158 research outputs found

    Healing violence in South Africa: A textual reading of Kentridge\u27s \u27Drawings for Projection\u27

    Get PDF
    While the literature appears to understand trauma and violence as experienced singularly, and as effecting intrapsychic changes or reactions, latterly there has been a recognition that this understanding of the term \u27trauma\u27 may not be adequate to describe violence suffered over a prolonged period of time. Further, psychology tends to avert our attention from healing by attending to symptomatology. In South Africa, during the apartheid years (1948-1994), violence was constituted by an extraordinary threat to ongoing being and was informed by a totalitarian prejudice. Creative texts, unlike traumatic texts, show how many artists have worked with South African traumas in an effort to understand, and come to terms with them. This dissertation is a textual reading of \u27Drawings for Projection\u27 (1989-1994) by William Kentridge (1955-), an acclaimed South African artist. The approach of this study is broadly hermeneutic, phenomenological, and semiological. The reading suggests that the healing of violence is circular and continuous, and includes our re-membering the past, and our humanity as ethical beings on both personal and collective levels. Additionally, the recognition of the Face, and the breath of the Other, contribute to the reconstitution of our ethics; conversely the counter pull to erasure, reconstitutes violence

    An investigation into the theoretical and practical aspects of office mechanisation

    Get PDF
    The leaders of industry are so often leaders because of their distaste for regulation and orthodox methods. They are often reluctant to be restricted in their activities by static requirements of a mechanised system. It may, however, be observed that, with the rapid strides in the development of machinery itself, the makers are very willing to make favourable trade -out conditions in order that users may take advantage of the most recent improvements. It may well be that, owing to improvements, ten years might be regarded as the period of most useful life for the more expensive office machinery, by which time the initial cost should have been fully saved to the user.The Question of installing mechanical aid in the office is largely an economic one, and must be determined by the need of such aids, and in the return which they are likely to yield. Needs, on the one hand, are essentially relative, and cannot be assessed by simple standards. On the other hand, returns are difficult to translate into £.s.d. where speed, accuracy, security, and even prestige, may be involved. It will be the purpose of the pages which follow to endeavour to afford some guidance on these issues

    Encrypt-to-self:Securely outsourcing storage

    Get PDF
    We put forward a symmetric encryption primitive tailored towards a specific application: outsourced storage. The setting assumes a memory-bounded computing device that inflates the amount of volatile or permanent memory available to it by letting other (untrusted) devices hold encryptions of information that they return on request. For instance, web servers typically hold for each of the client connections they manage a multitude of data, ranging from user preferences to technical information like database credentials. If the amount of data per session is considerable, busy servers sooner or later run out of memory. One admissible solution to this is to let the server encrypt the session data to itself and to let the client store the ciphertext, with the agreement that the client reproduce the ciphertext in each subsequent request (e.g., via a cookie) so that the session data can be recovered when required. In this article we develop the cryptographic mechanism that should be used to achieve confidential and authentic data storage in the encrypt-to-self setting, i.e., where encryptor and decryptor coincide and constitute the only entity holding keys. We argue that standard authenticated encryption represents only a suboptimal solution for preserving confidentiality, as much as message authentication codes are suboptimal for preserving authenticity. The crucial observation is that such schemes instantaneously give up on all security promises the moment the key is compromised. In contrast, data protected with our new primitive remains fully integrity protected and unmalleable. In the course of this paper we develop a formal model for encrypt-to-self systems, show that it solves the outsourced storage problem, propose surprisingly efficient provably secure constructions, and report on our implementations

    Rockland Gazette : July 12, 1872

    Get PDF

    Morrison's Miracle

    Get PDF
    This book, the 17th in the federal election series and the ninth sponsored by the Academy of the Social Sciences in Australia, provides a comprehensive account of the 2019 Australian election, which resulted in the surprise victory of the Coalition under Scott Morrison. It brings together 36 contributors who analyse voter behaviour, campaign strategies, regional variations, polling, ideology, media and the new importance of memes and digital campaigning. Morrison’s victory underlined the continuing trend toward the personalisation of politics and the loss of trust in political institutions, both in Australia and across western democracies. Morrison’s Miracle is indispensable for understanding the May 2019 Coalition victory, which surprised many observers and confounded pollsters and political pundits

    Ovarian cancer screening in the general population.

    Get PDF
    Despite significant improvements in therapy, ovarian cancer continues to be a leading cause of death amongst women with gynaecological malignancies. Advanced stage at diagnosis is thought to be a major contributor to mortality. Hence, there is considerable interest in early detection through screening. In the 1990s, Professor Jacobs pioneered the development of a multimodal ovarian cancer screening (OCS) strategy using serum CA125 as the first line screen and pelvic ultrasound as the second line test. This thesis summarises the next steps in the journey with refining of the screening algorithm, feasibility testing in a pilot randomised control trial (RCT) and finally setting up and recruiting 200,000 women into the largest ever RCT . The risk of ovarian cancer in postmenopausal women with elevated CA125 levels was established through a detailed analysis of 1219 pelvic scans from 741 women with raised CA125 levels in the completed trial of 22,000 women. Based on this, the multimodal 'Risk of Ovarian Cancer' (ROC) algorithm was refined and morphology instead of volume was used to interpret the ovarian scans. The refined ROC algorithm was then prospectively evaluated in a pilot RCT of 13,582 postmenopausal women. The trial established that screening using the ROC algorithm was feasible and could achieve high specificity and positive predictive value. The improved performance characteristics of the screening strategy and the experience accumulated in running and organising the pilot trial led to the design and successful implementation of a RCT - the UK Collaborative Trial of Ovarian Cancer Screening (UKCTOCS) - to assess the impact of early detection on disease mortality. The trial commenced in 2001 with recruitment of 202,638 postmenopausal women by September 2005. The issues involved in setting up the trial, recruitment of 202,000 women and the baseline characteristics of this population are described

    Interception: law, media, and techniques

    Get PDF
    In 2013, Edward Snowden provided journalists with copies of classified documents detailing the operations of the National Security Agency of the United States and its allies; in particular, the UK’s Government Communications Headquarters. Snowden explained that he hoped to set the conditions for a new technical literacy that would alter understandings of the relationship between digital communications and law. This thesis asks whether or not law is capable of repaying Snowden’s faith. To that end, it offers a media-theoretical genealogy of the interception of communication in the UK. Interception is presented as an effect of different sets of technical operations, mediated and processed by communication devices and networks. The thesis traces interception techniques: from their beginnings in the General Post Office; in their evolution through the operations of technical media; to their reappearance in the operations of digital media that constitute the internet. The authorisation of interception, meanwhile, has always depended upon legal techniques mediated by interception warrants. A genealogy of the interception warrant is presented through an archival study of the distinctly different practices of document production that manufactured and programmed warrants in different media epochs; from the medieval Chancery and paper bureaucracies of state institutions to the graphical user interface, which mediates between interception techniques and law today. Finally, the thesis addresses the function of legislation as it in turn addresses warrants and interception techniques. Law and legislation, it is argued, are incapable of constraining technical operations of interception because, like interception, law is already an effect of media-technical operations. The law operates not by controlling interception, but by processing it, assigning meaning to it, and protecting the secrecy of ongoing interception operations
    • …
    corecore