The Glitch Aesthetic

Total Page:16

File Type:pdf, Size:1020Kb

The Glitch Aesthetic Georgia State University ScholarWorks @ Georgia State University Communication Theses Department of Communication Fall 11-23-2011 The Glitch Aesthetic Rebecca Jackson Follow this and additional works at: https://scholarworks.gsu.edu/communication_theses Recommended Citation Jackson, Rebecca, "The Glitch Aesthetic." Thesis, Georgia State University, 2011. https://scholarworks.gsu.edu/communication_theses/80 This Thesis is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Theses by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. THE GLITCH AESTHETIC by REBECCA JACKSON Under the Direction of Ted Friedman ABSTRACT The miscommunication between sender and receiver during transcoding indexes specific historical moments similarly to analog film's indexical trace. Iconography and glitch art begin to establish glitch's deictic index. The glitch aesthetic exposes societal paranoia by illustrating dependence on the digital and fear of system failure. With the advent of video sharing sites like Youtube and popular cyberfilms, the glitch aesthetic has evolved into a pop culture artifact. INDEX WORDS: Glitch art, Glitch, Art, Aesthetic, Digital, Digital index, Index, Humanities, Buffer underrun, Error, Errant, TCP/IP, UDP, New media, Film theory, Pop culture, Visual, New media studies, Digital studies, Streaming media, Software studies THE GLITCH AESTHETIC by REBECCA JACKSON A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Arts in the College of Arts and Sciences Georgia State University 2011 Copyright by Rebecca Jackson 2011 THE GLITCH AESTHETIC by REBECCA JACKSON Committee Chair: Ted Friedman Committee: Jennifer Barker Alessandra Raengo Electronic Version Approved: Office of Graduate Studies College of Arts and Sciences Georgia State University December 2011 iv DEDICATION This thesis is dedicated to a true friend, talented artist, and my favorite person in the world: Luis Sierra. v ACKNOWLEDGEMENTS Thank you to all the glitch artists who helped me put this thesis together. Without your beautiful work, my argument would be bland and beige. Glitch art not only recycles digital bits of garbage into high art and pop culture artifacts, but it exposes digital (trace) indices thereby juxtaposing the analog world with the digital in a beautiful array of spastic pixelation. vi TABLE OF CONTENTS ACKNOWLEDGEMENTS ............................................................................................................... v LIST OF FIGURES....................................................................................................................... vvi 1 Chapter One: Introduction ................................................................................................. 11 1.1 A New Ecology for a Citizen of a Digital Age................................................................ 13 1.2 What is Glitch? ........................................................................................................... 25 1.3 Internet Protocols....................................................................................................... 26 1.4 Glitch Art.................................................................................................................... 32 1.5 The Glitch Aesthetic.................................................................................................... 33 1.6 Digital Index................................................................................................................ 34 1.7 Chapter Outline.......................................................................................................... 41 2 Chapter Two: Spontaneous Glitch ...................................................................................... 43 2.1 Windmill Glitch........................................................................................................... 44 2.2 Software Glitch........................................................................................................... 47 2.3 Anticipated .htm Glitch............................................................................................... 49 2.4 Human/Computer Miscommunication Glitch.............................................................. 51 2.5 Hardware Glitch.......................................................................................................... 53 2.6 Freeze Glitch............................................................................................................... 55 2.7 Pixelation Glitch.......................................................................................................... 57 2.8 Conclusion.................................................................................................................. 61 3 Chapter Three: Glitch Art.................................................................................................... 62 3.1 Tony "Ant" Scott......................................................................................................... 64 3.2 Nick Briz ..................................................................................................................... 68 vii 3.3 Jodi............................................................................................................................. 70 3.4 Rosa Menkman........................................................................................................... 75 3.5 Luis Sierra................................................................................................................... 78 3.6 Andy Denzler .............................................................................................................. 80 3.7 Conclusion.................................................................................................................. 83 4 Chapter Four: Pop Glitch .................................................................................................... 86 4.1 Videodrome................................................................................................................ 87 4.2 Ghost in the Machine ................................................................................................. 91 4.3 The Ring ..................................................................................................................... 97 4.4 Youtube.................................................................................................................... 101 4.5 Battlestar Galactica................................................................................................... 103 4.6 Work of Art............................................................................................................... 107 4.7 Kane and Lynch 2...................................................................................................... 110 4.8 Droid Ad Campaign................................................................................................... 112 4.9 Conclusion................................................................................................................ 115 5 Chapter 5: CONCLUSIONS................................................................................................. 116 REFERENCES ........................................................................................................................... 121 viii LIST OF FIGURES Figure 1.1 Briz covers his eyes ............................................................................................................... 14 Figure 1.2 Briz blends analog broadcast errors....................................................................................... 15 Figure 1.3 Racecars merge with Wolverine............................................................................................ 16 Figure 1.4 Repetitive drinking motion.................................................................................................... 17 Figure 1.5 Images disintegrate entirely.................................................................................................. 17 Figure 1.6 Briz emerges from within the pixelation................................................................................ 18 Figure 1.7 Briz unbuttons his shirt ......................................................................................................... 19 Figure 1.8 "David at the Dentist" 1 of 6.................................................................................................. 20 Figure 1.9 "David at the Dentist" 2 of 6.................................................................................................. 20 Figure 1.10 "David at the Dentist" 3 of 6................................................................................................ 21 Figure 1.11 "David at the Dentist" 4 of 6................................................................................................ 21 Figure 1.12 "David at the Dentist" 5 of 6................................................................................................ 22 Figure 1.13 "David at the Dentist" 6 of 6................................................................................................ 22 Figure 1.14 Briz emerges as a new citizen.............................................................................................
Recommended publications
  • Fill Your Boots: Enhanced Embedded Bootloader Exploits Via Fault Injection and Binary Analysis
    IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925, Vol. 2021, No. 1, pp. 56–81. DOI:10.46586/tches.v2021.i1.56-81 Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis Jan Van den Herrewegen1, David Oswald1, Flavio D. Garcia1 and Qais Temeiza2 1 School of Computer Science, University of Birmingham, UK, {jxv572,d.f.oswald,f.garcia}@cs.bham.ac.uk 2 Independent Researcher, [email protected] Abstract. The bootloader of an embedded microcontroller is responsible for guarding the device’s internal (flash) memory, enforcing read/write protection mechanisms. Fault injection techniques such as voltage or clock glitching have been proven successful in bypassing such protection for specific microcontrollers, but this often requires expensive equipment and/or exhaustive search of the fault parameters. When multiple glitches are required (e.g., when countermeasures are in place) this search becomes of exponential complexity and thus infeasible. Another challenge which makes embedded bootloaders notoriously hard to analyse is their lack of debugging capabilities. This paper proposes a grey-box approach that leverages binary analysis and advanced software exploitation techniques combined with voltage glitching to develop a powerful attack methodology against embedded bootloaders. We showcase our techniques with three real-world microcontrollers as case studies: 1) we combine static and on-chip dynamic analysis to enable a Return-Oriented Programming exploit on the bootloader of the NXP LPC microcontrollers; 2) we leverage on-chip dynamic analysis on the bootloader of the popular STM8 microcontrollers to constrain the glitch parameter search, achieving the first fully-documented multi-glitch attack on a real-world target; 3) we apply symbolic execution to precisely aim voltage glitches at target instructions based on the execution path in the bootloader of the Renesas 78K0 automotive microcontroller.
    [Show full text]
  • Automatic Detection of Perceived Ringing Regions in Compressed Images
    International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 5 (2011), pp. 491-516 © International Research Publication House http://www.irphouse.com Automatic Detection of Perceived Ringing Regions in Compressed Images D. Minola Davids Research Scholar, Singhania University, Rajasthan, India Abstract An efficient approach toward a no-reference ringing metric intrinsically exists of two steps: first detecting regions in an image where ringing might occur, and second quantifying the ringing annoyance in these regions. This paper presents a novel approach toward the first step: the automatic detection of regions visually impaired by ringing artifacts in compressed images. It is a no- reference approach, taking into account the specific physical structure of ringing artifacts combined with properties of the human visual system (HVS). To maintain low complexity for real-time applications, the proposed approach adopts a perceptually relevant edge detector to capture regions in the image susceptible to ringing, and a simple yet efficient model of visual masking to determine ringing visibility. Index Terms: Luminance masking, per-ceptual edge, ringing artifact, texture masking. Introduction In current visual communication systems, the most essential task is to fit a large amount of visual information into the narrow bandwidth of transmission channels or into a limited storage space, while maintaining the best possible perceived quality for the viewer. A variety of compression algorithms, for example, such as JPEG[1] and MPEG/H.26xhave been widely adopted in image and video coding trying to achieve high compression efficiency at high quality. These lossy compression techniques, however, inevitably result in various coding artifacts, which by now are known and classified as blockiness, ringing, blur, etc.
    [Show full text]
  • Free Remote Agile E-Book
    Table of Contents 1. Welcome to a new kind of Agile 2. Establishing Ground Rules 3. Stop Dreading Meetings: The Webcam Revolution 4. The Virtual Office Setup 5. Case Study: Stack Exchange’s Hybrid Team 6. Building and Nurturing Your Remote Team 7. Best Email Practices 8. Case Study: RES Software’s Three Remote Offices 9. Agile Can Thrive With Remote Teams 10. Let Us Know How We Can Help! Welcome to a new kind of Agile The current charter of most distributed company leaders is to create an online workspace (...) supported by a set of tools and self- organizing behaviors.(...)With a strong vision, clear articulation of priorities, and strongly nurturing culture as part of your company DNA, you have a clear path to success on your distributed Agile team." - Amanda Ross, Director of Marketing & Agile Practices at Sococo It’s been called a framework, a philosophy, a methodology - research Agile and you’ll find that so many people define it with so many different words that you'd be forgiven for thinking it’s some sort of mystical practice involving tarot cards and looking at the stars. But it’s actually a major shift in the way people work, and it’s been happening for over a decade - whatever you choose to call it, if you are in the IT business, Agile is likely part of the way you work. If it’s not, the time to start is now. Companies and teams worldwide have used it to deliver better products in record time with maximum efficiency and minimum burnout.
    [Show full text]
  • Glitch Studies Manifesto
    [email protected]. Amsterdam/Cologne, 2009/2010 http://rosa-menkman.blogspot.com The dominant, continuing search for a noiseless channel has been, and will always be no more than a regrettable, ill-fated dogma. Even though the constant search for complete transparency brings newer, ‘better’ media, every one of these new and improved techniques will always have their own fingerprints of imperfection. While most people experience these fingerprints as negative (and sometimes even as accidents) I emphasize the positive consequences of these imperfections by showing the new opportunities they facilitate. In the beginning there was only noise. Then the artist moved from the grain of celluloid to the magnetic distortion and scanning lines of the cathode ray tube. he wandered the planes of phosphor burn-in, rubbed away dead pixels and now makes performance art based on the cracking of LCD screens. The elitist discourse of the upgrade is a dogma widely pursued by the naive victims of a persistent upgrade culture. The consumer only has to dial #1-800 to stay on top of the technological curve, the waves of both euphoria and disappointment. It has become normal that in the future the consumer will pay less for a device that can do more. The user has to realize that improving is nothing more than a proprietary protocol, a deluded consumer myth about progression towards a holy grail of perfection. Dispute the operating templates of creative practice by fighting genres and expectations! I feel stuck in the membranes of knowledge, governed by social conventions and acceptances. As an artist I strive to reposition these membranes; I do not feel locked into one medium or between contradictions like real vs.
    [Show full text]
  • Mutable Artistic Narratives: Video Art Versus Glitch Art
    Mutable Artistic Narratives: Video Art versus Glitch Art Ana Marqués Ibáñez Department of Fine Arts. Didactic of Plastic Expression University of La Laguna Biography Ana holds a PhD in Fine Arts from the Univer- sity of Granada and is a professor in the Fac- ulty of Education at the University of La Laguna, Tenerife. Her PhD thesis focused on the commu- nicative capacity of images in literary classics, including the Divine Comedy, with a compari- son of the illustrations of Dante’s work created by different artists. Ana is a professor in the Early Childhood and Primary Education degree programmes, in which she teaches contemporary art and education. She is also a lecturer and coordinator of the special- isation course in drawing, design and visual arts in the Education Master’s Degree programme. Her current research focuses on promoting play as an element of learning, as well as creating teaching resources related to visual culture for people with disabilities. She has participated in national and international conferences, most re- cently at the Texas Art Education Association conference, where she gave presentations on art installations for children as generators of play and learning, and visual diaries as a form of ex- pression and knowledge. 1172 Synnyt / Origins | 2 / 2019 | Peer-reviewed | Full paper Abstract This project analyses a set of different innovative video formats for their sub- sequent incorporation and application in the fields of art and education. The aim is to conduct a historical review of the evolution of video art, in which images, video and experimental and instrumental sound play an essential role.
    [Show full text]
  • A Practical Introduction to Python Programming
    A Practical Introduction to Python Programming Brian Heinold Department of Mathematics and Computer Science Mount St. Mary’s University ii ©2012 Brian Heinold Licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported Li- cense Contents I Basics1 1 Getting Started 3 1.1 Installing Python..............................................3 1.2 IDLE......................................................3 1.3 A first program...............................................4 1.4 Typing things in...............................................5 1.5 Getting input.................................................6 1.6 Printing....................................................6 1.7 Variables...................................................7 1.8 Exercises...................................................9 2 For loops 11 2.1 Examples................................................... 11 2.2 The loop variable.............................................. 13 2.3 The range function............................................ 13 2.4 A Trickier Example............................................. 14 2.5 Exercises................................................... 15 3 Numbers 19 3.1 Integers and Decimal Numbers.................................... 19 3.2 Math Operators............................................... 19 3.3 Order of operations............................................ 21 3.4 Random numbers............................................. 21 3.5 Math functions............................................... 21 3.6 Getting
    [Show full text]
  • LIGO Detector Characterization Group Maintained by Josh Smith DCC# LIGO-G1500642 This Document: A
    Glitch classes seen in aLIGO so far (through end of O1) LIGO Detector Characterization Group Maintained by Josh Smith DCC# LIGO-G1500642 This document: A. lists the major glitch classes that have been seen in aLIGO so far, B. shows a few representative images, C.says which detectors have which glitches, and D.provides links to alog pages and wikis for more information 2 Table of Contents 1. LHO/LLO Blip glitches [NF] 9. Blue Mountains [NF] 2. LLO RF Beats [NF] 10. LHO End-Y 60Hz glitches [F] 3. LLO Koi fish (working title) [NF] 11. Saturating tidal control [F] 4. LHO end-Y scattered light [NF] 12.OMC L Scattered light [F] 5. LLO SRM scattered light [NF] 13.Hartmann Wavefront sensor malfunction [F] 6. LHO paired doves [NF] 14. LHO PRCL/SRCL glitches [F] 7. DAC glitches [PF] 15. LHO End-Y 50Hz air compressor 8. n*505Hz glitches [PF] glitches [F] [NF] = not fixed, [PF]= partially fixed, [F]=fixed 3 1. Blip glitches H1 Examples: https://ldas-jobs.ligo-wa.caltech.edu/~areeda/blip-omega.tar 4 Blip glitches documentation • Brief description: Class of common glitches in both detectors, with no known cause currently. The only weak lead is that saturated hardware injections cause glitches that look very similar, so perhaps these are saturations in the actuation chain that happen under normal conditions. • Relevant alogs: • LLO: • LHO: saturated injections look like blips? • Other documentation: Some blip times and scans link 5 2. RF Beats Examples: https://ldas-jobs.ligo.caltech.edu/~areeda/josh-20150828.tgz 6 RF Beats documentation • Brief description: These are beats of two or more RF oscillators that sweep quickly through the audio range.
    [Show full text]
  • Movement Behind Your Back
    Movement Behind Your Back: Cinematic Technology in Light of Simondon’s Philosophy of Technology University of Amsterdam Research Master’s Thesis in Media Studies Department of Media Studies Vladimir Lukin e-mail: [email protected] Supervisor: Dr. Abe Geil Second Reader: Dr. Marie-Aude L. Baronian Third Reader: Dr. Bernhard Rieder “La représentation du mouvement est la raison d’être du cinématographe, sa faculté maîtresse, l’expression fondamentale de son génie. […] l’affinité du cinématographe pour le mouvement va jusqu’à découvrir celui-ci là où notre œil ne sait pas le voir. ” — Jean Epstein, Le Cinéma du diable 2 Abstract Movement is the essence of cinema. But it is not the movement that we see on the screen but movement that happens behind our backs — both literally, in the cinematic apparatus in the movie theater, and metaphorically, for it defies our conceptual grasp. Thus, this thesis addresses the question of technical production of motion — the question which, as Tom Gunning aptly remarks, is “the repressed Freudian subject of film theory”. By drawing upon Gilbert Simondon’s philosophy of technology, this thesis attempts to lay bare the technicity of cinematic technology and also to reveal the reasons why it remains misunderstood and under-theorized in the current debates on the moving image. This thesis contends that cinematic technicity can be defined through the three technical operations, namely, movement data organization, movement analysis, and movement synthesis. As this thesis attempts to demonstrate, the misconception of cinematic technicity occurs on both the technological and conceptual levels. If optical technologies obscure cinematic technicity on the technological level, I claim the concept of the image obscures our conceptual understanding of movement.
    [Show full text]
  • Glitch.Com What Is Glitch?
    glitch.com What is Glitch? “Everybody has good ideas of things we want to make on the Internet. But honestly, it’s gotten too hard. Gomix fixes that. If you’re not a professional developer, the barriers are way too high. There are pretty good tools if you just went to make a marketing website or a blog, but if your idea is an app or a bot or something more interactive, you’re out of luck. It ought to be as easy to make an app as it is to edit a blog post or to change a formula in a spreadsheet.” Anil Dash, December 6, 2016 https://medium.com/gomix/introducing-gomix-aec205c421cb#.fqutfey03 https://glitch.com/about/ Glitch handles the mess • While you work with Glitch, it will seamlessly upgrade your servers and cloud infrastructure in the background. • There’s no deployment or server provisioning because it all happens automatically. Backed by a real company Glitch • Glitch is made by Fog Creek, one of the most influential small tech companies in the world. • They made Trello, FogBugz and co-created Stack Overflow. Why did they make it In some ways, Glitch is a throwback to an older era of software or the internet, when there were simpler ways to get started making cool stuff. For people who were around at that time, they'll understand Glitch easily: It brings “View Source” back. The ability to just look at the code behind something, and tweak it, and make your own thing, was essential to making the Internet fun, and weird, and diverse, in its early days.
    [Show full text]
  • Rosa Menkman: General Glitch Falyn, Olivia, Jane, Mutesi Biography
    Rosa Menkman: General Glitch Falyn, Olivia, Jane, Mutesi Biography - A full-time position as a substitute professor at - Born in 1983 New Media at the KHK since 2018 and - Wrote a book, The Glitch Moment(um)- helps expanded on the Resolution Studies curriculum. explain her and her work - She started glitching in 2005 when she was 22 - Won the Collide International Barcelona Award- years old annual international competition that invites - A co-organizer of the GLI.TC/H festival artists of any nationality or age to apply for a - Graduated at the University of Amsterdam in the 3-month residency award by submitting a subject of new media proposal - Fun fact: She is one of the Richest Visual Artist who was born in Kingdom of the Netherlands Art Process ❖ Uses the Quicktime and Cinepak (for moving images and compressions) software for her work ❖ ❖ She embraces the process of not being afraid to break her work as a learning process ❖ ❖ Likes to use opposites to portray; sanity for madness, order for chaos, etc. ❖ ❖ Glitches are a benchmark and threshold to create new problems and continue to find new solutions. ❖ ❖ Unconvers unseen, “too good to be implemented” resolutions to produce a new interpretation through technology ❖ ❖ “Highlights visual artifacts created by accidents in both analogue and digital media” (Loosen Art, 2018) Glitch within Contemporary Art Mistakes and errors are part of our everyday life, by taking all those imperfections you can make a new types of art into that imperfection. As Rosa explained during her Ted-talk speech, glitching was never something she wanted her life, but it later become something she saw it as making art, liking broken items because she can create a new meaning for them.
    [Show full text]
  • It's Time to Get Serious About Developer Relations
    03/04/2018 It’s time to get serious about Developer Relations – Glitch – Medium Images haven’t loaded yet. Please exit printing, wait for images to load, and try to Anil Dash Follow CEO of Fog Creek Software, makers pofri @nt Gagliatcinh. & Manuscript. Trying to make tech more ethical & humane. (Also an advisor to Medium.) More: http://anildash.com/ Sep 27, 2017 · 4 min read It’s time to get serious about Developer Relations Developer relations is a vital part of modern business strategy, but so much of the industry still treats it like an afterthought. Glitch for Platforms is here to help everyone who does Dev Rel. If you do developer relations or evangelism, you’re probably great at your job. You’re talking to coders, getting out in the community, building relationships. But does the rest of your organization value that work as much as they should? A lot of smart people are thinking it’s time for Dev Rel to grow up, and we agree. All of us who give a damn about developer relations need to get a lot louder and more aggressive about the business value of what we do. And that means tackling the ROI question head-on: Can you really show that your developer outreach is working? Jonathan Gottfried @jonmarkgo Replying to @bwest it feels counterintuitive to spend time proving ROI to execs rather than generating value for developers but Jonathan Gottfried, Co-Founder of Major League Hacking Dev Rel’s Burden of Proof For a lot of Dev Rel people, really proving a return on investment is, well, a pain in the ass.
    [Show full text]
  • Making Web Apps with Node - Paths Into Programming - Top Tips for New Coders V1.0 Glitch Is the Friendly Community Where You'll Build the App of Your Dreams
    In this issue: CC BY-NC-SA 4.0 Print & Share! - Making Web Apps with Node - Paths into Programming - Top Tips for New Coders v1.0 Glitch is the friendly community where you'll build the app of your dreams. With working example apps to remix, a code editor to modify them, instant hosting and deployment - anybody can build a web app on Glitch, for free. Learn more at glitch.com Credits Illustration: Good Boy Graphics Layout: Gareth Wilson Content: Jenn Schiffer, Gareth Wilson Edited by: Maurice Cherry Guest Contributors: Cassidy Williams, Saron Yitbarek, Steve Klabnik Contents p2. How Web Servers Work Paths into Programming: p4. Cassidy Williams p10. Saron Yitbarek p14. Steve Klabnik p6. Anatomy of a Web App p9. Expert Advice for New Developers p12. What is npm Exactly? p19. Top Tips for New Coders p16. Understanding Async in Node 1 How Web Servers Work What happens when you enter a URL into your browser? It turns out, a whole bunch of things happen. But one of them is you sending a request to a server (which is just a computer) somewhere, asking it to give you the app or site that relates to that URL. You can think of a computer server as being a bit like a server in a restaurant - you request something and they should return with what you requested. At a diner, for example, if you ask them for food, they eventually return with that food. 2 So when you’re surfin' the web, and you go to example.com, or click a link, you’re asking a server to send you a web page.
    [Show full text]