Customer Reviews


4 Reviews
5 star:
 (1)
4 star:
 (1)
3 star:    (0)
2 star:    (0)
1 star:
 (2)
 
 
 
 
 
Average Customer Review
Share your thoughts with other customers
Create your own review
 
 

The most helpful favorable review
The most helpful critical review


23 of 24 people found the following review helpful
4.0 out of 5 stars defining networks as they are becoming essential social presences
Authors Galloway and Thacker--with New York University and the Georgia Institute of Technology respectively--pose a dichotomy between networks and sovereignty. Sovereignty is the longtime, historical form of government and society; often described as "hierarchic." Networks, on the other hand as any contemporary person knows, are newer, postmodern, forms of social...
Published on December 16, 2007 by Henry Berry

versus
0 of 1 people found the following review helpful
1.0 out of 5 stars deceaving abstract
Surely the idea is interesting but the content is nonsense, not very well structured (it talks about protocols for 50 pages and then it defines them), talks about a lot of useless things without getting to the point, there is not a single example that touches ground in the whole book.
Published 8 months ago by Ken


Most Helpful First | Newest First

23 of 24 people found the following review helpful
4.0 out of 5 stars defining networks as they are becoming essential social presences, December 16, 2007
This review is from: The Exploit: A Theory of Networks (Electronic Mediations) (Paperback)
Authors Galloway and Thacker--with New York University and the Georgia Institute of Technology respectively--pose a dichotomy between networks and sovereignty. Sovereignty is the longtime, historical form of government and society; often described as "hierarchic." Networks, on the other hand as any contemporary person knows, are newer, postmodern, forms of social organization--or topology--and activity. The difference between sovereignty and network is the difference between architecture and biology.

The co-authors take a "more speculative, experimental approach [resulting in] a series of marginal claims" rather than a theory to try to grasp the essential nature and actual effects of networks; all the while recognizing that "the nonhuman quality of networks is precisely what makes them so difficult to grasp". With sovereignty, leaders--i. e., persons--and laws or conventions were recognizable formative elements. With networks on the other hand, there are no permanent nor widely-accepted leaders and no code of law or centuries of convention forming or even governing them. Yet, there are businesses and services such as protocols and institutions such as Microsoft and Google which strongly influence and in some ways determine the presence and activity of networks. The belief that networks, particularly the Internet, are naturally, intentionally, or inevitably egalitarian is misleading.

The author's "speculative" approach carries them to summaries and critiques of philosophers from widely differing ages and with widely differing ideas and even worldviews; among these, Plato and Hobbes, Foucault and Guattari, Baudrillard and Virilio, Michael Hardt and Antonio Negri. In accordance with their understanding that they are making only "marginal claims," they do not presume nor work to synthesize such diversified, in some cases exclusionary thoughts. The authors' wide historical and literary learning, however, with their patent familiarity with all aspects of contemporary computer and networking technology allow for continuous illumination. The play of the diversity of the content is stimulating rather than conclusive or even much suggestive.

"Nodes" and "Edges" are the two chief parts of the book within which the play occurs. Nodes (to simplify) are the businesses, or the sources, of networks; the protocols, programs, Microsofts, Myspaces, etc. These will come and go as the field of networks evolves, just like businesses have always done. While the nodes are essential, the authors see the edges are more meaningful for those involved with networks. The edges represent networks' potentials in that they indicate the human desire and choices which give shape to the networks. "What matters more and more is the very distribution and dispersal of action throughout the network, a dispersal that would ask us to define networks less in terms of the nodes and more in terms of the edges..." Yet, ever provisional in their approach, Galloway and Thacker imagine networks could be best comprehended "in terms other than the entire, overly spatialized dichotomy of nodes and edges altogether." But with this as the next-to-last sentence, they do not begin to move onto this ground.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


1 of 1 people found the following review helpful
5.0 out of 5 stars A refreshingly sober look at the socio-political effects of contemporary ..., September 5, 2014
Verified Purchase(What's this?)
This review is from: The Exploit: A Theory of Networks (Electronic Mediations) (Paperback)
A refreshingly sober look at the socio-political effects of contemporary network technologies, advancing thought along the trajectory established by Deluze's late work on societies of control.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


0 of 1 people found the following review helpful
1.0 out of 5 stars deceaving abstract, January 20, 2014
Verified Purchase(What's this?)
This review is from: The Exploit: A Theory of Networks (Electronic Mediations) (Paperback)
Surely the idea is interesting but the content is nonsense, not very well structured (it talks about protocols for 50 pages and then it defines them), talks about a lot of useless things without getting to the point, there is not a single example that touches ground in the whole book.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


13 of 36 people found the following review helpful
1.0 out of 5 stars Bluster, July 26, 2011
Verified Purchase(What's this?)
This review is from: The Exploit: A Theory of Networks (Electronic Mediations) (Paperback)
The authors clearly had a great idea, but this book ends up containing a lot of nonsense, bluster, and outright garbage. Too bad: I would have loved to read the book that it promised to be. There are real implications of our increasingly networked society; changes to dynamics of power and control. Unfortunately, the authors are too busy tying themselves in knots of their own psychobabble to sort any of it out.

I don't think that the authors really understand the technology whose implications on society they purport to review. Anyone who's taken a course in computer networking will understand that there are no political implications in the maxim "Be liberal in what you accept, and conservative in what you send," enshrined in RFC 1122. That is a guideline for implementing a software system and nothing else. One chapter includes a series of "fork bombs", little Perl scripts intended to crash a computer if they're run. They inserted in the text without comment, as a way to make the authors look smart, but any script kiddie could have looked up these little programs on the Internet. Why present them here? Turn to the end of the book and you'll see the authors' own "programming language" full of idiotic constructs that in the end add nothing to the book. Obviously, it's not intended to be implemented anywhere, but it also doesn't further anyone's point to include some Duchampian computer language. How childish.
Help other customers find the most helpful reviews 
Was this review helpful to you? Yes No


Most Helpful First | Newest First

Details

The Exploit: A Theory of Networks (Electronic Mediations)
The Exploit: A Theory of Networks (Electronic Mediations) by Alexander R. Galloway (Paperback - October 1, 2007)
$18.95 $14.62
In Stock
Add to cart Add to wishlist
Search these reviews only
Rate and Discover Movies
Send us feedback How can we make Amazon Customer Reviews better for you? Let us know here.