MFA calendar Term 2

Week 1: Project Proposals and Discussion (focus on essay) (HP)

Week 2: 17/01, Project Proposal and Discussion (focus on practice) (LB)

Week 1: Project Proposals and Discussion (focus on essay) (HP)

Week 2: 17/01, Project Proposal and Discussion (focus on practice) (LB)

Week 3: 24/01, Reflective Practice Workshop (HP)

Week 4: No session, Transmediale (Readings and Conference reflections)

Week 5: 7/02, Presentation: Project in pieces – series of mini-projects to realise some of the functionality that you will need. (assessed)  (LB)

Week 6: 14/02, Mapping Research Entanglements Workshop (HP)

Week 7: 21/02 Skeleton Project Presentation and Technical Support Session (LB)

Essay Draft Due: Monday 26th February  (assessed)

Week 8: 28/02, Individual Tutorials (essay feedback) (HP)

Week 9: 7/03, Prototype A  – Presentation for the MA continued development of your project so that it fully realises some of the features which you previously sketched out.(assessed) (LB)

Week 10: 14/03, Prototype B and Technical Support Session (LB)

Final Essay Draft Due: 19/03/2018 (assessed)

Week 11: 21/03, Individual Tutorials (essay feedback).

Prototype C – Work in Progress Showing – mid – late May (assessed)

FINAL Essay Hand-in: 07/05/2018

 

Network characterization

01/29/2018

working with sensors and motors, reading Physical computing : Sensing and controlling the physical world with computers. O’Sullivan, D., & Igoe, T. (2004). Boston, MA: Thomson. interesting quotes about “lost” characters in ASCII table “Another point of confusion stems from the fact that the first 32 entries in the ASII table are control characters, like the “carriage return”( ASCII 13) and “line feed”( ASCII 10), are familiar to you from word processing. Some of them, like “bell”(ASII 7), are left over from the old teletype days. Sending these numbers can cause confusion in environments that can only interpret text characters becaue either nothing shos up, or you get a bunch of garbage characters( square, smiley faces, and other dingbat characters).p142

the machine talks to each other in a foreign language, we gave and forgot about it , they still talk this language< Check the ASCII control characters table from old teletype days>

01/28/2018

<Define the Network of artefacts contolled via OSC touch?  Network is the Mask, its artefacts are the nodes>

network desire onto us- through its material affordances, AfNet

 

http://www.lozano-hemmer.com/projects.php

Jane Prophet and Helen Pritchard , Entanglement of Ubicomp apps in Urban South East Asia as possibility to create your own creatures on the web, entangled making between humans and non humans

Ken Rinaldo

Jessica Field Semiotic Investigation into Cybernetic Behaviour, 

Puppetry articles and readings

Kenneth Gross : Puppet: An Essay on Uncanny Life Paperback – University of Chicago -16 Oct 2012

https://www.rochester.edu/pr/Review/V74N5/pdf/0304_inrev_puppets.pdf

http://scholarship.claremont.edu/cgi/viewcontent.cgi?article=1050&context=mimejournal

Aesthetics of the Puppet – European Romanticism to the Avant-Garde

“Priority given to the visual and to sound is essential for all forms deriving from the art of the puppet.”

Myth of the Puppet – A Western Perspective

 

Digital flows

Network -Hide

01/25/2018

> Explore Steganography,  and embedding signal into Wearable Objects,

01/20/2018

State Machines is a programme of activities devoted to the investigation of new relationships between states, citizens and the stateless made possible by emerging technologies. Focussing on how such technologies impact identity and citizenship, digital labour and finance

Every time a smartphone powers up, their user is tied inextricably into data, laws and flowing bytes to different countries. Their every personal expression is framed and mediated by digital platforms which now include those operating new kinds of currencies, financial exchange, and labour relations that bypass corporations and governments.

Meanwhile these same technologies increase governmental powers of surveillance, allow corporations to extract ever more complex working arrangements, and, although seemingly the epitome of globalization, they do little to slow the construction of actual walls along actual borders.

We ask how might the digital subjects of today become active, engaged, and effective digital citizens of tomorrow?

State Machines now launches an open call for a new commissioned artistic project.. What kind of Project ? :

  • efforts and actions that resist new enclosures and preserve mobilities, freedom of assembly and other hard-won rights
  • unintended impacts of digital flows on physical bodies, places and infrastructure
  • shifting techniques for controls and flows of information and finance by governments, private companies and individuals;
  • public deliberation and free speech in social media – algorithmic and human corruption and its counterforces;
  • new tools and data for wrangling the personal and political impacts of cloud computing

The call is open to artists, technologists, activists, inventors and individuals, groups and hybrid human- artificial intelligence collaborations.

We are interested in all art forms and actions that can be encountered and experienced across networks, online and in physical exhibition. We welcome diverse viewpoints, experimental and playful approaches.

Fading Memories The social, political and economic future is determined globally by the evolution of digital technologies. The boundaries between the analogue and digital spheres have become increasingly blurred, and the digital has become an integral part of our actual reality. Fading memories devoted a year of international events to the themes of privacy and data ownership in the digital age against the backdrop of developments in the countries of north-western Europe.

 

What we give away when we log on to a public WiFi network experiment of creating a fake network and stealing data from visiting mobile phone in public space.The idea that public WiFi networks are not secure is not exactly news. It is, however, news that can’t be repeated often enough. There are currently more than 1.43 billion smartphone users worldwide and more than 150 million smartphone owners in the U.S. In the U.S., more than 92 million American adults own a tablet and more than 155 million The US census has numbers. own a laptop. Each year the worldwide demand for more laptops and tablets increases. In 2013, an estimated 206 million tablets and 180 million laptops were sold worldwide. Probably everyone with a portable device has once been connected to a public WiFi network: while having a coffee, on the train, or at a hotel. by Wouter Slotboom

> display the facts, rather than the content of counting smartphones and simulating their behaviour/ connections with K cells?

invisible-internet-of-things

Vladan Joler -ShareLab

Exploitation Forensics. Interview with Vladan Joler

The Human Fabric of the Facebook Pyramid

Embedding signal in objects

01/30/2018
soft electronics, embedded in fabric
 
01/25/2018
 

“The marks often were created by a wire sewn onto the paper mold.” and invisible to naked eye

Ref to Steganography

 

01/17/2018 > hidden life of objects in the Ubiquitous Computing ! Network -Hide

Signal Rich Art:Enabling the vision of Ubiquitous Computing

” Sculpture and Other Objects

Objects with flat surfaces can obviously be watermarked in the same way that digital photography and art is watermarked, using either the historic approach or the newer ideas introduced above. Medical packaging, for example, is beginning to be watermarked during printing as a way of providing additional important resources to purchasers. Objects, however, literally offer additional dimensions to consider in watermarking. One additional dimension is that of texture. Signal can be embedded in an object by adding textured patterns or by modifying an object’s natural texture.
This form of watermarking is currently employed to track sensitive or high-value machine parts and to identify containers carrying toxic or hazardous materials. Three-dimensional objects also raise the possibility of encoding signal by arranging artistic elements in space. This possibility raises the same kinds of issues as those brought up by embedding signals in music or painting by careful arrangement of artistic elements. While practical applications do not yet exist, research has been done in watermarking 3D models through modulation of triangle vertices. 13 It can be extrapolated that such modulations would persist through the manufacturing process.”
 

Textility of Code

FoAM . Collective looking into Weaving and Coding

A catalogue of errors, by David Griffiths and Alex McLean : This article presents a series of informal experiments in software and weaving, most of which were conducted as part of the Weaving Codes, Coding Weaves project.

FoAM github   Weaving experiment

 

K- cells-Knitted cells – MFA year 2 practical project

 

 

01/25/2018

the cells, could functions as kinetic drawing bots:

01/10/2018

 In relation to my essay proposal about the  ”NetWork : the Ultimate Mask “
Find the Poetic Space of the Network , I have the intention is to build up some Knitted cells units.  I would like to be able to stitch them together to make either a costume , a quilt , a mask,  a 3D sculpture  , a sensitive environment, or reactive bodies for puppets…

“Rules” :

  • The cells will have different functions , and different structures . They could store visual memories . They could produce or record sounds, be thermo sensitives.  They could produce lights etc…
  • Combined and stiched together they form a body. Each of this unit has its own functions and life, stich together they form a collective and have a collective behaviour. Individually they have a autonomous behaviour.
  • Like puppets can do one thing , dancing versus walking, or a mask is expressing one quality ( neutral, clown, buffon ….)  each type of K cells have limited functions , either data feed, ligth or sound. their design should reflect this particular feature.
  • Decide whether together they are stronger or weaker ? amplification process? they can also relate to each other remotely ie not stitch together.

Strategy

  • >Build K cells in electronics and transpose into soft e textile
  • > Build two families KL, knitted light fiber cells .and KA knitted audio fiber cells

    • Wearable Antennae Speaker FM Transmitter (KA)
  •  Puppetry and mask making process of animating objects
  • then WA weaved audio cells
  • combine the two families in a collective structure
    yep
    Birdy, found objects puppet by theatredu1k
Mona Luison
credit : Mona Louison

“Variables and functions”:

To achieve the design of each family of K cells,  I will use ( list to be completed)

  • mapping technology ( Max/ MSP, Mad Mapper)
  • generative code to find interesting patterns for each type of cells
generative sin pattern in Processing by SRQ
 

Luce - Lucette & Lulu

Essay planning

Notes from Helen Pritchard 15th december

  • –  Invasion of the body by the network
  • –  Exploitation of the body of the network
  • –  performativity of the network
  • –  Relations of power
  • –  Which side of the string are you – is there a side in entanglements?
  • –  Automation
  • –  Entanglement – Karen Barad
  • –  Body and Society Journal
  • –  Technology, Culture and Society Journal
  • –  Off the Network – https://www.upress.umn.edu/book-division/books/off-the-network

 

–       Anna Munster’s work
–       Erin Manning’s work on relationscapes

Research Methodology

 

 C.R. KOTHARI,  Research methodology and technics ,2004, NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS

“Thus, when we talk of research methodology
we not only talk of the research methods but also consider the logic behind the methods we use in the context of our research study and explain why we are using a particular method or technique and why we are not using others so that research results are capgable of being evaluated either by the researcher himself or by others”