Galloway and Thacker 2007: Difference between revisions

From Whiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 25: Line 25:


'''life-resistance''': "life is the capacity to resist force" (79); "Resistance-to-life is specifically the capacity to resist the fetishization of life and its reification into 'life itself.'" (80)
'''life-resistance''': "life is the capacity to resist force" (79); "Resistance-to-life is specifically the capacity to resist the fetishization of life and its reification into 'life itself.'" (80)
the '''exploit''': "Protocological struggles do not center around changing existent technologies but instead involve discovering holes in existent technologies and projecting potential change through those holes. Hackers call these holes exploits." (81)
computer viruses, emerging infectious diseases, bioterrorism

Revision as of 00:59, 17 December 2010

protocols: "a technology that regulates flow, directs netspace, codes relationships, and connects lifeforms" (30)

3 kinds of networks: centralized (pyramidal, hierarchical), decentralized (backbone with radiating peripheries), distributed (no backbone or center) (32-3)

disciplinary societies (Foucault) vs. control societies (Deleuze) (35)

"Control is not simply manipulation, but rather modulation." (35)
"Networks are, in this sense, the horizon of control." (36)

individuation and networks (37-8) -- "really a problem of establishing the very conditions in which a network can exist at all" (38) -- i.e. a problem of sovereignty

  • "no one controls networks, but networks are controlled" (39)
"In control societies, control 'matters' through information -- and information is never immaterial." (41)
"Protocol is an immanent expression of control." (54)

facility and enmity; "What of a defacement of enmity?" (65)

swarming

biopolitics:

"The methodology of biopolitics is therefore informatics, but a use of informatics in a way that reconfigures biology as an information resource. In contemporary biopolitics, the body is a database, and informatics is the search engine." (74)

life-resistance: "life is the capacity to resist force" (79); "Resistance-to-life is specifically the capacity to resist the fetishization of life and its reification into 'life itself.'" (80)

the exploit: "Protocological struggles do not center around changing existent technologies but instead involve discovering holes in existent technologies and projecting potential change through those holes. Hackers call these holes exploits." (81)

computer viruses, emerging infectious diseases, bioterrorism