This chapter discusses the concept of homology and how it can be used for critical analysis. A homology is a formal parallel between different objects or experiences. The chapter provides examples of homologies identified in everyday life and analyzed by various scholars. It then analyzes the concept of "secret" as a rhetorical homology, noting how secrets are discursive, socially powerful, and often used as instruments of social control. The chapter also analyzes GEICO caveman commercials and how they queer gender and racial categories in both their portrayal of the caveman and an attempted television series based on the character.
Kitbox is a social venture inspired to transform enterprise in education. We build businesses that generate profit for schools and give students real life experience of work.
Barter for Advertising with Ormita! The Ormita Commerce Network is the world's largest multilateral barter exchange network. Ormita brings new customers to a business, without affecting the existing cash sales already being generated by the company. This may result in more “word-of-mouth” referrals, an increased work-portfolio, more recommendations, improved organizational skills, higher visibility and more cash sales. Ormita offers a way for businesses to supplement their existing income through the process of trading their excess capacity or slow moving inventory for things they need. Regardless of the amount of money in the economy a business owner can still make acquisitions, create more brand awareness, fund marketing campaigns, reward customers, improve staff moral and enhance their lifestyle by trading what they have for what they need. Bartering for your advertising and essential media campaigns via the Ormita Commerce Network Barter Exchange System. Ormita can put together an advertising and marketing campaign to suit your needs and you pay for it with 100% barter! What better way to use your surplus time or space to attract new cash paying customers? http://www.barterforadvertising.com
Kitbox is a social venture inspired to transform enterprise in education. We build businesses that generate profit for schools and give students real life experience of work.
Barter for Advertising with Ormita! The Ormita Commerce Network is the world's largest multilateral barter exchange network. Ormita brings new customers to a business, without affecting the existing cash sales already being generated by the company. This may result in more “word-of-mouth” referrals, an increased work-portfolio, more recommendations, improved organizational skills, higher visibility and more cash sales. Ormita offers a way for businesses to supplement their existing income through the process of trading their excess capacity or slow moving inventory for things they need. Regardless of the amount of money in the economy a business owner can still make acquisitions, create more brand awareness, fund marketing campaigns, reward customers, improve staff moral and enhance their lifestyle by trading what they have for what they need. Bartering for your advertising and essential media campaigns via the Ormita Commerce Network Barter Exchange System. Ormita can put together an advertising and marketing campaign to suit your needs and you pay for it with 100% barter! What better way to use your surplus time or space to attract new cash paying customers? http://www.barterforadvertising.com
Take charge of the political narrative by knowing your values and framing the debate. Presentation discusses George Lakoff's framing principles discussed in the book"Don't Think of an Elephant!"
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Take charge of the political narrative by knowing your values and framing the debate. Presentation discusses George Lakoff's framing principles discussed in the book"Don't Think of an Elephant!"
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
2. • Many technologies like an IPod and now Iphone and other
portable media players have a media logic that is formally
parallel to a linguistic function: the secret.
• A secret is not found in nature
• A secret is instead a dramatistic/narrative device
• It is something we “tell” or don’t tell
3. • A homology is a formal parallel across different
objects, actions, modes of experience and so
forth, depending on the sort of homology one is
explaining.
• Mathematicians (Atiyah 2000), literary scholars
(Goldmann 1973/1974), anthropologists (Leach
1973, Levi-Strauss 1969), and scientists (Lorenz 1974) all
use the idea of homology as a speculative instrument.
4. • People identify homologies, although likely not by that
name, in their everyday lives.
• The book talks about your supervisor at work asking like a
queen, that suggests a formal parallel between what your
supervisor does and what a queen does.
• You might have family members who act like queens, note
that these homologies are formal: they are patterns rather
than assertions of literal equivalencies.
• A pattern of behavior connects how he or she acts at work
to what we think of as patterns of undergirding queenly
behavior.
5. • Questions that where asked in this chapter about the
formal parallel when it comes to homology
were, So, widely different cultures share patterns similar
to their myths: Why? What creates that homology?
• Of course everyone will answer the questions differently
depending on the their disciplines and the conceptual
tools they are using.
• Different scholars of homology identify different engines of
similarity to create those forms
6. • When studying a rhetorical homology, the mechanism
creating the formal parallels is the nature of discourse.
• Characteristics of discourse itself create a form that
generates similarity across the variable content of
different experiences and texts.
• Enough formal similarities among members of a
homologous set must be established to persuade an
audience of reasonable readers that a form, rather than a
mere chance, underlies the similarities.
7. • Once a homology is established, the critic can then dig
•
•
•
•
down into some members of the homologous set to see
whether new characteristics that are discovered may also
be found in other members.
Homological criticism may be a way of understanding
wide ranges of texts and experiences.
Rhetorical homologies resonate to discursive
characteristics and structures.
One widely occurring discursive form with which we are
all familiar with is the secret.
The secret is fundamentally discursive; it is a function of
language.
8. • People do what they do- whether there is a secret about
what they do is a matter of how people talk about it or do
not.
• Secrets are powerful. To have one about someone or
something is to be empowered
• One might be empowered with a secret through
blackmail, by the ability to shame another through
revealing secrets, by knowledge of another’s past.
• There is more meaning and impact stuffed into the words
of a secret than into many other sentences.
9. • Secrets are often instruments of social control.
• A secret is managed by a person or a group of people.
• If possession of the secret is empowering, then by its very
nature a secret will empower those who hold it. It will be
kept under control and neither easily revealed nor
revealed to all.
• Part of the allure of some societies, is their possession of
secret rituals and signs.
10. • If a secret is controlled, then one must go to those who
control it to obtain the secret.
• This is often not easy-one is unlikely to be told all about
the Vatican’s most secret treasures by just asking politely.
• Often a process of ritual, consecration, or training is
required for one to be given possession of a secret.
11. • Certain things we receive by ordering are packed like they
are secrets.
• The material wrapping the object and how one gets to the
actual item are homologous with the discursive workings
of a secret and its discovery.
• The way that technology is used in social and personal
contexts, once unwrapped, is homologous with the secret
as well.
• A technology is never composed of merely the electronic
or mechanical but is also made up of the social uses of
the electronic or mechanical.
12. • When it comes to unpacking an Ipod nano you have no
indication of what you are going to be opening.
• Once you get through the first package you can start to
see that you have an apple product.
• By digging deeper you unwrap what you bought, then
comes the challenge of figuring out how to use it.
• This could take a lot longer if there wasn’t a booklet
underneath explaining how to use it.
13. • A secret is antisocial in many ways
• A secret is passed from one to another but nor broad cast
en masse, thus secrets are far from democratic.
• Even within large groups, such as civic organizations or
religions, that mange secrets do so through some amount
of exclusivity.
• We have often heard that listening to a portably media
device reduces sociability.
• If several technologies work like secrets- if several
technologies need to be opened like secrets to be
physically accessed- and if we use these technologies on
a regular basis, then might we be getting a culture-wide
coaching to be lone wolves.
14. • The second part of this chapter looks at the ongoing
theme on the GEICO commercials is “caveman”.
• With evidence it shoes that the form or pattern underlying
popular stereotypes about femme gay men may be found
in the portrayals cavemen in these commercials.
• These insights based on homological criticism's
identification of form or pattern, enables a critique based
on queer theory that will discuss how these different
manifestations of caveman both confound and reinscribe
established categories in popular culture.
15.
16. • In 2007 ABC tried to make a television show based off of
the caveman from the GEICO commercials.
• But after a few episodes the show was cancelled.
• Viewers, critics and bloggers alike agreed that it was
simply awful, unfunny, and not entertaining.
• Many critics of the television series also agreed that it
reinscribed racial stereotypes, particularly concerning
tensions between whites and African Americans and most
particularly stereotypes having to do with African
American males dating white females.
17. • In the show, cavemen and Homo sapiens are cast as two
separate racial groups.
• The groups have racial epithets for each other; caveman
would refer to us as “sapes”
• The show portrayed a metaphor for race relations in the
United States.
18. • The depictions of the caveman are certainly within the
register of metrosexual, which, while not necessarily gay
certainly tilts away from the hardened masculinity that is
the heterosexual masculine ideal.
• The interesting appellation “metrosexual” teaches us how
we sexualize such aesthetic preoccupations away from a
heteronormative baseline in a direction that is called by a
kind of sexuality.
19. • You may recall that queer theory is useful for
understanding ways in which texts disturb widespread,
established, categories.
• Queerness is not only about sexual orientation- although
if you agree that the advertisement caveman were
following patterns of femme gay men, then sexual
orientation is indeed involved in queerness.
• If the homological analysis is correct, the queer category
of caveman is further queered by making them, at formal
levels, gay one moment and African American the next.
• Note that the two real minorities of gay men and African
Americans become embedded in the unreal-minority of
cavemen.
20. • Queer theory developed as a way to question hegemony,
to disturb categories that prop up power.
• Consider the effects that the queered categories of
humanity and what effects may result without the
conscious intention to anyone.
• When discourse has the potential to create harmful social
and political effects, we must be creative in our ways of
identifying the effects of queering our categories of
understanding.