Paranodal and paranodality in network age #bigdata #networkpolitics #code



[…] “While the primary directive of the network is linking, paranodality is concerned—to paraphrase Lovink—with whatever the mirror phantom of linking is. A few examples of paranodalities might help to illustrate the concept: a close friend orfamily member who refuses to participate in the latest social media craze and remains a conspicuous hole in our social network is an example of a paranode; broken web links pointing to pages thatno longer exist or cached versions of pagesno longer active are paranodal because they represent phantom nodes; signal jammers
such as RFID (radio-frequency identification) blockers that prevent network devices from being found are examples of technologies that create paranodality; public spaces without surveillance cameras are paranodal spaces; radio operators without a license (pirate radio) are paranodal because they function without validation from the network; any kind of wilderness where signal reception cannot be established is paranodal; digital viruses and parasites that obstruct the operations of a network are also examples of paranodal technologies; obsolete technology is
paranodal because its usage is no longer required to operate the network; digital noise and glitches are paranodal because they interfere with the fow of data in the network; paranodality is a lost information packet on the Internet; populations in a dataset that are excluded or discriminated against by an algorithm become paranodal; punk or rogue nodes—nodes who belong to a network only in order to destroy it—are paranodal” (“Off the Network.Disrupting the Digital World”, Ulises Ali MejiAs, Minnesota University Press, 2013, p.154-155)

Schermata 07-2456488 alle 17.54.15

Published by

Cosimo Accoto

Research Affiliate at MIT | Author "Il Mondo Ex Machina" (Egea) | Philosopher-in-Residence | Business Innovation Advisor |

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.