SlideShare a Scribd company logo
CHAPTER 10- TWO
HOMOLOGICAL CRITIQUES
By, Nicole Cayer
• Many technologies like an IPod and now Iphone and other

portable media players have a media logic that is formally
parallel to a linguistic function: the secret.
• A secret is not found in nature
• A secret is instead a dramatistic/narrative device
• It is something we “tell” or don’t tell
• A homology is a formal parallel across different

objects, actions, modes of experience and so
forth, depending on the sort of homology one is
explaining.
• Mathematicians (Atiyah 2000), literary scholars
(Goldmann 1973/1974), anthropologists (Leach
1973, Levi-Strauss 1969), and scientists (Lorenz 1974) all
use the idea of homology as a speculative instrument.
• People identify homologies, although likely not by that

name, in their everyday lives.
• The book talks about your supervisor at work asking like a
queen, that suggests a formal parallel between what your
supervisor does and what a queen does.
• You might have family members who act like queens, note
that these homologies are formal: they are patterns rather
than assertions of literal equivalencies.
• A pattern of behavior connects how he or she acts at work
to what we think of as patterns of undergirding queenly
behavior.
• Questions that where asked in this chapter about the

formal parallel when it comes to homology
were, So, widely different cultures share patterns similar
to their myths: Why? What creates that homology?
• Of course everyone will answer the questions differently
depending on the their disciplines and the conceptual
tools they are using.
• Different scholars of homology identify different engines of
similarity to create those forms
• When studying a rhetorical homology, the mechanism

creating the formal parallels is the nature of discourse.
• Characteristics of discourse itself create a form that
generates similarity across the variable content of
different experiences and texts.
• Enough formal similarities among members of a
homologous set must be established to persuade an
audience of reasonable readers that a form, rather than a
mere chance, underlies the similarities.
• Once a homology is established, the critic can then dig

•
•
•
•

down into some members of the homologous set to see
whether new characteristics that are discovered may also
be found in other members.
Homological criticism may be a way of understanding
wide ranges of texts and experiences.
Rhetorical homologies resonate to discursive
characteristics and structures.
One widely occurring discursive form with which we are
all familiar with is the secret.
The secret is fundamentally discursive; it is a function of
language.
• People do what they do- whether there is a secret about

what they do is a matter of how people talk about it or do
not.
• Secrets are powerful. To have one about someone or
something is to be empowered
• One might be empowered with a secret through
blackmail, by the ability to shame another through
revealing secrets, by knowledge of another’s past.
• There is more meaning and impact stuffed into the words
of a secret than into many other sentences.
• Secrets are often instruments of social control.
• A secret is managed by a person or a group of people.
• If possession of the secret is empowering, then by its very

nature a secret will empower those who hold it. It will be
kept under control and neither easily revealed nor
revealed to all.
• Part of the allure of some societies, is their possession of
secret rituals and signs.
• If a secret is controlled, then one must go to those who

control it to obtain the secret.
• This is often not easy-one is unlikely to be told all about
the Vatican’s most secret treasures by just asking politely.
• Often a process of ritual, consecration, or training is
required for one to be given possession of a secret.
• Certain things we receive by ordering are packed like they

are secrets.
• The material wrapping the object and how one gets to the
actual item are homologous with the discursive workings
of a secret and its discovery.
• The way that technology is used in social and personal
contexts, once unwrapped, is homologous with the secret
as well.
• A technology is never composed of merely the electronic
or mechanical but is also made up of the social uses of
the electronic or mechanical.
• When it comes to unpacking an Ipod nano you have no

indication of what you are going to be opening.
• Once you get through the first package you can start to
see that you have an apple product.
• By digging deeper you unwrap what you bought, then
comes the challenge of figuring out how to use it.
• This could take a lot longer if there wasn’t a booklet
underneath explaining how to use it.
• A secret is antisocial in many ways
• A secret is passed from one to another but nor broad cast

en masse, thus secrets are far from democratic.
• Even within large groups, such as civic organizations or
religions, that mange secrets do so through some amount
of exclusivity.
• We have often heard that listening to a portably media
device reduces sociability.
• If several technologies work like secrets- if several
technologies need to be opened like secrets to be
physically accessed- and if we use these technologies on
a regular basis, then might we be getting a culture-wide
coaching to be lone wolves.
• The second part of this chapter looks at the ongoing

theme on the GEICO commercials is “caveman”.
• With evidence it shoes that the form or pattern underlying
popular stereotypes about femme gay men may be found
in the portrayals cavemen in these commercials.
• These insights based on homological criticism's
identification of form or pattern, enables a critique based
on queer theory that will discuss how these different
manifestations of caveman both confound and reinscribe
established categories in popular culture.
• In 2007 ABC tried to make a television show based off of

the caveman from the GEICO commercials.
• But after a few episodes the show was cancelled.
• Viewers, critics and bloggers alike agreed that it was
simply awful, unfunny, and not entertaining.
• Many critics of the television series also agreed that it
reinscribed racial stereotypes, particularly concerning
tensions between whites and African Americans and most
particularly stereotypes having to do with African
American males dating white females.
• In the show, cavemen and Homo sapiens are cast as two

separate racial groups.
• The groups have racial epithets for each other; caveman
would refer to us as “sapes”
• The show portrayed a metaphor for race relations in the
United States.
• The depictions of the caveman are certainly within the

register of metrosexual, which, while not necessarily gay
certainly tilts away from the hardened masculinity that is
the heterosexual masculine ideal.
• The interesting appellation “metrosexual” teaches us how
we sexualize such aesthetic preoccupations away from a
heteronormative baseline in a direction that is called by a
kind of sexuality.
• You may recall that queer theory is useful for

understanding ways in which texts disturb widespread,
established, categories.
• Queerness is not only about sexual orientation- although
if you agree that the advertisement caveman were
following patterns of femme gay men, then sexual
orientation is indeed involved in queerness.
• If the homological analysis is correct, the queer category
of caveman is further queered by making them, at formal
levels, gay one moment and African American the next.
• Note that the two real minorities of gay men and African
Americans become embedded in the unreal-minority of
cavemen.
• Queer theory developed as a way to question hegemony,

to disturb categories that prop up power.
• Consider the effects that the queered categories of
humanity and what effects may result without the
conscious intention to anyone.
• When discourse has the potential to create harmful social
and political effects, we must be creative in our ways of
identifying the effects of queering our categories of
understanding.

More Related Content

Similar to Cms 298 final

Chapter 10 presentation
Chapter 10 presentationChapter 10 presentation
Chapter 10 presentation
Christie Omodeo
 
Chapter3 4thed 150204090422-conversion-gate01
Chapter3 4thed 150204090422-conversion-gate01Chapter3 4thed 150204090422-conversion-gate01
Chapter3 4thed 150204090422-conversion-gate01
Cleophas Rwemera
 
Chapter 3 4th ed
Chapter 3 4th edChapter 3 4th ed
Chapter 3 4th ed
derrickgriffey
 
Music video theory
Music video theoryMusic video theory
Music video theory
ellyshakular
 
Language and culture 7
Language and culture 7Language and culture 7
Language and culture 7
EdgarHeredia4
 
Question 1 b theories and key concepts
Question 1 b  theories and key conceptsQuestion 1 b  theories and key concepts
Question 1 b theories and key conceptsgeetag
 
chapter 4 Subject and Situation
chapter 4 Subject and Situationchapter 4 Subject and Situation
chapter 4 Subject and Situation
ZoobiaAbbasKhan
 
You are-all-crazy-subjectivaly-speaking-uploaded-1224441527362216-8
You are-all-crazy-subjectivaly-speaking-uploaded-1224441527362216-8You are-all-crazy-subjectivaly-speaking-uploaded-1224441527362216-8
You are-all-crazy-subjectivaly-speaking-uploaded-1224441527362216-8
Manuela Pestana
 
Theoretical research
Theoretical researchTheoretical research
Theoretical researchChloeMateides
 
Theoretical research
Theoretical researchTheoretical research
Theoretical researchChloeMateides
 
Sla and theory construction
Sla and theory constructionSla and theory construction
Sla and theory constructionGeoff Jordan
 
Introduction cda pid2012
Introduction cda pid2012Introduction cda pid2012
Introduction cda pid2012Francesca Helm
 
Ewrt1b class16 qhq
Ewrt1b class16 qhqEwrt1b class16 qhq
Ewrt1b class16 qhq
jordanlachance
 
Media key concept research
Media key concept researchMedia key concept research
Media key concept research
Sophia Charalambous
 
Amplifying the Truth in an Alternate Facts Universe
Amplifying the Truth in an Alternate Facts UniverseAmplifying the Truth in an Alternate Facts Universe
Amplifying the Truth in an Alternate Facts Universe
Vicki Boatright, (AKA Artist BZTAT)
 
Progressive Narratives - Framing the Debate
Progressive Narratives  - Framing the Debate Progressive Narratives  - Framing the Debate
Progressive Narratives - Framing the Debate
Vicki Boatright, (AKA Artist BZTAT)
 
Media Theory and Theorists for G325
Media Theory and Theorists for G325Media Theory and Theorists for G325
Media Theory and Theorists for G325Jack Suddaby
 
Ewrt1b class16 qhq
Ewrt1b class16 qhqEwrt1b class16 qhq
Ewrt1b class16 qhq
jordanlachance
 

Similar to Cms 298 final (20)

Chapter 10 presentation
Chapter 10 presentationChapter 10 presentation
Chapter 10 presentation
 
Chapter3 4thed 150204090422-conversion-gate01
Chapter3 4thed 150204090422-conversion-gate01Chapter3 4thed 150204090422-conversion-gate01
Chapter3 4thed 150204090422-conversion-gate01
 
Chapter 3 4th ed
Chapter 3 4th edChapter 3 4th ed
Chapter 3 4th ed
 
Music video theory
Music video theoryMusic video theory
Music video theory
 
Language and culture 7
Language and culture 7Language and culture 7
Language and culture 7
 
Question 1 b theories and key concepts
Question 1 b  theories and key conceptsQuestion 1 b  theories and key concepts
Question 1 b theories and key concepts
 
Week 8 class 1 1 b
Week 8 class 1 1 bWeek 8 class 1 1 b
Week 8 class 1 1 b
 
chapter 4 Subject and Situation
chapter 4 Subject and Situationchapter 4 Subject and Situation
chapter 4 Subject and Situation
 
Representation
RepresentationRepresentation
Representation
 
You are-all-crazy-subjectivaly-speaking-uploaded-1224441527362216-8
You are-all-crazy-subjectivaly-speaking-uploaded-1224441527362216-8You are-all-crazy-subjectivaly-speaking-uploaded-1224441527362216-8
You are-all-crazy-subjectivaly-speaking-uploaded-1224441527362216-8
 
Theoretical research
Theoretical researchTheoretical research
Theoretical research
 
Theoretical research
Theoretical researchTheoretical research
Theoretical research
 
Sla and theory construction
Sla and theory constructionSla and theory construction
Sla and theory construction
 
Introduction cda pid2012
Introduction cda pid2012Introduction cda pid2012
Introduction cda pid2012
 
Ewrt1b class16 qhq
Ewrt1b class16 qhqEwrt1b class16 qhq
Ewrt1b class16 qhq
 
Media key concept research
Media key concept researchMedia key concept research
Media key concept research
 
Amplifying the Truth in an Alternate Facts Universe
Amplifying the Truth in an Alternate Facts UniverseAmplifying the Truth in an Alternate Facts Universe
Amplifying the Truth in an Alternate Facts Universe
 
Progressive Narratives - Framing the Debate
Progressive Narratives  - Framing the Debate Progressive Narratives  - Framing the Debate
Progressive Narratives - Framing the Debate
 
Media Theory and Theorists for G325
Media Theory and Theorists for G325Media Theory and Theorists for G325
Media Theory and Theorists for G325
 
Ewrt1b class16 qhq
Ewrt1b class16 qhqEwrt1b class16 qhq
Ewrt1b class16 qhq
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 

Cms 298 final

  • 1. CHAPTER 10- TWO HOMOLOGICAL CRITIQUES By, Nicole Cayer
  • 2. • Many technologies like an IPod and now Iphone and other portable media players have a media logic that is formally parallel to a linguistic function: the secret. • A secret is not found in nature • A secret is instead a dramatistic/narrative device • It is something we “tell” or don’t tell
  • 3. • A homology is a formal parallel across different objects, actions, modes of experience and so forth, depending on the sort of homology one is explaining. • Mathematicians (Atiyah 2000), literary scholars (Goldmann 1973/1974), anthropologists (Leach 1973, Levi-Strauss 1969), and scientists (Lorenz 1974) all use the idea of homology as a speculative instrument.
  • 4. • People identify homologies, although likely not by that name, in their everyday lives. • The book talks about your supervisor at work asking like a queen, that suggests a formal parallel between what your supervisor does and what a queen does. • You might have family members who act like queens, note that these homologies are formal: they are patterns rather than assertions of literal equivalencies. • A pattern of behavior connects how he or she acts at work to what we think of as patterns of undergirding queenly behavior.
  • 5. • Questions that where asked in this chapter about the formal parallel when it comes to homology were, So, widely different cultures share patterns similar to their myths: Why? What creates that homology? • Of course everyone will answer the questions differently depending on the their disciplines and the conceptual tools they are using. • Different scholars of homology identify different engines of similarity to create those forms
  • 6. • When studying a rhetorical homology, the mechanism creating the formal parallels is the nature of discourse. • Characteristics of discourse itself create a form that generates similarity across the variable content of different experiences and texts. • Enough formal similarities among members of a homologous set must be established to persuade an audience of reasonable readers that a form, rather than a mere chance, underlies the similarities.
  • 7. • Once a homology is established, the critic can then dig • • • • down into some members of the homologous set to see whether new characteristics that are discovered may also be found in other members. Homological criticism may be a way of understanding wide ranges of texts and experiences. Rhetorical homologies resonate to discursive characteristics and structures. One widely occurring discursive form with which we are all familiar with is the secret. The secret is fundamentally discursive; it is a function of language.
  • 8. • People do what they do- whether there is a secret about what they do is a matter of how people talk about it or do not. • Secrets are powerful. To have one about someone or something is to be empowered • One might be empowered with a secret through blackmail, by the ability to shame another through revealing secrets, by knowledge of another’s past. • There is more meaning and impact stuffed into the words of a secret than into many other sentences.
  • 9. • Secrets are often instruments of social control. • A secret is managed by a person or a group of people. • If possession of the secret is empowering, then by its very nature a secret will empower those who hold it. It will be kept under control and neither easily revealed nor revealed to all. • Part of the allure of some societies, is their possession of secret rituals and signs.
  • 10. • If a secret is controlled, then one must go to those who control it to obtain the secret. • This is often not easy-one is unlikely to be told all about the Vatican’s most secret treasures by just asking politely. • Often a process of ritual, consecration, or training is required for one to be given possession of a secret.
  • 11. • Certain things we receive by ordering are packed like they are secrets. • The material wrapping the object and how one gets to the actual item are homologous with the discursive workings of a secret and its discovery. • The way that technology is used in social and personal contexts, once unwrapped, is homologous with the secret as well. • A technology is never composed of merely the electronic or mechanical but is also made up of the social uses of the electronic or mechanical.
  • 12. • When it comes to unpacking an Ipod nano you have no indication of what you are going to be opening. • Once you get through the first package you can start to see that you have an apple product. • By digging deeper you unwrap what you bought, then comes the challenge of figuring out how to use it. • This could take a lot longer if there wasn’t a booklet underneath explaining how to use it.
  • 13. • A secret is antisocial in many ways • A secret is passed from one to another but nor broad cast en masse, thus secrets are far from democratic. • Even within large groups, such as civic organizations or religions, that mange secrets do so through some amount of exclusivity. • We have often heard that listening to a portably media device reduces sociability. • If several technologies work like secrets- if several technologies need to be opened like secrets to be physically accessed- and if we use these technologies on a regular basis, then might we be getting a culture-wide coaching to be lone wolves.
  • 14. • The second part of this chapter looks at the ongoing theme on the GEICO commercials is “caveman”. • With evidence it shoes that the form or pattern underlying popular stereotypes about femme gay men may be found in the portrayals cavemen in these commercials. • These insights based on homological criticism's identification of form or pattern, enables a critique based on queer theory that will discuss how these different manifestations of caveman both confound and reinscribe established categories in popular culture.
  • 15.
  • 16. • In 2007 ABC tried to make a television show based off of the caveman from the GEICO commercials. • But after a few episodes the show was cancelled. • Viewers, critics and bloggers alike agreed that it was simply awful, unfunny, and not entertaining. • Many critics of the television series also agreed that it reinscribed racial stereotypes, particularly concerning tensions between whites and African Americans and most particularly stereotypes having to do with African American males dating white females.
  • 17. • In the show, cavemen and Homo sapiens are cast as two separate racial groups. • The groups have racial epithets for each other; caveman would refer to us as “sapes” • The show portrayed a metaphor for race relations in the United States.
  • 18. • The depictions of the caveman are certainly within the register of metrosexual, which, while not necessarily gay certainly tilts away from the hardened masculinity that is the heterosexual masculine ideal. • The interesting appellation “metrosexual” teaches us how we sexualize such aesthetic preoccupations away from a heteronormative baseline in a direction that is called by a kind of sexuality.
  • 19. • You may recall that queer theory is useful for understanding ways in which texts disturb widespread, established, categories. • Queerness is not only about sexual orientation- although if you agree that the advertisement caveman were following patterns of femme gay men, then sexual orientation is indeed involved in queerness. • If the homological analysis is correct, the queer category of caveman is further queered by making them, at formal levels, gay one moment and African American the next. • Note that the two real minorities of gay men and African Americans become embedded in the unreal-minority of cavemen.
  • 20. • Queer theory developed as a way to question hegemony, to disturb categories that prop up power. • Consider the effects that the queered categories of humanity and what effects may result without the conscious intention to anyone. • When discourse has the potential to create harmful social and political effects, we must be creative in our ways of identifying the effects of queering our categories of understanding.