Inhabiting & Interfacing the Cloud(s): all research workshops results at once (recap about usages, interaction, territory)

Note: the 6 research workshops we organized in the frame of Inhabiting and Interfacing the Cloud(s) took place during the “preliminary sketches” phase. A known and common phase that takes place in the course of each design process, during which we could naturally involve peers partners and students so to increase our “trials and errors”.

The outcomes of these experimental workshops were further analyzed in two posts by N. Nova and P. Keller (ethnographic “Lessons” and design “Learnings“), to further develop design proposals as the main results of this research, along with two publications to come.

 

Introduction to I&IC & field study (10.2014) – no sound :

Soilless – a research introduction and a field study from iiclouds.org design research on Vimeo.

More information about “Soilless, diagrams of uses” at HEAD – Genève on iiclouds.org

 

Situations, usages and alternative clouds (01.2016 & 11.2014), at HEAD – Genève:

Cloud Gestures – A workshop with S. Pohflepp at HEAD – Genève from iiclouds.org design research on Vimeo.

More information about  Cloud Gestures on iiclouds.org

 

Cloudified Scenarios – a workshop with James Auger at HEAD – Genève on Vimeo.

More information about Cloudified Scenarios on iiclouds.org

 

 

Interaction and data interfaces (11.2014 & 11.2015), at ECAL:

Botcaves – a workshop with Matthew Plummer-Fernandez at ECAL on Vimeo.

More information about  Networked Data Objects / Botcaves on iiclouds.org

 

The Everlasting Shadows – a workshop with rAndom International at ECAL from iiclouds.org design research on Vimeo.

More information about  The Everlasting Shadow on iiclouds.org

 

 

Networked and decentralized cloud infrastructures (02.2015), at EPFL-ECAL Lab:

Data territories – a workshop at EPFL-ECAL Lab with ALICE from iiclouds.org design research on Vimeo.

More information about  Distributed Data Territories on iiclouds.org

 

Oracle, Bastien Girshig & Martin Hertig’s workshop #3 project at Milan Furniture Fair 2016

Glad to see that Oracle, the project that Bastien Girshig and Martin Hertig made in the context of the workshop organized with Matthew Plummer-Fernandez, will be exhibited during next Milan Furniture Fair.

The project will be part of a group show entitled Poetry, organized by Logotel Italy and curated by Sefano Maffei.

Faced with the complexity of modern art, the design world tends to seek certainty and comfort. Producing, as a result, reassuring uniformities and unvarying expectations. Landscapes, environments, behaviours, democratic and functional objects that feed desire yet fail to surprise and often leave us cold.
They lack the transgressive energy of a détournement.
Or a stroke of originality bringing with it the power of poetry.

Curatorial statement.

 

More about this exhibition on www.designpoetry.it

 

I&IC Workshop #5 at ECAL, tips: RaspberryPi’s and the GrovePi+

By Monday, November 16, 2015 Tags: 0120, ECAL, Hardware, Tools Permalink 0

If you are not familiar with the Raspberry Pi and remote access, a previous post was written here and here.

 

School’s specials:

Your RaspberryPi is preconfigured with an updated version of wheezy (2015.03.20_Dexter_Industries_wheezy.img) specifically designed to work with the GrovePi+.

If during the week you need to re-run updates just type in the following:

sudo apt-get update
sudo apt-get upgrade

Note also that you can access a few tutorials and “how to’s” on the same Dexter Industries website. “Get Started with the Grove Pi” and “Example Projects” have been already linked on our resources section out here.

However beware, the school network might not let you do this, you might have to choose another network for that (like your phone’s).

 

The easiest way to access your Pi is via VNC with an Ethernet connection. First you need to install VNC viewer for your mac. During the installation process just check install viewer, no need to install server.

Once done and your Raspberry booted, you should be able to VNC into it through Ethernet connection:
169.254.0.2:5901

Note that :5901 indicates to connect to shared-screen number 1, if you configure other screens the number 2 would be :5902, and so on.

Once connected, to configure wifi go to wpa_gui on your desktop and configure the wifi network details (with your wifi-dongle plugged in ;).

Your RaspberryPi was configured for remote access, to ssh it via Ethernet (if it doesn’t work, unplug your wifi  dongle and plug it back in once done):
ssh pi@169.254.0.2

 

Once connected you can check if you have an active connection:
ping www.google.com

If you don’t, you can check if you Raspberry Pi is at least scanning the right networks:
sudo wpa_cli scan && sleep 5 && wpa_cli scan_results

For more wifi troubleshooting follow this guide

 

To set screens, or kill them via the command line there are these commands:

sudo tightvncserver :1
sudo tightvncserver -kill :1

If for some reason you need to change the static IP set for ethernet connection, you can edit it via a simple card reader by editing the IP set in cmdline.txt situated in the root folder of your card. (if it doesn’t work, check if your computer has a dynamically allocated IP for ethernet connection, in this case we’ll check it out together)

As the week goes on I’ll update this post with new ressources. Enjoy!

I&IC Workshop #5 with Random International at ECAL, brief: “The Everlasting Shadow”

Note: As I mentioned in a previous post, the I&IC design research project enters further developments in the context of new experimental workshops. Being still part of the first phase of our work, these researches are led in collaboration with design partners (peers) and the participation of Interaction Design students (Ba & Ma). They follow the purpose of creating a thematic corpus of design “counter-proposals” to the existing apparatus of the “cloud” (as described in the foundation document about this research).

I therefore publish the brief that Dev Joshi (from the London based collective Random International) recently sent me, in preparation of the coming workshop that will take place at ECAL next week (16-20.11.2015). This workshop will interrogate what the “self” might become in an era of permanent personal data traces left on countless online/cloud based services. These traces, now commonly known as “digital footprints“, or “data shadows” (“ombres numériques” in French) and even sometimes “data ghosts” open interesting questions when it comes to communicate/interface with these “ghosts”, objectify or make them visible.

 

The Everlasting Shadow

Workshop brief, November 2015.
Random International / Dev Joshi (Head of Creative Technology)

 

random_fs_gallery3

 

Introduction

A unique construct, the cloud is always growing but will never fill up and it always looks the same, regardless of the angle from which it is viewed.

People often think of the cloud as something which is lightweight, easy to use, not imposing and perhaps even mercurial in nature. Content streams are always changing, documents viewable at their most current version – everything is fast and new. Looking below the surface, it is clear that this perception isn’t true. The cloud is heavy – it has a huge physical and environmental impact and the permanence of the data is worrying.

Where does all that stuff go, who is there to look after it? When all of your life’s information exists on someone else’s computer, even if you delete, how can you be sure that it is gone? Years of our lives left to rot in forgotten Dropbox accounts; previous versions of ourselves trapped on abandoned MySpace pages with only Tom for company.

The dualism of the ghosts we leave behind in the cloud, these indelible snapshots of ourselves, raise interesting questions about where the self exists in the modern age and of ownership. If ownership over something is the right to destroy it, have we surrendered ourselves to a broken immortality which we cannot control. Have we lost the right to forget and be forgotten?

 

Questions and staring points

The cloud is always something that belongs to someone else, operating in borrowed time and space. Devise a way of informing others about the physical and digital shadow they leave behind when they use the cloud.

Written records have existed for millennia but great effort is still expended in deciphering ancient texts written in forgotten languages. If everything in the cloud really is forever, how can we ensure it retains its value when the world has forgotten how we communicate?

How many different versions of you are there in the cloud? If they could speak, what would they say?

Your digital ghosts are trapped on islands around the cloud – is there a way to rescue them? Maybe they just need a shelter to live in now that you have moved on?

 

Output and medium

Could be, but not limited to:

. Making use of existing, static, cloud data (Things in your drop box, old social media accounts)

. Small (desktop) artifacts

. Projection and frames in space – things which hang from the ceiling or are fixed to the wall

. Screen based

 

Reference pieces

http://random-international.com/work/temporary-printing-machine/

http://random-international.com/work/aspect-white/

http://random-international.com/work/future-self/

http://random-international.com/work/tower/

 

Timeline

Monday – Introduction and discussion (am briefing)

Tuesday – Bandwidth and bare minimums (am briefing)

Wednesday – The trees that grow on technology island (am briefing)

Thursday – Work day

Friday – Presentation prep and delivery

 

Further reading

Marcelo Coelho, Karsten Schmidt, Allison E Wood

I&IC within Poetics and Politics of Data, exhibition at H3K. Pictures

Note: a few pictures from the exhibition “Poetics and Politics of Data” that is currently taking place at the Haus der elektronische Künste in Basel.

With works by artists such as Rafael Lozano-Hemmer, Moniker, Aram Bartholl, Ludwig Zeller, Jennifer Lyn Morone, etc., the exhibition gives a sharp view on the production of artists (some of which were presented on this blog) around the contemporary theme of “data”.

 

We had the pleasure to present the temporary results of our design research as the main part of a scenography created by fabric | ch and accompanied by texts from Nicolas Nova and myself.

Note also that Nicolas Nova will be a speaker during the conference Data Traces: Big Data in the Context of Culture & Society that will take place at the H3K between the 3rd and 4th of July and when a publication will be released: Poetics & Politics of Data, Sabine Himmelsbach & Claudia Mareis, ed. Christoph Merian Verlag, Basel, 2015.

“Botcaves” on #algopop

Matthew Plummer-Fernandez just took the occasion to publish the results of the workshop he led at ECAL on #algopop (“studying the appearance of algorithms in popular culture and everyday life”)!

I&IC Workshop #3 with Algopop at ECAL: output > “Botcaves” / Networked Data Objects

Note: the post I&IC Workshop #3 with Algopop at ECAL, brief: “Botcaves” presents the objectives and brief for this workshop.

 

The third workshop we ran in the frame of I&IC with our guest researcher Matthew Plummer-Fernandez (Goldsmiths University) and the 2nd & 3rd year students (Ba) in Media & Interaction Design (ECAL) ended last Friday with interesting results. The workshop focused on small situated computing technologies that could collect, aggregate and/or “manipulate” data in automated ways (bots) and which would certainly need to heavily rely on cloud technologies due to their low storage and computing capacities. So to say “networked data objects” that will soon become very common, thanks to cheap new small computing devices (i.e. Raspberry Pis for diy applications) or sensors (i.e. Arduino, etc.) The title of the workshop was “Botcave”, which objective was explained by Matthew in a previous post.

 

Botcaves – a workshop with Matthew Plummer-Fernandez at ECAL on Vimeo.

 

The choice of this context of work was defined accordingly to our overall research objective, even though we knew that it wouldn’t address directly the “cloud computing” apparatus — something we learned to be a difficult approach during the second workshop –, but that it would nonetheless question its interfaces and the way we experience the whole service. Especially the evolution of this apparatus through new types of everyday interactions and data generation.

 

_MG_7469_m

Matthew Plummer-Fernandez (#Algopop) during the final presentation at the end of the research workshop.

 

Through this workshop, Matthew and the students definitely raised the following points and questions (details about the projects are below):

Small situated technologies that will soon spread everywhere will become heavy users of cloud based computing and data storage, as they have low storage and computing capacities. While they might just use and manipulate existing data (like some of the workshop projects — i.e. #Good vs. #Evil or Moody Printer) they will altogether and mainly also contribute to produce extra large additional quantities of them (i.e. Robinson Miner). Yet, the amount of meaningful data to be “pushed” and “treated” in the cloud remains a big question mark, as there will be (too) huge amounts of such data –Lucien will probably post something later about this subject: “fog computing“–, this might end up with the need for interdisciplinary teams to rethink cloud architectures.

Stored data are becoming “alive” or significant only when “manipulated”. It can be done by “analog users” of course, but in general it is now rather operated by rules and algorithms of different sorts (in the frame of this workshop: automated bots). Are these rules “situated” as well and possibly context aware (context intelligent) –i.e. Robinson Miner? Or are they somehow more abstract and located anywhere in the cloud? Both?

These “Networked Data Objects” (and soon “Network Data Everything”) will contribute to “babelize” users interactions and interfaces in all directions, paving the way for new types of combinations and experiences (creolization processes) — i.e. The Beast, The Like Hotline, Simon Coins, The Wifi Cracker could be considered as starting phases of such processes–.  Cloud interfaces and computing will then become everyday “things” and when at “house”, new domestic objects with which we’ll have totally different interactions (this last point must still be discussed though as domesticity might not exist anymore according to Space Caviar).

 

Moody Printer – (Alexia Léchot, Benjamin Botros)

_MG_7581_m

Moody Printer remains a basic conceptual proposal at this stage, where a hacked printer, connected to a Raspberry Pi that stays hidden (it would be located inside the printer), has access to weather information. Similarly to human beings, its “mood” can be affected by such inputs following some basic rules (good – bad, hot – cold, sunny – cloudy -rainy, etc.) The automated process then search for Google images according to its defined “mood” (direct link between “mood”, weather conditions and exhaustive list of words) and then autonomously start to print them.

A different kind of printer combined with weather monitoring.

 

The Beast – (Nicolas Nahornyj)

_MG_7454_m

_MG_7617_m

Top: Nicolas Nahornyj is presenting his project to the assembly. Bottom: the laptop and “the beast”.

The Beast is a device that asks to be fed with money at random times… It is your new laptop companion. To calm it down for a while, you must insert a coin in the slot provided for that purpose. If you don’t comply, not only will it continue to ask for money in a more frequent basis, but it will also randomly pick up an image that lie around on your hard drive, post it on a popular social network (i.e. Facebook, Pinterest, etc.) and then erase this image on your local disk. Slowly, The Beast will remove all images from your hard drive and post them online…

A different kind of slot machine combined with private files stealing.

 

Robinson – (Anne-Sophie Bazard, Jonas Lacôte, Pierre-Xavier Puissant)

_MG_7464_m

_MG_7507_m

Top: Pierre-Xavier Puissant is looking at the autonomous “minecrafting” of his bot. Bottom: the proposed bot container that take on the idea of cubic construction. It could be placed in your garden, in one of your room, then in your fridge, etc.

Robinson automates the procedural construction of MineCraft environments. To do so, the bot uses local weather information that is monitored by a weather sensor located inside the cubic box, attached to a Raspberry Pi located within the box as well. This sensor is looking for changes in temperature, humidity, etc. that then serve to change the building blocks and rules of constructions inside MineCraft (put your cube inside your fridge and it will start to build icy blocks, put it in a wet environment and it will construct with grass, etc.)

A different kind of thermometer combined with a construction game.

Note: Matthew Plummer-Fernandez also produced two (auto)MineCraft bots during the week of workshop. The first one is building environment according to fluctuations in the course of different market indexes while the second one is trying to build “shapes” to escape this first envirnment. These two bots are downloadable from the Github repository that was realized during the workshop.

 

#Good vs. #Evil – (Maxime Castelli)

_MG_7481_m

_MG_7619_m

Top: a transformed car racing game. Bottom: a race is going on between two Twitter hashtags, materialized by two cars.

#Good vs. #Evil is a quite straightforward project. It is also a hack of an existing two racing cars game. Yet in this case, the bot is counting iterations of two hashtags on Twitter: #Good and #Evil. At each new iteration of one or the other word, the device gives an electric input to its associated car. The result is a slow and perpetual race car between “good” and “evil” through their online hashtags iterations.

A different kind of data visualization combined with racing cars.

 

The “Like” Hotline – (Mylène Dreyer, Caroline Buttet, Guillaume Cerdeira)

_MG_7496_m

_MG_7604_m

Top: Caroline Buttet and Mylène Dreyer are explaining their project. The screen of the laptop, which is a Facebook account is beamed on the left outer part of the image. Bottom: Caroline Buttet is using a hacked phone to “like” pages.

The “Like” Hotline is proposing to hack a regular phone and install a hotline bot on it. Connected to its online Facebook account that follows a few personalities and the posts they are making, the bot ask questions to the interlocutor which can then be answered by using the keypad on the phone. After navigating through a few choices, the bot hotline help you like a post on the social network.

A different kind of hotline combined with a social network.

 

Simoncoin – (Romain Cazier)

_MG_7533_m

_MG_7568_m

Top: Romain Cazier introducing its “coin” project. Bottom: the device combines an old “Simon” memory game with the production of digital coins.

Simoncoin was unfortunately not functional at the end of the week of workshop but was thought out in force details that would be too long to explain in this short presentation. Yet the main idea was to use the game logic of the famous Simon says to generate coins. In a parallel approach to the one of the Bitcoins that are harder and harder to mill, Simoncoins are also more and more difficult to generate due to the inner game logic: each time a level is achieved by a user on the physical installation, a coin is generated and made available to him in the cloud (so as a tweet that says a coin has been generated). The main difference being that it is not the power of the machine that matters, but its user’s ability.

Another different kind of money combined with a game.

 

The Wifi Oracle - (Bastien Girshig, Martin Hertig)

_MG_7548_m

_MG_7586_m

_MG_7598_m

Top: Bastien Girshig and Martin Hertig (left of Matthew Plummer-Fernandez) presenting. Middle and Bottom: the wifi password cracker slowly diplays the letters of the wifi password.

The Wifi Oracle is an object that you can independently leave in a space. It furtively looks a little bit like a clock, but it won’t display time. Instead, it will look for available wifi networks in the area and start try to crack their protected password (Bastien and Martin found online a ready made process for that). Installed on the Raspberry Pi inside the Oracle,  the bot will test all possible combinations and it will take the necessary time do do so. Once the device will have found the working password, it will use its round display to display it within the space it has been left in. Letter by letter and in a slow manner as well.

A different kind of cookoo clock combined with a password cracker.

 

Acknowledgments:

Lots of thanks to Matthew Plummer-Fernandez for its involvement and great workshop direction; Lucien Langton for its involvment, technical digging into Raspberry Pis, pictures and documentation; Nicolas Nova and Charles Chalas (from HEAD) so as Christophe Guignard, Christian Babski and Alain Bellet for taking part or helping during the final presentation. A special thanks to the students from ECAL involved in the project and the energy they’ve put into it: Anne-Sophie Bazard, Benjamin Botros, Maxime Castelli, Romain Cazier, Guillaume Cerdeira, Mylène Dreyer, Bastien Girshig, Martin Hertig, Jonas Lacôte, Alexia Léchot, Nicolas Nahornyj, Pierre-Xavier Puissant.

 

_MG_7558_m

From left to right: Bastien Girshig, Martin Hertig (The Wifi Cracker project), Nicolas Nova, Matthew Plummer-Fernandez (#Algopop), a “mystery girl”, Christian Babski (in the background), Patrick Keller, Sebastian Vargas, Pierre Xavier-Puissant (Robinson Miner), Alain Bellet and Lucien Langton (taking the pictures…) during the final presentation on Friday.