1-14 of 14 Search Results for


Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
boundary 2 (2017) 44 (4): 95-112.
Published: 01 November 2017
...David Golumbia The question of the militarization of language emerges from the politics surrounding cryptography, or the use of encryption in contemporary networked digital technology, and the intersection of encryption with the politics of language. Ultimately, cryptographic politics aims to...
Journal Article
boundary 2 (2017) 44 (1): 125-147.
Published: 01 February 2017
..., concerns the classic phenomenological and metaphysical debates around expression, revealing, representation, mimesis, and the “extensions of man.” The second, rather ill-defined thus far, deals with a different set of concerns: encryption, obliteration, unilateral determination, irreversibility, and...
Journal Article
boundary 2 (2004) 31 (2): 197-218.
Published: 01 May 2004
...), and Phulboni (the writer who narrowly escapes the ghost); the details of these fragments densely encrypt specific vernacular ghost stories. Tarrying with the Vernacular My critical practice speaks of this ghosted tradition that haunts Ghosh while writing The Calcutta Chromosome. In...
Journal Article
boundary 2 (2001) 28 (2): 21-32.
Published: 01 May 2001
... modernism is bound to the cultural nationalism encrypted in the untranslatable words and the universal melody that W. E. B. Du Bois heard in the dandling melody derived from his grandfather’s grandmother’s African song.2 By means of quotation, with special attention to sound and an ear open to Africa...
Journal Article
boundary 2 (2002) 29 (2): 29-43.
Published: 01 May 2002
... Stripes, the veteran announces to his interlocutor that both he and Gabriel are caught up in a ‘‘lost cause’’ for which there exists no hope for success. In associating the flag under whose authority the revo- lutionists sought to overthrow British rule with the ‘‘Lost Cause the scene encrypts the...
Journal Article
boundary 2 (2010) 37 (1): 201-213.
Published: 01 February 2010
...” constitute a “homotextual” practice but also for its fund of biographical, anecdotal, and archival information. I wonder if future readers of the Library of America edition, however, will continue to experience Ashbery’s homosexuality as so heavily encrypted: “I’m hoping that...
Journal Article
boundary 2 (2007) 34 (2): 71-103.
Published: 01 May 2007
Journal Article
boundary 2 (2015) 42 (2): 25-56.
Published: 01 May 2015
... political order. Freud recognized how the Wolf Man embodied incom- mensurate structures of historical identification, but his theoretical con- structions cordoned off Wolf Man’s outer history from the inner story of infantile neurosis.13 In “Freud, the Wolf Man and the Encrypted Dynamism of...
Journal Article
boundary 2 (2008) 35 (1): 197-215.
Published: 01 February 2008
... knowledge, some key to an encrypted message of great moment, which others are locked in struggle to come into control of.26 (AD, 748) Yashmeen’s letter amplifies the genealogical form of the novel’s philosophi- cal preoccupations in a dramatic register. Rather than repeat the ahistori...
Journal Article
boundary 2 (2000) 27 (2): 83-111.
Published: 01 May 2000
... alienability of personhood that emerged with modern capitalism, in order to keep stories about the self from circulating in the market and hence to resist the risk of appropriation by the market 17 In effect, Poe’s encrypted rhetorical...
Journal Article
boundary 2 (2002) 29 (1): 65-96.
Published: 01 February 2002
Journal Article
boundary 2 (2012) 39 (2): 111-141.
Published: 01 May 2012
Journal Article
boundary 2 (2006) 33 (1): 203-228.
Published: 01 February 2006
... means of nonconceptual truth-content encrypted in its formal principles. If reduced to a bare-bones sketch, Adorno’s critique of the sociology of knowledge amounts to the following argument: the focus on the ‘‘extra- theoretical’’ function (Mannheim) prevents the sociology of art from grasping...
Journal Article
boundary 2 (2017) 44 (4): 33-55.
Published: 01 November 2017
... attention at times at least to the manner in which information is “given” and becomes “a given datum”—and how it is passed on and circulated. This includes authorized and unauthorized uses of language, selection, and transmission of “data,” encryption and decryption, inculcation of habits of...