圖書標籤: 媒介研究 美國 科技 畢論 數字人文 政治學 人文 theory
发表于2024-11-10
The Exploit pdf epub mobi txt 電子書 下載 2024
"The Exploit" is that rare thing: a book with a clear grasp of how networks operate that also understands the political implications of this emerging form of power. It cuts through the nonsense about how 'free' and 'democratic' networks supposedly are, and it offers a rich analysis of how network protocols create a new kind of control. Essential reading for all theorists, artists, activists, techheads, and hackers of the Net." --McKenzie Wark, author of A Hacker Manifesto" The network has become the core organizational structure for postmodern politics, culture, and life, replacing the modern era's hierarchical systems. From peer-to-peer file sharing and massive multiplayer online games to contagion vectors of digital or biological viruses and global affiliations of terrorist organizations, the network form has become so invasive that nearly every aspect of contemporary society can be located within it. Borrowing their title from the hacker term for a program that takes advantage of a flaw in a network system, Alexander R. Galloway and Eugene Thacker challenge the widespread assumption that networks are inherently egalitarian. Instead, they contend that there exist new modes of control entirely native to networks, modes that are at once highly centralized and dispersed, corporate and subversive. In this provocative book-length essay, Galloway and Thacker argue that a whole new topology must be invented to resist and reshape the network form, one that is as asymmetrical in relationship to networks as the network is in relation to hierarchy. Alexander R. Galloway is associate professor of culture and communications at New York University and the author of Gaming: Essays on Algorithmic Culture" (Minnesota, 2006) and Protocol: How Control Exists after Decentralization." Eugene Thacker is associate professor of new media at the Georgia Institute of Technology and the author of Biomedia" (Minnesota, 2004) and The Global Genome: Biotechnology, Politics, and Culture."
Awesome analysis, but heavily relies on the dichotomies
評分NYU兩個人想要從生態網絡、社會政治網絡、虛擬網絡等等現象中抽象齣關於“網絡”的專門理論,討論主權形態如何滲透以協議為基礎的網絡節點,以及控製、平衡和對稱-反對稱的關係如何在網絡中跨界運作,並企圖用網絡理論解釋病毒現象、恐怖主義。NYU有學派麼?昨天來瞭個人講德裏達和控製論,我沒怎麼聽懂。。。
評分NYU兩個人想要從生態網絡、社會政治網絡、虛擬網絡等等現象中抽象齣關於“網絡”的專門理論,討論主權形態如何滲透以協議為基礎的網絡節點,以及控製、平衡和對稱-反對稱的關係如何在網絡中跨界運作,並企圖用網絡理論解釋病毒現象、恐怖主義。NYU有學派麼?昨天來瞭個人講德裏達和控製論,我沒怎麼聽懂。。。
評分Awesome analysis, but heavily relies on the dichotomies
評分NYU兩個人想要從生態網絡、社會政治網絡、虛擬網絡等等現象中抽象齣關於“網絡”的專門理論,討論主權形態如何滲透以協議為基礎的網絡節點,以及控製、平衡和對稱-反對稱的關係如何在網絡中跨界運作,並企圖用網絡理論解釋病毒現象、恐怖主義。NYU有學派麼?昨天來瞭個人講德裏達和控製論,我沒怎麼聽懂。。。
評分
評分
評分
評分
The Exploit pdf epub mobi txt 電子書 下載 2024