Johnny Mnemonic

Work Title: Johnny Mnemonic
Medium: Film
Episode Title:
Year: 1995
Writer(s): William Gibson
"Original" Writer: Yes Own work?: No

Summary:

"In 2021, when the world is basically ruled by corporate Japan, humans with microchip brain implants are used to transport the most important of data files. Computer networks are unsafe, because people can "jack in" and neo-physically enter the complex world of cyberspace, where a computer virus won't just knock out your computer, it'll kill you outright. / This is the world of writer William Gibson, and it seems like a pretty interesting place to visit. It's unfortunate that Johnny Mnemonic does very little in this setting and comes off as little more than a remake of Tron, without the lightcycle sequence." (from http://filmcritic.com/misc/emporium.nsf/ddb5490109a79f598625623d0015f1e4/3e17ef13c0ef4 e498625627d005c5b44?OpenDocument)


Era/Year of Portrayal: near_future

Distinctive characteristics of the world in portrayal:

Corporations rule the world. Runs of contemporary Earth reside outside the cities. Information networks exist, as do virtual reality devices such as data gloves, visors, and even neural jacks. Portions of memory can be replaced in human beings with artificial devices that can be used to store information. Imprints of human beings can be stored in computers to serve as Artificial Intelligences.


Technology

  • Name of portrayed presence-evoking technology: unnamed videophone; wet-wired brain implants; unnamed virtual reality technology to access the Internet
  • Description of the technology: Most communication is done via a videophone, which is often attached to a wall, whereby the traditional 10 digits are dialed but instead of only speaking to the recipient of the call one can also see them. Some people can have their memories replaced with a prosthetic device that can be used to store 80 gigabytes of information, 160 with a booster device, and potentially more with a better implant. The user attaches various equipment, including a wire into his/her brain back near the ear that is then connected to a disc reader. Once the disc reader is activated, the information transfer occurs. If too much data is transfered, the user may experience some leakage and see some of the data in flashes. By wearing data gloves, a VR visor, and using various special types of monitors and external hardware, the user can access the Internet and experience a physical interaction with it. It is almost as if the user is in the Internet.
  • Nature of task or activity: The videophone is for direct, face-to-face interaction at a distance. The mnemonic storage device is for the clandestine transport of information between 2 distant points without allowing for technological theft of it (the transporter can still be intercepted though). The VR equipment is used to directly and quickly access the Internet; it appears especially useful for hackers.
  • Performance of the Technology: The videophones work efficiently, except that the sender or receiver of the call could be a computer-generate facsimile. The mnemonic storage device works as designed, but in the story it malfunctions because Johnny overloads his storage capicity by double. The VR equipment works flawlessly.
  • Description of creator(s): creators not shown
  • Major goal(s) of creator(s): The videophone appears to be soley for communication. The mnemonic storage devices appear to be for te safe transport of information. The VR equipment appears to be to allow a more interactive access to the Internet.
  • Description of users of technology: Johnny, the title character uses all three devices. He is a white male, in his later twenties, and acts as a data courier, which is apparently a not quite legal job. He claims to be a city-dweller, used to room service and expensive prostitutes, which indicates he has a high social class background. Other users of the videophone are a wealthy, mature, Asian male, one of the antagonists, and an artificial intelligence named Anna, who was a white, European female. Anna also appeared when Johnny was using VR to access the Internet, and one other white male was briefly shown working to block Johnny on the Internet.
  • Type(s) of presence experience in the portrayal: both
  • Description of presence experience: The videophone was solely for social presence, for people to communicate directly over long distance and experience a facsimile of face-to-face interaction. When the mnemonic storage device malfunctions, the data leaks into Johnny's consciousness and he experiences flashes of memory in which he appears to be in another place. When using the VR device, Johnny appears as an avatar on the Internet, interacting with the virtual environment in an almost physical way.
  • User awareness of technology during experience: In each case, the user is aware of the technology being used.
  • Valence of experience: The videophone is used as a matter of course. Mnemonic device users experience pain and discomfort when the data is being transferred; Johnny's nose bleeds after he receives the data at the start of the film. They also experience discomfort when the data leaks; death can occur within 24-72 hours when the storage capacity is exceeded. The VR tech in and of itself seems to have no ill effects, and might actually be pleasant.
  • Specific responses: The data storage device malfunctions cause nose bleeds, dizziness, unconsciousness, pain, and eventually death. The VR tech evokes involvement in the task, self-motion through the net, inproved task performance at hacking.
Long-term consequences:

None from the videophone or VR technology. The movie ends with Johnny uploading all the information he has been carrying. It is implied that he will suffer no longtern effects now that his mnemonic device has been emptied.

Other:

The film also uses a subtheme of a disease called NAS, Nerve Attenuation Syndrome, which is said to be caused by all the hi-tech devices used in the film. A direct link between thise disease and the presence-evoking technology is not directly made, but is definitely implied here.

Coder name: Tom Polcari
Coder email: tpolcari@temple.edu
Coder affiliation: Temple University, Philadelphia, PA