fusion telexTelexexternal linkExternal Linkinternal linkInternal Linkatomjacked inventory cacheInventory Cache


True Names by Vernor Vinge

True Names
This nOde last updated May 21st, 2002 and is permanently morphing...
(11 Ben (Reed) / 6 Zip - 193/260 - 12.19.9.4.13)

fusion telex
_True Names: And the Opening of the Cyberspace Frontier_
by Vernor Vinge, James Frenkel

Paperback - 384 pages
Tor Books; ISBN: 0312862075

Synopsis
In 1981, three years before publication of internal linkWilliam Gibson's   internal link_Neuromancer_ (1984)atomjacked inventory cache,  Vernor Vinge's critically acclaimed novella "True Names" invented the concept of cyberspace. This book is the first forum to explore the blossoming discoveries and groundbreaking applications, both current and future, on the new frontier of the internal linkInternet and all its subsets.

William Gibson Neuromancer Internet
Synopsis
A study of _True Names_, Vernor Vinge's critically acclaimed novella that invented the concept of cyberspace, features that complete text of the novella, as well as articles by Richard Stallman, John Markoff, internal linkHans Moravec, Patricia Maes, Timothy May, and other cyberspace pioneers.


fusion telex
shivers@ai.mit.edu  from Cambridge, Mass.    March 23, 1999
When I was starting out as a PhD student in internal linkArtificial Intelligence at Carnegie Mellon, it was made known to us first-year students that an unofficial but  necessary part of our education was to locate and read a copy of an obscure science-fiction novella called *True Names*. Since you couldn't find it in  bookstores, older grad students and professors would directly mail order sets of ten and set up informal lending internal linklibraries -- you would go, for example, to  Hans Moravec's office, and sign one out from a little cardboard box over in the corner of his office. This was 1983 -- the Internet was a toy reserved for American academics, "internal linkvirtual reality" was not a popular topic, and the term "internal linkcyberpunk" had not been coined. One by one, we all tracked down copies, and  all had the tops of our heads blown off by Vinge's incredible book.

 In my grad student days, we loved to sit around and discuss the implications of Vernor's ideas. Sixteen years later, I do research at internal linkMIT, and it's still fun to sit around and talk about how Vernor's ideas are coming to be.
 (Amazingly enough, Vinge has done this not once, but twice: *Marooned in Realtime*atomjacked inventory cache contains ideas even more interesting than *True Names* -- all in the setting of a murder mystery that takes place 50 million years in the future.)

  - Olin



fusion telex
internal linkAlan Kay's emphasis on internal linkmagic indicates that the internal linksupernatural metaphors that saturate technoculture may have a more substantive basis than the fondness that many internal linkhackers have for internal link_Sandman_ comic books or internal linkD&D.
 
Sandman - The Kindly Ones Techgnosis by Erik Davis

These metaphors arise and take power because, as William Irwin Thompson noted in a discussion of computer games, "the conventional worldview of materialism is not subtle enough to deal with the complexities of a multidimensional universe in which domains interpenetrate and are enfolded in one another." The science-fiction author Vernor Vinge came to a similar conclusion in _True Names_, a brilliant novella whose vision of a internal linknetworked virtual world predates _Neuromancer_atomjacked inventory cache by three years.  Unlike the bright neon grid of Gibson's cyberspace, the Other Plane of Vinge's story is a Tolkienesque world of swamps, castles, and magic, a half-internal linkdreamed environment that is generated partly through electronic cues that stimulate the "internal linkimagination and subconscious" of its electrode-wearing users.  The hacker denizens of the Other Plane band together as covens of witches and warlocks, and at one point, a few of them discuss how magical metaphors came to dominate "data space":

The Limey and Erythrina argued that sprites, reincarnation, spells, and castles were the natural tools here, more natural than the atomistic twentieth-century notions of data structures, programs, files, and communication protocols.  It was, they argued, just more convenient for the mind to use the global ideas of magic as the tokens to manipulate this new environment.
 - Erik Davis - _Techgnosis: Myth, Magic & Mysticism In The Age Of internal linkInformation_atomjacked inventory cache

fusion telexTelexexternal linkExternal Linkinternal linkInternal Linkatomjacked inventory cacheInventory Cache
fUSION Anomaly.  Locutions
return to the source...fUSION Anomaly.
fUSION Anomaly.