Skip to main content

Book Review: "How Great Science Fiction Works,” by Gary K. Wolfe, Course Review by Rick Howard

I very much enjoyed Dr. Wolfe’s Great Courses lecture. I have always considered myself to be a science fiction fan, but after listening to these lectures, I learned that there are numerous holes in my science fiction education that I will have to get busy filling. 

To my great surprise, I learned that the mother of science fiction is Mary Shelly, the author of ‘Frankenstein; or The Modern Prometheus,” published in 1818. She was the first author to tell a fictional tale where the catalyst of the entire story arc was a bit of science that was tantalizingly just out of modern reach. Electricity might be able to reanimate dead tissue. What a great idea. The fact that a woman created an entire genre of writing is fascinating by itself but when you consider that she did it when, at the time, respectable women didn’t write novels and especially didn’t write horror/gothic novels, Shelly’s accomplishment is extraordinary. And she wasn’t done there. Some scholars say she is the first author to create a post-apocalyptic novel too when she published, "The Last Man” in 1826. 

On the other end of the spectrum, I was saddened to discover that men treated women and minorities just as badly in the science fiction family as they did everywhere else. Although Shelly’s Frankenstein was fabulous start, science fiction has largely been, until recently, an American and British tradition and mostly written by white people. That is slowly changing now, but since Shelly’s beginning to Ursula K. Le Guin’s "The Left Hand of Darkness" in 1969, the story authors and pulp magazine editors that published these stories were not diverse. There were exceptions of course, but the bulk of the writers were white and American or British. 

What I found the most interesting about Dr. Wolf’s explanation of science fiction though was my realization that there isn’t much difference between science fiction and other genres. They all tell fictional stories. Literature scholars rate good literature higher than the other forms because authors tell good stories that are realistic but also illuminate some piece of the human condition: love, sadness, life, death, etc. Authors who can write at multiple levels like that are very good at their craft.

Other genres are normally frowned on by literature scholars because the authors usually tell fantastical stories; stories that would never happen in the real world. Science Fiction authors use not-yet-existing-but plausible science to explain visionary possibilities. Fantasy authors uses magic and/or the supernatural to explain their whimsical, imaginary, and even grotesque tales. Horror writers uses the supernatural to explain their stories of the macabre. But even these lesser forms of storytelling, as judged by the literature scholars, could be literature too if they illuminated the human condition somehow as many of the great science fiction books do. The difference between literature fans and science fiction fans though is that, sometimes, science fiction fans just want a rip-roaring story that doesn’t make us think too much; stories like space operas and space westerns where there are lots of spaceships and robots and flying cities and the heroes save the day and they don’t give a hoot about the human condition. Science fiction fans will take some illumination of the human condition but it is not a prerequisite. 

I recommend Dr. Wolfe’s Great Course. I learned a lot and because of it, I have a deep stack of great science fiction to discover. 

References

“Frankenstein; or The Modern Prometheus,” by Mary Shelly, published by Lackington, Huges, Harding, Mavor, and Jones, 1818, Last Visited 10 August 2018,
https://www.thegreatcoursesdaily.com/mary-shelley-science-fiction/

"FRANKENSTEIN PUBLISHED,” History.com Staff, 2009, A+E Networks, Last Visited 8 August 2018, 
http://www.history.com/this-day-in-history/frankenstein-published

"How Great Science Fiction Works,” by Gary K. Wolfe, Audible Audio, The Great Courses, #2984, Published 8 January 2016 by The Teaching Company, Last Visited 8 August 2018,
https://www.goodreads.com/book/show/29338161-how-great-science-fiction-works

"How Great Science Fiction Works: Course Guidebook” by Professor Gary K. Wolfe, Roosevelt University, Published by The Great Courses, 2016. 

“This Day in History, 11 Mar 1818, Frankenstein Published,” History, Last Visited 8 August 2018,
https://www.history.com/this-day-in-history/frankenstein-published

"The Last Man,” by Mary Wollstonecraft Shelley, published by Galignani, 1826, Last Visited 10 August 2018, 
https://books.google.com/booksid=l78NAAAAQAAJ&printsec=frontcover&source=gbs_ge_summary_r&cad=0#v=onepage&q&f=false

"Mary Shelley: Meet The Teenage Girl Who Invented Science Fiction,” by Whitney Milam, Digital Communications at National Security Action, 11 July 2015, Last Visited 10 August 2018,
https://amysmartgirls.com/mary-shelley-meet-the-teenage-girl-who-invented-science-fiction-3735d785411c

"Mary Shelley, Frankenstein and the Villa Diodati,” by Greg Buzwell, Discovering Literature: Romantics and Victorians, British Library, 15 May 2014, Last Visited 8 August 2018,
https://www.bl.uk/romantics-and-victorians/articles/mary-shelley-frankenstein-and-the-villa-diodati

Comments

Popular posts from this blog

Books You Should Have Read By Now

When I started Terebrate back in January 2010, I always intended it to be a place to put my book reviews on whatever I was reading. Since then, a lot has happened in my professional life. I changed jobs, twice. I presented my collection of cybersecurity book reviews at the annual RSA Conference and suggested that the cybersecurity community ought to have a list of books that we all should have read by now. My current employer, Palo Alto Networks, liked the idea so much that they decided to sponsor it. We ended up creating the the Rock and Roll Hall of Fame  for cybersecurity books. We formed a committee of cybersecurity experts from journalists, CISOs, researchers and marketing people who were all passionate about reading. My collection became the the candidate list and for the past two years, the committee, with the help of community voting, has selected books from the candidate list to be inducted into something we are calling the Cybersecurity Canon. It has be

Book Review: The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage (1989) by Clifford Stoll

Executive Summary This book is a part of the cyber security canon. If you are a cyber security professional, you should have read this by now. Twenty years after it was published, it still has something of value to say on persistent cyber security problems like information sharing, privacy versus security, cyber espionage and the intelligence dilemma. Rereading it after 20 years, I was pleasantly surprised to learn how pertinent that story still is. If you are not a cyber security professional, you will still get a kick out of this book. It reads like a spy novel, and the main characters are quirky, smart, and delightful. Introduction The Cuckoo’s Egg is my first love. Clifford Stoll published it in 1989, and the first time I read it, I devoured it over a weekend when I should have been writing my grad school thesis. It was my introduction to the security community and the idea that somebody had to protect these new-fangled gadgets called computers. Back in those days, author

Book Review: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen (2011)

Executive Summary Kingpin tells the story of the rise and fall of a hacker legend: Max Butler. Butler is most famous for his epic, hostile hacking takeover in August 2006 of four of the criminal underground’s prominent credit card forums. He is also tangentially associated with the TJX data breach of 2007. His downfall resulted from the famous FBI sting called Operation Firewall where agent Keith Mularski was able to infiltrate one of the four forums Butler had hacked: DarkMarket. But Butler’s transition from pure white-hat hacker into something gray—sometimes a white hat, sometimes a black hat—is a treatise on the cyber criminal world. The author of Kingpin , Kevin Poulsen, imbues the story with lush descriptions of how Butler hacked his way around the Internet and pulls the curtain back on how the cyber criminal world functions. In much the same way that Cuckoo's Egg reads like a spy novel, Kingpin reads like a crime novel. Cyber security professionals might know the