I&IC Workshop #5 at ECAL, tips: RaspberryPi’s and the GrovePi+

By Monday, November 16, 2015 Tags: 0120, ECAL, Hardware, Tools Permalink 0

If you are not familiar with the Raspberry Pi and remote access, a previous post was written here and here.

 

School’s specials:

Your RaspberryPi is preconfigured with an updated version of wheezy (2015.03.20_Dexter_Industries_wheezy.img) specifically designed to work with the GrovePi+.

If during the week you need to re-run updates just type in the following:

sudo apt-get update
sudo apt-get upgrade

Note also that you can access a few tutorials and “how to’s” on the same Dexter Industries website. “Get Started with the Grove Pi” and “Example Projects” have been already linked on our resources section out here.

However beware, the school network might not let you do this, you might have to choose another network for that (like your phone’s).

 

The easiest way to access your Pi is via VNC with an Ethernet connection. First you need to install VNC viewer for your mac. During the installation process just check install viewer, no need to install server.

Once done and your Raspberry booted, you should be able to VNC into it through Ethernet connection:
169.254.0.2:5901

Note that :5901 indicates to connect to shared-screen number 1, if you configure other screens the number 2 would be :5902, and so on.

Once connected, to configure wifi go to wpa_gui on your desktop and configure the wifi network details (with your wifi-dongle plugged in ;).

Your RaspberryPi was configured for remote access, to ssh it via Ethernet (if it doesn’t work, unplug your wifi  dongle and plug it back in once done):
ssh pi@169.254.0.2

 

Once connected you can check if you have an active connection:
ping www.google.com

If you don’t, you can check if you Raspberry Pi is at least scanning the right networks:
sudo wpa_cli scan && sleep 5 && wpa_cli scan_results

For more wifi troubleshooting follow this guide

 

To set screens, or kill them via the command line there are these commands:

sudo tightvncserver :1
sudo tightvncserver -kill :1

If for some reason you need to change the static IP set for ethernet connection, you can edit it via a simple card reader by editing the IP set in cmdline.txt situated in the root folder of your card. (if it doesn’t work, check if your computer has a dynamically allocated IP for ethernet connection, in this case we’ll check it out together)

As the week goes on I’ll update this post with new ressources. Enjoy!

I&IC workshop #5 at ECAL: (esoteric) comments about the cloud (about the brief)

Following the publication of Dev Joshi‘s brief on I&IC documentary blog yesterday, I took today the opportunity to briefly introduce it to the interaction design students that will be involved in the workshop next week. Especially, I focused on some points of the brief that were important but possibly quite new concepts for them. I also extended some implicit ideas with images that could obviously bring ideas about devices to build to access some past data, or “shadows” as Dev’s names them.

What comes out in a very interesting way for our research in Dev’s brief is the idea that the data footprints each of us leaves online on a daily basis (while using all type of digital services) could be considered as past entities of ourselves, or trapped, forgotten, hidden, … (online) fragments of our personalities… waiting to be contacted again.

How many different versions of you are there in the cloud? If they could speak, what would they say?

 

Yet, interestingly, if the term “digital footprint” is generally used in English to depict this situation (the data traces each of us leaves behind), we rather use in French the term “ombre numérique”  (literally “digital shadow”). That’s why we’ve decided with Dev that it was preferable to use this term as the title for the workshop (The Everlasting Shadows): it is somehow a more vivid expression that could bring quite direct ideas when it comes to think about designing “devices” to “contact” these “digital entities” or make them visible again in some ways.

 

ph_ramette2_2007

ph_ramette_2007

Philippe Ramette, “L’ombre de celui que j’étais / Shadow of my former self “, 2007. Light installation, mixed media.

 

By extension, we could also start to speak about “digital ghosts” as this expression is also commonly used (not to mention the “corps sans organes” of G. Deleuze/F. Gattari and previously A. Artaud). Many “ghosts”/facets of ourselves? All trapped online in the form of zombie data?

Your digital ghosts are trapped on islands around the cloud – is there a way to rescue them? Maybe they just need a shelter to live in now that you have moved on?

… or a haunted house?

 

And this again is a revealing parallel, because it opens the whole conceptual idea to beliefs… (about ghosts? about personal traces and shadows? about clouds? and finally, about technology? …)

What about then to work with inspirations that would come from the spiritualism domain, its rich iconography and produce “devices” to communicate with your dead past data entities?

 

U169302INP

Fritz Lang. “Dr. Mabuse,  the Gambler”, movie, 1922.

 

Or even start to think about some kind of “wearables”, and then become a new type of fraud technological data psychic?

 

colin_evans_fraud_in_1938

Fraud medium Colin Evans in levitation, 13 June 1938 (source Wikipedia).

 

We could even digg deeper into these “beliefs” and start looking at old illustrations and engravings that depicts relations to “things that we don’t understand”, that are “beyond our understanding”… and that possibly show “tools” or strange machinery to observe or communicate with these “unknown things” (while trying to understand them)?

 

spiritualism-1855-granger

Spiritualism in 1855, author unknown.

 

EPSON scanner image

J.G. Heck. A plate from “The Iconographic Encyclopedia of Science, Literature and Art” published in 1851. Astronomy tools.

 

This last illustration could also drive us, by extension and a very straight shortcut , to the idea of the Sublime (in art, but also in philosophy), especially the romantic works of the painters from that period (late 18th and early 19th centuries, among them W. Turner, C. S. Friedrich, E. Delacroix, T. Cole, etc.) Submerged by the presentiment of a nature that was in all dimensions dominating humans, that remained at that time mostly unexplained and mysterious, if not dangerous and feared, some painters took on this feeling, named “sublime” after Edmund Burke’s Philosophical Enquiry (1757), and start painting dramatic scenes of humans facing the forces of nature.

 

Thomas_Cole_-_The_Voyage_of_Life_Old_Age,_1842_(National_Gallery_of_Art)

Thomas Cole, “The Voyage of Life: Old Age”, 1842. National Gallery of Art, Washington DC.

 

It is not by chance of course that I’ll end my “esoteric comments about the brief” post with this idea of the Sublime. This is because recently, the concept found a new life in regard to technology and its central yet “unexplained, mysterious, if not dangerous and feared” role in our contemporary society. The term got completed at this occasion to become the “Technological Sublime”, thus implicitly comparing the once dominant and “beyond our understanding” Nature to our contemporary technology.

American Technological Sublime” by D. E. Nye, published in 1994 (MIT Press) was certainly one of the first book to join the two terms. It continues the exploration of the social construction of technology initiated in his previous book, “Electrifying America” (MIT Press, 1990). More recently in 2011, the idea popup again on the blog of Next Nature in an article simply entitled The Technological Sublime.

 

So, to complete my post with a last question, is the Cloud, that everybody uses but nobody seems to understand, a technologically sublime artifact? Wouldn’ it be ironic that an infrastructure, which aim is to be absolutely rational and functional, ultimately contributes to creates a completely opposite feeling?

 

Quotes are from Dev Joshi’s brief, “The Everlasting Shadow“.

 

I&IC Workshop #5 with Random International at ECAL, brief: “The Everlasting Shadow”

Note: As I mentioned in a previous post, the I&IC design research project enters further developments in the context of new experimental workshops. Being still part of the first phase of our work, these researches are led in collaboration with design partners (peers) and the participation of Interaction Design students (Ba & Ma). They follow the purpose of creating a thematic corpus of design “counter-proposals” to the existing apparatus of the “cloud” (as described in the foundation document about this research).

I therefore publish the brief that Dev Joshi (from the London based collective Random International) recently sent me, in preparation of the coming workshop that will take place at ECAL next week (16-20.11.2015). This workshop will interrogate what the “self” might become in an era of permanent personal data traces left on countless online/cloud based services. These traces, now commonly known as “digital footprints“, or “data shadows” (“ombres numériques” in French) and even sometimes “data ghosts” open interesting questions when it comes to communicate/interface with these “ghosts”, objectify or make them visible.

 

The Everlasting Shadow

Workshop brief, November 2015.
Random International / Dev Joshi (Head of Creative Technology)

 

random_fs_gallery3

 

Introduction

A unique construct, the cloud is always growing but will never fill up and it always looks the same, regardless of the angle from which it is viewed.

People often think of the cloud as something which is lightweight, easy to use, not imposing and perhaps even mercurial in nature. Content streams are always changing, documents viewable at their most current version – everything is fast and new. Looking below the surface, it is clear that this perception isn’t true. The cloud is heavy – it has a huge physical and environmental impact and the permanence of the data is worrying.

Where does all that stuff go, who is there to look after it? When all of your life’s information exists on someone else’s computer, even if you delete, how can you be sure that it is gone? Years of our lives left to rot in forgotten Dropbox accounts; previous versions of ourselves trapped on abandoned MySpace pages with only Tom for company.

The dualism of the ghosts we leave behind in the cloud, these indelible snapshots of ourselves, raise interesting questions about where the self exists in the modern age and of ownership. If ownership over something is the right to destroy it, have we surrendered ourselves to a broken immortality which we cannot control. Have we lost the right to forget and be forgotten?

 

Questions and staring points

The cloud is always something that belongs to someone else, operating in borrowed time and space. Devise a way of informing others about the physical and digital shadow they leave behind when they use the cloud.

Written records have existed for millennia but great effort is still expended in deciphering ancient texts written in forgotten languages. If everything in the cloud really is forever, how can we ensure it retains its value when the world has forgotten how we communicate?

How many different versions of you are there in the cloud? If they could speak, what would they say?

Your digital ghosts are trapped on islands around the cloud – is there a way to rescue them? Maybe they just need a shelter to live in now that you have moved on?

 

Output and medium

Could be, but not limited to:

. Making use of existing, static, cloud data (Things in your drop box, old social media accounts)

. Small (desktop) artifacts

. Projection and frames in space – things which hang from the ceiling or are fixed to the wall

. Screen based

 

Reference pieces

http://random-international.com/work/temporary-printing-machine/

http://random-international.com/work/aspect-white/

http://random-international.com/work/future-self/

http://random-international.com/work/tower/

 

Timeline

Monday – Introduction and discussion (am briefing)

Tuesday – Bandwidth and bare minimums (am briefing)

Wednesday – The trees that grow on technology island (am briefing)

Thursday – Work day

Friday – Presentation prep and delivery

 

Further reading

Marcelo Coelho, Karsten Schmidt, Allison E Wood

Dead Drops and Keepalive by A. Bartholl

By Wednesday, October 28, 2015 Tags: 0116, D, Data, Interaction, Object, Situated, Storage Permalink 0

bartholl_deadkeep_00

Note: we mentioned the project Dead Drops (2010), by artist Aram Bartholl, in the foundation document of our design research Inhabiting & Interfacing the Cloud(s). The project was about passive memory sticks (usb keys) that were inserted into public streets walls, for anybody to drop or pick files.

A. Bartholl recently published a new project, Keepalive, which also presents a public, situated (rural or into the wild) and almost ritual interaction with files.

Both projects are presented below in more details, but what interests us in these two cases is this different interaction with files that is proposed. Both physical and that brings a different meaning to the interaction itself: a special type of (situated) interaction to access specific files. Something quite different therefore than a general purpose type of interaction (“clic” with a mouse or “tap” with a finger) to access any type of files (current situation with cloud storage).

In the continuity of the workshop we held about physical bot objects that manipulate data, “Botcaves” - Networked Data Objects, this is certainly a track we’ll like to pursue and digg into during the next steps of this project.

 

bartholl_deaddrops

The Dead Drops Manifesto

Dead Drops is an anonymous, offline, peer to peer file-sharing network in public space. Anyone can access a Dead Drop and everyone may install a Dead Drop in their neighborhood/city. A Dead Drop must be public accessible. A Dead Drop inside closed buildings or private places with limited or temporary access is not a Dead Drop. A real Dead Drop mounts as  read and writeable mass storage drive without any custom software. Dead Drops don’t need to be synced or connected to each other. Each Dead Drop is singular in its existence. A very beautiful Dead Drop shows only the metal sheath enclosed type-A USB plug and is cemented into walls.You would hardly notice it. Dead Drops don’t need any cables or wireless technology. Your knees on the ground or a dirty jacket on the wall is what it takes share files offline. A Dead Drop is a naked piece of passively powered Universal Serial Bus technology embedded into the city, the only true public space. In an era of growing clouds and fancy new devices without access to local files we need to rethink the freedom and distribution of data. The Dead Drops movement is on its way for change!

Free your data to the public domain in cement! Make your own Dead Drop now! Un-cloud your files today!!!

Aram Bartholl 2010

 

 

bartholl_keepalive_01

bartholl_keepalive_02

bartholl_keepalive_03

Keepalive
Sculpture, permanent outdoor installation
Aram Bartholl 2015

The boulder from the region Neuenkirchen, Niedersachsen contains a thermoelectric generator which converts heat directly into electricity. Visitors are invited to make a fire next to the boulder to power up the wifi router in the stone which then reveals a large collection of PDF survival guides. The piratebox.cc inspired router which is NOT connected to the Internet offers the users to download the guides and upload any content they like to the stone database. As long as the fire produces enough heat the router will stay switched on. The title Keepalive refers to a technical network condition where two network endpoints send each other ‘empty’ keepalive messages to maintain the connection.https://en.wikipedia.org/wiki/Keepalive To visit the piece please arrange an appointment with Springhornhof.de.

The project ‘Keepalive’ by Aram Bartholl was realised in the context of the research project ‘Art and Civic Media’, as part of the Innovation Incubator Lüneburg, a large EU project funded by the European Fund for Regional Development and the Germna State of Lower Saxony.

Reblog > The cloud

Note: after a Summer “pause” mostly dedicated to a mid-term exhibition and publication of our joint design-research, we are preparing to dive again into the I&IC project for 18 months. This will first happen next November through a couple of new workshops with guest designers/partners (Dev Joshi from Random International at ECAL and Sascha Pohflepp at HEAD). We will take the occasion to further test different approaches and ideas about “The cloud”. We will then move into following steps of our work, focused around the development of a few “counter-propositional” artifacts.

But before diving again, I take the occasion to reblog an article by James Bridle published earlier this year and that could act as an excellent reminder of our initial questions, so as a good way to relaunch our research. Interestingly, Brindle focuses on the infrastructural aspects of the cloud (mostly pointing out the “hard” parts of it), which may in fact become the main focus of our research as well in this second phase. Scaled down certainly…

 

Via Icon (thanks Lucien for the reference)

—–

cloud_copy

 

There’s something comforting about the wispy metaphor for the network that underpins most aspects of our daily lives. It’s easy to forget the reality of its vast physical infrastructure

The “cloud” in cloud computing has its origins in the network diagrams of early telecommunications engineers. Drawn freehand, a little puff of semicircles, a thought bubble, it denotes the point at which the responsibility of the engineer ceases. That stuff over there, which we don’t need to think about. Everything in the cloud is invisible; and somebody else’s problem.

With the advent of digital networks, the cloud quickly came to denote the internet, the worldwide network of networks that is also somebody else’s problem. You can ask the cloud questions, and the cloud answers. All is well and good. Sometimes the cloud doesn’t answer, and you have to dig up a road. Beneath the paving stones, the cloud.

But some time around the mid-1990s, the cloud changed. A 1996 internal document from computer company Compaq was titled “Internet Solutions Division Strategy for Cloud Computing”. Whether it was the first use of the term is disputed, but it states that in the future “application software is no longer a feature of the hardware – but of the Internet”.

What had changed was that the network had stopped being a mere communication channel, and had become a place for computation and storage. By the mid-noughties it was a marketing buzzword, and today it is a fact of life. We have designed our lives around this ever-available, practically infinite and startlingly remote storage capacity. As smart as the phones in our pockets are, most of what they tell us is calculated and held in the cloud.

A 2012 survey by cloud corp Citrix stated that, from a base of 1,000 respondents, 95 per cent didn’t believe they used the cloud, and 95 per cent of them actually did. From Gmail to the Amazon wishlist, most of your emails, photos, status updates, business documents, library and voting data, health records, credit rating, likes, experiences and personal preferences are in the cloud. And that cloud belongs to someone.

The cloud is not some magical faraway place made of water vapour and radio waves where everything just works. It is a physical infrastructure consisting of phone lines, fibre optics, satellites, cables on the ocean floor, and vast warehouses filled with computers, which consume huge amounts of water and energy, and reside within national and legal jurisdictions. There’s a reason Google and Facebook like to build data centres in Ireland (tax) and Scandinavia (cheap energy, and it’s cold). The cloud doesn’t just have a shadow, it has a footprint.

Yet it is still “somebody else’s problem”. The cloud is both an inherently distancing metaphor and a potentially harmful one. The computer in your pocket was designed in California, mined in Canada, assembled in China, shipped via god-knows-where, and allows you to see and contact any point on the planet, and even the satellites orbiting above it.

The cloud obscures these relationships, but if we poke it, it also reveals them in ways that were not possible to see before. That anonymous shed on the ring road is the new civic sphere; it’s the place where we shop, bank, socialise and vote. To truly perceive and understand the implications of this is central to the design and architecture of the future. The network is crying out for better metaphors.

 

“Pictures of Clouds”, 1995

I found this quite funny yet revealing diagram related to the paper “A brief history of cloud computing” (already mentioned earlier on this blog), by Maximiliano Destefani Neto. It describes the time, back in 1995 according to Mr. Neto, when “Pictures of Clouds” started to appear in technical drawings about networks and the then emerging network computing (grid computing started to be a buzz word around the same time).

The purposes of these schematic “clouds” were to synthesize “too complicated for non technical people to understand” parts of the infrastructure into one image/logotype. It was the icon of the cloud! And it revealed to be a clever choice, because it probably helped to keep the whole infrastructure “blurry”, “hidden”, “invisible” or “un-understandable”… “It happens in the cloud“, this fuzzy technological arrangement and therefore you don’t really need to explain it.

 

clouds_of_1995

 

Now in 2015, we’re almost fully immersed into these “clouds”. Literally living in them, through them, … but they still remain blurry!

 

In someways and on our own scale, it is also to go against this “too complicated for non technical people to understand” DNA of cloud computing that we’ve set up the design research Inhabiting and Interfacing the cloud(s). Trying to underpin the concepts and ideas, the technologies, the infrastructures, the usages, the locations, etc. that lie behind the service(s), with the goal to make them more “transparent” and accessible again in some ways. To turn them into community tools one more time, while pointing out resources. That’s somehow what we’re also trying to do on this blog, at the same time that we’re putting artifacts together with our discovered or elaborated public resources…

 

The full infographic can be seen on the website “Thoughts On Cloud”.