Sunday, November 13, 2011

Part II: Edges and Coda

                                                               Part II: Edges

The Datum of Cura I
            The authors discuss similarities between computer viruses and biological epidemics within the context of how they are displayed. Forced to “care for the most misanthropic agents of infection and disease, one must curate that which eludes the cure” (p. 106) for if the disease was cured, there would be nothing left to display. Therefore, the best curator would necessarily be the most careless, the one incapable of exacerbating the virus. Caring for the virus vs. caring for those infected. The political economy in the 1700s (see Ricardo, Smith, and Malthus) was based on a correlation between the health of the population and the wealth of the country. Today’s public health has moved toward the idea of caring for health information and ensuring that “the biological bodies of the population correlate to the informatics patterns on the screen” (p. 107). Statistics, rather than bodies, are central.

The Datum of Cura II
            Foucault notes that curating entails a form of governance- caring for oneself would also benefit others through self-transformation. Becoming the best individual you can be will undoubtedly benefit society (so long as the best you can be is good- what about people’s whose best still sucks?). Yet, self destruction is inherent with self-transformation

http://www.guardian.co.uk/artanddesign/2009/sep/28/gustav-metzger-auto-destructive . Liu calls this “viral aesthetics” where the distinction between production and destruction are blurred. In the above link, an exhibit of Metzger’s work involves the demolition of an automobile. Its destruction becomes the art. Curare (Latin for to care) is the point where control and transformation intersect. “Is there a certain ‘carelessness’ to curare?” (p. 109)

Sovereignty and Biology I
             In politics, the body is often used as a metaphor for political organization. For Plato, the primary threat to the body politic was the move from concerns about justice to those “of wealth (oligarchy) and concerns of appetites (democracy) (p. 109). The excess of these concerns results is disease of the political body, similar to excess bile and phlegm in the physical body. Lawmakers must work to avoid these symptoms altogether but in the event they appear, should eradicate them “cells and all.” Our knowledge of the physical body has changed since the time of Plato, so does this mean that our understanding of the political body has also changed? Should it change?

Sovereignty and Biology II
            The model of sovereignty proposed by Hobbes in Leviathan, where citizens constitute the body and the sovereignty the head raises a fundamental question of political thought: can a political collectivity exist without transferring its rights to a supreme ruler? One of the ways that sovereignty maintains political power is through the continual identification of biological threats. In doing so, the sovereignty can justify enacting stronger controls over citizens by protecting them from threats to the health of the population. The medicalization of politics oversees the  behaviors, conduct, discourse, desires, etc. of biology occurs where discipline and sovereignty meet, a place which challenges the between the good of the individual and the good of the collective.

Abandoning the Body Politic
            The body politic has two states: (1) Constitutive- where the body politic is assembled through the “social contract” based on securing life (2) Dissolution- chaos, a return to the “state of nature,” sovereignty of the people, the dark side of the constitutive body. These two states feed into each through war.  “Peace is waging a secret.” Abandoning the body politic means deserting the military foundations of politics and also opening the body to its own abandon. “What is left is an irremediable scattering, a dissemination of ontological specks” (p.111).

The Ghost in the Network
            Heterogeneous network phenomena can be understood through the identification of commonalities in shared particular patterns- “a set of relations between dots (nodes) and lines (edges) (p. 112). Thus, organization gives shapes to matter and serves as a means to inform (in-form). The living network can also be viewed in political terms. There is not a central node that sits in the middle and monitors/controls every link and node. A single node cannot break the web. A scale-free network is a web without a spider. For politics to be viewed in a natural sense, networks need to be seen as an unavoidable consequence of their evolution.    

Birth of the Algorithm
            An algorithm is a type of visible articulation of any given processor’s machinic grammar.

Political Animals
            Biology is a prerequisite for politics (Aristotle). If the human being is a political animal, are there also animal politics? Vocabularies of biology retain the remnants of sovereignty: the queen bee, the drone. But, what about swarm intelligence where there is no centralized power, but only an instance of self-organization?

Sovereignty and the State of Emergency
            Modern sovereignty is based not on the right to impose laws but on the ability to suspend the law, to claim a state of emergency” (p.115). Both sides in a state of emergency rely on network management- either in destabilizing key nodes or fortifying them.

Epidemic and Endemic
            The distinction between emerging infectious disease and bioterrorism based on cause: one was naturally occurring, and the other resulted from direct human intervention has been muddled if not fully abandoned. In its place, the U.S. government has developed an inclusive approach to biopolitics. Regardless of the context, the role of the government is to alert and respond to biological threats. What matters most is what is at stake, which is always, life itself. To achieve this aim, “medical security” seeks “to protect the population, defined as a biological and genetic entity, from any possible biological threat, be it conventional war or death itself” (p.116). The biological threat is always present.

Network Being
          Information networks are often described as a “global village” or a “collective consciousness.” These references to networks somehow being alive bring up questions of what being actually means. The authors posit two questions: At what point does the difference between “being” and “life” implode? What would be the conditions for the nondistinction between “being” and “life”? They recognize two problems with the distinctions: (1) Life sciences are faced with anomalies where living organisms cross species barriers and questions of what it means to be alive, as in the case of a virus. For Heidegger, ‘life” and “being” are separate from but dependent upon each other. In network science, however, the concept of “being” is arrived at from a privative definition of “life.” In this sense, all networks form the same animal: a graph or a network. In turn, network science can study all networks as the same type of being. The impact of this view of network being is confused. Does the experience of being in a network constitute network phenomenology (where occurrences are shared)? Does it mean the existence of properties that differ across networks? The only “life” that is specific to networks is their “being” a network.

Good Viruses (SimSARS I)
            Network-based strategies are being developed on all levels. Computer security uses network solutions to address network threats in the world of online viruses. This behind the scenes war is invisible to most users but is in constant motion. Similarly, epidemiologists understand how infectious diseases are spread effectively through a variety of networks. Public health agencies in turn, use these same networks as instruments of awareness and prevention. Caution must be exercised in utilizing these networks to avoid widespread panic or political hype. In the post 9/11 United States, infectious disease and bioterrorism are inevitably linked. In doing so, questions of a new biopolitical war or a new medical terror are raised. “Good” viruses introduced to combat emerging infectious diseases are administered through the same networks as the disease, but will only succeed if its rate of infection is greater than the bad virus.

Medical Surveillance (SimSARS II)
            Developments in medical surveillance are representative of the intensive nature of networks. The Center for Disease Control (CDC) is working to develop “syndromic surveillance” where the goal is to implement a real-time, nationwide system for detecting anomalies in public health data which could signal a possible outbreak or bioterrorist attack. In this case, “an information network is used to combat a biological network” (p. 121). Similar the World Health Organization’s Global Outbreak Alert and Response Network works to insure that potential threats (either naturally occurring or intentionally caused) are quickly verified and information shared through the Network. Medical surveillance in itself is not problematic, but could become controversial when what constitutes “health data” is disputed. “In the informatic mode, disease is always virtual (p. 122) which creates a permanent state of emergency. Disease is always looming but kept just out of reach.

Feedback versus Interaction I
            Two models typify the evolution of two-way communication in mass media. In the first model (feedback), information flows in one direction- from the public to the institution. Two-way communication (interaction) is seen in the second model. Here communication occurs within a system of communicative peers where each peer can physically affect another.

Feedback versus Interaction II
            Feedback and interaction also correspond to two different models of control. Feedback corresponds to the cybernetic model of control where one party is always the controlling party and the other is the controlled party (television, radio). Interaction corresponds to a networked model of control where decision making occurs multilaterally and simultaneously. The authors argue that “double the communication leads to double the control” (p. 124) through surveillance, monitoring, biometrics, and gene therapy.

Rhetorics of Freedom
            Technological systems can either be closed or open. Closed systems are generally created by either commercial or state interests (profit through control and scarcity). Open systems are generally associated with the public and political transparency (innovative standards in the public domain). Rather than focus on the opposition between open/closed, the authors examine alternative logics of control. Open control logics use an informatic (material) mode of control, while closed logics use a social model of control. From this perspective, informatic control is equally as powerful (if not more so) than social control.

A Google Search for My Body
            One is either online and accounted for or offline and still accounted for. The body becomes a medium of constant locatability surrounded by personal network devices. For an example, think of how your Facebook page tracks your internet habits. How many people have disconnected the chat function on Facebook or other Instant Messengers because they do not want others to know they are online?

Divine Metabolism

            Life-forms are not merely biological but include social, cultural, and political forms as well, but not all of these have an equal claim on life. Networks are the site where control works through the continual relation to life-form.

The Paranormal and the Pathological I
            Conceptions of health and illness have changed from a quantitative approach (illness as a deviation from the norm) which requires a return to balance to a qualitative one (disease is a different state than health) where medicine’s role is to treat symptoms of the disease. However, the third transition, “disease as error,” is the most telling. In this conception, disease is viewed as an error in the organism. It does not manifest itself in testimony from the patient or in signs expressed on the body. Rather, the disease exists only in itself. It is everywhere and nowhere. Disease is an informatic expression that must be mapped and decoded.

The Paranormal and the Pathological II
            Because disease can occur as a mass phenomenon, includes modes of transmission and contagion, and exists between bodies, it is necessary to evaluate diseases as networks. If the processes that lead to an outbreak have no center and are multicausal, how can they be prevented? Epidemics are both medical situations and political ones. If epidemics are networks, the problem of multiplicities in networks is the tension between sovereignty and control. Compounding this problem is sovereignty found in the supernatural.

Universals of Identification
            Once universal standards of identification are agreed upon, real-time tracking technologies will increase. Space will become rewindable and archivable; the world will exist as a giant convenience store. See these videos about gunshot tracking technology to get an idea of what that world will look like or how it is made possible:



RRCOO1b: BmTP
            Molecular biology laboratories employ (at least) two networks to encode, recode, and decode biological information: the informatics network of the Internet and the biological network. The Internet allows for uploading and downloading of biological information and brings together databases, search engines, and specialized hardware. The biological network occurs in-between DNA and an array of other proteins.

Unknown Unknowns
            From Donald Rumsfeld: “Because as we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns—the ones we don’t know we don’t know.” The unknown unknowns bring forth visions of death, fear, and terror, the end of humanity.

Codification, Not Reification

            The new concern for political problems is the extraction of abstract code from objects. The process of bioprospecting, whereby unique genes are harvested for their informational value has reduced individuals to digital forms, ignoring their lived reality. Today’s impoverished populations are expected to give up their labor power as well as their bodily information. “The biomass, not social relations, is today’s site of exploitation” (p.135).

Tactics of Nonexistence
            “The question of nonexistence is this: how does one develop techniques and technologies to make oneself unaccounted for?” (p.135). Nonexistence is tactical for anything that wishes to avoid control.

Disappearance; or, I’ve Seen It All Before
              Disappearance is the by-product of speed. As technology gets faster, one’s physical and biological self disappears amid a plethora of files, photos, video, and a variety of Net tracking data. Bey proposes that nomadism is the response to speed. A “temporary autonomous zone” (TAZ) is a temporary space set-up to avoid formal structural control. Move before the cultural and political mainstream knows what happened.

Stop Motion
            “The question of animation and the question of ‘life’ are often the same question” (p.138). Graph theory begins from the classical division between node and edge and in doing so privileges space over time, site over duration (p.139). Networks can only be thought of in a different way if animation (movement) becomes ontological or a universal right.

Pure Metal
            Cultural constructionism focuses more on the way that gender/sexuality, race/ethnicity, and class/status form, shape, and construct a self than with the innate self or identity. The human subject is decentralized in the process. What about the nonhuman? Regardless of views on the nonhuman (incorporating or discorporating), it continues to be negatively defined. The human is always the starting point for comparison. How then are nonhuman elements that run through or found within humans classified?

The Hypertrophy of Matter (Four Definitions and One Axiom)
            Definition 1. Immanence- the process of exorbitance, of desertion, of spreading out

            Definition 2. Emptiness- the space between things; an edge
            Definition 3. Substance- the continual by-product of the immanence and emptiness; a node

            Definition 4. Indistinction- the quality of relations in a network
            Axiom 1- “Networks have as their central problematic, the fact that they prioritize nodes at the same time as they exist through the precession of edges” (p.143)

The User and the Programmer
            “User” is a synonym for “consumer.” Programmer is a synonym for “producer.” Most legal prohibitions are migrating away from the user model (being) toward programmers (doing). Anyone can be a programmer if he or she chooses. More and more threats to programming are seen in everyday life. Future politics will focus on use over expression.

Interface
            The authors define interface as “an artificial structure of differentiation between two media” (p.144). Differentiation occurs whenever a structure is added to raw data. Data does not appear fully formed and whole but instead gets its shape from social and technical processes. Interface is how dissimilar data forms interoperate.

There is No Content
            Content cannot be separated from the technological vehicles of representation and conveyance that facilitate it. Meaning is a data conversion” (p.145). There is not content, only data.

Trash, Junk, Spam
            Trash is the set of all things that have been cast out of previous sets, all that which no longer has use. Junk is the set of all things that are not of use at this moment, but may be of use at some time, and certainly may have been of use in the past. Spam is an exploit. “Spam signifies nothing yet is pure signification” (p.146).


CODA: BITS AND ATOM

Networks are always exceptional, in the sense that they are always related, however ambiguously, to sovereignty.

            This ambiguity informs contemporary discussions of networks. Hardt and Negri describe the multitude as a “multiplicity of singularities,” a collective group that remains heterogeneous (the one and the many, sovereignty and multitude). Virno recognizes that the multitude does not clash with the One; it redefines it. Unity is not the State; rather, it is language, intellect, communal faculties of the human race. The fact that the multitude is not “One” is its greatest strength, giving it flexibility that centralized organizations lack.

Contemporary analyses of “multitude” share significant affinities with Arquilla and Ronfeldt’s analysis of “netwar.” In this intersection, political allegiances of Left and Right tend to blur into a strange, shared concern over the ability to control, produce, and regulate networks.

            According to Arquilla and Ronfeldt, “netwar refers to an emerging mode of conflict (and crime) at societal levels, short of military warfare, in which the protagonists use network forms of organization and related doctrines, strategies, and technologies attuned to the information age” (p.151). Netwar can be waged by ‘good’ or ‘bad’ actors as well as through peaceful or violent measures. The diversity and complexity of netwar makes them an emerging form of political action. It takes a network to fight a network.

Despite their political differences, both the concept of the multitude and the concept of netwars share a common methodological approach: that “the ‘unit of analysis’ is not so much the individual as it is the network in which the individual is embedded.

            The authors believe what is missing from Hardt and Negri and from Arquilla and Ronfeldt is a “new future of asymmetry” (p.152). Resistance IS asymmetry. Formal sameness may bring reform, but formal incommensurability (having no common basis) breeds revolution. “Open” or “free” networks exhibit power relations regardless of the power held by the individuals who comprise them.

At this point, we pause and pose a question: Is the multitude always “human”? Can the multitude or netwars not be human and yet still be “political”? That is, are individuated human subjects always the basic unit of composition in the multitude? If not, the we must admit that forms such as the multitude, netwars, and networks exhibit unhuman as well as human characteristics.

            These questions relate to the nature of constituent power in the age of networks. Not all networks are created equal and often display asymmetrical power relationships. But if no one controls the network, how do we account for such differences and asymmetrics?

Our suggestion may at first seem perplexing. We suggest that the discussions over the multitude, netwars, and networks are really discussions about the unhuman within the human.

            The word “unhuman” does not mean against human or antihuman. Rather, the use of the term is designed to ponder whether these emerging forms go far enough in comprehending the portions of ourselves that are not fully human.

Difficult, even frustrating, questions appear at this point. If no single human entity controls the network in any total way, then can we assume that a network is not controlled by humans in any total way? If humans are only a part of the network, then how can we assume that the ultimate aim of the network is a set of human-centered goals?

            At both the macro and micro levels, it is easy to recognize elements in networks that inhibit total control or total knowledge—computer viruses, infectious diseases, viral marketing or adware, unforeseen interpersonal connections on social networks, and various other biological and man-made phenomena

In fact, it is the very idea of “the total” that is both promised and yet continually deferred in the “inhumanity” of networks, netwars, and even the multitude.

            Networks are constituted by the tension between the agency of individuals within the network and the abstract “whole.”

The network is this combination of spreading out and overseeing, evasion and regulation. It is the accident and the plan. In this sense, we see no difference between the network that works too well and the network that always contains exploits.

            Another perspective, however does see a great difference between successful networks and networks that fail. These differing viewpoints are part of the reason why Internet viruses and infectious diseases evoke such fear and frustration. Networks show us the unhuman in the inhuman and illustrate that individual human subjects are not the basic unit of network constitution.

For this reason, we propose something that is, at first, counterintuitive: to bring our understanding of networks to the level of bits and atoms, to the level of aggregate forms of organization that are material and unhuman, to a level that shows us the unhuman in the human.

            Networks operate through continuous connections and disconnections, but at the same time, they continually posit a topology. They are always taking shape but remain incomplete.

The unhuman aspects of networks challenge us to think in an elemental fashion. The elemental is, in this sense, the most basic and the most complex expression of a network.   

            The central concern of networks is no longer the action of individuals or nodes in the network. Instead what matters more is the action throughout the network, a dispersal of action that requires us to think of networks less in terms of nodes (information) and more in terms of edges (space)—or even in terms other than the entire dichotomy of nodes and edges altogether. “In a sense, therefore, our understanding of networks is all-too-human…” (p.157).

Discussion Questions:

1.      The videos of gunshot tracking give us an idea of how surveillance can be incorporated into society. How could a program such as this be used to track biological happenings? What type of universals would have to be agreed upon?

2.      On page 118, the authors assert that network science “seeks a universal pattern that exists above and beyond the particulars of any given network. For this reason, network science can study AIDS, terrorism, and the Internet all as the same kind of being—a network.” What are the similarities between biological and man-made networks? Are there differences?  

5 comments:

  1. In response the second discussion regarding the study of network science, which classifies both biological and man-made are ‘all of the same being,’ that is, both the biological and the man-made are networks. As network science ‘seeks a universal pattern’ beyond a single network it then assumes that both biological and man-made entities are essentially the same as all networks are the same animal and the same being. Universality then trumps the historical notions of ‘being’ and ‘life.’ As Aristotle posited, “Biology is a prerequisite for politics,” the biological has become politicized. Put simply, the coalescence of the body and the state that occurred during the emergence of neo-liberalism created biopolitical implications.

    In examining the similarities and differences present between the biological and the man-made, the infectious disease ‘Acquired Immune Deficiency Syndrome’ (AIDS) raises critical questions regarding this distinction. The U.S. Center for Disease Control identified AIDS in 1981. Subsequently, a ‘cause’ of the disease emerged in the early 1980s. Initially, the AIDS virus appeared a biological entity, however, this changed as the biological basis of the virus became transformed through various institutions and organizations. That is, the emergence of networks merged AIDS as a biological pathogen into a universally accepted network made by man.

    For example, The World Health Organization (WHO) produced a report regarding the AIDS ‘epidemic’ in 1990. The report introduced the, WHO Disease Staging System for HIV Infection and Disease In the document, the WHO states, “With the pandemic spread of AIDS, a universally applicable staging system for HIV infection and disease is needed. This system could be used to: improve clinical management of patients; establish reliable prognoses; help in designing and evaluating drug and vaccine trials; and perform studies on pathogenesis and natural history of HIV infection” ( WHO, 1990). Here one can assess that universal global networks impact the bare notion of AIDS. As the report notes, the proposed HIV staging system can ‘improve,’ ‘establish,’ ‘design,’ ‘evaluate’ and ‘perform.’ WHO offers a universal approach in the systemization of biology. Consequently, man redefined the biological pathogen in terms of science and politics.

    Finally, I find it interesting that the meaning between two separate entities such as AIDS and the Internet as both networks displays the similarities and differences between the biological and the man-made, AIDS serves as an example where the two combine.

    ReplyDelete
  2. Carolyn asks: “What are the similarities between biological and man-made networks? Are there differences?”

    For me, this is first and foremost a question of semiotics. I understand “biological” to be a claim about the nature of the network and “man-made” to be an inquiry into the origin of the network. In other words, to conceptualize a network in “biological” terms is to make a claim about its make-up, its components, and its inner-workings. In other words, biological comprises and is comprised of processes. Conversely, a network that is “man-made” seems to conceptualize the network as a product that has an identifiable starting point. But of course, this begs the question: a product of what? And, producing what?

    Perhaps one way we can begin to answer these questions is by applying the logic underlying distinctions between “evolution” and “design” to the question of “biological” v. “man-made networks.” The blog “Immunoblogging” posted an article in February of 2006 titled “Evolution vs. Design: Man-Made Biological Weapons Part I” (http://immunoblogging.blogspot.com/2006/02/evolution-vs-design-man-made.html). In a discussion about different types of biological warfare, the author writes the following:

    “Today, unlike in the previous examples the threat of biological weapons is much greater, because technology has advanced to the point where we can simply design our own pathogens to be more effective weapons...The question that arises is how to determine if an organism is designed by human techniques, or if the pathogen is just another example of a newly emerged pathogen that has arisen by evolutionary processes.” Following this logic, we must ask: how can we determine whether a network is biological or man-made?

    Of course, these distinctions are imperfect and clearly overlap into each other: in fact, can a network not be both biological AND man-made at once? It is perhaps problematic to even make the distinction at all, since, as our authors write, “the question of ‘life’ and the question of ‘being’ seem always to imply each other, but never to meet” (p. 119). The question now becomes how we can develop a framework which encompasses both biology and the actions of man, acknowledges the similarities and the differences, and still leaves space for us to account for at least two commonly overlooked aspects of network constitution: 1) the slippage between networks and between the nodes within networks (or, rather, the “space between things,” p. 142) and 2) the “unhuman aspects” that are very much a part of networks (p. 157).

    ReplyDelete
  3. The videos of gunshot tracking give us an idea of how surveillance can be incorporated into society. How could a program such as this be used to track biological happenings? What type of universals would have to be agreed upon?

    There is a type of surveillance that I am able to partially avoid because I work on a cash only basis. Think about every time someone swipes their credit or debit card. People as “users” leave trails of digital DNA that is connected to their biological activities. We are under constant surveillance because we leave behinds nodes of personal information as we move across the various networks we come into contact with. Galloway and Thacker explain that data is transferred into meaning through data conversation. ”To the extent that meaning exists in digital media, it only ever exists between two or more technologies” (p. 145). Their concept is demonstrated in how political data miners turn purchase data into votes. The data is given meaning through the conversation between the retail and political parties technologies. According to Andrew Drechsler, "When we get the voter file it's usually first name, last name, address, phone number, and then vote history, is the typical information in the voter file." Voter files will not say who a person voted for, but they will say whether or not the person voted. Data miners also buy information from companies. "You know, what type of magazine do people read, what kind of car do they drive, do they rent, do they own, do they have pets, what sort of pet do they have?” Each detail is a data point, and by the time data miners are finished, they can know a lot about a person. "So we will have close to a thousand data points on the voters." (http://www.voanews.com/learningenglish/home/Political-Data-Miners-Really-Get-to-Know-You-133327648.html) I am not sure the universals are agreed upon. Maybe it is a trade off; speed and convenience in exchange for privacy? But people willingly swipe their cards and give away their personal data. Their participation in the credit/debit network is voluntary. Unless you’re renting a car, most vendors accept cash, which isn’t as track able. I think that this how any new system that might track other biological happening might work; People will willingly participate.

    ReplyDelete
  4. Carolyn’s first question immediately brought to mind a technology that has been discussed by paranoid skeptics for a while- the biochip. The ability to track your loved one or pet can be easily accomplished by implanting the chip. Doomsday prophets have decried this as the “Mark of the beast” for some time now. Actually, this is a bit of an old hat. A 2005 Time article claimed that Applied Digital Solutions sold 7,000 of these chips and had implanted 2,000 (http://www.time.com/time/magazine/article/0,9171,1118348,00.html). This was almost seven years ago, so how far has this technology gone since then?

    As recently as five days ago an article was published claiming that the University of Rochester Medical Center won a patent on a biochip that is “designed to give physicians real-time readings of changes in the body” (http://www.rbj.net/article.asp?aID=189394). Advancements like this will allow physicians to monitor conditions like diabetes in real-time, which would seem to be advantageous for treatment purposes. Obviously, the patients would have to agree upon this in order to participate. I am sure many would still shun this type of technology because of the possible Orwellian implications, but as we saw in the film Transcendent Man there are at least a few people out there all too willing to use technology to improve their biology, even going so far as to merge with it.

    Even freakier sounding are the “Self-assembling biomimetic nanostructures” which has been lauded as a “bioengineering breakthrough” . I won’t even attempt to explain this so I will include the explanation from the article:
    “The design of biological molecules that mimic living structures and tissue is emerging as one of the most valuable strategies in bioengineering. Such biomimetic molecules, coupled with increasingly accurate simulations of cellular growth and responses, are leading to a wide range of regenerative applications as well as the development of controlled drug delivery systems and biochips for pharmaceutical research and diagnosis. In a significant step forward in the field, Charlotte Hauser and co-workers at the A*STAR Institute of Bioengineering and Nanotechnology (IBN) have designed a new class of ultrasmall peptides capable of self-assembling into a variety of structures such as membranes, micelles, tubules and gels that are suitable for application in tissue engineering and regenerative medicine.” (From nanowerk news){http://www.nanowerk.com/news/newsid=23337.php}

    The easiest and very obvious example of a technology that is universally agreed upon and provides a data goldmine is something all of us carry: the cell phone. Not only can this device can be pinpointed wherever it is (and usually the owner is right there with it) but a great deal of information about the user can be discovered from the user’s activity.

    ReplyDelete
  5. Hello all...my exploit book is defected and is missing almost all of today's readings. It repeats the nodes chapter again instead. Therefore, to contribute to this post, I will attempt to answer the first question to the best of my ability with the limited pages I had access to.
    The gunshot tracking shows the modern day use of surveillance in society. Obviously, we all know that this isn't the only form of visual surveillance in modern day. An interesting form of surveillance that a student recently showed in her persuasive speech arguing for reforms in the US driving systems was a red light video that caught a car who was at the red light for a while and then decided to speed through existing sideways traffic. Luckily, no one was hurt by this car's actions.

    This example makes me wonder of the place of surveillance in society from the standpoint that those for the use of it would argue that it will make society safer and help control incidents and violence of all kinds. It seems that the network is beneficial in many ways as it can track any kind of incident, including none-traffic related ones-that may be of interest to the network.

    As Galloway and Thacker note, "The network is this combination of spreading out and overseeing, evasion and regulation. It it the accident and the plan. In this sense, we see no different between the network that works too well and the network that always contains exploits" (p. 155). I think Galloway and Thacker's explanation as both accidental and planned best explains the overarching networks of video surveillance in society.

    ReplyDelete