1. creatio-ex-materia:

    Juha Arvid Helminen’s Shadow People and Invisible Empire

    (Source: darkasagrave, via infamousaccessories)

     

  2. prostheticknowledge:

    History of Art: Net Art

    Online resource by Thomas Dreher outlining the backround to Net Art from the 1960s onwards, from the design concepts that would make modern computing possible to examples by artists who explored what art could be created by this new technology  - sample quote below:

    In the sixties Joseph Carl Robnett Licklider and Douglas Carl Engelbart conceptualise the interface between humans and computers as a cooperation of several participants using the same “intelligence augmenting tool” 4 for operations with “symbols” 5: to store character strings, to retrieve documents from the memory, to process these data and to store the processed data. 6 A keyboard and an electronic pen or a mouse are the means to process characters presented on a monitor. With these means functions can be easily activated. 7 Computers formerly used as calculators can be used with these forerunners of menus´ icons dominantly to process text and graphics.

    The website is very simple Web 1.0, but an interesting primer on the subject (and is part of a wider History of Computer Art).

    Part One | Part Two | Part Three

     

  3. thisistheverge:

    Outfoxed: how protests forced Mozilla’s CEO to resign in 11 days
    On a rainy morning this week in San Francisco, newly appointed Mozilla CEO Brendan Eich sat down for coffee with one of the people calling for his resignation. Hampton Catlin, a prominent developer of apps for the nascent Firefox OS, announced he was abandoning the platform due to Eich’s handling of the disclosure that in 2008 he donated $1,000 to the fight against same-sex marriage. California’s Proposition 8, which passed with 52 percent of the vote in 2008, made same-sex marriage illegal in California until the law was overturned by the Supreme Court. Over the course of an hour, Catlin explained the suffering that Prop. 8 caused for him and his partner, a Brit who couldn’t immigrate until marriage became legal. Catlin asked Eich for an apology. He didn’t get one.

     

  4. prostheticknowledge:

    Flock

    New Media art installation from 2011 by Bernd Oppl projects surreal gravity-defying activity in a convincing space (which is actually a rotating model) - video embedded below:

    The view is directed to an interior. There is a window, a heater, stairs, which neither lead up- nor down - stairs. You watch a door, which sometimes opens and you notice the empty corners of the room. You don’t see any people. The room seems quiet and still there is movement. There are traces of action, as if the room possessed memory, as if it could remember the ones, which have been gone for a long time with their spirits still being present. Dark shadows, composed of countless pixels, accumulate in the corners, wipe along the walls, seem to escape through the stairs. These pictures are produced by a digital camera. The model of the described room is being rotated around the lens of the camera by a motor. A projector shows the miniaturised room in the size of a real room on a screen. The changing perspective of the camera changes the mood of the projection as well. The atmosphere might remind you of Alfred Hitchcock`s cinematographic panic-rooms. The scary effects in the work of Bernd Oppl focus on movement. Taking a look at the interior reveals a simple reason, watching the screen produ - ces a scary medial effect. Both realities, the virtual and the analog one, fall apart. The weirdness does not dissolve by recognizing the cause. The artist shows the digital translation, the medial leap from the animated model to the moving image and leaves the effect of uncertainness, the observer looses touch with reality. The eye of Bernd Oppl’s camera shows how far human experience stays away from technical perception – and the other way around. (Brigitte Felderer)

    More about the work of Bernd can be found here

    (Source: vimeo.com)

     

  5.  


  6. Google Flu Trends, which launched in 2008, monitors web searches across the US to find terms associated with flu activity such as “cough” or “fever”. It uses those searches to predict up to nine weeks in advance the number of flu-related doctors’ visits that are likely to be made. The system has…

    (via algopop)

     

  7.  

  8. prostheticknowledge:

    NewHive

    Online collage webpage maker and social network with tools to create, share and remix. Whilst similar in concept to to-dot-be, this could emerge as an online magazine tool - video embedded below:

    Our blank canvas empowers you to create amazing content, simply. Drag + drop images, GIFs, text, video, audio, add links, shapes, + embed content. We give you limitless possibilities.

    Above is one example from maxcapacity, extending his Cityscape series featuring parts of the collection as one - if you wish, you could add, extend, or change this to make it your own.

    More about NewHive can be found at their website here

     

  9.  

  10. thisistheverge:

    The internet is fucked
    Here’s a simple truth: the internet has radically changed the world. Over the course of the past 20 years, the idea of networking all the world’s computers has gone from a research science pipe dream to a necessary condition of economic and social development, from government and university labs to kitchen tables and city streets. We are all travelers now, desperate souls searching for a signal to connect us all. It is awesome. And we’re fucking everything up.

     

  11.  

  12. prostheticknowledge:

    RIOT

    In-development indie game is a riot simulator based on real-world events - video embedded below:

    As the economical crisis advances, the discontent of an entire population cannot help but outburst in Riots, where the sounds of many voices get heard at once. The Director Leonard Menchiari has been experiencing this form of protest in person, and the game “RIOT” was born as a way to express it and to tell the stories of these fights. What is that triggers such a strife? What does a cop feel during the conflict? In “Riot”, the player will experience both sides of a fight in which there is no such thing as “victory” or “defeat”.

    The game is due to be released later this year.

    More Here

     

  13. sci-universe:

    Technology at it’s cutest — The Bipedal Cycling Robot

    In 2011, robot creator Masahiko Yamaguchi demonstrated a robot which can balance, steer and correct itself while riding a fixed-gear bike.

    Full video with more information here.

    (via brucesterling)

     

  14. Paul Lansky is an algorithmic composer producing works since the seventies. His Idle Chatter pieces from the Homebrew album employ Linear Predictive Codinggranular synthesis and his own algorithms to produce “a kind of mathematical complexity, there are tons of things going on and you don’t really know what the main voice is.” (Lansky, Interview 97). An ontological study revealed that:

    Lansky considers software writing, or ‘instrument-building’ as he calls it, integral to the composing process, so stopping to code a new feature or algorithm is not considered an interruption to the composing process. Although he provides the applications (Cmix, RT, GQ, EIN) to anyone who wants to use them, via the Princeton Sound Kitchen web site, he considers the algorithms (Cmix scripts) of his to be integral to the composition and does not distribute those. In this way they can be considered as partial scores describing the works or more usually sections of the work and specific timbral manipulations.

     

  15. brucesterling:

    prostheticknowledge:

    DIY Phone Signal Blocking Pouch

    Instructions from the KILLYOURPHONE.COM workshops to create a simple tech privacy-focused pouch for your signal sending device:

    The pouch has a very simple design. Of course you are invited make something more fashionable but this version is very easy to make and it works. Make it any size you want! (Tablet etc) To make it fit most common current smart phones I usually make the pouch 10 x 20 cm. IMPORTANT: What ever you do make sure you fold the material on all sides to make sure the radio waves can’t get through!!

    Tutorial for a 10 x 20 cm pouch:

    1. Cut 12 cm stripes from your roll [HF+LF Shielding] blocking fleece.
    2. Make pieces of 50 x 12 cm, each for one pouch. (i.e. from a 1 m roll stripe you’ll get 2 pieces.)
    3. Fold your 50 x 12 cm piece in length to 25 x 12 cm
    4. Fold again the long sides, each 1 cm and pin them with needles.
    5. Sew two straight seams on the left and right side.
    6. Fold the opening at least 2 times! Find a paper clip or clamp to close the pouch.
    7. Done!

    The project also has a FAQ for doubters … you can check the project’s website with more valuable information here

    *But… but WHY would I want to stick my beloved cellphone into a radiation-proof homemade Faraday sack?

    *Because it’s constantly ratting you out to data-miners whether you touch it or not, that’s why:

    http://www.theverge.com/2014/1/16/5316178/nsas-dishfire-program-said-to-capture-nearly-200m-texts-a-day

    Nearly 200 million text messages a day are being collected from people around the globe by the National Security Agency as part of a secret program called “Dishfire.” That’s according to a new report from The Guardian and the UK’s Channel 4 News service, aided by former NSA contractor Edward Snowden. As part of the program, so-called “untargeted” texts are collected then analyzed by a separate service called “Prefer,” which is capable of pulling together detailed reports for the agency. News of the program comes from an internal NSA presentation dated June 2011, which refers to SMS text messages as “a goldmine to exploit.”

    "A GOLDMINE TO EXPLOIT"

    Some of the information captured by the program includes names, phone numbers, and images, though other seemingly basic alerts offer a closer look at someone’s habits. Three such examples are texts from banks and other services about financial transactions, detailed meeting information from calendar invites, as well as messages from wireless phone carriers that are sent when borders are crossed. The program also kept track of missed calls, passwords, and information about SIM cards….