SlideShare a Scribd company logo
1 of 16
Download to read offline
Microtemporality:
At The Time When Loading-in-progress
Winnie Soon #ISEA2016
PhD fellow, Aarhus University
The network structure of today’s communication
channels and their streams are often understood as
providing a direct connection between users and
services or between two communication partners,
even though there cannot be any direct links on
digital networks. The metaphor of flow conceals the
fact that, technically, what is taking place is quite
the opposite. There is no stream in digital networks.
(Sprenger 2015, 88-89, my emphasis)
Microtemporality
Microtemporality relates to the nature of signals and
communications, mathematics, digital computation
and dynamic network within these deep internal
and operational structures.
Image src: http://www.ocrcomputing.org.uk/f451/networks/circuit_packed_switching.html
On the transmitting end, the functions include
chopping the data stream into packets, adding
control information and end-to-end error control
information to be out-going packets. On the
receiving end, each multiplexing station uses
terminating buffers temporarily assigned to each
end addressee to unscramble the order of the
arrived packets, and buffer them so that they come
out as an error-free stream, only slightly but not
noticeably delayed.
(Baran 2002, 42-48, my emphasis)
Principle organization of a playback buffer, 2013, Christoph
Meinel & Harald Sack, Print, Copyright 2013 by Springer.
Work by Jaret Vadera
The automated micro-decisions and computational
processes […] reconfigure the temporality of
networks by discarding absent data. The notion of
microtemporality explicates the invisibility of
computational culture by shifting our attention from
what is visible on a screen to invisible micro events
that are running in the background.
(Soon 2016)
The Spinning Wheel of Life
http://siusoon.net/home/?p=1407
Thank You
wsoon@cc.au.dk

More Related Content

What's hot

TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKIAEME Publication
 
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...Azrull Haziq
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
 
Dynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsDynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsJPINFOTECH JAYAPRAKASH
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEEBEBTECHSTUDENTPROJECTS
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...ecwayerode
 
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Editor IJCATR
 
Dynamic control of coding for progressive packet arrivals in dt ns
Dynamic control of coding for progressive packet arrivals in dt nsDynamic control of coding for progressive packet arrivals in dt ns
Dynamic control of coding for progressive packet arrivals in dt nsIEEEFINALYEARPROJECTS
 

What's hot (13)

TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
THE PERFORMANCE EVALUATION OF OPEN SHORTEST PATH FIRST VERSION 3 IN TERMS OF ...
 
Computer network
Computer network Computer network
Computer network
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
Dynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtnsDynamic control of coding for progressive packet arrivals in dtns
Dynamic control of coding for progressive packet arrivals in dtns
 
Distributed systems
Distributed systemsDistributed systems
Distributed systems
 
Syllabus cse
Syllabus cseSyllabus cse
Syllabus cse
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...
 
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
 
Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08
Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08
Towards a New Architectural Framework – The Nth Stratum Concept Mobimedia 08
 
Dynamic control of coding for progressive packet arrivals in dt ns
Dynamic control of coding for progressive packet arrivals in dt nsDynamic control of coding for progressive packet arrivals in dt ns
Dynamic control of coding for progressive packet arrivals in dt ns
 
C0351725
C0351725C0351725
C0351725
 

Similar to Microtemporality: At The Time When Loading-in-progress

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelIRJET Journal
 
Packet switching
Packet switchingPacket switching
Packet switchingVikash Dhal
 
Te 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updatedTe 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updatedShohan Ean
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsVijay Karan
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsVijay Karan
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsVijay Karan
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Journals
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...eSAT Publishing House
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
 
9-2020.pdf
9-2020.pdf9-2020.pdf
9-2020.pdffermanrw
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
 
Cy31439446
Cy31439446Cy31439446
Cy31439446IJMER
 

Similar to Microtemporality: At The Time When Loading-in-progress (20)

SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure ChannelA Survey on Privacy-Preserving Data Aggregation Without Secure Channel
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Te 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updatedTe 1 introduction to telecommunications_updated
Te 1 introduction to telecommunications_updated
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
1720 1724
1720 17241720 1724
1720 1724
 
1720 1724
1720 17241720 1724
1720 1724
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...Performance improvement of bottleneck link in red vegas over heterogeneous ne...
Performance improvement of bottleneck link in red vegas over heterogeneous ne...
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
Transport layer
Transport layerTransport layer
Transport layer
 
9-2020.pdf
9-2020.pdf9-2020.pdf
9-2020.pdf
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
50120140502004
5012014050200450120140502004
50120140502004
 
Cy31439446
Cy31439446Cy31439446
Cy31439446
 

More from Aarhus University

Unerasable Characters in Machine Learning
Unerasable Characters in Machine LearningUnerasable Characters in Machine Learning
Unerasable Characters in Machine LearningAarhus University
 
Humanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through PracticeHumanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through PracticeAarhus University
 
n.a.g/the inexecutable query
n.a.g/the inexecutable queryn.a.g/the inexecutable query
n.a.g/the inexecutable queryAarhus University
 
What is Coding in University in Practice?
What is Coding in University in Practice?What is Coding in University in Practice?
What is Coding in University in Practice?Aarhus University
 
Screen shots : Critical Codes of Capture
Screen shots : Critical Codes of CaptureScreen shots : Critical Codes of Capture
Screen shots : Critical Codes of CaptureAarhus University
 
Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create? Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create? Aarhus University
 
Executing tasks: Spam as Automated Agents
Executing tasks: Spam as Automated AgentsExecuting tasks: Spam as Automated Agents
Executing tasks: Spam as Automated AgentsAarhus University
 
Digital Surveillance in China: From the Great Firewall to the Social Credit S...
Digital Surveillance in China: From the Great Firewall to the Social Credit S...Digital Surveillance in China: From the Great Firewall to the Social Credit S...
Digital Surveillance in China: From the Great Firewall to the Social Credit S...Aarhus University
 
Executing Queries as a form of artistic practice
Executing Queries as a form of artistic practiceExecuting Queries as a form of artistic practice
Executing Queries as a form of artistic practiceAarhus University
 
Interfacing with questions: The unpredictability of live queries in the work...
Interfacing with questions:  The unpredictability of live queries in the work...Interfacing with questions:  The unpredictability of live queries in the work...
Interfacing with questions: The unpredictability of live queries in the work...Aarhus University
 
Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...Aarhus University
 
Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...Aarhus University
 
Discussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella MovementDiscussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella MovementAarhus University
 
Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...Aarhus University
 
Artist Talk: From net art to software art
Artist Talk: From net art to software artArtist Talk: From net art to software art
Artist Talk: From net art to software artAarhus University
 
Collaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] ResearchCollaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] ResearchAarhus University
 
Net Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical ThinkingNet Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical ThinkingAarhus University
 

More from Aarhus University (20)

Unerasable Characters in Machine Learning
Unerasable Characters in Machine LearningUnerasable Characters in Machine Learning
Unerasable Characters in Machine Learning
 
Humanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through PracticeHumanistic and Computational Thinking Through Practice
Humanistic and Computational Thinking Through Practice
 
n.a.g/the inexecutable query
n.a.g/the inexecutable queryn.a.g/the inexecutable query
n.a.g/the inexecutable query
 
What is Coding in University in Practice?
What is Coding in University in Practice?What is Coding in University in Practice?
What is Coding in University in Practice?
 
Screen shots : Critical Codes of Capture
Screen shots : Critical Codes of CaptureScreen shots : Critical Codes of Capture
Screen shots : Critical Codes of Capture
 
Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create? Why Code? Why Program? Why Create?
Why Code? Why Program? Why Create?
 
Executing tasks: Spam as Automated Agents
Executing tasks: Spam as Automated AgentsExecuting tasks: Spam as Automated Agents
Executing tasks: Spam as Automated Agents
 
Digital Surveillance in China: From the Great Firewall to the Social Credit S...
Digital Surveillance in China: From the Great Firewall to the Social Credit S...Digital Surveillance in China: From the Great Firewall to the Social Credit S...
Digital Surveillance in China: From the Great Firewall to the Social Credit S...
 
Executing Liveness
Executing LivenessExecuting Liveness
Executing Liveness
 
Executing Queries as a form of artistic practice
Executing Queries as a form of artistic practiceExecuting Queries as a form of artistic practice
Executing Queries as a form of artistic practice
 
Interfacing with questions: The unpredictability of live queries in the work...
Interfacing with questions:  The unpredictability of live queries in the work...Interfacing with questions:  The unpredictability of live queries in the work...
Interfacing with questions: The unpredictability of live queries in the work...
 
Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...Software art and design: computational thinking through programming practice ...
Software art and design: computational thinking through programming practice ...
 
Executing Queries
Executing QueriesExecuting Queries
Executing Queries
 
Life and Death in Software
Life and Death in SoftwareLife and Death in Software
Life and Death in Software
 
Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...Network materiality and temporality: Things flow 'non-continuously' in networ...
Network materiality and temporality: Things flow 'non-continuously' in networ...
 
Discussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella MovementDiscussing Software through the art of the Hong Kong Umbrella Movement
Discussing Software through the art of the Hong Kong Umbrella Movement
 
Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...Nonhuman Participation: a materialist perspective on execution from agency o...
Nonhuman Participation: a materialist perspective on execution from agency o...
 
Artist Talk: From net art to software art
Artist Talk: From net art to software artArtist Talk: From net art to software art
Artist Talk: From net art to software art
 
Collaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] ResearchCollaborative and Collective [Artistic] Research
Collaborative and Collective [Artistic] Research
 
Net Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical ThinkingNet Art: Data Hacking, Coding and Critical Thinking
Net Art: Data Hacking, Coding and Critical Thinking
 

Recently uploaded

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Microtemporality: At The Time When Loading-in-progress

  • 1. Microtemporality: At The Time When Loading-in-progress Winnie Soon #ISEA2016 PhD fellow, Aarhus University
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. The network structure of today’s communication channels and their streams are often understood as providing a direct connection between users and services or between two communication partners, even though there cannot be any direct links on digital networks. The metaphor of flow conceals the fact that, technically, what is taking place is quite the opposite. There is no stream in digital networks. (Sprenger 2015, 88-89, my emphasis)
  • 8. Microtemporality Microtemporality relates to the nature of signals and communications, mathematics, digital computation and dynamic network within these deep internal and operational structures.
  • 10. On the transmitting end, the functions include chopping the data stream into packets, adding control information and end-to-end error control information to be out-going packets. On the receiving end, each multiplexing station uses terminating buffers temporarily assigned to each end addressee to unscramble the order of the arrived packets, and buffer them so that they come out as an error-free stream, only slightly but not noticeably delayed. (Baran 2002, 42-48, my emphasis)
  • 11.
  • 12. Principle organization of a playback buffer, 2013, Christoph Meinel & Harald Sack, Print, Copyright 2013 by Springer.
  • 13. Work by Jaret Vadera
  • 14. The automated micro-decisions and computational processes […] reconfigure the temporality of networks by discarding absent data. The notion of microtemporality explicates the invisibility of computational culture by shifting our attention from what is visible on a screen to invisible micro events that are running in the background. (Soon 2016)
  • 15. The Spinning Wheel of Life http://siusoon.net/home/?p=1407