Free Essay

The Language of the Neuromancer

In:

Submitted By needpaper21
Words 943
Pages 4
The Language of The Neuromancer

According to A Handbook of Critical Approaches to Literature, formalistic approach represents "an approach with methodology, with a history, with practitioners and with some detractors" (73). "When all the words, phrases, metaphors, images, and symbols and examined in terms of each other and of the whole, any literary text worth our efforts will display its own internal logic" (75). However, peculiarity of language use remains one of the most prevalent aspects of the formalistic approach in literature.

"The sky above the port was the color of television tuned into a dead channel" (3).

Opening the novel with the use of such extravagant language, the author sets an ambiance for an intriguing and intricate proceeding plot. Using surrealistic language that starts with heavy-duty terminology and bizarre coding, to names of places that have dubious and ambiguous meaning, to characters' names that Gibson uses in his cyberpunk novel, the author exposes the reader to a number of different nationalities and words derived from foreign languages that pertain to events of the modern world. Gibson talks about the Russian military prosthesis, the East European steel teeth of Ratz's, the Chinese "nerve splicing," the Japanese "Sarariman" or the English slang for "suit," the Australian bellowing, the French "flechettes," the Jamaican Rustafarian culture, the Turkish settings, which proceeds in an on-going concoction of terminology. This concept leads to the perception that incorporation and interrelation of mixed and diverse cultures through the use of different languages represents a stronghold for the creation of the entire world as one big cosmopolitan society.

Describing the color of the sky and the TV, and the port in the very beginning of the novel, the reader senses that hard core science fiction conveyed through technical language prevails in the novel. "Dermatrodes" are the electrodes that plug on the derma, meaning skin; a "mandala" represents a circular and symmetrical Buddhist symbol; "cyborg" describes a cybernetic organism that is part man, part machine. Apparently, the "Sprawl" represents the key word in this cyber-punk novel as it encompasses the entire science fiction world that Gibson depicts. Perhaps, "sprawl" defines a new civilization and society where the world's population exceeds the territory available, as it is the case with Japan's situation with overpopulation today.

As the cyberpunk novel's plot becomes more tangled the question of who stands behind all the action and intricate plot keeps re-occurring. As inconspicuous about the answer as the author might seem, all one has to do in order to find out is analyze and interpret the names of the characters. Once again, language dominates even the most important role in this novel - the revelation since language holds the solution itself. All of the names contain some crucial information to the plot. Henry Dorsett Case is the protagonist of "Neuromancer," a twenty-four year old cyberspace cowboy whose nervous system has been junked with wartime Mycotoxin. Case's name has a dubious meaning. The author could be alluding to a case as an object that can be used for storage of Case's brain or a "case" could simply refer to a functional defection, or stated in a contemporary expression - a mental case. Case also appears under different names for instance, Charles Derek May is the name on his Mitsubishi Bank Chip, Truman Star the name on his passport, and the Panther Moderns refer to him as Cutter. By the same pattern, Ratz's name could be originating from the slang "rats," suggesting that Ratz must be spoiled and unfortunate. Perhaps, his ugliness of his unnatural fusion of stainless steel teeth on his jaws proves Ratz's "spoiled" and "unfortunate" nature. On the other hand, Gibson might have borrowed Molly's name from a secret association called "Molly Maguires" which according to the on-line dictionary was "formed among the tenantry in Ireland about 1843, principally for the purpose of intimidating law officers and preventing the service of legal writs and whose members disguised themselves in the dress of women. [Also, "Molly" is] a member of a similar association of Irishmen organized in the anthracite coal region of Pennsylvania, about 1854, for the purpose of intimidating employers and officers of the law, and for avenging themselves by murder on persons obnoxious to them." Molly also, assumes a nickname of a "working girl" - slang for a prostitute. Just as significant are the interpretations of Armitage and Dixie Flatline's names. Armitage perhaps reflects the harmful meaning of arms. Dixie Flatline signifies the flatline on the intensive-care room monitor - an implication of death.

By far the most complex and conspicuous nickname is Wintermute. Being the twin or the alternate-self of the Neuromancer, Wintermute's name connotes both to a cold-natured being (the prefix "winter") and an everlasting silence and secretiveness (the suffix "-mute"). The word "neuromancer" itself consists of two compounds: 'neuro' stands for nerves and artificial intelligence, and 'mancer' stands for a magician and romance. Yet, "Neuromancer" might be Gibson's mere speculation about Case's "quality" as a computer "hacker" who disrupts the social order by throwing virus programs into society, thus causing chaos in the world. Nonetheless, using the "neuromancer" as a pun, the author could be alluding to the "Necromancer" in Goethe's "Faust," which means a magician dealing in evil spirits and death.

Apparently, peculiarity and the use of surrealistic language determine the conceit and revelation of the novel's plot. However, contemplating about the future of science fiction and cyberpunk literature, it is probable that humans will not be capable of deciphering the language without the use of additional help sources. Rather, science fiction's predisposition of becoming an unintelligible puzzle of words increases on a daily basis.

Similar Documents

Free Essay

Internet Metaphors

...des Internet durch englische und französische Muttersprachler konzeptualisiert wird. Theoretischer Ausgangspunkt ist die kognitive Metapherntheorie, die von Lakoff & Johnson entwickelt sowie von Sweetser und Turner weiterentwickelt wurde. Ziel der Untersuchung ist es, die unterschiedlichen sprachlichen und konzeptuellen Metaphern aufzudecken und zu analysieren sowie Überlegungen dahingehend anzustellen, inwiefern ein konzeptuell metaphorischer Wandel im Zusammenhang mit einem Wahrnehmungswandel des Internet steht. 1. Introduction Any cognitive linguist is sure to know Lakoff and Johnson’s famous statement about the omnipresence of metaphor in human cognition and human life: [M]etaphor is pervasive in everyday life, not just in language but in thought and action. Our ordinary conceptual system, in terms of which we both think and act, is fundamentally metaphorical in nature....

Words: 9616 - Pages: 39

Free Essay

100 Best First Lines from Famous Novels

...100 Best First Lines from famous Novels 1. Call me Ishmael. —Herman Melville, Moby-Dick (1851) 2. It is a truth universally acknowledged, that a single man in possession of a good fortune, must be in want of a wife. —Jane Austen, Pride and Prejudice (1813) 3. A screaming comes across the sky. —Thomas Pynchon, Gravity's Rainbow (1973) 4. Many years later, as he faced the firing squad, Colonel Aureliano Buendía was to remember that distant afternoon when his father took him to discover ice. —Gabriel García Márquez, One Hundred Years of Solitude (1967; trans. Gregory Rabassa) 5. Lolita, light of my life, fire of my loins. —Vladimir Nabokov, Lolita (1955) 6. Happy families are all alike; every unhappy family is unhappy in its own way. —Leo Tolstoy, Anna Karenina (1877; trans. Constance Garnett) 7. riverrun, past Eve and Adam's, from swerve of shore to bend of bay, brings us by a commodius vicus of recirculation back to Howth Castle and Environs. —James Joyce, Finnegans Wake (1939) 8. It was a bright cold day in April, and the clocks were striking thirteen. —George Orwell, 1984 (1949) 9. It was the best of times, it was the worst of times, it was the age of wisdom, it was the age of foolishness, it was the epoch of belief, it was the epoch of incredulity, it was the season of Light, it was the season of Darkness, it was the spring of hope, it was the winter of despair. —Charles Dickens, A Tale of Two Cities (1859) 10. I am an invisible man. —Ralph Ellison...

Words: 3896 - Pages: 16

Premium Essay

Internet Terminologies

...ccesses |   | Document access, page accesss, site access, file access | ADSL | Asymmetric Digital Subscriber Line | A DSL line where the upload speed is different from the download speed. usually the download speed is much greater. | Adware |   | Adware, or advertising-supported software, is any software application in which advertisements are displayed while the program is running. These applications include additional code that displays the ads in pop-up windows or through a bar that appears on a computer screen. | All the Web |   | FAST, One of the fastest and most comprehensive of the search engines, but sadly used by only a very small fraction of searchers.  This excellent resource is now bought out and used by Lycos a an internet resource | alt tags |   | Image tags | Alta Vista |   | A search engine which has declined in terms of percentage of the total search market over the past decade, but now seems to have stabilised and perhaps increased its share in certain regions of the world. It incorporates a paid  express submission program called InfoSpider | Applet |   | A small Java program that can be embedded in an HTML page. It differs from full-fledged Java applications in that cannot access certain resources on the local computer; and is prohibited from communicating with most other computers across a network. The common rule is that an applet can only make an internet connection to the computer from which the applet was sent. | ASCII | American Standard...

Words: 4029 - Pages: 17

Premium Essay

Maketing

...The current issue and full text archive of this journal is available at www.emeraldinsight.com/1352-2752.htm YouTube: an opportunity for consumer narrative analysis? Stefano Pace ` Universita Bocconi, Milano, Italy Abstract Purpose – The aim of the paper is to discuss a possible extension of narrative analysis to a new medium of expression of consumer behaviour, specifically YouTube. Design/methodology/approach – Marketing and consumer behaviour studies often apply narrative analysis to understand consumption. The consumer is a source of introspective narratives that are studied by scholars. However, consumption has a narrative nature in itself and consumers are also storytellers. YouTube is a new context in which subjects tell stories to an audience through self-made videos and re-edited TV programs. After defining the pros and cons of different approaches to the study of YouTube, narrative analysis is presented as a possible means of understanding YouTube. Findings – Some preliminary evidence is presented by discussing several YouTube videos. These indicate that YouTube content can be better understood as stories, rather than example of other approaches, such as visual analysis, media studies, videography, and others. Research limitations/implications – From the analysis conducted, preliminary managerial implications can be drawn. It seems unlikely that normal TV broadcasters will be substituted by YouTube videos. For the most part, YouTube content draws its sense and shared...

Words: 7435 - Pages: 30

Free Essay

Hari Kunzru's Works!

...Hari Kunzru Literature Resource Center | Ratcliffe, Sophie. "Hari Kunzru." British Writers: Supplement 14. Ed. Jay Parini. New York: Charles Scribner's Sons, 2009. Literature Resource Center. Web. 12 Mar. 2012.Document URL http://go.galegroup.com/ps/i.do?id=GALE%7CH1483000135&v=2.1&u=monroecc&it=r&p=LitRC&sw=w | Title: Hari Kunzru  British Writer ( 1969 - )Author(s): Sophie RatcliffeSource: British Writers: Supplement 14. Ed. Jay Parini. New York: Charles Scribner's Sons, 2009. From Scribner Writers Series.Document Type: Biography, Critical essay[Image Omitted: ]Table of Contents:Biographical EssayFurther ReadingsWorks  In 2007, visitors encountering Hari Kunzru's website for the first time might have been a little surprised. Those searching for more information about this British author would have come across an old school photograph of a small boy aged perhaps five or six years old. A few lines of curt white typeface gave a few brief details: his current age, the fact that he was born in London in 1969, and, perhaps surprisingly, his blood group (HbAD) and a hyperlink to his genotype (human). Kunzru is joking, here, about the contemporary thirst for biographical details about writers. As he puts it, nowadays, "British journalists seem more interested in your biography or your publishing deal--the British press is interested in writers, but it isn't interested in writing" (Litt, 2004). The starkly playful nature of Kunzru's 2007 website poked fun both...

Words: 9462 - Pages: 38

Premium Essay

Ethical Hacking

...Chapter-1 1.0 Introduction With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the world around the clock. Highly interconnected devices which have access to the global network are the consequence. As a result, privacy and security concerns are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones...

Words: 8365 - Pages: 34

Free Essay

Child Labour

...10000 quiz questions and answers www.cartiaz.ro 10000 general knowledge questions and answers 10000 general knowledge questions and answers www.cartiaz.ro No Questions Quiz 1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 Carl and the Passions changed band name to what How many rings on the Olympic flag What colour is vermilion a shade of King Zog ruled which country What colour is Spock's blood Where in your body is your patella Where can you find London bridge today What spirit is mixed with ginger beer in a Moscow mule Who was the first man in space What would you do with a Yashmak Who betrayed Jesus to the Romans Which animal lays eggs On television what was Flipper Who's band was The Quarrymen Which was the most successful Grand National horse Who starred as the Six Million Dollar Man In the song Waltzing Matilda - What is a Jumbuck Who was Dan Dare's greatest enemy in the Eagle What is Dick Grayson better known as What was given on the fourth day of Christmas What was Skippy ( on TV ) What does a funambulist do What is the name of Dennis the Menace's dog What are bactrians and dromedaries Who played The Fugitive Who was the King of Swing Who was the first man to fly across the channel Who starred as Rocky Balboa In which war was the charge of the Light Brigade Who invented the television Who would use a mashie niblick In the song who killed Cock Robin What do deciduous...

Words: 123102 - Pages: 493

Free Essay

Code

...C O D E C ODE v e r s i o n 2 . 0 L A W R E N C E L E S S I G A Member of the Perseus Books Group New York Copyright © 2006 by Lawrence Lessig CC Attribution-ShareAlike Published by Basic Books A Member of the Perseus Books Group Printed in the United States of America. For information, address Basic Books, 387 Park Avenue South, New York, NY 10016–8810. Books published by Basic Books are available at special discounts for bulk purchases in the United States by corporations, institutions, and other organizations. For more information, please contact the Special Markets Department at the Perseus Books Group, 11 Cambridge Center, Cambridge MA 02142, or call (617) 252-5298, (800) 255-1514 or e-mail special.markets@perseusbooks.com. CIP catalog record for this book is available from the Library of Congress. ISBN-10: 0–465–03914–6 ISBN-13: 978–0–465–03914–2 06 07 08 09 / 10 9 8 7 6 5 4 3 2 1 Code version 1.0 FOR CHARLIE NESSON, WHOSE EVERY IDEA SEEMS CRAZY FOR ABOUT A YEAR. Code version 2.0 TO WIKIPEDIA, THE ONE SURPRISE THAT TEACHES MORE THAN EVERYTHING HERE. C O N T E N T S Preface to the Second Edition Preface to the First Edition Chapter 1. Code Is Law Chapter 2. Four Puzzles from Cyberspace PART I: “REGULABILITY” ix xiii 1 9 Chapter 3. Is-Ism: Is the Way It Is the Way It Must Be? Chapter 4. Architectures of Control Chapter 5. Regulating Code PART II: REGULATION BY CODE 31 38 61 Chapter 6. Cyberspaces Chapter 7. What Things Regulate...

Words: 190498 - Pages: 762

Premium Essay

Accounting Dictionary

...cover next page > title author publisher isbn10 | asin print isbn13 ebook isbn13 language subject publication date lcc ddc subject : : : : : : : : : : : cover next page > < previous page page_i next page > Page i Dictionary of Accounting Terms Third Edition Joel G. Siegel, PhD, CPA Professor of Accounting Queens College of the City University of New York Jae K. Shim, PhD Professor of Accounting College of Business Administration California State University, Long Beach < previous page page_i next page > < previous page ACKNOWLEDGMENTS page_ii next page > Page ii The authors would like to acknowledge the contributions made by reviewers John Downes, formerly of the New York City Office of Economic Development, and Dr. G. Thomas Friedlob, Professor of Accounting at Clemson University. Their in-depth evaluations have been of great importance to the technical accuracy of the manuscript. Gerald J. Barry suggested many meaningful insertions and deletions that greatly enhanced the authors' prose. Thanks also go to Roberta Siegel and Cher Ragge for their assistance with the computer terms, graphics, and word processing. Anna Damaskos, Don Reis, Sally Strauss, and Eileen Prigge of Barron's have been invaluable during the many stages of editing the manuscript into its bound book form. © Copyright 2000 by Barron's Educational Series, Inc. Prior editions © 1995, 1987 by Barron's Educational Series, Inc. All rights reserved. No part of this...

Words: 195124 - Pages: 781

Free Essay

Ssss

...JUNOT DÍAZ RIVERHEAD BOOKS a member of Penguin Group (USA) Inc. New York 2012 RIVERHEAD BOOKS Published by the Penguin Group Penguin Group (USA) Inc., 375 Hudson Street, New York, New York 10014, USA • Penguin Group (Canada), 90 Eglinton Avenue East, Suite 700, Toronto, Ontario M4P 2Y3, Canada (a division of Pearson Penguin Canada Inc.) • Penguin Books Ltd, 80 Strand, London WC2R 0RL, England • Penguin Ireland, 25 St Stephen’s Green, Dublin 2, Ireland (a division of Penguin Books Ltd) • Penguin Group (Australia), 250 Camberwell Road, Camberwell, Victoria 3124, Australia (a division of Pearson Australia Group Pty Ltd) • Penguin Books India Pvt Ltd, 11 Community Centre, Panchsheel Park, New Delhi–110 017, India • Penguin Group (NZ), 67 Apollo Drive, Rosedale, North Shore 0632, New Zealand (a division of Pearson New Zealand Ltd) • Penguin Books (South Africa) (Pty) Ltd, 24 Sturdee Avenue, Rosebank, Johannesburg 2196, South Africa Penguin Books Ltd, Registered Offices: 80 Strand, London WC2R 0RL, England Copyright © 2012 by Junot Díaz All rights reserved. No part of this book may be reproduced, scanned, or distributed in any printed or electronic form without permission. Please do not participate in or encourage piracy of copyrighted materials in violation of the author’s rights. Purchase only authorized editions. Grateful acknowledgment is made to reprint an excerpt from My Wicked Wicked Ways. Copyright © 1987 by Sandra Cisneros. Published by Third Woman Press and in hardcover...

Words: 47742 - Pages: 191