. They emerged in the 19th century. Some Taboquinhas' features will be shown in the movie through ex-members reports, historical materials and two presentations in the carnival of 2016. The name of group is to honor a “Batalha das Tabocas” (Battle of Tabocas). This Battle occurred in the year 1645 in Vitória de Santo Antão and was the beginning of the expulsion of the Dutch army (according to part of local history). The interesting fact in Taboquinhas’ group is in reference of the local denomination: one fado in carnival. This fact its very singular. The title of the short movie its in allusion at this “fado” of the Taboquinhas’, questioning about a link with the fado from Portugal or with frevo music. The Taboquinhas it’s composed by adults, elderly person, young people and some children, grandsons or familiars from the older participants. In the carnival parade they have two “cordões” with mans and woman's wearing clothes (with colors) like Portuguese peasants, one standard-bearer, two character called Senhora Helena and Sinhá Pequena; one little orchestra of “pau e corda” (wood and rope), composed for mandolim, tambourine, “rabeca” and guitars. Although it’s called “clube de fado”, the group sounds like a frevo de bloco (a type of frevo and played for the “blocos lìricos” from Recife). However, the Taboquinhas it’s not a “bloco lírico”, despite play “frevo de bloco” or “marcha de bloco” and not fado However, the Taboquinhas it’s not a “bloco lírico”, despite play “frevo de bloco” or “marcha de bloco” and not fado (like the Portugal rhythm). This two types of carnival groups are different. The clothes, character, colors and others elements used during the parade. Finally, this short movie it’s a little introduction to “clube de fado” even yet unknown, more specifically focused in Taboquinhas’ group, the last one for the type, very present in the popular imaginary from the people of the city and treated how one local heritage. Palavras-chave: Taboquinhas, Carnaval, Cultura Popular, Frevo, Fado, Clube de Fados Key-words: Taboquinhas, Carnival, Popular Culture, Frevo, Fado, “Clube de fados” Ficha técnica: Direção: Hérika Araújo, Saulo Lima, Walter Andrade Argumento: Walter Andrade Fotografia: Saulo Lima, Walter Andrade Edição e Montagem: Walter Andrade Trabalho de conclusão de curso: Walter Andrade Orientação: Lady Selma Ferreira Albernaz Co-orientação: Ana Cláudia Rodrigues da Silva e Luciana Mendonça Credits: Direction: Hérika Araújo, Saulo Lima, Walter Andrade Text: Walter Andrade Photography: Saulo Lima, Walter Andrade Editing: Walter Andrade Monograph: Walter Andrade Orientation: Lady Selma Ferreira Albernaz Co-orientation: Ana Cláudia Rodrigues da Silva and Luciana Mendonça
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Person-Name Queries"

1

Al-Kamha, Reema. "Grouping Search-Engine Returned Citations for Person-Name Queries." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd472.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Person-Name Queries"

1

Gruetze, Toni, Gjergji Kasneci, Zhe Zuo, and Felix Naumann. "Bootstrapping Wikipedia to answer ambiguous person name queries." In 2014 IEEE 30th International Conference on Data Engineering Workshops (ICDEW). IEEE, 2014. http://dx.doi.org/10.1109/icdew.2014.6818303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Kamha, Reema, and David W. Embley. "Grouping search-engine returned citations for person-name queries." In the 6th annual ACM international workshop. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1031453.1031472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography