Thanks for your patience during our recent outage at scalar.usc.edu. While Scalar content is loading normally now, saving is still slow, and Scalar's 'additional metadata' features have been disabled, which may interfere with features like timelines and maps that depend on metadata. This also means that saving a page or media item will remove its additional metadata. If this occurs, you can use the 'All versions' link at the bottom of the page to restore the earlier version. We are continuing to troubleshoot, and will provide further updates as needed. Note that this only affects Scalar projects at scalar.usc.edu, and not those hosted elsewhere.
Rhizome Experiment, Fall 2015Main MenuPowerteam pageRhizome ConceptThe Virtual and The RealSelfTeam Overview Page & TagIntro to the Virtual SelfThe world of social media, avatars, and the brandscapeSimulation MachineDerived from the previous paper to make an introduction to AI, the advanced simulation machineArtificial IntelligenceRace and the Social MachineDrone PilotsFull Battle RattleTechnology and the Black ExperienceVideo GamesDwayne Dixon5129acc1d78d02bed532993adeb2cc39f7be6920
Self: Conclusion
12015-12-12T13:01:27-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f772252plain2015-12-12T13:08:29-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7The Abstract MachineThe self is composed of many fragmented segments. While the virtual self can be an extension of reality, it can also be the materialized desires of the self in the real world. Once in the online realm, that version of self can evolve and develop its own social sense of normalcy and identity. Following in the idea of techne, we actively decide how to engage in these machinic assemblages and through simulation, virtual games, and social media develop a new extension and variation of our self. This triggers the haunting of our virtual self in reality. Despite an physical divisions or separation along the axis of time or space, simulation provokes an emotional haunting that comes to shape our reality. Additionally, haunting facilitates the coalescence of the virtual and the real into a singular, ambiguous definition of self.
The version that we choose to show to the public is crafted in a way that we are able to maintain control over the image and what is perceived of us. We have become dependent and nearly obsessed in engaging in social media or some version of virtual simulation or play, however simultaneously seek an advantageous power dynamic. When this activity or participation is monitored or limited, is an assault on our ability to explore and reformulate our identity and on our right to privacy. By unilaterally standing against this threat, people are freeing themselves from the horror or tech and seizing control of their concept of self.
12015-12-03T19:14:05-08:00zachary hershac6a3bae585d77dc5af456c8aa96242718b50572Guattari's Theory on Machineszachary hersh10plain2148582015-12-11T19:06:21-08:00zachary hershac6a3bae585d77dc5af456c8aa96242718b50572
12015-12-06T12:41:30-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7Self in Virtual Simulation & Real Repercussions: Drone Pilots & FBR SoldiersDwayne Dixon9Exploration of Physical, Mental, and Emotional Haunting Stemming from Simulationsplain2015-12-14T10:30:13-08:00Dwayne Dixon5129acc1d78d02bed532993adeb2cc39f7be6920
12015-12-07T21:11:54-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7HacktivismSarah Frauen8A method to Achieve Freedom from Virtual and Government Hauntingplain2015-12-12T12:17:44-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7
12015-12-06T12:39:02-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7The Transcendent Self & Second LifeSarah Frauen8A look into the Transcendent Capabilities of the Virtual Selfplain2015-12-12T12:24:28-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7
12015-12-06T12:37:04-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7Haunting: Effect on The SelfSarah Frauen8Description of Haunting of Technology and Mediaplain2015-12-12T12:29:23-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7
12015-12-06T12:43:03-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7Private vs. Public Self: Violation of the SelfSarah Frauen8External Forces that Threaten Privacyplain2015-12-12T12:33:58-08:00Sarah Frauen573e02a60281d966c9405a56bec47a01a933a5f7
12015-12-03T17:37:39-08:00Zheqing Zhudce4157cfa324011b252b318e8cb966c317931d1Simulation MachineZheqing Zhu7Derived from the previous paper to make an introduction to AI, the advanced simulation machineplain2015-12-13T02:15:04-08:00Zheqing Zhudce4157cfa324011b252b318e8cb966c317931d1
12015-12-12T15:52:49-08:00Morgan Rodgers452e676dca91385aa42710b50e3b758fd2873af7Production of Self Through FacebookMorgan Rodgers5plain2015-12-14T15:54:07-08:00Morgan Rodgers452e676dca91385aa42710b50e3b758fd2873af7