Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Unit Operations: An Approach to Videogame Criticism

Buy
"Bogost challenges humanists and technologists to pay attention to one another, something they desperately need to do as computation accelerates us into the red zones of widespread virtual reality. This book gives us what we need to meet that challenge: a general theory for understanding creativity under computation, one that will apply increasingly to all creativity in the future. Not only that, but we get an outstanding theory of videogame criticism in the mix as well. Highly recommended."
--Edward Castronova, Department of Telecommunications, Indiana University, author of Synthetic Worlds: The Business and Culture of Online Games

"Unit Operations is a major milestone on the path to establishing a framework for analyzing videogames as important cultural artifacts of our time. Proposing a comparative approach to videogame criticism that is equally relevant for humanists and technologists, Ian Bogost weaves philosophy, psychoanalysis, literature, film, media theory, informatics, software, and videogames into a narrative that reveals how these seemingly disparate fields relate to and inform each other. Unit operations--discrete, programmatic units of meaning--are used as the conceptual tool for unpacking complex relationships between different worlds: criticism and computation, genetics and complex adaptive systems, and narrative spaces from Casablanca and Half-Life to Ulysses and Grand Theft Auto."
--Christiane Paul, Adjunct Curator of New Media Arts, Whitney Museum of American Art

In Unit Operations, Ian Bogost argues that similar principles underlie both literary theory and computation, proposing a literary-technical theory that can be used to analyze particular videogames. Moreover, this approach can be applied beyond videogames: Bogost suggests that any medium--from videogames to poetry, literature, cinema, or art--can be read as a configurative system of discrete, interlocking units of meaning, and he illustrates this method of analysis with examples from all these fields. The marriage of literary theory and information technology, he argues, will help humanists take technology more seriously and hep technologists better understand software and videogames as cultural artifacts. This approach is especially useful for the comparative analysis of digital and nondigital artifacts and allows scholars from other fields who are interested in studying videogames to avoid the esoteric isolation of "game studies."

The richness of Bogost's comparative approach can be seen in his discussions of works by such philosophers and theorists as Plato, Badiou, Zizek, and McLuhan, and in his analysis of numerous videogames including Pong, Half-Life, and Star Wars Galaxies. Bogost draws on object technology and complex adaptive systems theory for his method of unit analysis, underscoring the configurative aspects of a wide variety of human processes. His extended analysis of freedom in large virtual spaces examines Grand Theft Auto 3, The Legend of Zelda, Flaubert's Madame Bovary, and Joyce's Ulysses. In Unit Operations, Bogost not only offers a new methodology for videogame criticism but argues for the possibility of real collaboration between the humanities and information technology.

About the Author
Ian Bogost is Assistant Professor in the School of Literature, Communication, and Culture at the Georgia Institute of Technology and Founding Partner, Persuasive Games LLC.
(HTML tags aren't allowed.)

Image Processing with ImageJ
Image Processing with ImageJ

Discover the incredible possibilities of ImageJ, from basic image processing to macro and plugin development

Overview

  • Learn how to process digital images using ImageJ and deal with a variety of formats and dimensions, including 4D images
  • Understand what histograms, region of interest, or...
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace Security and Defense: Research Issues: Proceedings of the NATO Advanced Research Workshop on Cyberspace Security and Defense
Cyberspace security is a critical subject of our times.

On the one hand the development of Internet, mobile communications, distributed computing, computer software and databases storing essential enterprise information has helped to conduct business and personal communication between individual people. On the other hand it has created many...

Defensive Database Programming with SQL Server
Defensive Database Programming with SQL Server

Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment. Too often as...


Organise Yourself: Clear the Clutter; Take Charge of Your Time; Manage Information (Sunday Times Creating Success)
Organise Yourself: Clear the Clutter; Take Charge of Your Time; Manage Information (Sunday Times Creating Success)

Many people find it hard to get on top of their workload.  They constantly bounce from one task to another and struggle to prioritize, which can have a serious impact on productivity.

Organise Yourself helps readers develop effective organizational skills and dramatically improve the way they work. It...

AAA Identity Management Security (Networking Technology: Security)
AAA Identity Management Security (Networking Technology: Security)

This book is focused on providing the skills necessary to successfully configure authentication, authorization, and accounting (AAA) services on Cisco devices using Cisco Secure Access Control Server/System 4.2 and 5.1. This book was motivated by a desire to provide a one-stop resource for AAA solutions on Cisco...

Turbo Decoder Architecture for Beyond-4G Applications
Turbo Decoder Architecture for Beyond-4G Applications

This book describes the most recent techniques for turbo decoder implementation, especially for 4G and beyond 4G applications. The authors reveal techniques for the design of high-throughput decoders for future telecommunication systems, enabling designers to reduce hardware cost and shorten processing time. Coverage includes an...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy