1-20 of 20 Search Results for

encryption

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Article
Social Text (2018) 36 (1 (134)): 81–89.
Published: 01 March 2018
...After Globalism Writing Group This section examines how we recount our lives, particularly those lost and forgotten in history. Oftentimes, the one who recounts is expected to do so with clarity and truthfulness. We turn here to other acts of recollection that involve amnesia and encryption...
Journal Article
Social Text (2018) 36 (1 (134)): 15–23.
Published: 01 March 2018
... frustration about thinking through and trying to contend with a language of life that is not dependent upon the figure of Christ, redemption, and salvation absorbed in a narrative of pro-life. Perhaps a rethinking of the grammars of life not conditioned by the colonial artifact of religious encryption matters...
Journal Article
Social Text (2004) 22 (3 (80)): 51–73.
Published: 01 September 2004
... military applications (command and control systems and encryption).8 Yet information theory also had larger implications for our understanding of communication as a material process that technological development latched onto and...
Journal Article
Social Text (2016) 34 (3 (128)): 137–152.
Published: 01 September 2016
... allows the audience to grasp from the message that is norman bates a sort of corollary to the law of the father and its necessary repression of desire in modern, cinematic capitalism. Norman is an algorithmic encryption of the law placed under duress by cine-mediated scopophilia and the...
Journal Article
Social Text (2018) 36 (1 (134)): 45–54.
Published: 01 March 2018
... learning that sediments colonial modernity, all the racial and gendered violence of discourse, images, institutions, and practices into its operating systems. It’s all of social relations — the sordid history of “the human” — that has been encrypted into the machine architecture at the level of the code...
Journal Article
Social Text (2017) 35 (4): 113–152.
Published: 01 December 2017
... surveillance distributed throughout: mountains of USB sticks and burner mobile phones; a painfully slow, encrypted Internet connection, sticker-covered IBM laptops, electronic manacles, and monitoring boxes—objects that moved the WikiLeaks operation from one location to another and that we documented within...
Journal Article
Social Text (2010) 28 (1 (102)): 35–58.
Published: 01 March 2010
...” machine that had been secretly built during the war. Ralph Pot- ter, director of “Project X” — in which vocoder technology was used for speech encryption — also coordinated a wartime cryptanalysis project. His team built the sound spectrograph as the vocoder’s twin, a code...
Journal Article
Social Text (2009) 27 (3 (100)): 219–222.
Published: 01 September 2009
Journal Article
Social Text (2009) 27 (3 (100)): 223–229.
Published: 01 September 2009
Journal Article
Social Text (2009) 27 (3 (100)): 230.
Published: 01 September 2009
Journal Article
Social Text (2009) 27 (3 (100)): 231–241.
Published: 01 September 2009
Journal Article
Social Text (2009) 27 (3 (100)): 242–245.
Published: 01 September 2009
Journal Article
Social Text (2009) 27 (3 (100)): 247–250.
Published: 01 September 2009
Journal Article
Social Text (2009) 27 (3 (100)): 251–256.
Published: 01 September 2009
Journal Article
Social Text (2009) 27 (3 (100)): 257–262.
Published: 01 September 2009
Journal Article
Social Text (2016) 34 (2 (127)): 21–44.
Published: 01 June 2016
.... In his study of language, psychoanalysis, and capital, Jean-Joseph Goux writes of the amortization of consciousness in the historical working up of the transcendental abstractions. The “I,” the phallus, the value form—these are the results of practical activities that are amortized and thus encrypted...
Journal Article
Social Text (2010) 28 (4 (105)): 65–89.
Published: 01 December 2010
.... A network can be dispersed, distributed, encrypted, and ubiquitous.”17 Within the logic of the war on terror — ­a mode of think- ing that is both reproduced and opened up by network aesthetics — ­the continual emergence of unknown terrorist networks reinforces a state of emergency and...
Journal Article
Social Text (2012) 30 (1 (110)): 109–141.
Published: 01 March 2012
... abjures the usual tale of leaders, institutions, and governmental legisla- tion, avoids a valorization of “the masses” just as it does great leaders, and focuses instead on the question of political intensity. Sometimes this tale requires the disinterment of encrypted signs of desires that tear us...
Journal Article
Social Text (2012) 30 (4 (113)): 25–53.
Published: 01 December 2012
Journal Article
Social Text (2013) 31 (4 (117)): 25–47.
Published: 01 December 2013
... of people through time and space.”19 Indeed, there are unnamed yet powerfully present absences encrypted in the structures inherited from the Marcos regime.20 They provoke collective memories that are strangely familiar and conjure...