Feeds

John le Carré archives to rest at Bodleian Library

Oxford to protect manuscripts, diaries from moles

  • alert
  • submit to reddit

High performance access to file storage

John le Carré has donated his literary archive to Oxford's Bodleian Library, delivering a crushing blow to archive-hungry American universities and a well-known East Anglian breeding ground for moles alike.

Le Carré, or David Cornwell to use his real name, studied modern languages at Oxford before becoming a civil servant cum intelligence officer. In 1995, he confirmed his Lincoln College tutor the Rev Vivian Green was the inspiration for his most famous creation, George Smiely.

According to the Bodleian, the archive "fills a space the size of a Cornish barn" and "comprises multiple versions of his works, showing the evolution of his thought, his handling of plot and development of character, and his intensive editorial approach".

The Bodleian received 85 boxes last year, and more is still to come. An exhibition of some of the material will kick off on world Book Day next week, and in time, much of the archive will find its way online.

"John le Carré’s writing is not just a key to understanding the history of the Cold War; it is itself a vital and influential part of that history. To have this archive in the Bodleian is a major enrichment of Oxford’s unique collection of primary sources for the study of contemporary history," said Timothy Garton Ash, Professor of European Studies, University of Oxford.

Le Carré said, "I am delighted to be able to do this. Oxford was Smiley’s spiritual home, as it is mine. And while I have the greatest respect for American universities, the Bodleian is where I shall most happily rest."

A number of British literary archives have ended up in the hands of cash rich American universities in recent years. The innermost thoughts of both David Hare and Tom Stoppard will spend eternity at the University of Texas.

As a sometime servant of HRH it would presumably have been unthinkable for Le Carré to have sent his archive to the US. Almost as unthinkable as for it to end up at Cambridge, the recruiting ground for the real life moles that George Smiley spent so many books rooting out. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.