
Sign up to save your podcasts
Or


View the Full Article on Substack: https://theofficialurban.substack.com/p/cybernetic-daemons-continued?r=3kr5wz
Part One on Internet Daemons: https://theofficialurban.substack.com/p/cybernetic-daemons
Cybernetics Imgur Album: https://imgur.com/a/cybernetics-YIy3E3J
Directory of Human Husbandry Technology: https://datawrapper.dwcdn.net/9ysrs/
Explore the hidden mechanics operating behind your screen. In this episode, guest host Urban returns to dive into Fenwick McKelvey's groundbreaking book, Internet Daemons. We pull back the curtain on media infrastructure to expose how background processes, algorithms, and automated intermediaries actively manage modern power dynamics, packetized data streams, and network traffic.
Tracing the intellectual lineage of technology back to James Clerk Maxwell’s 1871 thermodynamics thought experiment, we look at how early cyberneticists like Norbert Wiener used "Maxwell’s Demon" to construct the foundation of information theory. Discover how modern infrastructure acts as an active participant—using flow control, deep packet inspection, and autonomous policy daemons to commodify speed and individual anxiety.
Key Topics Covered in This Episode
Semiconductor Magic & Alchemical Engineering:
A look at the staggering scale of modern transistor technology—compressing a gigabyte of data to the width of a human hair.
Why semiconductor manufacturing in class-1 cleanrooms perfectly maps onto the ancient alchemical "Great Work".
The Origin of the Internet Daemon:
Defining background-oriented, tireless software processes that wait silently for environmental triggers.
How MIT hackers converted Maxwell's imaginary molecular sorting demon into modern server code.
Norbert Wiener & Cybernetic Symbiosis:
Wiener’s core insight that information is the literal negative of entropy.
Bridging the speed mismatch between human thought and computing hardware.
The Interface Message Processor (IMP) & Flow Control:
Inside ARPANET's original design and the eight duties of the internet's first true daemons.
The mechanics of packet-switching algorithms: Leaky Bucket vs. Token Bucket strategies and Hot Potato routing.
The Screaming Chorus of Pandemonium:
Oliver Selfridge's "Pandemonium" architecture where specialized cognitive algorithms shriek upon pattern recognition to control data flow.
The Weaponization and Aesthetics of Lag:
How individualized throttling and loading indicators function as modern sigils of digital manipulation.
Shifting resistance tactics from open accelerationism to closed encryption escalationism.
By Urban (@officialurbanus)5
1010 ratings
View the Full Article on Substack: https://theofficialurban.substack.com/p/cybernetic-daemons-continued?r=3kr5wz
Part One on Internet Daemons: https://theofficialurban.substack.com/p/cybernetic-daemons
Cybernetics Imgur Album: https://imgur.com/a/cybernetics-YIy3E3J
Directory of Human Husbandry Technology: https://datawrapper.dwcdn.net/9ysrs/
Explore the hidden mechanics operating behind your screen. In this episode, guest host Urban returns to dive into Fenwick McKelvey's groundbreaking book, Internet Daemons. We pull back the curtain on media infrastructure to expose how background processes, algorithms, and automated intermediaries actively manage modern power dynamics, packetized data streams, and network traffic.
Tracing the intellectual lineage of technology back to James Clerk Maxwell’s 1871 thermodynamics thought experiment, we look at how early cyberneticists like Norbert Wiener used "Maxwell’s Demon" to construct the foundation of information theory. Discover how modern infrastructure acts as an active participant—using flow control, deep packet inspection, and autonomous policy daemons to commodify speed and individual anxiety.
Key Topics Covered in This Episode
Semiconductor Magic & Alchemical Engineering:
A look at the staggering scale of modern transistor technology—compressing a gigabyte of data to the width of a human hair.
Why semiconductor manufacturing in class-1 cleanrooms perfectly maps onto the ancient alchemical "Great Work".
The Origin of the Internet Daemon:
Defining background-oriented, tireless software processes that wait silently for environmental triggers.
How MIT hackers converted Maxwell's imaginary molecular sorting demon into modern server code.
Norbert Wiener & Cybernetic Symbiosis:
Wiener’s core insight that information is the literal negative of entropy.
Bridging the speed mismatch between human thought and computing hardware.
The Interface Message Processor (IMP) & Flow Control:
Inside ARPANET's original design and the eight duties of the internet's first true daemons.
The mechanics of packet-switching algorithms: Leaky Bucket vs. Token Bucket strategies and Hot Potato routing.
The Screaming Chorus of Pandemonium:
Oliver Selfridge's "Pandemonium" architecture where specialized cognitive algorithms shriek upon pattern recognition to control data flow.
The Weaponization and Aesthetics of Lag:
How individualized throttling and loading indicators function as modern sigils of digital manipulation.
Shifting resistance tactics from open accelerationism to closed encryption escalationism.

3,993 Listeners

3,439 Listeners

431 Listeners

9,488 Listeners

1,146 Listeners

5,976 Listeners

1,093 Listeners

623 Listeners

6,355 Listeners

46,368 Listeners

1,834 Listeners

1,374 Listeners

706 Listeners

413 Listeners

192 Listeners

2 Listeners

2 Listeners