working with sensors and motors, reading Physical computing : Sensing and controlling the physical world with computers. O’Sullivan, D., & Igoe, T. (2004). Boston, MA: Thomson. interesting quotes about “lost” characters in ASCII table“Another point of confusion stems from the fact that the first 32 entries in the ASII table are control characters, like the “carriage return”( ASCII 13) and “line feed”( ASCII 10), are familiar to you from word processing. Some of them, like “bell”(ASII 7), are left over from the old teletype days. Sending these numbers can cause confusion in environments that can only interpret text characters becaue either nothing shos up, or you get a bunch of garbage characters( square, smiley faces, and other dingbat characters).p142
the machine talks to each other in a foreign language, we gave and forgot about it , they still talk this language< Check the ASCII control characters table from old teletype days>
<Define the Network of artefacts contolled via OSC touch? Network is the Mask, its artefacts are the nodes>
> Explore Steganography, and embedding signal into Wearable Objects,
State Machinesis a programme of activities devoted to the investigation of new relationships between states, citizens and the stateless made possible by emerging technologies. Focussing on how such technologies impact identity and citizenship, digital labour and finance
Every time a smartphone powers up, their user is tied inextricably into data, laws and flowing bytes to different countries. Their every personal expression is framed and mediated by digital platforms which now include those operating new kinds of currencies, financial exchange, and labour relations that bypass corporations and governments.
Meanwhile these same technologies increase governmental powers of surveillance, allow corporations to extract ever more complex working arrangements, and, although seemingly the epitome of globalization, they do little to slow the construction of actual walls along actual borders.
We ask how might the digital subjects of today become active, engaged, and effective digital citizens of tomorrow?
State Machines now launches an open call for a new commissioned artistic project.. What kind of Project ? :
efforts and actions that resist new enclosures and preserve mobilities, freedom of assembly and other hard-won rights
unintended impacts of digital flows on physical bodies, places and infrastructure
shifting techniques for controls and flows of information and finance by governments, private companies and individuals;
public deliberation and free speech in social media – algorithmic and human corruption and its counterforces;
new tools and data for wrangling the personal and political impacts of cloud computing
The call is open to artists, technologists, activists, inventors and individuals, groups and hybrid human- artificial intelligence collaborations.
We are interested in all art forms and actions that can be encountered and experienced across networks, online and in physical exhibition. We welcome diverse viewpoints, experimental and playful approaches.
Fading Memories The social, political and economic future is determined globally by the evolution of digital technologies. The boundaries between the analogue and digital spheres have become increasingly blurred, and the digital has become an integral part of our actual reality.Fading memories devoted a year of international events to the themes of privacy and data ownership in the digital age against the backdrop of developments in the countries of north-western Europe.
What we give away when we log on to a public WiFi networkexperiment of creating a fake network and stealing data from visiting mobile phone in public space.The idea that public WiFi networks are not secure is not exactly news. It is, however, news that can’t be repeated often enough. There are currently more than 1.43 billion smartphone users worldwide Find the latest numbers here and more than 150 million smartphone owners in the U.S. In the U.S., more than 92 million American adults Tablet numbers own a tablet and more than 155 million The US census has numbers. own a laptop. Each year the worldwide demand for more laptops and tablets increases. In 2013, an estimated 206 million tablets and 180 million laptops were sold worldwide. Probably everyone with a portable device has once been connected to a public WiFi network: while having a coffee, on the train, or at a hotel. by Wouter Slotboom
> display the facts, rather than the content of counting smartphones and simulating their behaviour/ connections with K cells?
Objects with flat surfaces can obviously be watermarked in the same way that digital photography and art is watermarked, using either the historic approach or the newer ideas introduced above. Medical packaging, for example, is beginning to be watermarked during printing as a way of providing additional important resources to purchasers. Objects, however, literally offer additional dimensions to consider in watermarking. One additional dimension is that of texture. Signal can be embedded in an object by adding textured patterns or by modifying an object’s natural texture.
This form of watermarking is currently employed to track sensitive or high-value machine parts and to identify containers carrying toxic or hazardous materials. Three-dimensional objects also raise the possibility of encoding signal by arranging artistic elements in space. This possibility raises the same kinds of issues as those brought up by embedding signals in music or painting by careful arrangement of artistic elements. While practical applications do not yet exist, research has been done in watermarking 3D models through modulation of triangle vertices. 13 It can be extrapolated that such modulations would persist through the manufacturing process.”
A catalogue of errors, by David Griffiths and Alex McLean : This article presents a series of informal experiments in software and weaving, most of which were conducted as part of the Weaving Codes, Coding Weaves project.
In relation to my essay proposal about the ”NetWork : the Ultimate Mask “
Find the Poetic Space of the Network , I have the intention is to build up some Knitted cells units. I would like to be able to stitch them together to make either a costume , a quilt , a mask, a 3D sculpture , a sensitive environment, or reactive bodies for puppets…
The cells will have different functions , and different structures . They could store visual memories . They could produce or record sounds, be thermo sensitives. They could produce lights etc…
Combined and stiched together they form a body. Each of this unit has its own functions and life, stich together they form a collective and have a collective behaviour. Individually they have a autonomous behaviour.
Like puppets can do one thing , dancing versus walking, or a mask is expressing one quality ( neutral, clown, buffon ….) each type of K cells have limited functions , either data feed, ligth or sound. their design should reflect this particular feature.
Decide whether together they are stronger or weaker ? amplification process? they can also relate to each other remotely ie not stitch together.
>Build K cells in electronics and transpose into soft e textile
> Build two families KL, knitted light fiber cells .and KA knitted audio fiber cells
Wearable Antennae Speaker FM Transmitter (KA)
Puppetry and mask making process of animating objects
then WA weaved audio cells
combine the two families in a collective structure
“Variables and functions”:
To achieve the design of each family of K cells, I will use ( list to be completed)
mapping technology ( Max/ MSP, Mad Mapper)
generative code to find interesting patterns for each type of cells
knitted and weaving iterations , exploring different techniques ( manual or computarized) and material ( copper, wool, paper, cord…)
we not only talk of the research methods but also consider the logic behind the methods we use in the context of our research study and explain why we are using a particular method or technique and why we are not using others so that research results are capgable of being evaluated either by the researcher himself or by others”