Ment the Glitch Moment(Um)

Total Page:16

File Type:pdf, Size:1020Kb

Ment the Glitch Moment(Um) Moment(um) The The Glitch Glitch The Glitch Moment Mo- Moment(um) (um) mentRosa MenkMan Glitch Mo- The Glitch t Moment(um)04 The Glitch Moment(um) 04 ConTenTs ACknowledGeMenTs 5 InTroduction 7 Glitch StudIes MAnIfesTo 11 A TeChnological Approach To noIse 12 LinearProgressionandtheMythofPerfectTransmission 12 NoiseArtifacts 15 EncodingAndDecoding:CompressionArtifacts 15 AVernacularOfFileFormats 17 OrderlyChaos:FeedbackArtifacts 26 The OtherNoiseArtifact:Glitch 26 The perCeption of Glitch 28 TheMeaningOfNoise 28 TheGlitchMoment(um):AVoidInTechno-Culture 29 TechnorealismAndtheAccidentOfArt 31 A phenoMenoloGy of Glitch ArT 33 ThePredicamentsOfDefiningGlitchArt 33 CategoricalPrecursors:ABinaryApproachToGlitchArt? 35 FromPassiveAppropriationOr‘PureGlitchArt’ToActive,‘Post-ProceduralGlitchArt’ 36 Post-proceduralGlitchArtOrtheIntentionalFauxPas 37 TheConceptAndTechniqueOfRuin 40 Creatingthe‘PerfectGlitch’UsingCriticalMediaAesthetics 43 TheTippingPointofCool:CriticalMediaAesthetics'BecomingCommodities 44 froM Artifact To Commodity 46 FromCircuitbendingtoSimulation 46 FromDatabendingtoTranscoding 49 FromEnchantingAffectToFilteredEffect 53 TheGlitchArtGenre:BetweentheVoidAndCommoditizedForm 55 TheGenreParadox 57 organIzInG Glitch spheres 59 GlitchArtNetworked 62 GlitchSphereRelations 63 SomeFinalReflectionsOnTheGlitchSpheres 64 The Emancipation of DissonAnCe Glitch 65 BiblIoGrAphy 67 Colophon Network Notebooks editors: Geert Lovink and Sabine Niederer Producer of this publication: Margreet Riphagen Copy editing: Rachel O'Reilly Design: Studio Léon&Loes, Rotterdam http://www.leon-loes.nl Printer: Printvisie Rotterdam Publisher: Institute of Network Cultures, Amsterdam Supported by: School for Communication and Design at the Amsterdam University of Applied Sciences (Hogeschool van Amsterdam, Domein Media, Creatie en Informatie) and Stichting Democratie en Media. The glitch moment(um) is composed of texts that have been extended and reworked by Rosa Menkman, 2006–2011. If you want to order copies please contact: Institute of Network Cultures Kenniscentrum Create-IT Singelgrachtgebouw Rhijnspoorplein 1 1091 GC Amsterdam The Netherlands http://www.networkcultures.org [email protected] t:+31 (0)20 59 51 866 – f: +31 (0)20 59 51 840 A pdf of this publication can be freely downloaded at: http://www.networkcultures.org/networknotebooks This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. Amsterdam, October 2011. ISBN/EAN 978-90-816021-6-7 neTwork noTeBook serIes The Network Notebooks series presents new media research commissioned by the INC. PREVIOUSLY PUBLISHED NETWORK NOTEBOOKS Network Notebooks 03: Dymtri Kleiner, The Telekommunist, 2010. ISBN: 978-90-816021-2-9. Network Notebooks 02: Rob van Kranenburg, The Internet of Things: A critique of ambient technology and the all- seeing network of RFID, 2008. ISBN: 978-90-78146-06-3. Network Notebooks 01: Rosalind Gill, Technobohemians of the new Cybertariat? New media work in Amsterdam a decade after the Web, 2007. ISBN: 978-90-78146-02-5. 4 Acknowledgements IamverythankfultotheInstituteofNetworkCulturesforsupportingmeandmylovefor glitch,andfordevotingoneoftheirpublicationstothissubject.Iamespeciallygrateful toGeertLovink,notjustforhisendlessinsightsintoandsupporttowardsallfringesof digitalculture,butspecificallyforpushingmeintounexpectedterritories.Ihavetothank JodiforopeningmyeyelidsandGoto80foropeningmyearlids,andforthejourneywe shared.Besidesthis,IhaveKarlKlomptothankforhistechnicalsupport. AnnetDekkerandJosephineBosmawrotethefirsttextsthatshowedmeawayintotheo- rizingglitchart–IhavetothankthemforwritingthosetextsandalsoMatthewFullerfor theconversationthatwehadthedayhewelcomedmeintohisoffice,whichIconsiderthe startingpointforthistext.Specialthankstomyeditor,Rachel,whoworkedlonghours reviewingmyglitches. Finally,IwouldliketomakeashoutouttoThegli.tc/h/botsandallbrokenexecutables everywhere,forbringingmelatenightUnicodebarf,alltheorganizersoffestivalsIhave attendedandallthepeoplewhohavesupportedmeinthelastyears,artistically,theoreti- callyandtechnically.Finally,myfamilyandclosefriends–maygoodspambewithyou. 5 Introduction Glitchfirstcameintomylifein2005,whenIvisitedtheworldwidewrongexhibition bytheDutch/BelgiumartistcollectiveJodi(JoanHeemskerkandDirkPaesmans)atMon- teVideo/TimeBasedArtsinAmsterdam(nowknownastheNIMK,NetherlandsMediaArt Institute).AnintroductorytextontheworkoftheartistsbyAnnetDekkerwentalong wayinarticulatingtheartists’deconstructivemethods.However,theworkthatmadethe biggestimpressiononme,untitledgame(1996-2001),whichwasamodificationofthe videogamequake1,seemedthemostincomprehensible.Icouldonlyunderstanditas irrationalandvoidofmeaning,andsoIwalkedawayfromit,confusedandtitillated.In hindsight,Ilearnedaboutmyselfinthatmoment–aboutmyexpectationsandconcep- tionsofhowavideogameshouldwork.Thestrangegameseemedonlytoreturnmetomy ownperspectivesandexpectationsaroundthemediumthatitwasfailingtobe.Asecond text by Josephine Bosma usefully outlined Jodi’s active deprogramming of computers, andtheparadoxesandtensionsinherenttotheirworkingmethod.Evenstill,untitled game in particular remained for me under-articulated in theory, which increased my curiosityaboutthiskindofartpractice.Ididnotrealizeitthen,butmytasteforglitch, andforitspotentialtointerrogateconventionsthroughcrashes,bugs,errorsandviruses, wasspawnedbythatinitialandpersistentcriticalevasionofuntitledgamefrommy theoreticalgrasp. Attheendofmymasterthesisin2006,whichfocusedonJodi’sworkuntitledgame, IhadstillnotyetreferredtoJodi’sartworkas‘glitch art’–Ionlymentionedthewords ‘glitch’and‘buggy’.Thisisprobablybecausethenotionofglitchartwasjustcrossingover fromsoundculture,andleakingintovisualartculturesonlysporadically.01Glitchmore fullyenteredmyvocabularyforvisualsandnetworkswhenIbegananartisticcollabora- tionwiththemusicianGoto80(AndersCarlsson)in2007.Heexplainedtomehowheex- ploitedtheCommodore64soundchip(theSIDchip)forthecreationofmusic.Thebugs Goto80usedgaveaveryspecifictexturetothesound(theresultofnoise artifacts)andI begantodevelopandrecognizevisualequivalentstothisprocess.Ifoundmoreandmore artifact-basedcorrespondencesbetweenaudioandvisualtechnologies,suchascompres- sions,feedbackandglitches,inmyatthattimemostlyonlineartpractice.Theninearly 2008,GeertLovinkinvitedmetotheVideoVortexconferenceforavisualliveperformance (which was quite a challenge since I had never stood onstage before) and in 2009 put meintouchwithMatthewFuller,anartist,authorandlecturerinLondon,whichlater turnedouttobetwokeyturningpoints,artisticallyandtheoretically.Ibeganperform- ingandmorestronglytheorizingwhatIwasthencallingmyacousmaticvideoscapes.02 IexplainedtoFullermyobservationsofcompressions,feedbackandglitchesinsound 01|Aroundthistime,therewereonlyafewpeopleusingtheterm‘glitchart’inthecontextofthevisualarts:AntScotthadbeenworkingonhis ‘glitchart’sinceJuly2001andwasalsooneofthekeyperformersataGlitchfestivalthattookplaceinNorwayin2002.Besidesthis,Iman MoradijustfinishedhisGlitchAesthetics-dissertation(2004)inwhichheusedtheterms‘glitchart’and‘glitchdesign’interchangeably.The term‘glitchart’firstenteredWikipediain2007,whereitwasexplainedasmanipulatedB-moviesanderoticart,alsoknownasasubsetof RapeArt.Thisdescriptionchangedonlyin2009.InconversationwithMoradi,weagreedthatthetermonlypermeatedvisualarttheoryanda generalvocabularyafter2005,ifnotacoupleofyearslater. 02|InreferencetoPierreSchaeffer,Icalledthesevideos‘videoscapes’.Thesevideosfollowedthelogicofacousmatics;Irefusedtheaudience knowledgeovertheinstrumentandthusdeniedthemtheirinherentculturalconditioningthatwouldotherwisehelpthemintheirprocessof makingmeaning.Indoingso,Iputinfrontofthemthe‘unseenvisualartifacts’,frombehindPythagoras’curtain-theshrouded,blackveilof technology,http://videoscapes.blogspot.com/ 7 andtheircorrespondencestothevisualsphere,whopointedmetotheearlyinformation theoryofClaudeElwoodShannonandWarrenWeaver.Theirworkprovedmostuseful tomyprojectofdevelopingatechnology-drivenframeworkfortheorizingtheseusually unwelcome,increasinglyexploitednoise artifactsinwhichmypracticewassoinvested. Inthebeginningof2010,Idevelopedanddistributedtheglitchstudiesmanifesto (2010)inwhichIarguedinfavorofmorecriticalattentiontoglitch’sincreasingossifi- cationinstandardizeddesign.03Ialsowroteavernacularoffileformats(2010),a workinthegenreofahandbook,intendedtomorerigorouslycommunicatethetechni- calspecificationsofall(ormost-used)digitalcompressionartifactsthatcouldbecreated through random data insertion at that historical moment.04 This comprehensive PDF guidetocompressionartifactswaspositivelyreceivedbytheglitchcommunityandalso spawnedmynextproject,theco-developmentofapieceofgenerativeglitchdesignsoft- waretogetherwithJohanLarsby,calledmonglot(2011).monglotmadeitpossiblefor anybody, without extensive data corruption skills, to technically interrogate and learn aboutthedevelopmentofspecificglitchformations.05 MorerecentlyIhavemergedmytechnical,narrativeandhistoricalcomprehensionofdig- italglitchcultureintoanaudiovisualperformancecalledthecollapseofpal(2010),in whichthe(PaulKlee’s)AngelofHistory,asnarratedbyWalterBenjamin,reflectsspecifi- callyontheendingofPAL,theanalogPhaseAlternateLinetelevisionsignal.Byintroduc- ingacriticalandmelodramaticnarrativetoaworkofglitchart,Itriedtounderlinethat thereismoretoglitchart,andmoreatstake,thanjustdesignandaesthetics.Thework addressesthemessuchasplannedobsolescence,built-innostalgia,criticalmediaaes- theticsandthegentrificationandcontinuingdevelopmentofaglitchartgenre.Finally,I havebeenparticipatingincriticalcommunitybuildingaroundglitch,inmyworkasco-or-
Recommended publications
  • Fill Your Boots: Enhanced Embedded Bootloader Exploits Via Fault Injection and Binary Analysis
    IACR Transactions on Cryptographic Hardware and Embedded Systems ISSN 2569-2925, Vol. 2021, No. 1, pp. 56–81. DOI:10.46586/tches.v2021.i1.56-81 Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis Jan Van den Herrewegen1, David Oswald1, Flavio D. Garcia1 and Qais Temeiza2 1 School of Computer Science, University of Birmingham, UK, {jxv572,d.f.oswald,f.garcia}@cs.bham.ac.uk 2 Independent Researcher, [email protected] Abstract. The bootloader of an embedded microcontroller is responsible for guarding the device’s internal (flash) memory, enforcing read/write protection mechanisms. Fault injection techniques such as voltage or clock glitching have been proven successful in bypassing such protection for specific microcontrollers, but this often requires expensive equipment and/or exhaustive search of the fault parameters. When multiple glitches are required (e.g., when countermeasures are in place) this search becomes of exponential complexity and thus infeasible. Another challenge which makes embedded bootloaders notoriously hard to analyse is their lack of debugging capabilities. This paper proposes a grey-box approach that leverages binary analysis and advanced software exploitation techniques combined with voltage glitching to develop a powerful attack methodology against embedded bootloaders. We showcase our techniques with three real-world microcontrollers as case studies: 1) we combine static and on-chip dynamic analysis to enable a Return-Oriented Programming exploit on the bootloader of the NXP LPC microcontrollers; 2) we leverage on-chip dynamic analysis on the bootloader of the popular STM8 microcontrollers to constrain the glitch parameter search, achieving the first fully-documented multi-glitch attack on a real-world target; 3) we apply symbolic execution to precisely aim voltage glitches at target instructions based on the execution path in the bootloader of the Renesas 78K0 automotive microcontroller.
    [Show full text]
  • Automatic Detection of Perceived Ringing Regions in Compressed Images
    International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 5 (2011), pp. 491-516 © International Research Publication House http://www.irphouse.com Automatic Detection of Perceived Ringing Regions in Compressed Images D. Minola Davids Research Scholar, Singhania University, Rajasthan, India Abstract An efficient approach toward a no-reference ringing metric intrinsically exists of two steps: first detecting regions in an image where ringing might occur, and second quantifying the ringing annoyance in these regions. This paper presents a novel approach toward the first step: the automatic detection of regions visually impaired by ringing artifacts in compressed images. It is a no- reference approach, taking into account the specific physical structure of ringing artifacts combined with properties of the human visual system (HVS). To maintain low complexity for real-time applications, the proposed approach adopts a perceptually relevant edge detector to capture regions in the image susceptible to ringing, and a simple yet efficient model of visual masking to determine ringing visibility. Index Terms: Luminance masking, per-ceptual edge, ringing artifact, texture masking. Introduction In current visual communication systems, the most essential task is to fit a large amount of visual information into the narrow bandwidth of transmission channels or into a limited storage space, while maintaining the best possible perceived quality for the viewer. A variety of compression algorithms, for example, such as JPEG[1] and MPEG/H.26xhave been widely adopted in image and video coding trying to achieve high compression efficiency at high quality. These lossy compression techniques, however, inevitably result in various coding artifacts, which by now are known and classified as blockiness, ringing, blur, etc.
    [Show full text]
  • Chiptuning Intellectual Property: Digital Culture Between Creative Commons and Moral Economy
    Chiptuning Intellectual Property: Digital Culture Between Creative Commons and Moral Economy Martin J. Zeilinger York University, Canada [email protected] Abstract This essay considers how chipmusic, a fairly recent form of alternative electronic music, deals with the impact of contemporary intellectual property regimes on creative practices. I survey chipmusicians’ reusing of technology and content invoking the era of 8-bit video games, and highlight points of contention between critical perspectives embodied in this art form and intellectual property policy. Exploring current chipmusic dissemination strategies, I contrast the art form’s links to appropriation-based creative techniques and the ‘demoscene’ amateur hacking culture of the 1980s with the chiptune community’s currently prevailing reliance on Creative Commons licenses for regulating access. Questioning whether consideration of this alternative licensing scheme can adequately describe shared cultural norms and values that motivate chiptune practices, I conclude by offering the concept of a moral economy of appropriation-based creative techniques as a new framework for understanding digital creative practices that resist conventional intellectual property policy both in form and in content. Keywords: Chipmusic, Creative Commons, Moral Economy, Intellectual Property, Demoscene Introduction The chipmusic community, like many other born-digital creative communities, has a rich tradition of embracing and encouraged open access, collaboration, and sharing. It does not like to operate according to the logic of informational capital and the restrictive enclosure movements this logic engenders. The creation of chipmusic, a form of electronic music based on the repurposing of outdated sound chip technology found in video gaming devices and old home computers, centrally involves the reworking of proprietary cultural materials.
    [Show full text]
  • Videogame Music: Chiptunes Byte Back?
    Videogame Music: chiptunes byte back? Grethe Mitchell Andrew Clarke University of East London Unaffiliated Researcher and Institute of Education 78 West Kensington Court, University of East London, Docklands Campus Edith Villas, 4-6 University Way, London E16 2RD London W14 9AB [email protected] [email protected] ABSTRACT Musicians and sonic artists who use videogames as their This paper will explore the sonic subcultures of videogame medium or raw material have, however, received art and videogame-related fan art. It will look at the work of comparatively little interest. This mirrors the situation in art videogame musicians – not those producing the music for as a whole where sonic artists are similarly neglected and commercial games – but artists and hobbyists who produce the emphasis is likewise on the visual art/artists.1 music by hacking and reprogramming videogame hardware, or by sampling in-game sound effects and music for use in It was curious to us that most (if not all) of the writing their own compositions. It will discuss the motivations and about videogame art had ignored videogame music - methodologies behind some of this work. It will explore the especially given the overlap between the two communities tools that are used and the communities that have grown up of artists and the parallels between them. For example, two around these tools. It will also examine differences between of the major videogame artists – Tobias Bernstrup and Cory the videogame music community and those which exist Archangel – have both produced music in addition to their around other videogame-related practices such as modding gallery-oriented work, but this area of their activity has or machinima.
    [Show full text]
  • Spsg Sn76489 User Manual
    SUPER PSG VST SN76489 SMS www.alyjameslab.com USER MANUAL 1.0 BY Aly James ©2013-2014 ALYJAMESLAB TABLE OF CONTENTS SUPER PSG VST ..................................................................................................................... 1 INTRODUCTION............................................................................................................................. 3 INSTALLATION............................................................................................................................... 6 CONTROL PANELS ......................................................................................................................... 9 THE SN76489 PSG CHIP ................................................................................................................11 MAIN CONTROLS..........................................................................................................................15 SETTINGS .....................................................................................................................................17 AMP GENERATOR.........................................................................................................................19 PITCH GENERATOR .......................................................................................................................22 ARPEGGIATOR .............................................................................................................................25 SPECIAL - TIMERS & AY-EG ............................................................................................................27
    [Show full text]
  • Use of Progressive Rock in David Wise's Soundtrack for Donkey Kong
    Use of Progressive Rock in David Wise’s Soundtrack for Donkey Kong Country and the Advancement of Video Game Music Brooke Spencer Professor Stephanie Lind MUSC501 3 March 2019 Introduction In 1994, Nintendo released the Super Nintendo game: Donkey Kong Country (DKC)– resulting in widespread popularity and new innovative use of music in gameplay. Through the utilization of prog-rock in David Wise’s soundtrack for DKC, Nintendo has expanded its range of musical styles, function, and status as a top contending videogame company. The use of prog-rock can be broken down in David Wise’s three pieces: “Treetop Rock”, “Fear Factory”, and “Aquatic Ambience”. Through elements of prog-rock seen in each of these pieces - harmonic prolongation, fragmentation, distortion, and use of the concept ‘meta- chord’ – we can see that DKC’s music was unlike anything Nintendo had been creating previously, and set expectations for music in videogames to come. History Starting in 1977-78, the video game industry began to rise in popularity through arcades. In the 1960s/1970s when first-generation home consoles were created, sound was not a possibility. It was only when Pong was released on the Atari home console in 1975 that sounds were used deliberately: the game had 3 different sounds coinciding with actions on screen: the ball hitting the wall, the paddle, and a sound for player failure. Most games included sound in future releases to increase profits after Pong’s success.1 By the end of the 70s, arcades were growing in popularity, with Nintendo a primary arcade console producer.
    [Show full text]
  • Free Remote Agile E-Book
    Table of Contents 1. Welcome to a new kind of Agile 2. Establishing Ground Rules 3. Stop Dreading Meetings: The Webcam Revolution 4. The Virtual Office Setup 5. Case Study: Stack Exchange’s Hybrid Team 6. Building and Nurturing Your Remote Team 7. Best Email Practices 8. Case Study: RES Software’s Three Remote Offices 9. Agile Can Thrive With Remote Teams 10. Let Us Know How We Can Help! Welcome to a new kind of Agile The current charter of most distributed company leaders is to create an online workspace (...) supported by a set of tools and self- organizing behaviors.(...)With a strong vision, clear articulation of priorities, and strongly nurturing culture as part of your company DNA, you have a clear path to success on your distributed Agile team." - Amanda Ross, Director of Marketing & Agile Practices at Sococo It’s been called a framework, a philosophy, a methodology - research Agile and you’ll find that so many people define it with so many different words that you'd be forgiven for thinking it’s some sort of mystical practice involving tarot cards and looking at the stars. But it’s actually a major shift in the way people work, and it’s been happening for over a decade - whatever you choose to call it, if you are in the IT business, Agile is likely part of the way you work. If it’s not, the time to start is now. Companies and teams worldwide have used it to deliver better products in record time with maximum efficiency and minimum burnout.
    [Show full text]
  • Glitch Studies Manifesto
    [email protected]. Amsterdam/Cologne, 2009/2010 http://rosa-menkman.blogspot.com The dominant, continuing search for a noiseless channel has been, and will always be no more than a regrettable, ill-fated dogma. Even though the constant search for complete transparency brings newer, ‘better’ media, every one of these new and improved techniques will always have their own fingerprints of imperfection. While most people experience these fingerprints as negative (and sometimes even as accidents) I emphasize the positive consequences of these imperfections by showing the new opportunities they facilitate. In the beginning there was only noise. Then the artist moved from the grain of celluloid to the magnetic distortion and scanning lines of the cathode ray tube. he wandered the planes of phosphor burn-in, rubbed away dead pixels and now makes performance art based on the cracking of LCD screens. The elitist discourse of the upgrade is a dogma widely pursued by the naive victims of a persistent upgrade culture. The consumer only has to dial #1-800 to stay on top of the technological curve, the waves of both euphoria and disappointment. It has become normal that in the future the consumer will pay less for a device that can do more. The user has to realize that improving is nothing more than a proprietary protocol, a deluded consumer myth about progression towards a holy grail of perfection. Dispute the operating templates of creative practice by fighting genres and expectations! I feel stuck in the membranes of knowledge, governed by social conventions and acceptances. As an artist I strive to reposition these membranes; I do not feel locked into one medium or between contradictions like real vs.
    [Show full text]
  • Hyperbole Followed by Disillusion
    EDITORIAL Hyperbole Followed By Disillusion ew technology is invariably preceded by challenge of broadening the use base is a difficult as hyperbole and followed by disillusionment. ever. N The short-term impact of new technology is What was not as widely predicted in 1983, but has generally overestimated, while the long-term impact is become hugely significant, is the impact of electronics almost always underestimated," noted the chairman of on the way music is being made and performed today. AT&T in a recent interview. He was discussing the Guitars are currently in the forefront of popular music, evolution of the much heralded "information but behind the scene arsenals of electronics, ranging superhighway," but his words could have just as from signal processing to tone modules, are employed easily been used to describe the evolution of the to help produce that "true acoustic sound." The electronic music industry. marriage between MIDI, the entire family of In one form or another, electronic musical electronic instruments, and the computer has also instruments have existed for over 50 years, but from a made it possible for people working in their living commercial standpoint the synthesizer and electronic rooms to create recordings that previously would have music market has been an important industry sales required a $500,000 studio. Consumers may not have component only for the past 12 years. The only thing embraced electronic music to the extent predicted, but that has changed as rapidly as technology in that then no one anticipated that electronic music would relatively brief time span has been the outlook of end up on virtually every popular recording, including retailers and manufacturers.
    [Show full text]
  • Mutable Artistic Narratives: Video Art Versus Glitch Art
    Mutable Artistic Narratives: Video Art versus Glitch Art Ana Marqués Ibáñez Department of Fine Arts. Didactic of Plastic Expression University of La Laguna Biography Ana holds a PhD in Fine Arts from the Univer- sity of Granada and is a professor in the Fac- ulty of Education at the University of La Laguna, Tenerife. Her PhD thesis focused on the commu- nicative capacity of images in literary classics, including the Divine Comedy, with a compari- son of the illustrations of Dante’s work created by different artists. Ana is a professor in the Early Childhood and Primary Education degree programmes, in which she teaches contemporary art and education. She is also a lecturer and coordinator of the special- isation course in drawing, design and visual arts in the Education Master’s Degree programme. Her current research focuses on promoting play as an element of learning, as well as creating teaching resources related to visual culture for people with disabilities. She has participated in national and international conferences, most re- cently at the Texas Art Education Association conference, where she gave presentations on art installations for children as generators of play and learning, and visual diaries as a form of ex- pression and knowledge. 1172 Synnyt / Origins | 2 / 2019 | Peer-reviewed | Full paper Abstract This project analyses a set of different innovative video formats for their sub- sequent incorporation and application in the fields of art and education. The aim is to conduct a historical review of the evolution of video art, in which images, video and experimental and instrumental sound play an essential role.
    [Show full text]
  • A Practical Introduction to Python Programming
    A Practical Introduction to Python Programming Brian Heinold Department of Mathematics and Computer Science Mount St. Mary’s University ii ©2012 Brian Heinold Licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported Li- cense Contents I Basics1 1 Getting Started 3 1.1 Installing Python..............................................3 1.2 IDLE......................................................3 1.3 A first program...............................................4 1.4 Typing things in...............................................5 1.5 Getting input.................................................6 1.6 Printing....................................................6 1.7 Variables...................................................7 1.8 Exercises...................................................9 2 For loops 11 2.1 Examples................................................... 11 2.2 The loop variable.............................................. 13 2.3 The range function............................................ 13 2.4 A Trickier Example............................................. 14 2.5 Exercises................................................... 15 3 Numbers 19 3.1 Integers and Decimal Numbers.................................... 19 3.2 Math Operators............................................... 19 3.3 Order of operations............................................ 21 3.4 Random numbers............................................. 21 3.5 Math functions............................................... 21 3.6 Getting
    [Show full text]
  • LIGO Detector Characterization Group Maintained by Josh Smith DCC# LIGO-G1500642 This Document: A
    Glitch classes seen in aLIGO so far (through end of O1) LIGO Detector Characterization Group Maintained by Josh Smith DCC# LIGO-G1500642 This document: A. lists the major glitch classes that have been seen in aLIGO so far, B. shows a few representative images, C.says which detectors have which glitches, and D.provides links to alog pages and wikis for more information 2 Table of Contents 1. LHO/LLO Blip glitches [NF] 9. Blue Mountains [NF] 2. LLO RF Beats [NF] 10. LHO End-Y 60Hz glitches [F] 3. LLO Koi fish (working title) [NF] 11. Saturating tidal control [F] 4. LHO end-Y scattered light [NF] 12.OMC L Scattered light [F] 5. LLO SRM scattered light [NF] 13.Hartmann Wavefront sensor malfunction [F] 6. LHO paired doves [NF] 14. LHO PRCL/SRCL glitches [F] 7. DAC glitches [PF] 15. LHO End-Y 50Hz air compressor 8. n*505Hz glitches [PF] glitches [F] [NF] = not fixed, [PF]= partially fixed, [F]=fixed 3 1. Blip glitches H1 Examples: https://ldas-jobs.ligo-wa.caltech.edu/~areeda/blip-omega.tar 4 Blip glitches documentation • Brief description: Class of common glitches in both detectors, with no known cause currently. The only weak lead is that saturated hardware injections cause glitches that look very similar, so perhaps these are saturations in the actuation chain that happen under normal conditions. • Relevant alogs: • LLO: • LHO: saturated injections look like blips? • Other documentation: Some blip times and scans link 5 2. RF Beats Examples: https://ldas-jobs.ligo.caltech.edu/~areeda/josh-20150828.tgz 6 RF Beats documentation • Brief description: These are beats of two or more RF oscillators that sweep quickly through the audio range.
    [Show full text]