Professional Documents
Culture Documents
Almond, Richard - From Mnemonics and Digital Decay
Almond, Richard - From Mnemonics and Digital Decay
MNEMONICS
AND DIGITAL
DECAY
An Exploration of ‘Memory’ and ‘Decay’ as Metaphors
Enforced upon our Virtual Realm
Richard Almond
MA (Architecture + Digital Media)
University of Westminster, London
August 2009
Thank you to Richard Difford
for his invaluable support and
advice, to Antonio Passaro for
making my installation possible,
to Mark McCormick for his
help in putting this report
together, to my parents for
allowing me this opportunity,
and to Lola for putting up with
me spending the past year glued
to my computer.
Contents
Metaphor and Analogy in the Digital Realm — 10
The Art of Memory in the Age of Mechanical Reproduction — 17
The Paradox of Preservation — 24
404 File Not Found and the Digital Chernobyl — 32
Extracting a Beauty from the Blue Screen of Death — 44
Exploring the Glitch — 56
Introducing Automation — 70
Destroying the Digital City — 86
The Datamosh — 98
MaxMsp/Processing - Introducing Interactivity — 110
The Installation — 128
Embracing the ‘Digital Natural’ — 182
Bibliography — 188
Further Reading — 192
Introduction
1 an inextricable relationship.
Without memory, it is
questionable as to whether
decay exists, as there would be
no recollection of the existence
of an object in any other form
than its current. Without decay,
can memory exist? If nothing
ever changes then one can never
have a record of something in a
previous state.
1.A
1.B Memory is the metaphor most It is imperative that we begin to
1.B
Smashed Mac,
courtesy of Jessica
Elgin
and learnings, however with the a rogue Trojan horse (yet another (http://tr.im/xobQ)
rapid shift of our culture into the metaphor).
digital realm, asking a teenager
to consider the word ‘memory’
would likely turn their thoughts
to a hard drive as much as it
would to a past event they had
experienced. Such is the power
and pertinence of this metaphor.
2.2
Yates, The Art of
Memory, — page
gods. A little later a message was which is to be remembered in memories are very dissimilar. be copied identically. The original 22-23
sent to Simonides telling him each room. Later, for instance somewhat began to loose its
that two young men were waiting when delivering a speech, the Human memory is poetic, it is importance. Relating this idea 2.3
Benjamin, Walter,
outside to speak to him. Upon individual takes a mental journey nostalgic and entropic. Patches to the concept of memory, the The Work of
leaving the banquet, Simonides through this locus, demanding come, patches go, we forget both computer now acts like the Art in the Age
could find no one, but during his from each room what he has intentionally and unintentionally printing press, making exact of Mechanical
Reproduction, 1935
absence, the roof of the building mentally stored there. The and we often are unable to erase duplicates of data, each identical — page 2-3
collapsed, crushing everyone images placed in each room must an unwanted memory. Over to the very first, whilst human (http://tr.im/xm97)
inside to their deaths. The bodies be as explicit and powerful as time our memories are altered, memory is an analogy for the
2.A
were so heavily mangled that possible. Scenes that shock are they develop with the individual, manual replication of data.
The Memory
the relatives could not tell them most likely to be remembered, they become amplified and Just as a master painter trains Theatre of Giulio
apart, but Simonides was able and so relating an image to, even fabricated. Each individual his pupil by having him copy Camillo based on
to remember every single guest say, a scene of bloody battle memorizes an event in his or his paintings, one individual L’Idea del Theatro,
from Yate’s The Art
from the position at which they works particularly well. Cicero her own, often very different passes on a memory to another of Memory
were seated around the table. defined two types of memory, way. Digital memory is the by means of articulating this
The twin gods had paid their not memory as in the style of polar opposite. It is clean and memory verbally. In each case, 2.B
Brain Scan, courtesy
share handsomely. Simonides memorizing, but memory as in pristine, it is simple in its binary the replication will never be of Liz Henry
realized how essential orderly the material that needs to be form. It is a series of 1’s and 0’s identical. The copied painting (http://tr.im/xocF)
arrangement was for a good memorised. He defined the first which either exists or does not. will have minor differences
memory. as the memory of ‘things’, and the Digital memory can be copied, from the original, although 2.C
Harddrive, courtesy
second the memory of ‘words’. replicated and backed up, time these will not necessarily result of Ace0fClub5
This association of memory Both ‘things’ and ‘words’ could after time, each version as perfect in the copy being worse, and (http://tr.im/xod3)
with physical space became be memorised using the spatial as the very first. likewise the individual to which
2.D
imperative, and techniques association techniques. 2.2 the memory has been passed Type Press, via
were established to allow one There are undeniable associations onto will have a somewhat Wikipedia
to memorize vast amounts by to be mentioned at this point different understanding of it (http://tr.im/xodp)
mentally placing images in with Walter Benjamin’s The Work to the individual who initially
physical spaces. The artificial of Art in the Age of Mechanical experienced it, having to use
memory the unknown teacher Reproduction. Benjamin talks their imagination to replicate the
refers to consists of images and of how prior to the age of described events mentally.
2.C
3.2
Guggenheim Museum. longer if they were stored in One notable method of error differences between memory in Sterling, Bruce,
environmentally controlled boxes, detection in digital data is the the human sense and memory in Digital Decay, 2001
This seems to be one of the but what would the point in their parity bit, an optional additional the digital sense. Physical decay — page 21
(http://tr.im/xmaC)
first formal documentations of existence be if the public could parameter incorporated into a is slow but certain, it is expected
‘digital decay’ being considered, not view them? binary character to determine and often encouraged. Like 3.3
and proves to be a somewhat whether the remote device has human memory, it is nostalgic Sterling, Bruce,
Digital Decay, 2001
worrying chain of thoughts. “The final painful paradox lies in correctly received transmitted and entropic. Conversely, the — page 14
Sterling talks of the epic shift harming what we save, as we try data. Depending on the type decay of digital data is sudden
towards the digitisation of our to save it. Preservation is itself of the parity bit, either a 1 or and abrupt. Like its binary 3.4
IBM, Parity Bits,
civilisation and its associated, but a source of hazard. We dropped a 0 will be added to the binary polarity, it either works or it does
2008
generally ignored concerns. the precious china while we were chain in order to make the not.
dusting it. We tripped and split total number of 1s either odd 3.A
This common perception that the old painting frame. We tried or even. For example if the Data Dump,
Courtesy of Seth
our data is safe as long as we to fix that old book with tape and letter ‘a’ (binary 1100001) is Anderson
have a digital back up of it is rubber cement. Entropy requires transmitted with even parity, the (http://tr.im/xofy)
dangerous. He suggests it is not no maintenance. Entropy has parity bit would read ‘1’, making
3.B
the material we must preserve, its own poetry: it’s all about a total number of four 1s, an Shattered Vases,
but the immaterial. Our CDs, delamination, disintegration, even number. If the chain were Courtesy of Nathan
hard-drives and shiny new iMacs deterioration, degeneration, mistakenly received as 1000001, Osborn
will eventually fall to pieces, but decomposition, and doddering yet the parity bit read 1, the (http://tr.im/xolr)
it is the pure binary data that we decline.” 3.3 system would read an error, as
strive to maintain, the 1s and 0s. the total amount of 1s would be
It is easy to back up this data, but Whereas we develop complex 3, an odd total. The key difference
the danger is the advancing pace and incredibly expensive here is that parity is an error
of technology itself. File formats methods to preserve our physical detection system, and not an
become obsolete, components media, we have relatively simple error prevention system, or even
become incompatible, and methods of protecting our digital an error correction system. 3.4
data becomes unreadable. The data. Paintings and ancient texts
computer becomes “an emulator are stored in environmentally But maybe the unexpected
of an emulator’s emulator”. 3.2 controlled boxes to ensure software glitches are a metaphor
4.2
Wein, The
Fleetingness of
perception, filtering, reduction Bits — Fear of
Wein talks about the vast amount and evaluation. And forgetting Information Loss
of digital storage space humanity is vital too, otherwise we
fills each year — the Library would decline in our ability 4.3
Wein, The
of Congress alone preserves to retain information. These Fleetingness of Bits
around 3,000 TB (3 Pentabytes) functions, as of yet, cannot be (home page)
of collected human knowledge efficiently emulated by computer
4.4
(in the year 1998). In 1998, the technologies.” (Wein)4.5 Wein, The
digital information humanity Fleetingness of
was producing each year was Wein suggests that in an age Bits — Traditional
less than the total amount of when it is so easy to store Information
4.C
Pripyat Cultural
Centre, courtesy of
days. The Internet’s data is comparison between the digital pennyjb
continuously removed and decay/memory and its physical/ (http://tr.im/xohm)
replaced, in tandem with new human equivalence—
information being added. 4.D
Pripyat Sports
“Now they are lying there: Equipment,
The Internet is indeed a relevant virtual ruins in the global courtesy of pennyjb
example to consider when network, being forgotten until (http://tr.im/xohq)
thinking of digital decay. Wein they disappear one day without 4.E
explains how “The World Wide a trace, fallen out of conscience Pripyat Dodgem
Web is like a huge labyrinth, of the transient memory of the Cars, courtesy of
where routes leading once to global brain.” 4.11 pennyjb
(http://tr.im/xoho)
something now can disappear
4.D
4.E
and sometimes end in the dead
end “404 File Not Found”... This
message is always an annoyance
to the user but functions as a
last hint that there had been
something existing before. These
documents are some of the few
trails the online world carries in
itself.” 4.8
4.13 — 4.15
Wein, The
Fleetingness of
Bits — Digital
“Within the context of a On the one hand these thoughts Information is
webpage which naturally is have a striking similarity— one What if there was a way of Transient
also made up of bits and bytes, could compare digital data to incorporating some of this
a poetic documentation of the human memory, compare the entropic nature of the human
digital decay in and about our hard disk to the brain. Just as memory into the digital world?
culture is presented.” 4.12 digital data becomes obsolete What if a digital image taken a
if its format is not transferred decade ago and left in a rarely
Wein quotes Andy Grove— as technology advances, so do opened archive file was not quite
“digital information is forever. It the old man’s memories if he as pristine as the day it was
doesn’t deteriorate and requires does not share them with others taken? What if a story written as
little in the way of material before he dies. If he does not tell a Word file became warped over
media”. 4.13 his stories, they die with him. time— parts became lost, altered,
If digital data isn’t backed up dramatized?
This is perfectly true. We know or transferred, it dies with the
digital information ultimately computer. Wein compares modern, digital
consists of binary ones and media storage with the more
zeros, and these ones and zeros The discrepancy lies with the traditional forms of storage such
themselves cannot decay or contrasting natures of digital as parchment and stone tablature
degrade. This, however, does not data and human memory. Binary carvings. Whereas optical storage
mean the data that they create information exists in its original media will last a maximum of
cannot be lost. If the means state up until the point at which 100 years (more usually only
to store the data suffers from the means to store or read it 4), the Rosetta Stone has lasted
physical decay, if a hard disk is breaks down. At that point the millenniums. She talks of the
broken, if a file format becomes data effectively ceases to exist. difficulty of detecting physical
obsolete, then the data becomes Its nature is polar in more than decay within digital storage
useless. Wein goes on to compare one sense. The human memory media, which leads ultimately to
this thought to that of human is different. It breaks down over the data being lost, and ability
memory— time, parts are forgotten, lost of a single faulty bit to corrupt a
forever, other parts are created whole file. 4.15
to compensate. Stories become
4.17
Wein, Melanie,
Personal Portfolio
and time consuming this very nature, it will only become Website, 2005
conversion is. According to more and more pertinent with (http://tr.im/xqnU)
Wein’s research, it would take age. When links start breaking
NASA around 4 years to transfer and decaying, the site will 4.F
Rosetta Stone,
all of the data they store to the become one of the “forgotten courtesy of jj_mac
new generation of digital media and deserted” web pages Wein (http://tr.im/xojh)
storage format. The life span of talks of. Wein’s own portfolio
these new carriers however is page has not been updated for 4
only guaranteed for up to 6 years, years.4.17 Has she become a victim
so NASA would immediately of her own concerns? Or was this
have to begin transferring their all part of her plan?
data to the next generation of
storage media upon completion.
On top of all this is the
incredible amount of new data
that is added to the archives each
year. 4.16
5.2, 5.3
Ohlmann, Andrew,
The Eventual Death
of the Super Mario
Brothers, 2007
somewhat controlled, enforced decay it in some fashion.” 5.3 (http://tr.im/xmeH)
digital decay. Glitching in this
respect is taking a piece of A very different method that 5.A
digital data, such as an image, produces similar effects to The Glitch
Dilemma, Self-
video or audio clip, opening its glitching is ‘circuit bending’. This Portrait, Rosa
HEX or ASCII source code could be considered the physical Menkman
in a text editing program, and equivalence of decaying the (http://tr.im/xolb)
actively decaying it in some code of a game. Here the actual 5.B
fashion before re-saving the file hardware of the games console is Screenshots from
and opening the result with the tampered with, wires are moved, The Eventual
intended piece of software for connections are purposefully Death of the Super
Mario Brothers
the file type. short-circuited, etc. Visually the
results are somewhat similar to
Ohlmann has done some with code glitching, however in
fascinating work with old the case of circuit bending, the
computer games, and in decay becomes user-controllable
particular with Super Mario in live-time, almost like another
Brothers. His post, entitled joy pad with which to operate
The Eventual Decay of the the game, glitching at will.
Super Mario Brothers 5.2 on The beauty is that almost any
the intensely inspiring Space electrical device can be circuit
Collective looks into the bent to an extent. From a
glitching of the game. The game‘s Gameboy to a keyboard to a
source is tampered with, re-saved Furby.
and ran through an emulator.
5.5
Menkman, The
Glitch Dilemma,
absorbing chains of thought. negative experiences, Rosa 2009 (http://tr.im/
This is effectively de-generative emphasizes their positive xomR)
design. consequences”. 5.4
5.C
Various work from
Mario being able to walk Menkman entirely embraces the Menkman’s Digital
through walls is particularly glitch as an art form. Her interest Artifacts collection
pertinent, a simple alteration lies in reducing digital media (http://tr.im/xomp)
of a code can result in a surface down to its very basic visual 5.D
being permeable, loosing all form, the pixel, and in decaying Extraboy-
of its physical connotations it in some fashion. Most of Megatronika,
and becoming a purely visual Menkman’s work involves active Menkman
(http://tr.im/xoni)
stimulus. Imagine a wall that destruction of digital data by the
is not actually there. The artist, and she does consider the
room is a desirable volume, difference between the Glitching
we crave enclosed space, we that she creates intentionally, and
feel sheltered, but could a that which we can never predict
surface be purely visual, open or prevent:
to adaptation, transformation
and penetration? The idea “How can we explain the glitch
of a space that is entirely as an unexpected, abnormal
transformable is not new, but the mode of operandi, when the
idea of the unpredictability and artists working process and more
entropic nature of decay in this importantly, what the artist
transformation is certainly little aimed for was abnormal in the
explored. first place? In other words, can
an intended error be erroneous?”
Another who adheres to a similar 5.5
6.A
JPEG image
glitched through
code manipulation
manipulation tends to be the A TIFF is also structured as a 6.B
vertical shifting of thin rows sequence of 8-bit bytes, however JPEG source code
of pixels, whereas with TIFFs, these bytes are numbered from 0
effects are more commonly the to N. A TIFF file begins with an 6.C
JPEG in the early
shifting of large blocks of pixels Image File Header which points stages of decay
in all directions. Each file format to an Image File Directory. The
has a clear character, almost a Image File Directory is where 6.D
Common error
willingness or a resistance to information about the image messages during the
being glitched. This prompted is stored, such as Meta data, code manipulation
some further research into the and points to the actual image process
structure behind the source code data. The Image File Header
of various image formats. consists of two bytes that define
the byte order to be used in the
A JPEG is structured in a file. This can be either II (called
sequence of segments. Each little-endian, ordering bytes
of these segments contains a from least significant to most
series of bytes, the first of which significant), or MM (called big-
is a ‘marker’ byte beginning endian, ordering bytes from most
with ‘0xFF’, followed by a byte significant to least significant).
which indicates the type of This is followed by the number
6.B 6.C marker. Often these two bytes 42 which fills the next two bytes
are followed by a further two and identifies the file as a TIFF,
that indicate the length of the then the offset of the first Image
stored data which relates to the File Directory which fills the
marker. For example, the bytes final four bytes. The Image File
‘0xFFd8’ indicate the start of Directory consists of a 2-byte
an image, and ‘0xFFDA’ trigger value indicating the number of
a top-to-bottom scan of the fields in the directory, followed
image. Most commonly, the by a sequence of 12 one-byte
6.D process of encoding a JPEG field entries, and a further 4
is done with ‘JFIF’ encoding. bytes which act as an offset for
Page 60 | Exploring the Glitch
6.2
the next Image File Directory. and Cr components represent A TIFF is organized as a The strip system may also be an
The first 2 bytes of an Image
File Directory is the tag that
identifies the field and gives the
TIFF its name (Tagged Image
File Format). The 3rd and 4th
the red and blue chrominance.
Variations in brightness are
more perceivable to the human
eye than variations in colour,
and JPEG compression takes
Adobe Developers
Association, TIFF
Revision 6.0, 1992
(http://tr.im/xqAf )
6 rectangular array of pixels, the
dimensions of which are stored
in the file as ImageLength and
ImageWidth. ImageLength
defines the number of rows in
explanation for why bands of
pixels tend to loop around the
image when the corresponding
code is shifted. For example,
adding a chunk of code before
bytes indicate the field type, the advantage of this fact. Much the image, often described as the start of a strip may result in
next 4 bytes indicate the number of the resulting code is given scanlines, and ImageWidth that strip now beginning in the
of values for the specified type, over to removing colours which specifies the number of columns centre of the image, which would
and the final 4 bytes act as the show only a small difference in in the image, the number of result in it also terminating in
value offset which points to the value between its neighbouring pixels per scanline. To increase the centre of the image, on the
next piece of data to be read in colour, and this is possibly why editing flexibility, a TIFF is often next strip below. Pushing pixels
the image. 6.2 when manipulating this code further broken into strips, and a across the image boundary
we quickly see streaks of pixels RowsPerStrip variable is given. results in their reappearance
Some of these contrasting who’s hues have been shifted. This seems to thoroughly explain at the beginning of the strip
properties in the structuring of Upon retrospective examination, the nature with which a TIFF immediately beneath.
JPEGs and TIFFs have been these bands are 8 pixels in becomes decayed as its code is
revealed during experimentation height, which further suggests glitched.
with image glitching. The that the 8x8 byte sub-images
nature of a JPEG’s source code are arranged in horizontal rows, In contrast to the JPEG, the
is modular and somewhat and that the tags containing the TIFF retains much of its
autonomous, it is divided into colour information is specific to legibility as it is being decayed.
blocks of 8x8 bytes which display each of those rows. JPEGs also Like a jigsaw which is being
as a 64-pixel sub-image. These use ‘padding’ to recreate bytes rearranged, one can still make
sub-images have no specified which may have been removed out the component parts,
connection to each other, and during the compression process. although they may have been
therefore the manipulation of This technique helps prevent moved significantly from where
the code tends to have a rapidly the resulting image from being they originally were. The strip
destructive influence on the corrupt and unreadable and may system is most prominent in the
overall legibility of the image. explain why when shifting blocks examples shown. Since each byte
As part of the JFIF encoding of code during the glitching contains an embedded link to
process of a JPEG, the colour process there would appear grey the next byte, shifting a single
profile of the original image pixels at the edges of the image. byte results in the shifting of
is converted from RGB to It was in fact true that the JPEG the rest of the bytes within that
yCbCr, where Y relates to the format was far sturdier than a strip, resulting in thick bands of
brightness of a pixel, and the Cb TIFF, withstanding a far greater pixels retaining their structure.
level of glitching.
Page 62 | Exploring the Glitch
The stages of decay of a JPEG during
progressive code manipulation. The code
structure is clearly evident, and is highlighted
by the adjacent diagram. (http://tr.im/xqAB)
GlitchMonkey8.1 is a plug-in
script for Firefox web browser
which scrambles the images of
a web page whilst the user is
viewing it, and Glitch Browser8.2
is a Google-esque site into
which one pastes a URL which
is then scrambled. Another site
is CORRUPTTM 8.3, a project
using Processing8.4 to randomly
manipulate the code of an
image uploaded by a user, before
saving a series of iterations onto
its homepage. Each of these
examples possesses an amount of
automation, and one cannot help
but wonder what would happen
if they were used collectively. The
first experiment was to attempt
to have the Glitch Browser glitch
itself by pasting into it its own
URL.
8.2
Glitch Browser,
2005-2009
glitches provoked by the glitch leaves one struggling to relate the (Concluded), created
browser and displayed through slow, entropic, and progressive by Dimitre Lima,
our forgiving and unsuspecting decay of the physical world into Iman Moradi & Ant
web browsers.” 8.5 the digital realm, and hints at Scott
an aspect of truth in Sterling’s 8.3
Frustratingly, the Glitch thoughts. CORRUPT TM,
Browser could glitch, but not be 2006, created
by Benjamin
glitched itself. Each glitching Gaulon, aka
generates a URL containing the RECYCLISMTM
decayed webpage, and the next
experimentation was to paste 8.4
Processing, a
this URL back into the Glitch programming
8.C Browser. The subsequent results language, open-
were different to the originally source development
environment, and
glitched page, but not glitched online community
to a higher degree. The process first developed
would glitch every image only in 2001 by Ben
Fry and Casey
once, in a random fashion. Reas. It operates
as an electronic
Some increasingly complex sketchbook for
experimentation was done developing ideas in
visual computing.
with all three of the web-based
glitching programs. The prospect 8.5
of putting a web page through Excerpt from the
Glitch Browser
the Glitch Browser before taking home page
a screen shot of the result and
loading it into CORRUPT, all 8.A
with the GlitchMonkey script Detail from a Flickr
page ran through
running in the background was Glitch Browser
very exciting, but unfortunately
8
8.J Flickr page ran 8.L
through Glitch
Browser
8.C
Pasting URLs of
glitched pages back
into Glitch Browser
8.E
Ebay home page
with GlitchMonkey
script running
8.F
BBC home page
with GlitchMonkey
script running
8.G
Webpage destroyed
via Glitch Browser
8.H
Google home page
with GlitchMonkey
script running
8.I
Image glitching via
CORRUPT TM
8.J
Applying
GlitchMonkey to
CORRUPT TM
8.K
Flickr page with
GlitchMonkey
running
8.L
8.K uploaded to
Flickr and resultant
page viewed with
GlitchMonkey
running
Page 92 | Destroying the Digital City
SECTION NINE
The Datamosh
As a psychedelic vortex of melting pixels, datamoshing acts
as a pertinent vehicle for the exploration of the boundaries
between memory/decay in the human/physical sense and
that in the digital sense
9
9.C Tintori, Ray, How
9.D
I-frames can be removed, to Datamosh, 2009
resulting in the pixels from the (http://tr.im/xlU8)
final frame of one scene moving 9.2
to the P-frame data of the next Murata, Takeshi,
scene. The technique emerged Monster Movie and
Untitled (Pink Dot),
as an art form fairly recently, 2005
and although it is difficult to
pinpoint a specific inventor, 9.3
Takeshi Murata is a key pioneer. Tintori, Ray,
personal portfolio
In his work Monster Movie and website
Untitled (Pink Dot)9.2, Murata (http://tr.im/xlWi)
uses 80’s movies as moshing
9.4
material. Tintori, Ray, music
video for band
Murata is often cited as a huge Chairlift, 2009
influence by those working with (http://tr.im/xlVV)
10.E 10.F
10.G 10.H
10.I
Experimentation
with the Mean
prior coding knowledge. The disappointingly subtle, but in Patch for MaxMSP
advantage of MaxMSP is glimpses, hinted at something (http://tr.im/xqG9)
that it is a modular graphical exciting.
development software 10.J
Experimentation
which allows the creation of with the Debris
interactive environments via an Patch for MaxMSP
intuitive, visual method. (http://tr.im/xqG9)
10.K
An API allows third-party Combining the
developers to create objects Mean and Debris
which can be pieced together MaxMSP patches
(http://tr.im/xqG9)
to create custom patches. Jitter
is the component of MaxMSP
which deals with visual effects,
and the Mean patch proved to
be an interesting study of the
relationship between digital
and human memory. This patch
calculates the mean matrix value
of the pixels it records over time.
10.L
Experimentation
experimentation was done with with the Mean
the HSFlow patch, adjusting and Patch for MaxMSP
adapting settings to achieve a
range of destructive effects from 10.M — 10.O
Experimentation
the very subtle to the completely with Andrew
abstract. Benson’s HSFlow
patch for MaxMSP
(http://tr.im/xqG9)
10.N 10.O
Page 120 | MaxMSP/Processing - Introducing Interactivity
SECTION ELEVEN
Installation
Research and experimentation culminated in an interactive
installation which people were encouraged to visit and
engage with
11 REALISATION
The project manifests itself in a
physical, interactive installation
which explores digital memory
and decay. The key aspects of
the project - decay, memory
and metaphor all speak of
inclusion and humanity as
much as they do of the digital
realm. Memories bring people
together, decay can pull them
apart, and metaphor is the
perfect tool for communication.
The project needed something
people could explore, visit and
engage in.
11.A
sq ft former construction hall of a camera-projector live feed. Early projection
of the University’s School The camera, fixed high above experimentation
of Engineering. Build in the a suspended screen, sent a live (http://tr.im/xpWT)
1960’s, its dramatic scale led to feed of the space to the projector,
11.B
its use as a testing centre for which rear-projected the Image from P3
sections of the Channel Tunnel results onto the screen. Visitors Ambika Exhibitions
and Spaghetti Junction, and were encouraged to visit the website
(http://tr.im/xlYB)
although now an exciting venue installation and saw themselves
for artistic installations and projected in real time. Over
exhibitions, it retains much of the course of the installation,
the paraphernalia of its industrial this live feed was progressively
past. decayed in a manner similar in
appearance to the data moshing
The storage room was awash with effect. Initial results were very
patches of flaking paint, cracked subtle, certain colours within the
concrete and damp plasterboard, feed becoming glitched. Soon
and some initial experimentation the movement of visitors began
was enjoyed with the projection to draw a trail of colour across
of some of the early glitched the screen, before the projection
images across the various eventually culminated in a
surfaces. Essentially, digital surreal, psychedelic, blur of pixels
decay was being projected onto which was almost unrecognizable
physical decay, and what began as from its initial stages. The visitor
a simple exercise to calibrate the input becomes progressively
projection equipment resulted in abstract as the feed is decayed.
the generation of some incredibly What is initially a digital mirror
interesting results. Particularly becomes a canvas, an interactive
pertinent were the instances piece of digital artwork of which
in which it became almost the visitor simply manipulates
impossible to decipher whether the pixels.
11.E
Testing the
MaxMSP patch
recalled randomly throughout
the duration of the installation
and overlaid into the live feed
at progressively more frequent
intervals. Visitors began to
share the space with its previous
occupants, even with previous,
lesser-decayed versions of
themselves.
11.C 11.D
11.F
Isometric diagram of
installation
The proposal is that users may feedback loops begin to be (http://tr.im/xpYV)
submit their memories of the generated, and with the web page
site to the installation, via the acting as a hub for the transition 11.G, 11.H
Internet, in the form of images, of digital data back and forth, Plans explaining
installation
video and audio files. Most becoming progressively more operation
likely these memories, digital in decayed and glitched. A further (http://tr.im/xpYV)
medium but human in origin, level of complexity is likely to
would come from a past time be introduced in the form of
when the site was not in such mobile Internet devices. Visitors
a state of decay. This would who take photographs of the
further reinforce the relationship installation on their mobile
between the installation and the phones could submit these
site in which it is located. to the same decaying feed as
those who are submitting data
The submitted digital data via the Internet. The physical
would be decayed before being contributors become digital
overlaid into the projection, in contributors.
an automated process similar to
Ted Davis’ IMAGE_REMIX11.2
project. A web page would act
as a live stream onto which the
decayed data would be stored,
building up a log of these
digital memories, giving the
contributors the opportunity to
view their decayed files. There
would also be a second camera
in the installation, positioned
opposite the first, which would
allow the Internet contributors
to view the results of their input
Page 132 | The Installation
11.G 11.H
11
11 TECHNOLOGIES
The technology behind the
installation lies in MaxMSP/
Jitter.
converting each pixel to either
black or white. Upon a visitor
entering the space, this pixel
matrix is disturbed, and if more
than a certain number of pixels,
MaxMSP patch
development
schematic
(http://tr.im/xpYV)
a
This sub-patch is
used to trigger the
other sub-patches
upon opening
b
The clock sub-patch
drives the timing of
other sub-patches
c
This sub-patch
e applies the
distortion to the
f camera feed
d
b d
This sub-patch is
used to trigger a
recording upon a
visitor entering the
c installation
e
This sub-patch
names and saves
triggered recordings
f
This sub-patch
recalls recordings
and overlays them
into the projection
feed
g
g
This window is the
output which is
11.J
projected
11
11.N
notable precedent that further fuba_recorder, 2009
(http://tr.im/xm66)
describes the proposal. Claiming (http://tr.im/xm6i)
to be a “robot for generating
abstract images of Japanese 11.L
TV programs”, FUBA_ Visualisation of
mobile device being
RECORDER blends together used to contribute to
a series of screenshots from installation
TV programs requested by its
11.M, 11.N
followers into beautifully glitched From fuba_recorder
artwork, before posting the Flickr stream
results to a Flickr feed. The sheer
volume of outputted images leads
one to assume that there is a
process of automation occurring
with FUBA_RECORDER,
and the thought of a robot
scouring the Internet for clips of
TV presenters requested by its
commander is both captivating
and poetic.11.7
(http://tr.im/xqHt) (http://tr.im/xqHs)
(http://tr.im/xqHC)
(http://tr.im/xqHF)
11 review
The installation proved an
invaluable exploration of
the thesis topic, exploring
Photomontage of
images taken during
the second run of
the one-day-long
version of the
installation (http://
tr.im/xqHW)
the metaphors of decay and
memory and attempting to blur
the boundaries between their
definitions in the physical sense
and the digital sense.
decayed result. visitor has left, like an embedded complex structure of fragments
memory which is physical in of reality. Before and after fuse
An unforeseen but enjoyable that it is a record of past human together in that the previously,
outcome was that in these latter presence, yet digital in that it is undeveloped horizon is still
stages, since a recording is simply a collection of pixels. Of visible through the newly
chosen at random from the pool, yet further interest is that these constructed buildings”.
there would occasionally be a pixels remained live and editable,
memory from the very start of meaning that when the next Our visual understanding is
the installation overlaid into the visitor entered the space, their confused as new buildings seem
feed. This recording of course had movement manipulated them. transparent, and the daily path
been only very subtly decayed, so Often these pixels would attach of the sun is traced across the
visitors were periodically allowed themselves to the next visitor, sky as glowing streaks. Perhaps
just a glimpse of reality. In the clinging onto and following them the most interesting quality of
final stage, the user can no longer around the space. The initial user the images is their distinct lack
make out themselves as current leaves not only a memory of their of human presence, or of life in
occupants of the space, the feed visit, but directly influences the general for that matter. Due to
has become so decayed that they use of the space and the behavior the minute aperture size required
simply manipulate the pixels of subsequent visitors long after to develop such images, the
with their movement, pushing they are gone. general movement of human
and pulling colour around the beings is simply too quick to be
screen. They begin to be able to The work of photographer captured. Instead we see a ghost
actively decay the memories of Michael Wesely is sited here, and town, deserted but with clear
the previous occupants that they in particular his Potsdamer Platz traces of the impact of humanity.
are being shown. project. The project documents We see what has been left
the construction process of behind, a memory of both the
A fascinating quality of the patch the Berlin site between 1997 original site and the process of
was its tendency to grasp pixels and 1999 from five different construction.
towards the end of the run. If, camera positions. Each shot is a
for example, a visitor entered two-year-long exposure and the Similar to the later stages of
the space wearing a bright red resulting images the P3 installation, one can
11.Q
became evident that the initially previous occupants, and often Light sources
planned six-day-long version even alongside a version of used to illuminate
of the installation was simply themselves from only a few installation
too lengthy for something that minutes ago. (http://tr.im/xqcl)
is intended to be purposefully
visited, and that the one-day and
one-hour-long versions were a lot
more suitable. Visitors expected
to see the results of their actions
in real time. The average visit
was maybe 2-3 minutes, but the
shorter the overall length of the
11.Q
11.V
seemed to almost cut through installation their behavior is both Graphical forms
the decayed feed, it was at times enthusiastic and natural. Any run during the
barely effected and stood boldly of the installation which lasts installation
and clearly in a sea of warped, more than 6 hours or so almost
melting pixels. There is further certainly needs to be something
experimentation to be done people passively engage with,
with graphics, exposing words something in a public space,
and signs during the recording rather than something which
process which could build people are invited to actively visit
up a poetically random set of and interact with. The installation
memories. is neither a static entity, nor is
its location trivial. There are
Although possibly the ideal potentially many sites which
location to host the installation could generate much interaction
is a derelict building such as from visitors, and there is an
a pub or communal housing interest in how the installation
block which holds many fond responds to these different sites.
memories for a relatively small It could manifest itself into a
but closely-knit group of touring artwork. There is also
people, there is a definite lure possibly an opportunity from a
for its use in a public space. commercial point of view for the
Through experimentation, it use of something similar to the
has become apparent the appeal installation in the likes of bars
of the installation being used and nightclubs.
in a space containing large
amounts of passing people.
Some testing was carried out in
a busy thoroughfare space and
this was particularly successful.
When people are unaware of the
Coleman, Christopher, Structural Decay Interactive AudioVisual Installation, 2001 Open CV, by Intel, latest version 2008 (http://ubaa.net/shared/processing/opencv/)
(http://www.digitalcoleman.com/physical5.html)
P3 Ambika, University of Wesminster, (http://www.p3exhibitions.com/)
CORRUPT TM, created by Benjamin Gaulon aka RECYCLISMTM, 2006
(http://www.recyclism.com/corruption/index.php) Processing, (http://processing.org/)
Davis, Ted, IMAGE_REMIX project, 2009 (http://www.ffd8.org/image_remix/) Sterling, Bruce, Digital Decay, Keynote Address from a Conference on Digital Media,
Personal portfolio website, 2009 (http://www.teddavis.org/) 2001 (http://www.variablemedia.net/pdf/Sterling.pdf )
Flickr, by Ludicorp, 2004 (http://www.flickr.com/) Spiller, Neil, Digital Architecure Now, 2008
GlitchMonkey, Firefox Plug-In, 2008 (http://userscripts.org/scripts/show/9653) Twitpic, by Noah Everett, 2008 (http://twitpic.com/)
HSFlow Patch, by Andrew Benson, 2009, via Cycling ‘74 forums (http://tr.im/xaud) Wein, Melanie, The Fleetingness of Bits, 2000 (http://www.the-fleetingness-of-bits.de/)
Personal portfolio website, 2005 (http://www.melaniewein.com/)
IBM, Description of Parity Bits, 2008
(http://publib.boulder.ibm.com/infocenter/systems/index.jsp?topic=/com.ibm.aix.commadmn/doc/ Wikipedia, 2009 (http://en.wikipedia.org/wiki/JPEG)
commadmndita/asynch_params_parity.htm)
Wesely, Michael, Potsdamer Platz, 1997-1999
MaxMSP, by Cycling ‘74 (http://www.cycling74.com/products/max5) (http://www.wesely.org/wesely/gruppe.php?var=potsdamerplatz#)
http://blog.rafolio.co.uk
http://flickr.com/rafolio
Video documentation of
software experimentation and the
operation of the installation may
be found at my Vimeo account:
http://vimeo.com/rafolio