Difference between revisions of "Extended Nervous System"
|Line 26:||Line 26:|
Revision as of 13:13, 17 June 2010
Emotional circuits that give us pleasure. That we construct things in the world that help us do this, including social networks.
You get enough feedback to prove that the action is you, that that mechanical device is an extension of yourself.
There is the creation of a second self online.
One who runs a server and hosts websites has a nervous system that extends to those sites. When the site goes down, they may be physiologically affected. They are running an organism. Google Analytics is a sensing network that acts as an extended nervous system detecting clicks on the extension of one's identity.
In the same way, one's perception changes when one enters a vehicle. One's perception extends to the edges of the vehicle.
Donna Haraway discusses the compression of dichotomies as a result of technology. “the cyborg myth is about transgressed boundaries [and] deepened dualisms of mind and body, animal and machine” (Haraway 1991:154).
Instead of delineations between place and non-place, or delineations between public and private, the hybrid state decays the delineation between dichotomies and reduces it to a state the is neither public nor private, place or non-place, or 'here nor there'. Thus, non-place is not separate from place, but is both a place and a non-place at once.
The realm of the cell phone is a place that may be heard, and only liminally lived in. Augé defines the idea of the communication network as one that lies on the plane of extraterrestrial space (Augé, 1995:79). Thus the cell phone is a liminal extra-terrestrial space, or a space that is actually a place removed from place (the isolation of urban reality) that can be accessed simply by logging onto the Actor Network of cell phone users.
It is natural that so many disconnected individuals would so quickly adopt a technology that allows them some semblance of former society, even though it is mediated by technology and a payment plan.
Also see: Cyborg Security