1-16 of 16 Search Results for


Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
boundary 2 (2017) 44 (4): 95–112.
Published: 01 November 2017
...David Golumbia The question of the militarization of language emerges from the politics surrounding cryptography, or the use of encryption in contemporary networked digital technology, and the intersection of encryption with the politics of language. Ultimately, cryptographic politics aims...
Journal Article
boundary 2 (2017) 44 (1): 125–147.
Published: 01 February 2017
..., concerns the classic phenomenological and metaphysical debates around expression, revealing, representation, mimesis, and the “extensions of man.” The second, rather ill-defined thus far, deals with a different set of concerns: encryption, obliteration, unilateral determination, irreversibility...
Journal Article
boundary 2 (2004) 31 (2): 197–218.
Published: 01 May 2004
...), and Phulboni (the writer who narrowly escapes the ghost); the details of these fragments densely encrypt specific vernacular ghost stories. Tarrying with the Vernacular My critical practice speaks of this ghosted tradition that haunts Ghosh while writing The Calcutta Chromosome. In a recent...
Journal Article
boundary 2 (2001) 28 (2): 21–32.
Published: 01 May 2001
... to the cultural nationalism encrypted in the untranslatable words and the universal melody that W. E. B. Du Bois heard in the dandling melody derived from his grandfather’s grandmother’s African song.2 By means of quotation, with special attention to sound and an ear open to Africa and its 1. This project...
Journal Article
boundary 2 (2007) 34 (2): 71–103.
Published: 01 May 2007
... the speaker’s firstborn, the Angel of Death apparently found the son’s name [W(aldo)him] encrypted within this enig- matic signifier and interpreted “Whim” as one of the family relations from whom the speaker had pledged to disaffiliate so as to secure his bond with Genius. Emerson’s “Self...
Journal Article
boundary 2 (2010) 37 (1): 201–213.
Published: 01 February 2010
... of the Library of America edition, however, will continue to experience Ashbery’s homosexuality as so heavily encrypted: “I’m hoping that homosexuals not yet born get to inquire about it, inspect the whole random collection as though it were a sphere” (765). 15. The intermingling of critical...
Journal Article
boundary 2 (2002) 29 (2): 29–43.
Published: 01 May 2002
.... In associating the flag under whose authority the revo- lutionists sought to overthrow British rule with the ‘‘Lost Cause the scene encrypts the ideology of Confederate nationalism onto a historical scene in which nationalism had not yet been achieved.7 But when The Patriot rendered the ‘‘cause...
Journal Article
boundary 2 (2015) 42 (2): 25–56.
Published: 01 May 2015
... identification, but his theoretical con- structions cordoned off Wolf Man’s outer history from the inner story of infantile neurosis.13 In “Freud, the Wolf Man and the Encrypted Dynamism of Revolu- tionary History,”14 Thomas Goodwin has summarized revisionist under- standings of the case that bring...
Journal Article
boundary 2 (2008) 35 (1): 197–215.
Published: 01 February 2008
..., some key to an encrypted message of great moment, which others are locked in struggle to come into control of.26 (AD, 748) Yashmeen’s letter amplifies the genealogical form of the novel’s philosophi- cal preoccupations in a dramatic register. Rather than repeat the ahistori- cal...
Journal Article
boundary 2 (2023) 50 (3): 211–231.
Published: 01 August 2023
... remains, it seems to me, is precisely the question of the body, a question that encrypts yet another, more uncertain one: the question of justice.” The leprous body that Henryson parades as spectacle through the poem is what brings the poem to an abrupt end when it is buried: the final line of the poem...
Journal Article
boundary 2 (2017) 44 (4): 33–55.
Published: 01 November 2017
... in which information is “given” and becomes “a given datum”—and how it is passed on and circulated. This includes authorized and unauthorized uses of language, selection, and transmission of “data,” encryption and decryption, inculcation of habits of perception and of reflec- tion—and these are just...
Journal Article
boundary 2 (2006) 33 (1): 203–228.
Published: 01 February 2006
... by means of nonconceptual truth-content encrypted in its formal principles. If reduced to a bare-bones sketch, Adorno’s critique of the sociology of knowledge amounts to the following argument: the focus on the ‘‘extra- theoretical’’ function (Mannheim) prevents the sociology of art from grasping...
Journal Article
boundary 2 (2012) 39 (2): 111–141.
Published: 01 May 2012
... that is not already in the compendium of the latter. Everything thus is already con- tained in the Vedas. A modern engagement with the Vedic twilight is thus at once of discursive exegesis and decryption. The question of time and mem- ory here is inextricably a question of language. If all is indeed encrypted...
Journal Article
boundary 2 (2020) 47 (2): 119–151.
Published: 01 May 2020
... may be, produce marks of difference (as in the way they deny or encrypt their gendering, for example), their specific significations no doubt matter a great deal. But, in effect, these too are no more than different instances of historical ontology in a trajectory that has no structural logic...
Journal Article
boundary 2 (2000) 27 (2): 83–111.
Published: 01 May 2000
... of appropriation by the market 17 In effect, Poe’s encrypted rhetorical shenanigans work to frustrate such circulation. This is the posi- tion Jonathan Auerbach assumes in stating that Poe fears ‘‘fad[ing] into ob- scurity as soon as his...
Journal Article
boundary 2 (2002) 29 (1): 65–96.
Published: 01 February 2002
..., and if such an ontological investi- gation turns out to be a Marranist and paleonymic encryption, so be it. And what I have been referring to as philopoesis aims to bring such an ontology to bear on the practice of reading words and of writing words alongside other words: It hopes to reinsert ontology in the study...