Journal articles on the topic 'Internet telephony. Ethernet (Local area network system) Local area networks (Computer networks)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 27 journal articles for your research on the topic 'Internet telephony. Ethernet (Local area network system) Local area networks (Computer networks).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mansfield, John F., Andy Adamson, and Kevin Coffman. "Development of a System to Provide Full, Real-time Remote Control of a Scanning Electron Microscope across the Second Generation Internet: The Teaching SEM." Microscopy and Microanalysis 6, no. 1 (January 2000): 31–41. http://dx.doi.org/10.1017/s1431927600000064.

Full text
Abstract:
The development and makeup of a real-time full remote control system for the University of Michigan, Department of Materials Science and Engineering Teaching SEM is described. The instrument was initially controlled via the campus local area Ethernet network and cable TV network. The latest implementation employs Fast Ethernet, Asynchronous Transfer Mode (ATM) networks, and moving picture experts group (MPEG) video encoding to effect the remote control via the computer network alone. Remote control demonstrations from Washington, DC, Dearborn, MI, and Emerson School, Ann Arbor, MI are described.
APA, Harvard, Vancouver, ISO, and other styles
2

Mansfield, John F., Andy Adamson, and Kevin Coffman. "Development of a System to Provide Full, Real-time Remote Control of a Scanning Electron Microscope across the Second Generation Internet: The Teaching SEM." Microscopy and Microanalysis 6, no. 1 (January 2000): 31–41. http://dx.doi.org/10.1007/s100059910003.

Full text
Abstract:
Abstract The development and makeup of a real-time full remote control system for the University of Michigan, Department of Materials Science and Engineering Teaching SEM is described. The instrument was initially controlled via the campus local area Ethernet network and cable TV network. The latest implementation employs Fast Ethernet, Asynchronous Transfer Mode (ATM) networks, and moving picture experts group (MPEG) video encoding to effect the remote control via the computer network alone. Remote control demonstrations from Washington, DC, Dearborn, MI, and Emerson School, Ann Arbor, MI are described.
APA, Harvard, Vancouver, ISO, and other styles
3

Sarkar, Nurul I., and Kashif Nisar. "Performance of VoIP in Wired-Cum-Wireless Ethernet Network." International Journal of Interdisciplinary Telecommunications and Networking 4, no. 4 (October 2012): 1–25. http://dx.doi.org/10.4018/jitn.2012100101.

Full text
Abstract:
The Voice over Internet Protocol (VoIP) is a rapidly growing technology that enables transport of voice over data networks such as Ethernet Local Area Networks (LANs). This growth is due to the integration of voice and data traffic over the existing network infrastructure, low cost, and improved network management offered by the technology. This paper reports on the performance of VoIP traffic characteristics in a wired-cum-wireless Ethernet LAN. The effect of increasing the number of VoIP wireless clients, different voice codec schemes, and packet arrival distributions on system performance is investigated. Through various simulation experiments under realistic network scenarios, such as Small Office Home Office (SOHO) and campus networks, this paper provides an insight into the performance of VoIP over Ethernet LANs. Simulation results show that VoIP clients and voice codec schemes have significant effect on system performance. The authors preformed OPNET-based simulations to validate their experiments.
APA, Harvard, Vancouver, ISO, and other styles
4

Briantoro, Hendy, Nobuo Funabiki, Minoru Kuribayashi, Kwenga Ismael Munene, Rahardhita Widyatra Sudibyo, Md Manowarul Islam, and Wen-Chung Kao. "Transmission Power Optimization of Concurrently Communicating Two Access Points in Wireless Local Area Network." International Journal of Mobile Computing and Multimedia Communications 11, no. 4 (October 2020): 1–25. http://dx.doi.org/10.4018/ijmcmc.2020100101.

Full text
Abstract:
Currently, the IEEE 802.11 wireless local-area network (WLAN) has been prevalent around the world due to the advantages of mobility, flexibility, and scalability. WLAN offers the wireless internet-access method through an access-point (AP) at homes, schools, or offices. When multiple APs are deployed in the network field, the proper transmission power of each AP is essential to improve the performance, considering the coverage area, transmission capacity, and interference. In this paper, the authors study the transmission power optimization of concurrently communicating two APs in WLAN. Based on extensive experiment results, the authors propose a method of selecting the best power for each AP from the signal-to-noise ratio (SNR) of receiving signal strength (RSS). For evaluations, the authors implemented the proposed method on the elastic WLAN system testbed using Raspberry Pi for APs and conducted experiments for nine network topologies in two buildings at Okayama University. The results show that the proposal always selects the best power in any topology.
APA, Harvard, Vancouver, ISO, and other styles
5

Atmadja, Martono Dwi. "Single Board Computer Applications as Multi-Server VoIP." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 15, 2021): 1023–28. http://dx.doi.org/10.22214/ijraset.2021.36512.

Full text
Abstract:
Telecommunication technology is developing along with information technology and several innovations in several audio and data transmission and reception techniques. Innovation and communication technology are hoped to be able to create efficiencies in regards to time, equipment, and cost. The Public Switched Telephone Network (PSTN) telephone technology has experienced integration towards communication using Internet Protocol (IP) networks, better known as Voice over Internet Protocol (VoIP). VoIP Technology transmits conversations digitally through IP-based networks, such as internet networks, Wide Area Networks (WAN), and Local Area Networks (LAN). However, the VoIP cannot fully replace PSTN due to several weaknesses, such as delay, jitter, packet loss, as well as security and echo. Telephones calls using VoIP technology are executed using terminals in the form of computer devices or existing analogue telephones. The benefit of VoIP is that it can be set in all ethernet and IP addresses. Prefixes can be applied for inter-server placements as inter-building telephone networks without the addition of inefficient new cables on single board computers with Elastix installed. Prefix and non-prefix analysis on servers from single board computers can be tested using QoS for bandwidth, jitter, and packet loss codec. The installation of 6 clients, or 3 simultaneous calls resulted in a packet loss value in the prefix Speex codex of 2.34%. The bandwidth in the prefix PCMU codec has an average value of 82.3Kbps, and a non-prefix value of 79.3Kbps, in accordance to the codec standards in the VoIP. The lowest jitter was found in the non-prefix PCMU codec with an average of 51.05ms, with the highest jitter for the prefix Speex codec being 314.65ms.
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Dong Hyun, and Jong Deok Kim. "Unequal loss protection scheme using a quality prediction model in a Wi-Fi broadcasting system." International Journal of Distributed Sensor Networks 15, no. 6 (June 2019): 155014771985424. http://dx.doi.org/10.1177/1550147719854247.

Full text
Abstract:
Wireless local area network–based broadcasting techniques are a type of mobile Internet Protocol television technology that simultaneously transmits multimedia content to local users. Contrary to the existing wireless local area network–based multimedia transmission systems, which transmit multimedia data to users using unicast packets, a wireless local area network–based broadcasting system is able to transmit multimedia data to many users in a single broadcast packet. Consequently, network resources do not increase with the increase in the number of users. However, IEEE 802.11 does not provide a packet loss recovery algorithm for broadcast packet loss, which is unavoidable. Therefore, the forward error correction technique is required to address the issue of broadcast packet loss. The broadcast packet loss rate of a wireless local area network–based broadcasting system that transmits compressed multimedia data is not proportional to the quality deterioration of the received video signals; therefore, it is difficult to predict the quality of the received video while also considering the effect of broadcast packet loss. In this scenario, allocating equal forward error correction packets to compressed frames is not an effective method for recovering broadcast packet loss. Thus, several studies on unequal loss protection have been conducted. This study proposes an effective, prediction-based unequal loss protection algorithm that can be applied to wireless local area network–based broadcasting systems. The proposed unequal loss protection algorithm adopts a novel approach by adding forward error correction packets to every transmission frame while considering frame loss. This algorithm was used as a new metric to predict video quality deterioration, and an unequal loss protection structure was designed, implemented, and verified. The effectiveness of the quality deterioration model and the validity of the unequal loss protection algorithm were demonstrated through experiments.
APA, Harvard, Vancouver, ISO, and other styles
7

Luhanga, Mathew L., and Cuthbet E. B. Amos. "Analytical Modeling of a Large Local Area Network - Part I: Internet Traffic Characterization." Tanzania Journal of Engineering and Technology 31, no. 2 (December 31, 2008): 52–60. http://dx.doi.org/10.52339/tjet.v31i2.430.

Full text
Abstract:
The goal of both IP network operators and the end users is to get the highest performance from the system for a given cost. This makes Performance a key criterion in the design, procurement, and use of computer and communication systems. In order to address problems associated with performance degradation of operational communicationssystems, over the last decade, traffic engineering techniques have emerged in an attempt to optimize communication systems’ performance and ensure more efficient use of their resources. One of these techniques is analytical modeling. Analytic performance models are an excellent tool for quickly evaluating the performance of operational or new systems. They are also well suited to comparing the performance of several alternative designs. However, analytical models can only be developed once detailed knowledge of characteristics of trafficcarried by a network is available. In Part I of this paper, traffic characterization of traffic carried by the largest Local Area Network (LAN) in Tanzania, University of Dar es Salaam Network (UDSMNET) is carried out. In Part II of this paper, an analytical model based on the Discrete Time Markov Modulated Poisson Process is proposed and validated for performance analysis of IP networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Xiu, De Bin, Qi Sun, Chun Zhi Ge, Yi Luo, Yuan Ting Du, Ya Dong Wang, and Yun Bo Shi. "Design of Mobile Meteorological Monitor Based on Wireless Sensor Network." Applied Mechanics and Materials 303-306 (February 2013): 938–44. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.938.

Full text
Abstract:
In order to monitor meteorological parameters such as temperature, humidity, pressure, wind speed and wind direction, a meteorological monitor system of wireless sensor networks was analyzed, which was based on the combination of Zigbee and GPRS communication technology. Short-distance data transmission was achieved through sensors local-area network completed by Zigbee technology, and long-distance data communication was achieved through GPRS technology. Terminal devices distributed in environment collected real-time data gained by sensors, and sent the data to the base station via Zigbee communication technology. The data was received and processed by Mobile base station and base stations choose to use GPRS or Ethernet technology access to Internet and transferred data to the monitoring center. Experimental results show that: temperature accuracy can reach 0.2°C, humidity accuracy can achieve 3.0%RH, and the pressure accuracy is up to 1.5mbar. The Meteorological data is real-time transmitted and the system solves the problem of data loss.
APA, Harvard, Vancouver, ISO, and other styles
9

Al mojamed, Mohammad. "Integrating Mobile Ad Hoc Networks with the Internet Based on OLSR." Wireless Communications and Mobile Computing 2020 (October 23, 2020): 1–16. http://dx.doi.org/10.1155/2020/8810761.

Full text
Abstract:
Although a standalone and isolated mobile ad hoc network (MANET) is practical in many scenarios, integration with the Internet is much more advantageous. The integration of a MANET with the Internet provides MANET users with Internet access and hence increases the scope of the MANET application. In addition, the Internet can benefit from this integration by an extension of the network coverage area. However, the integration of heterogeneous networks raises many issues. To overcome the incompatibilities between different architectures, gateways are used. This paper proposes a lightweight integration scheme for a MANET and the wider Internet, based on the optimized link state routing (OLSR). OLSR routing messages are reengineered and optimized to meet the needs of integration without involving additional routing messages for gateway discovery. The compulsory registration of a MANET node with a gateway node in a traditional integration is not required in the proposed approach, meaning that nodes can move freely within the local MANET with no disruption in the connection to another node in the external network. The proposed system is evaluated using the OMNET++ network simulator and is compared to another existing system. The simulation results demonstrate the validity of the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
10

Sholikhin, Achmad Riyadus, Taufiq Timur Warisaji, and Triawan Adi Cahyanto. "Penerapan Wireless Distribution System (WDS) Mesh Untuk Optimasi Cakupan Area Wi-Fi di UM Jember." BIOS : Jurnal Teknologi Informasi dan Rekayasa Komputer 1, no. 2 (February 11, 2021): 61–69. http://dx.doi.org/10.37148/bios.v1i2.14.

Full text
Abstract:
One very rapid change in computer networks is the use of Wireless Local Area Network (WLAN) to access systems both locally and the internet. One way to add an Access Point (AP) so as not to change the configuration of the running software is use the Wireless Distribution System Mesh (WDS) network. The use of WDS mesh at Universitas Muhammmadiyah Jember (UM Jember) enables a slightly different wireless configuration to reduce the connection loss in the user due to the wireless network area coverage. One step is use AP devices into one unit to handle the case of a connection break by utilizing a network service that is WDS Mesh. WDS Mesh can cover Wi-Fi areas at UM Jember, and the results of testing and analysis of client devices for APs that have been configured WDS Mesh with parameters Signal Strength, CCQ, Signal to Noise Ratio Ratio, Throughput is Excellent.
APA, Harvard, Vancouver, ISO, and other styles
11

Li, Jianjun, Jie Yu, Lanlan Xu, Xinying Xue, Chin-Chen Chang, Xiaoyang Mao, and Junfeng Hu. "A Cascaded Algorithm for Image Quality Assessment and Image Denoising Based on CNN for Image Security and Authorization." Security and Communication Networks 2018 (July 17, 2018): 1–13. http://dx.doi.org/10.1155/2018/8176984.

Full text
Abstract:
With the rapid development of Internet technology, images on the Internet are used in various aspects of people’s lives. The security and authorization of images are strongly dependent on image quality. Some potential problems have also emerged, among which the quality assessment and denoising of images are particularly evident. This paper proposes a novel NR-IQA method based on the dual convolutional neural network structure, which combines saliency detection with the human visual system (HSV), used as a weighting function to reflect the important distortion caused by the local area. The model is trained using gray and color features in the HSV space. It is applied to the parameter selection of an image denoising algorithm. The experiment proves that our proposed method can accurately evaluate image quality in the process of denoising. It provides great help in parameter optimization iteration and improves the performance of the algorithm. Through experiments, we obtain both improved image quality and a reasonable result of subject assessment when the cascaded algorithm is applied in image security and authorization.
APA, Harvard, Vancouver, ISO, and other styles
12

Hudiono, Hudiono, Mochammad Taufik, Ridho Hendra Yoga Perdana, and Amalia Eka Rakhmania. "Digital centralized water meter using 433 MHz LoRa." Bulletin of Electrical Engineering and Informatics 10, no. 4 (August 1, 2021): 2062–71. http://dx.doi.org/10.11591/eei.v10i4.2950.

Full text
Abstract:
The local water supply corporation in Indonesia only uses analog water meter so that the monitoring of water usage information was conducted by officers manually. Officers must physically monitor the value in the customer's water meter that can lead to unreliable reading and ineffectiveness of process. Smart meter is one of the smart city metrics which could overcome this problem. This research uses the flow sensor to design and incorporate automated water meters. The measured value is then passed via the 433 MHz LoRa, a low-power wide-area network protocol, to the local hub, then forwarded to the server via the internet based cellular network. Results show that our proposed system's accuracy hit 97.31% at an ideal distance of 200 meters from customer to the local hub. The customer's water usage could be tracked in real time with our proposed system. Furthermore, the original water meter need not to be replaced which may minimize capital costs for this system.
APA, Harvard, Vancouver, ISO, and other styles
13

Gonzalez, Gilbert. "DIVIDE OR CONVERGE?" Muma Case Review 1 (2016): 1–23. http://dx.doi.org/10.28945/3581.

Full text
Abstract:
Gilbert Gonzalez, founder and CEO of Mission Critical Solutions (MCS), was reflecting on the path forward for his company. MCS maintained and updated a five-year strategic plan each year since its inception in 1990. In the early years, the strategic plan focused on the key strategic factors (KSFs) and resulted in a narrow mission. Year after year, that focus on the KSFs was rewarded by the market. Doing the most important things well kept the organization focused and efficient. The consistently evolving mission of the organization necessitated adding new products, services, and solutions. In the early 1990s, deploying PCs, implementing local area networks (LANs), and providing onsite support met the challenges their customers faced. A few years later, the company’s clients’ needs led to the addition of a Wide Area Network (WAN) solution to aggregate offices and link applications. By 1996, information technologies (IT) and telecommunications began to converge. Common structured cable plants and digital trunks sharing voice and data traffic were new and mandatory elements of the clients’ solutions. Subtly, the technologies evolved and converged. Internet Protocol (IP) Telephony and Unified Communications converged onto the clients’ LAN/WAN networks. It was clear that most technology would speak IP in the future. In the early 2000s, building automation, audio video (AV), security, surveillance, and control system endpoints converged onto the network. The trend of unusual devices converging onto the network, also known as “the Internet of things,” will continue. Wireless innovations and mobility meant that technology could move not just around the facility, but also around the world. For MCS, the end result of this phenomenon was a group of specialized departments and teams: information technologies, passive cabling systems, electrical systems, building automation and controls, audio video, security and surveillance, and unified communications. All of these departments, staffed 200 associates strong, were coordinated by the project management team, and collaborated to meet the requirements of the company’s clients. Thus, the marketing elevator speech for MCS required a tall building! Their clients expressed surprise and confusion at the breadth of services offered. While the devices had converged, the clients’ perception of their vendors and providers had not. The question at hand was whether MCS should stay converged in a functional organization strategy with capability-based teams, or organize into separate standalone entities with unique identities and separate overheads, focusing more on the individual capability-based technology specialization.
APA, Harvard, Vancouver, ISO, and other styles
14

Kaknjo, Admir, Muzaffar Rao, Edin Omerdic, Luke Robinson, Daniel Toal, and Thomas Newe. "Real-Time Video Latency Measurement between a Robot and Its Remote Control Station: Causes and Mitigation." Wireless Communications and Mobile Computing 2018 (December 2, 2018): 1–19. http://dx.doi.org/10.1155/2018/8638019.

Full text
Abstract:
This work presents a detailed study, characterization, and measurement of video latency in a real-time video streaming application. The target application consists of an automatic control system in the form of a control station and the mini Remotely Operated Vehicle (ROV) equipped with a camera, which is controllable over local area network (LAN) and the Internet. Control signal transmission and feedback measurements to the operator usually impose real-time constraints on the network channel. Similarly, the video stream, which is required for the normal system control and maneuvering, imposes further strict requirements on the network in terms of bandwidth and latency. Based on these requirements, controlling the system in real time through a standard Internet connection is a challenging task. The measurement of important network parameters like availability, bandwidth, and latency has become mandatory for remotely controlling the system in real time. It is necessary to establish a methodology for the measurement of video and network latency to improve the real-time controllability and safety of the system as such measurement is not possible using existing solutions due to the following reasons: insufficient accuracy, relying on the Internet resources such as generic Network Time Protocol (NTP) servers, inability to obtain one-way delay measurement, and many solutions only having support for web cameras. Here, an efficient, reliable, and cost-effective methodology for the measurement of latency of a video stream over a LAN and the Internet is proposed. A dedicated stratum-1 NTP server is used and the necessary software needed for acquiring and measuring the latency of a video stream from a generic IP camera as well as integration into the existing ROV control software was developed. Here, by using the software and dedicated clock synchronization equipment (NTP server), it was found that normal video latencies in a LAN were in the range of 488ms – 850ms, while latencies over the Internet were measured to be in the range of 558ms – 1211ms. It is important to note that the values were obtained by using a generic (off-the-shelf) IP camera and they represent the actual latencies which might be experienced during control over long range and across international territory borders.
APA, Harvard, Vancouver, ISO, and other styles
15

Sumardi, Sopian, and Mohammad Taufan Asri Zaen. "Perancangan Jaringan Komputer Berbasis Mikrotik Router OS Pada SMAN 4 Praya." Jurnal Informatika dan Rekayasa Elektronik 1, no. 1 (May 4, 2018): 50. http://dx.doi.org/10.36595/jire.v1i1.32.

Full text
Abstract:
Information and Communication Technology (ICT) is a very important requirement in the implementation of education. Becoming a necessity for SMAN 4 Praya as an upper secondary educational institution to build computer network technology considering the complexity of the problems faced in the administrative system as well as the teaching and learning process. ICTs need to be well-designed to ensure that resources can be utilized optimally and mission vision can be achieved as expected. The design of computer networks at SMAN 4 Praya uses the Network Development Life Cycle (NDLC) approaches as a development method, covering a number of stages analysis, design, prototype simulation, implementation, monitoring and management. The process of analysis is divided into several processes, namely user needs analysis, device requirement analysis (hardware, software, brainware), network needs analysis, feasibility analysis (feasibility of infrastructure and human resource feasibility), and through network topology analysis by designing architecture and computer network design. Network Design Local Area Network (LAN) and Wireless Fidelity (WiFi) based on Mikrotik RouterOS. Implementation of the use of Mikroutik RouterOS on the Internet network SMAN 4 Praya can provide effective and optimal results to divide the bandwidth of each client as as reserved, and allows administrators in managing the network to remain stable and provide maximum results.
APA, Harvard, Vancouver, ISO, and other styles
16

Zheng, Zhe, Wenpeng Cui, Lei Qiao, and Jinghong Guo. "Performance and Power Consumption Analysis of IEEE802.11ah for Smart Grid." Wireless Communications and Mobile Computing 2018 (July 25, 2018): 1–8. http://dx.doi.org/10.1155/2018/5286560.

Full text
Abstract:
IEEE802.11ah is a Wireless Local Area Network (WLAN) designed for the application of Internet of Things (IoT) and Machine to Machine (M2M), mainly used in sensor network, smart metering, car network, health care, and other emerging fields. IEEE802.11ah inherits the IEEE802.11n∖ac technology. At present, smart grid has completed the installation of optical fiber communication as its backbone network; WLAN can be used to build new wireless sensor network for smart grid by improving the transmission distance, speed, and power efficiency. The critical features of 802.11ah make it a powerful candidate for WLAN in smart grid, such as intelligent substation sensor network and automatic metering system (AMS). This paper simulates the new added highly robust 1MHz bandwidth and Modulation Coding Scheme (MCS) 10 in the 802.11ah physical layer and analyzes the coverage range and energy-saving performance of 802.11ah based on the simulation results. The analysis shows that the 802.11ah at 1 MHZ MCS 10 mode can obtain 2.5-3 dB gain. Combined with advantages of Sub-1GHz working frequency, 802.11ah could enlarge the coverage range by five times, compared to 2.4 GHz Wi-Fi. On the other side, 802.11ah module used in the smart grid can greatly reduce power consumption, especially in the AMS with a 1.1 kW.H power savings per year. 802.11ah not only provides the flexibility and low cost features of wireless communication, but also brings coverage and energy-saving performance improvements, which leads to good economic benefit.
APA, Harvard, Vancouver, ISO, and other styles
17

Majeed, Muhammad Faran, Irshad Ahmed Abbasi, Sikandar Ali, Elfatih Elmubarak Mustafa, Ibrar Hussain, Khalid Saeed, Muhammad Faisal Abrar, Mah E. No, and Muhammad Kashif Khattak. "From Digital Divide to Information Availability: A Wi-Fi-Based Novel Solution for Information Dissemination." Wireless Communications and Mobile Computing 2021 (February 28, 2021): 1–19. http://dx.doi.org/10.1155/2021/6698246.

Full text
Abstract:
Digital divide means unequal access to the people for information and communication technology (ICT) facilities. The developed countries are comparatively less digitally divided as compared to developing countries. This study focuses on District Chitral considering its geographical conditions and high mountainous topography which plays a significant role in its isolation. Aside from the digital divide, the situation in Chitral is even more severe in terms of the absence of basic ICT infrastructure and electricity in the schools. To address this issue, especially in female secondary and higher secondary schools, we designed a project to bridge the digital divide via Wireless Local Area Network on Raspberry Pi3 for balancing the ICT facilities in the targeted area. The Wi-Fi-Based Content Distributors (Wi-Fi-BCDs) were provided to bridge the digital divide in rural area schools of Chitral. The Wi-Fi-BCD is a solar-based system that is used to deliver quality educational contents directly to classroom, library, or other learning environments without electricity connection and Internet wire as these facilities are available by default in it. The close-ended questionnaire was adopted to collect data from the students, teachers, and headmistresses of girl secondary and higher secondary schools in Chitral. The procedure of validity, reliability, regression, correlation, and exploratory factor analysis was used to analyze the obtained data. The technology acceptance model (TAM) was modified and adopted to examine the effects of Wi-Fi-BCD for bridging the digital divide. The relationship of the modified TAM model was examined through regression and correlation to verify the model fitness according to the data obtained. The result analysis of this study shows that the relationship of the modified TAM model with its variables is positively significant, while the analysis of path relationship between model variables and outcomes from the questionnaire shows that it motivates learners to use Wi-Fi-BCD.
APA, Harvard, Vancouver, ISO, and other styles
18

L, Rajesh, and Penke Satyanarayana. "Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol." Security and Communication Networks 2021 (September 27, 2021): 1–15. http://dx.doi.org/10.1155/2021/8887666.

Full text
Abstract:
Industrial control systems (ICS) are being used for surveillance and controlling numerous industrial process plants in national critical infrastructures. Supervisory control and data acquisition (SCADA) system is a core component in ICS systems for continuous monitoring and controlling these process plants. Legacy SCADA systems are working in isolated networks and using proprietary communication protocols which made them less exposed to cyber threats. In recent times, these ICS systems have been connected to Internet and corporate networks for data sharing and remote monitoring. They are also using open protocols and operating systems. This leads to vulnerabilities of the system to cyberattacks. Cybersecurity threats are more prevalent than ever in ICS systems. These attacks may be external or internal. Modbus is a widely deployed communication protocol for SCADA communications. There is no security in design of Modbus protocol, and it is vulnerable to numerous cyberattacks. In this paper, we worked for False Command Injection attack, False Access Injection attack, and replay attacks on Modbus protocol. Initially, a real-time SCADA testbed was set up, and we envisaged the impact of these attacks on Modbus protocol data using the testbed. In this work, we used local area network (LAN) environment only for simulating the attacks. We assumed that the attacks penetrated the LAN network. We proposed and developed (a) a method to detect replay attacks by incorporating time stamp and sequence number in Modbus communications and (b) a frame filtering module which will block unauthorized attacks like False Command Injection and False Access Injection attacks to reach programmable logic controller (PLC). Numbers of attacks were simulated and the performance of the method was measured using attack block rate (ABR). It blocked 97% of malicious Modbus transactions or attacks to reach the PLC. It protects SCADA systems from attackers, which is a core component of industrial control systems. The solution enhanced the security of SCADA systems with Modbus protocol.
APA, Harvard, Vancouver, ISO, and other styles
19

Nayyar, Anand, Pijush Kanti Dutta Pramankit, and Rajni Mohana. "Introduction to the Special Issue on Evolving IoT and Cyber-Physical Systems: Advancements, Applications, and Solutions." Scalable Computing: Practice and Experience 21, no. 3 (August 1, 2020): 347–48. http://dx.doi.org/10.12694/scpe.v21i3.1568.

Full text
Abstract:
Internet of Things (IoT) is regarded as a next-generation wave of Information Technology (IT) after the widespread emergence of the Internet and mobile communication technologies. IoT supports information exchange and networked interaction of appliances, vehicles and other objects, making sensing and actuation possible in a low-cost and smart manner. On the other hand, cyber-physical systems (CPS) are described as the engineered systems which are built upon the tight integration of the cyber entities (e.g., computation, communication, and control) and the physical things (natural and man-made systems governed by the laws of physics). The IoT and CPS are not isolated technologies. Rather it can be said that IoT is the base or enabling technology for CPS and CPS is considered as the grownup development of IoT, completing the IoT notion and vision. Both are merged into closed-loop, providing mechanisms for conceptualizing, and realizing all aspects of the networked composed systems that are monitored and controlled by computing algorithms and are tightly coupled among users and the Internet. That is, the hardware and the software entities are intertwined, and they typically function on different time and location-based scales. In fact, the linking between the cyber and the physical world is enabled by IoT (through sensors and actuators). CPS that includes traditional embedded and control systems are supposed to be transformed by the evolving and innovative methodologies and engineering of IoT. Several applications areas of IoT and CPS are smart building, smart transport, automated vehicles, smart cities, smart grid, smart manufacturing, smart agriculture, smart healthcare, smart supply chain and logistics, etc. Though CPS and IoT have significant overlaps, they differ in terms of engineering aspects. Engineering IoT systems revolves around the uniquely identifiable and internet-connected devices and embedded systems; whereas engineering CPS requires a strong emphasis on the relationship between computation aspects (complex software) and the physical entities (hardware). Engineering CPS is challenging because there is no defined and fixed boundary and relationship between the cyber and physical worlds. In CPS, diverse constituent parts are composed and collaborated together to create unified systems with global behaviour. These systems need to be ensured in terms of dependability, safety, security, efficiency, and adherence to real‐time constraints. Hence, designing CPS requires knowledge of multidisciplinary areas such as sensing technologies, distributed systems, pervasive and ubiquitous computing, real-time computing, computer networking, control theory, signal processing, embedded systems, etc. CPS, along with the continuous evolving IoT, has posed several challenges. For example, the enormous amount of data collected from the physical things makes it difficult for Big Data management and analytics that includes data normalization, data aggregation, data mining, pattern extraction and information visualization. Similarly, the future IoT and CPS need standardized abstraction and architecture that will allow modular designing and engineering of IoT and CPS in global and synergetic applications. Another challenging concern of IoT and CPS is the security and reliability of the components and systems. Although IoT and CPS have attracted the attention of the research communities and several ideas and solutions are proposed, there are still huge possibilities for innovative propositions to make IoT and CPS vision successful. The major challenges and research scopes include system design and implementation, computing and communication, system architecture and integration, application-based implementations, fault tolerance, designing efficient algorithms and protocols, availability and reliability, security and privacy, energy-efficiency and sustainability, etc. It is our great privilege to present Volume 21, Issue 3 of Scalable Computing: Practice and Experience. We had received 30 research papers and out of which 14 papers are selected for publication. The objective of this special issue is to explore and report recent advances and disseminate state-of-the-art research related to IoT, CPS and the enabling and associated technologies. The special issue will present new dimensions of research to researchers and industry professionals with regard to IoT and CPS. Vivek Kumar Prasad and Madhuri D Bhavsar in the paper titled "Monitoring and Prediction of SLA for IoT based Cloud described the mechanisms for monitoring by using the concept of reinforcement learning and prediction of the cloud resources, which forms the critical parts of cloud expertise in support of controlling and evolution of the IT resources and has been implemented using LSTM. The proper utilization of the resources will generate revenues to the provider and also increases the trust factor of the provider of cloud services. For experimental analysis, four parameters have been used i.e. CPU utilization, disk read/write throughput and memory utilization. Kasture et al. in the paper titled "Comparative Study of Speaker Recognition Techniques in IoT Devices for Text Independent Negative Recognition" compared the performance of features which are used in state of art speaker recognition models and analyse variants of Mel frequency cepstrum coefficients (MFCC) predominantly used in feature extraction which can be further incorporated and used in various smart devices. Mahesh Kumar Singh and Om Prakash Rishi in the paper titled "Event Driven Recommendation System for E-Commerce using Knowledge based Collaborative Filtering Technique" proposed a novel system that uses a knowledge base generated from knowledge graph to identify the domain knowledge of users, items, and relationships among these, knowledge graph is a labelled multidimensional directed graph that represents the relationship among the users and the items. The proposed approach uses about 100 percent of users' participation in the form of activities during navigation of the web site. Thus, the system expects under the users' interest that is beneficial for both seller and buyer. The proposed system is compared with baseline methods in area of recommendation system using three parameters: precision, recall and NDGA through online and offline evaluation studies with user data and it is observed that proposed system is better as compared to other baseline systems. Benbrahim et al. in the paper titled "Deep Convolutional Neural Network with TensorFlow and Keras to Classify Skin Cancer" proposed a novel classification model to classify skin tumours in images using Deep Learning methodology and the proposed system was tested on HAM10000 dataset comprising of 10,015 dermatoscopic images and the results observed that the proposed system is accurate in order of 94.06\% in validation set and 93.93\% in the test set. Devi B et al. in the paper titled "Deadlock Free Resource Management Technique for IoT-Based Post Disaster Recovery Systems" proposed a new class of techniques that do not perform stringent testing before allocating the resources but still ensure that the system is deadlock-free and the overhead is also minimal. The proposed technique suggests reserving a portion of the resources to ensure no deadlock would occur. The correctness of the technique is proved in the form of theorems. The average turnaround time is approximately 18\% lower for the proposed technique over Banker's algorithm and also an optimal overhead of O(m). Deep et al. in the paper titled "Access Management of User and Cyber-Physical Device in DBAAS According to Indian IT Laws Using Blockchain" proposed a novel blockchain solution to track the activities of employees managing cloud. Employee authentication and authorization are managed through the blockchain server. User authentication related data is stored in blockchain. The proposed work assists cloud companies to have better control over their employee's activities, thus help in preventing insider attack on User and Cyber-Physical Devices. Sumit Kumar and Jaspreet Singh in paper titled "Internet of Vehicles (IoV) over VANETS: Smart and Secure Communication using IoT" highlighted a detailed description of Internet of Vehicles (IoV) with current applications, architectures, communication technologies, routing protocols and different issues. The researchers also elaborated research challenges and trade-off between security and privacy in area of IoV. Deore et al. in the paper titled "A New Approach for Navigation and Traffic Signs Indication Using Map Integrated Augmented Reality for Self-Driving Cars" proposed a new approach to supplement the technology used in self-driving cards for perception. The proposed approach uses Augmented Reality to create and augment artificial objects of navigational signs and traffic signals based on vehicles location to reality. This approach help navigate the vehicle even if the road infrastructure does not have very good sign indications and marking. The approach was tested locally by creating a local navigational system and a smartphone based augmented reality app. The approach performed better than the conventional method as the objects were clearer in the frame which made it each for the object detection to detect them. Bhardwaj et al. in the paper titled "A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions" performed literature on IoV and Trust and proposed a Hybrid Trust model that seperates the malicious and trusted nodes to secure the interaction of vehicle in IoV. To test the model, simulation was conducted on varied threshold values. And results observed that PDR of trusted node is 0.63 which is higher as compared to PDR of malicious node which is 0.15. And on the basis of PDR, number of available hops and Trust Dynamics the malicious nodes are identified and discarded. Saniya Zahoor and Roohie Naaz Mir in the paper titled "A Parallelization Based Data Management Framework for Pervasive IoT Applications" highlighted the recent studies and related information in data management for pervasive IoT applications having limited resources. The paper also proposes a parallelization-based data management framework for resource-constrained pervasive applications of IoT. The comparison of the proposed framework is done with the sequential approach through simulations and empirical data analysis. The results show an improvement in energy, processing, and storage requirements for the processing of data on the IoT device in the proposed framework as compared to the sequential approach. Patel et al. in the paper titled "Performance Analysis of Video ON-Demand and Live Video Streaming Using Cloud Based Services" presented a review of video analysis over the LVS \& VoDS video application. The researchers compared different messaging brokers which helps to deliver each frame in a distributed pipeline to analyze the impact on two message brokers for video analysis to achieve LVS & VoS using AWS elemental services. In addition, the researchers also analysed the Kafka configuration parameter for reliability on full-service-mode. Saniya Zahoor and Roohie Naaz Mir in the paper titled "Design and Modeling of Resource-Constrained IoT Based Body Area Networks" presented the design and modeling of a resource-constrained BAN System and also discussed the various scenarios of BAN in context of resource constraints. The Researchers also proposed an Advanced Edge Clustering (AEC) approach to manage the resources such as energy, storage, and processing of BAN devices while performing real-time data capture of critical health parameters and detection of abnormal patterns. The comparison of the AEC approach is done with the Stable Election Protocol (SEP) through simulations and empirical data analysis. The results show an improvement in energy, processing time and storage requirements for the processing of data on BAN devices in AEC as compared to SEP. Neelam Saleem Khan and Mohammad Ahsan Chishti in the paper titled "Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review" outlined major authentication issues in IoT, map their existing solutions and further tabulate Fog and IoT security loopholes. Furthermore, this paper presents Blockchain, a decentralized distributed technology as one of the solutions for authentication issues in IoT. In addition, the researchers discussed the strength of Blockchain technology, work done in this field, its adoption in COVID-19 fight and tabulate various challenges in Blockchain technology. The researchers also proposed Cell Tree architecture as another solution to address some of the security issues in IoT, outlined its advantages over Blockchain technology and tabulated some future course to stir some attempts in this area. Bhadwal et al. in the paper titled "A Machine Translation System from Hindi to Sanskrit Language Using Rule Based Approach" proposed a rule-based machine translation system to bridge the language barrier between Hindi and Sanskrit Language by converting any test in Hindi to Sanskrit. The results are produced in the form of two confusion matrices wherein a total of 50 random sentences and 100 tokens (Hindi words or phrases) were taken for system evaluation. The semantic evaluation of 100 tokens produce an accuracy of 94\% while the pragmatic analysis of 50 sentences produce an accuracy of around 86\%. Hence, the proposed system can be used to understand the whole translation process and can further be employed as a tool for learning as well as teaching. Further, this application can be embedded in local communication based assisting Internet of Things (IoT) devices like Alexa or Google Assistant. Anshu Kumar Dwivedi and A.K. Sharma in the paper titled "NEEF: A Novel Energy Efficient Fuzzy Logic Based Clustering Protocol for Wireless Sensor Network" proposed a a deterministic novel energy efficient fuzzy logic-based clustering protocol (NEEF) which considers primary and secondary factors in fuzzy logic system while selecting cluster heads. After selection of cluster heads, non-cluster head nodes use fuzzy logic for prudent selection of their cluster head for cluster formation. NEEF is simulated and compared with two recent state of the art protocols, namely SCHFTL and DFCR under two scenarios. Simulation results unveil better performance by balancing the load and improvement in terms of stability period, packets forwarded to the base station, improved average energy and extended lifetime.
APA, Harvard, Vancouver, ISO, and other styles
20

Tadevosyan, Robert, Arthur Petrosyan, and Gurgen Petrosyan. "The Concept of Internal IP Addresses System for NRENs." Mathematical Problems of Computer Science, July 15, 2020, 67–71. http://dx.doi.org/10.51408/1963-0054.

Full text
Abstract:
This paper presents the concept of a new system of internal IP addresses proposed for use by National Research and Education Networks (NREN). Recently, various systems and services, have been actively developing, such as Wi-Fi, IP telephony, etc., for which it is necessary to ensure the security of streams, reducing the area of collisions, etc. The allocation of additional IP addresses in local networks makes it possible to realize all the abovementioned tasks and have the necessary reserve for future development. The concept is deployed in Academic Scientific Research Computer Network ofArmenia (ASNET-AM).
APA, Harvard, Vancouver, ISO, and other styles
21

Osman Goni and Abu Shameem. "Implementation of Local Area Network (LAN) & Build a Secure LAN System for BAEC Head Quarter." Research Journal of Computer Science and Engineering, June 5, 2021, 1–15. http://dx.doi.org/10.36811/rjcse.2021.110003.

Full text
Abstract:
Network security is the process of taking physical and software preventative measures to protect the underlying networking infrastructure from unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure, thereby creating a secure platform for computers, users, and programs to perform their permitted critical functions within a secure environment. A local area network (LAN) is a computer network within a small geographical area such as a home, school, computer laboratory, office building or group of buildings. A LAN is composed of inter-connected workstations and personal computers which are each capable of accessing and sharing data and devices, such as printers, scanners and data storage devices, anywhere on the LAN. LANs are characterized by higher communication and data transfer rates and the lack of any need for leased communication lines. A data network is an interconnected system of computers, peripherals and software over which data files and messages are sent and received. LAN is only one type of computer network. LAN define is Data com system allowing a number of independent devices to communicate directly with each other, within a moderately sized geographic area over a physical communications channel of moderate data rates. Fiber-optic communication is a method of transmitting information from one place to another by sending pulses of infrared light through an optical fiber. The light is a form of carrier wave that is modulated to carry information. Fiber is preferred over electrical cabling when high bandwidth, long distance, or immunity to electromagnetic interference is required. This type of communication can transmit voice, video, and telemetry through local area networks or across long distances. Optical fiber is used by many telecommunications companies to transmit telephone signals, Internet communication, and cable television signals. Researchers at Bell Labs have reached a record bandwidth distance product of over 100 petabit × kilometers per second using fiber optic communication. Communication between remote parties can be achieved through a process called Networking, involving the connection of computers, media and networking devices. When we talk about networks, we need to keep in mind three concepts, distributed processing, network criteria and network structure. The purpose of this Network is to design a Local Area Network (LAN) for a BAEC (Bangladesh Atomic Energy Commission) Head Quarter and implement security measures to protect network resources and system services. To do so, we will deal with the physical and logical design of a LAN. The goal of this Network is to examine of the Local Area Network set up for a BAEC HQ and build a secure LAN system. Keywords: LAN, Secure LAN, BTCL, UTP, RJ-45, Bandwidth, Wavelength, ISP, Firewall, BAEC
APA, Harvard, Vancouver, ISO, and other styles
22

Luo, Wei, Wuquan Chen, Yulu Feng, and Yuqi Yang. "A novel automobile antenna for vehicles communication of IoT systems in 5G network." EURASIP Journal on Wireless Communications and Networking 2020, no. 1 (October 29, 2020). http://dx.doi.org/10.1186/s13638-020-01838-7.

Full text
Abstract:
Abstract The Internet of vehicles (IoV) is an important part of mobile communication system with the development of Internet of things. A novel multiband automobile antenna is proposed, which can cover all frequency bands for the long-term evolution (LTE), the fifth generation wireless systems (5G), the wireless local area network and the dedicated short-range communication (from 690 to 944 MHz and from 1.46 to 6 GHz). The antenna is designed based on the monopole antenna, and the impedance matching performance of the antenna is improved by loading the toothed capacitor and the impedance matching disk. The simulation results show that the automobile antenna achieves good impedance matching in the working bandwidth and obtains omnidirectional radiation pattern in the horizontal direction. The electric field distribution of the antenna placed on the vehicle roof is simulated to evaluate the network performance of the antenna system in the urban environment. The transmission coefficient of the transceiver system using the automobile antenna is also analyzed based on the electromagnetic simulation results and statistical model. The blind area of mobile communication system is effectively covered with the automobile antenna, which could be used to connect the LTE cell and the IoV system.
APA, Harvard, Vancouver, ISO, and other styles
23

Goggin, Gerard. "Broadband." M/C Journal 6, no. 4 (August 1, 2003). http://dx.doi.org/10.5204/mcj.2219.

Full text
Abstract:
Connecting I’ve moved house on the weekend, closer to the centre of an Australian capital city. I had recently signed up for broadband, with a major Australian Internet company (my first contact, cf. Turner). Now I am the proud owner of a larger modem than I have ever owned: a white cable modem. I gaze out into our new street: two thick black cables cosseted in silver wire. I am relieved. My new home is located in one of those streets, double-cabled by Telstra and Optus in the data-rush of the mid-1990s. Otherwise, I’d be moth-balling the cable modem, and the thrill of my data percolating down coaxial cable. And it would be off to the computer supermarket to buy an ASDL modem, then to pick a provider, to squeeze some twenty-first century connectivity out of old copper (the phone network our grandparents and great-grandparents built). If I still lived in the country, or the outskirts of the city, or anywhere else more than four kilometres from the phone exchange, and somewhere that cable pay TV will never reach, it would be a dish for me — satellite. Our digital lives are premised upon infrastructure, the networks through which we shape what we do, fashion the meanings of our customs and practices, and exchange signs with others. Infrastructure is not simply the material or the technical (Lamberton), but it is the dense, fibrous knotting together of social visions, cultural resources, individual desires, and connections. No more can one easily discern between ‘society’ and ‘technology’, ‘carriage’ and ‘content’, ‘base’ and ‘superstructure’, or ‘infrastructure’ and ‘applications’ (or ‘services’ or ‘content’). To understand telecommunications in action, or the vectors of fibre, we need to consider the long and heterogeneous list of links among different human and non-human actors — the long networks, to take Bruno Latour’s evocative concept, that confect our broadband networks (Latour). The co-ordinates of our infrastructure still build on a century-long history of telecommunications networks, on the nineteenth-century centrality of telegraphy preceding this, and on the histories of the public and private so inscribed. Yet we are in the midst of a long, slow dismantling of the posts-telegraph-telephone (PTT) model of the monopoly carrier for each nation that dominated the twentieth century, with its deep colonial foundations. Instead our New World Information and Communication Order is not the decolonising UNESCO vision of the late 1970s and early 1980s (MacBride, Maitland). Rather it is the neoliberal, free trade, market access model, its symbol the 1984 US judicial decision to require the break-up of AT&T and the UK legislation in the same year that underpinned the Thatcherite twin move to privatize British Telecom and introduce telecommunications competition. Between 1984 and 1999, 110 telecommunications companies were privatized, and the ‘acquisition of privatized PTOs [public telecommunications operators] by European and American operators does follow colonial lines’ (Winseck 396; see also Mody, Bauer & Straubhaar). The competitive market has now been uneasily installed as the paradigm for convergent communications networks, not least with the World Trade Organisation’s 1994 General Agreement on Trade in Services and Annex on Telecommunications. As the citizen is recast as consumer and customer (Goggin, ‘Citizens and Beyond’), we rethink our cultural and political axioms as well as the axes that orient our understandings in this area. Information might travel close to the speed of light, and we might fantasise about optical fibre to the home (or pillow), but our terrain, our band where the struggle lies today, is narrower than we wish. Begging for broadband, it seems, is a long way from warchalking for WiFi. Policy Circuits The dreary everyday business of getting connected plugs the individual netizen into a tangled mess of policy circuits, as much as tricky network negotiations. Broadband in mid-2003 in Australia is a curious chimera, welded together from a patchwork of technologies, old and newer communications industries, emerging economies and patterns of use. Broadband conjures up grander visions, however, of communication and cultural cornucopia. Broadband is high-speed, high-bandwidth, ‘always-on’, networked communications. People can send and receive video, engage in multimedia exchanges of all sorts, make the most of online education, realise the vision of home-based work and trading, have access to telemedicine, and entertainment. Broadband really entered the lexicon with the mass takeup of the Internet in the early to mid-1990s, and with the debates about something called the ‘information superhighway’. The rise of the Internet, the deregulation of telecommunications, and the involuted convergence of communications and media technologies saw broadband positioned at the centre of policy debates nearly a decade ago. In 1993-1994, Australia had its Broadband Services Expert Group (BSEG), established by the then Labor government. The BSEG was charged with inquiring into ‘issues relating to the delivery of broadband services to homes, schools and businesses’. Stung by criticisms of elite composition (a narrow membership, with only one woman among its twelve members, and no consumer or citizen group representation), the BSEG was prompted into wider public discussion and consultation (Goggin & Newell). The then Bureau of Transport and Communications Economics (BTCE), since transmogrified into the Communications Research Unit of the Department of Communications, Information Technology and the Arts (DCITA), conducted its large-scale Communications Futures Project (BTCE and Luck). The BSEG Final report posed the question starkly: As a society we have choices to make. If we ignore the opportunities we run the risk of being left behind as other countries introduce new services and make themselves more competitive: we will become consumers of other countries’ content, culture and technologies rather than our own. Or we could adopt new technologies at any cost…This report puts forward a different approach, one based on developing a new, user-oriented strategy for communications. The emphasis will be on communication among people... (BSEG v) The BSEG proposed a ‘National Strategy for New Communications Networks’ based on three aspects: education and community access, industry development, and the role of government (BSEG x). Ironically, while the nation, or at least its policy elites, pondered the weighty question of broadband, Australia’s two largest telcos were doing it. The commercial decision of Telstra/Foxtel and Optus Vision, and their various television partners, was to nail their colours (black) to the mast, or rather telegraph pole, and to lay cable in the major capital cities. In fact, they duplicated the infrastructure in cities such as Sydney and Melbourne, then deciding it would not be profitable to cable up even regional centres, let alone small country towns or settlements. As Terry Flew and Christina Spurgeon observe: This wasteful duplication contrasted with many other parts of the country that would never have access to this infrastructure, or to the social and economic benefits that it was perceived to deliver. (Flew & Spurgeon 72) The implications of this decision for Australia’s telecommunications and television were profound, but there was little, if any, public input into this. Then Minister Michael Lee was very proud of his anti-siphoning list of programs, such as national sporting events, that would remain on free-to-air television rather than screen on pay, but was unwilling, or unable, to develop policy on broadband and pay TV cable infrastructure (on the ironies of Australia’s television history, see Given’s masterly account). During this period also, it may be remembered, Australia’s Internet was being passed into private hands, with the tendering out of AARNET (see Spurgeon for discussion). No such national strategy on broadband really emerged in the intervening years, nor has the market provided integrated, accessible broadband services. In 1997, landmark telecommunications legislation was enacted that provided a comprehensive framework for competition in telecommunications, as well as consolidating and extending consumer protection, universal service, customer service standards, and other reforms (CLC). Carrier and reseller competition had commenced in 1991, and the 1997 legislation gave it further impetus. Effective competition is now well established in long distance telephone markets, and in mobiles. Rivalrous competition exists in the market for local-call services, though viable alternatives to Telstra’s dominance are still few (Fels). Broadband too is an area where there is symbolic rivalry rather than effective competition. This is most visible in advertised ADSL offerings in large cities, yet most of the infrastructure for these services is comprised by Telstra’s copper, fixed-line network. Facilities-based duopoly competition exists principally where Telstra/Foxtel and Optus cable networks have been laid, though there are quite a number of ventures underway by regional telcos, power companies, and, most substantial perhaps, the ACT government’s TransACT broadband network. Policymakers and industry have been greatly concerned about what they see as slow takeup of broadband, compared to other countries, and by barriers to broadband competition and access to ‘bottleneck’ facilities (such as Telstra or Optus’s networks) by potential competitors. The government has alternated between trying to talk up broadband benefits and rates of take up and recognising the real difficulties Australia faces as a large country with a relative small and dispersed population. In March 2003, Minister Alston directed the ACCC to implement new monitoring and reporting arrangements on competition in the broadband industry. A key site for discussion of these matters has been the competition policy institution, the Australian Competition and Consumer Commission, and its various inquiries, reports, and considerations (consult ACCC’s telecommunications homepage at http://www.accc.gov.au/telco/fs-telecom.htm). Another key site has been the Productivity Commission (http://www.pc.gov.au), while a third is the National Office on the Information Economy (NOIE - http://www.noie.gov.au/projects/access/access/broadband1.htm). Others have questioned whether even the most perfectly competitive market in broadband will actually provide access to citizens and consumers. A great deal of work on this issue has been undertaken by DCITA, NOIE, the regulators, and industry bodies, not to mention consumer and public interest groups. Since 1997, there have been a number of governmental inquiries undertaken or in progress concerning the takeup of broadband and networked new media (for example, a House of Representatives Wireless Broadband Inquiry), as well as important inquiries into the still most strategically important of Australia’s companies in this area, Telstra. Much of this effort on an ersatz broadband policy has been piecemeal and fragmented. There are fundamental difficulties with the large size of the Australian continent and its harsh terrain, the small size of the Australian market, the number of providers, and the dominant position effectively still held by Telstra, as well as Singtel Optus (Optus’s previous overseas investors included Cable & Wireless and Bell South), and the larger telecommunications and Internet companies (such as Ozemail). Many consumers living in metropolitan Australia still face real difficulties in realising the slogan ‘bandwidth for all’, but the situation in parts of rural Australia is far worse. Satellite ‘broadband’ solutions are available, through Telstra Countrywide or other providers, but these offer limited two-way interactivity. Data can be received at reasonable speeds (though at far lower data rates than how ‘broadband’ used to be defined), but can only be sent at far slower rates (Goggin, Rural Communities Online). The cultural implications of these digital constraints may well be considerable. Computer gamers, for instance, are frustrated by slow return paths. In this light, the final report of the January 2003 Broadband Advisory Group (BAG) is very timely. The BAG report opens with a broadband rhapsody: Broadband communications technologies can deliver substantial economic and social benefits to Australia…As well as producing productivity gains in traditional and new industries, advanced connectivity can enrich community life, particularly in rural and regional areas. It provides the basis for integration of remote communities into national economic, cultural and social life. (BAG 1, 7) Its prescriptions include: Australia will be a world leader in the availability and effective use of broadband...and to capture the economic and social benefits of broadband connectivity...Broadband should be available to all Australians at fair and reasonable prices…Market arrangements should be pro-competitive and encourage investment...The Government should adopt a National Broadband Strategy (BAG 1) And, like its predecessor nine years earlier, the BAG report does make reference to a national broadband strategy aiming to maximise “choice in work and recreation activities available to all Australians independent of location, background, age or interests” (17). However, the idea of a national broadband strategy is not something the BAG really comes to grips with. The final report is keen on encouraging broadband adoption, but not explicit on how barriers to broadband can be addressed. Perhaps this is not surprising given that the membership of the BAG, dominated by representatives of large corporations and senior bureaucrats was even less representative than its BSEG predecessor. Some months after the BAG report, the Federal government did declare a broadband strategy. It did so, intriguingly enough, under the rubric of its response to the Regional Telecommunications Inquiry report (Estens), the second inquiry responsible for reassuring citizens nervous about the full-privatisation of Telstra (the first inquiry being Besley). The government’s grand $142.8 million National Broadband Strategy focusses on the ‘broadband needs of regional Australians, in partnership with all levels of government’ (Alston, ‘National Broadband Strategy’). Among other things, the government claims that the Strategy will result in “improved outcomes in terms of services and prices for regional broadband access; [and] the development of national broadband infrastructure assets.” (Alston, ‘National Broadband Strategy’) At the same time, the government announced an overall response to the Estens Inquiry, with specific safeguards for Telstra’s role in regional communications — a preliminary to the full Telstra sale (Alston, ‘Future Proofing’). Less publicised was the government’s further initiative in indigenous telecommunications, complementing its Telecommunications Action Plan for Remote Indigenous Communities (DCITA). Indigenous people, it can be argued, were never really contemplated as citizens with the ken of the universal service policy taken to underpin the twentieth-century government monopoly PTT project. In Australia during the deregulatory and re-regulatory 1990s, there was a great reluctance on the part of Labor and Coalition Federal governments, Telstra and other industry participants, even to research issues of access to and use of telecommunications by indigenous communicators. Telstra, and to a lesser extent Optus (who had purchased AUSSAT as part of their licence arrangements), shrouded the issue of indigenous communications in mystery that policymakers were very reluctant to uncover, let alone systematically address. Then regulator, the Australian Telecommunications Authority (AUSTEL), had raised grave concerns about indigenous telecommunications access in its 1991 Rural Communications inquiry. However, there was no government consideration of, nor research upon, these issues until Alston commissioned a study in 2001 — the basis for the TAPRIC strategy (DCITA). The elision of indigenous telecommunications from mainstream industry and government policy is all the more puzzling, if one considers the extraordinarily varied and significant experiments by indigenous Australians in telecommunications and Internet (not least in the early work of the Tanami community, made famous in media and cultural studies by the writings of anthropologist Eric Michaels). While the government’s mid-2003 moves on a ‘National Broadband Strategy’ attend to some details of the broadband predicament, they fall well short of an integrated framework that grasps the shortcomings of the neoliberal communications model. The funding offered is a token amount. The view from the seat of government is a glance from the rear-view mirror: taking a snapshot of rural communications in the years 2000-2002 and projecting this tableau into a safety-net ‘future proofing’ for the inevitable turning away of a fully-privately-owned Telstra from its previously universal, ‘carrier of last resort’ responsibilities. In this aetiolated, residualist policy gaze, citizens remain constructed as consumers in a very narrow sense in this incremental, quietist version of state securing of market arrangements. What is missing is any more expansive notion of citizens, their varied needs, expectations, uses, and cultural imaginings of ‘always on’ broadband networks. Hybrid Networks “Most people on earth will eventually have access to networks that are all switched, interactive, and broadband”, wrote Frances Cairncross in 1998. ‘Eventually’ is a very appropriate word to describe the parlous state of broadband technology implementation. Broadband is in a slow state of evolution and invention. The story of broadband so far underscores the predicament for Australian access to bandwidth, when we lack any comprehensive, integrated, effective, and fair policy in communications and information technology. We have only begun to experiment with broadband technologies and understand their evolving uses, cultural forms, and the sense in which they rework us as subjects. Our communications networks are not superhighways, to invoke an enduring artefact from an older technology. Nor any longer are they a single ‘public’ switched telecommunications network, like those presided over by the post-telegraph-telephone monopolies of old. Like roads themselves, or the nascent postal system of the sixteenth century, broadband is a patchwork quilt. The ‘fibre’ of our communications networks is hybrid. To be sure, powerful corporations dominate, like the Tassis or Taxis who served as postmasters to the Habsburg emperors (Briggs & Burke 25). Activating broadband today provides a perspective on the path dependency of technology history, and how we can open up new threads of a communications fabric. Our options for transforming our multitudinous networked lives emerge as much from everyday tactics and strategies as they do from grander schemes and unifying policies. We may care to reflect on the waning potential for nation-building technology, in the wake of globalisation. We no longer gather our imagined community around a Community Telephone Plan as it was called in 1960 (Barr, Moyal, and PMG). Yet we do require national and international strategies to get and stay connected (Barr), ideas and funding that concretely address the wider dimensions of access and use. We do need to debate the respective roles of Telstra, the state, community initiatives, and industry competition in fair telecommunications futures. Networks have global reach and require global and national integration. Here vision, co-ordination, and resources are urgently required for our commonweal and moral fibre. To feel the width of the band we desire, we need to plug into and activate the policy circuits. Thanks to Grayson Cooke, Patrick Lichty, Ned Rossiter, John Pace, and an anonymous reviewer for helpful comments. Works Cited Alston, Richard. ‘ “Future Proofing” Regional Communications.’ Department of Communications, Information Technology and the Arts, Canberra, 2003. 17 July 2003 <http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115485,00.php> —. ‘A National Broadband Strategy.’ Department of Communications, Information Technology and the Arts, Canberra, 2003. 17 July 2003 <http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115486,00.php>. Australian Competition and Consumer Commission (ACCC). Broadband Services Report March 2003. Canberra: ACCC, 2003. 17 July 2003 <http://www.accc.gov.au/telco/fs-telecom.htm>. —. Emerging Market Structures in the Communications Sector. Canberra: ACCC, 2003. 15 July 2003 <http://www.accc.gov.au/pubs/publications/utilities/telecommu... ...nications/Emerg_mar_struc.doc>. Barr, Trevor. new media.com: The Changing Face of Australia’s Media and Telecommunications. Sydney: Allen & Unwin, 2000. Besley, Tim (Telecommunications Service Inquiry). Connecting Australia: Telecommunications Service Inquiry. Canberra: Department of Information, Communications and the Arts, 2000. 17 July 2003 <http://www.telinquiry.gov.au/final_report.php>. Briggs, Asa, and Burke, Peter. A Social History of the Internet: From Gutenberg to the Internet. Cambridge: Polity, 2002. Broadband Advisory Group. Australia’s Broadband Connectivity: The Broadband Advisory Group’s Report to Government. Melbourne: National Office on the Information Economy, 2003. 15 July 2003 <http://www.noie.gov.au/publications/NOIE/BAG/report/index.htm>. Broadband Services Expert Group. Networking Australia’s Future: Final Report. Canberra: Australian Government Publishing Service (AGPS), 1994. Bureau of Transport and Communications Economics (BTCE). Communications Futures Final Project. Canberra: AGPS, 1994. Cairncross, Frances. The Death of Distance: How the Communications Revolution Will Change Our Lives. London: Orion Business Books, 1997. Communications Law Centre (CLC). Australian Telecommunications Regulation: The Communications Law Centre Guide. 2nd edition. Sydney: Communications Law Centre, University of NSW, 2001. Department of Communications, Information Technology and the Arts (DCITA). Telecommunications Action Plan for Remote Indigenous Communities: Report on the Strategic Study for Improving Telecommunications in Remote Indigenous Communities. Canberra: DCITA, 2002. Estens, D. Connecting Regional Australia: The Report of the Regional Telecommunications Inquiry. Canberra: DCITA, 2002. <http://www.telinquiry.gov.au/rti-report.php>, accessed 17 July 2003. Fels, Alan. ‘Competition in Telecommunications’, speech to Australian Telecommunications Users Group 19th Annual Conference. 6 March, 2003, Sydney. <http://www.accc.gov.au/speeches/2003/Fels_ATUG_6March03.doc>, accessed 15 July 2003. Flew, Terry, and Spurgeon, Christina. ‘Television After Broadcasting’. In The Australian TV Book. Ed. Graeme Turner and Stuart Cunningham. Allen & Unwin, Sydney. 69-85. 2000. Given, Jock. Turning Off the Television. Sydney: UNSW Press, 2003. Goggin, Gerard. ‘Citizens and Beyond: Universal service in the Twilight of the Nation-State.’ In All Connected?: Universal Service in Telecommunications, ed. Bruce Langtry. Melbourne: University of Melbourne Press, 1998. 49-77 —. Rural Communities Online: Networking to link Consumers to Providers. Melbourne: Telstra Consumer Consultative Council, 2003. Goggin, Gerard, and Newell, Christopher. Digital Disability: The Social Construction of Disability in New Media. Lanham, MD: Rowman & Littlefield, 2003. House of Representatives Standing Committee on Communications, Information Technology and the Arts (HoR). Connecting Australia!: Wireless Broadband. Report of Inquiry into Wireless Broadband Technologies. Canberra: Parliament House, 2002. <http://www.aph.gov.au/house/committee/cita/Wbt/report.htm>, accessed 17 July 2003. Lamberton, Don. ‘A Telecommunications Infrastructure is Not an Information Infrastructure’. Prometheus: Journal of Issues in Technological Change, Innovation, Information Economics, Communication and Science Policy 14 (1996): 31-38. Latour, Bruno. Science in Action: How to Follow Scientists and Engineers Through Society. Cambridge, MA: Harvard University Press, 1987. Luck, David. ‘Revisiting the Future: Assessing the 1994 BTCE communications futures project.’ Media International Australia 96 (2000): 109-119. MacBride, Sean (Chair of International Commission for the Study of Communication Problems). Many Voices, One World: Towards a New More Just and More Efficient World Information and Communication Order. Paris: Kegan Page, London. UNESCO, 1980. Maitland Commission (Independent Commission on Worldwide Telecommunications Development). The Missing Link. Geneva: International Telecommunications Union, 1985. Michaels, Eric. Bad Aboriginal Art: Tradition, Media, and Technological Horizons. Sydney: Allen & Unwin, 1994. Mody, Bella, Bauer, Johannes M., and Straubhaar, Joseph D., eds. Telecommunications Politics: Ownership and Control of the Information Highway in Developing Countries. Mahwah, NJ: Erlbaum, 1995. Moyal, Ann. Clear Across Australia: A History of Telecommunications. Melbourne: Thomas Nelson, 1984. Post-Master General’s Department (PMG). Community Telephone Plan for Australia. Melbourne: PMG, 1960. Productivity Commission (PC). Telecommunications Competition Regulation: Inquiry Report. Report No. 16. Melbourne: Productivity Commission, 2001. <http://www.pc.gov.au/inquiry/telecommunications/finalreport/>, accessed 17 July 2003. Spurgeon, Christina. ‘National Culture, Communications and the Information Economy.’ Media International Australia 87 (1998): 23-34. Turner, Graeme. ‘First Contact: coming to terms with the cable guy.’ UTS Review 3 (1997): 109-21. Winseck, Dwayne. ‘Wired Cities and Transnational Communications: New Forms of Governance for Telecommunications and the New Media’. In The Handbook of New Media: Social Shaping and Consequences of ICTs, ed. Leah A. Lievrouw and Sonia Livingstone. London: Sage, 2002. 393-409. World Trade Organisation. General Agreement on Trade in Services: Annex on Telecommunications. Geneva: World Trade Organisation, 1994. 17 July 2003 <http://www.wto.org/english/tratop_e/serv_e/12-tel_e.htm>. —. Fourth protocol to the General Agreement on Trade in Services. Geneva: World Trade Organisation. 17 July 2003 <http://www.wto.org/english/tratop_e/serv_e/4prote_e.htm>. Links http://www.accc.gov.au/pubs/publications/utilities/telecommunications/Emerg_mar_struc.doc http://www.accc.gov.au/speeches/2003/Fels_ATUG_6March03.doc http://www.accc.gov.au/telco/fs-telecom.htm http://www.aph.gov.au/house/committee/cita/Wbt/report.htm http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115485,00.html http://www.dcita.gov.au/Article/0,,0_1-2_3-4_115486,00.html http://www.noie.gov.au/projects/access/access/broadband1.htm http://www.noie.gov.au/publications/NOIE/BAG/report/index.htm http://www.pc.gov.au http://www.pc.gov.au/inquiry/telecommunications/finalreport/ http://www.telinquiry.gov.au/final_report.html http://www.telinquiry.gov.au/rti-report.html http://www.wto.org/english/tratop_e/serv_e/12-tel_e.htm http://www.wto.org/english/tratop_e/serv_e/4prote_e.htm Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Goggin, Gerard. "Broadband" M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/02-featurebroadband.php>. APA Style Goggin, G. (2003, Aug 26). Broadband. M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/02-featurebroadband.php>
APA, Harvard, Vancouver, ISO, and other styles
24

Waelder, Pau. "The Constant Murmur of Data." M/C Journal 13, no. 2 (April 15, 2010). http://dx.doi.org/10.5204/mcj.228.

Full text
Abstract:
Our daily environment is surrounded by a paradoxically silent and invisible flow: the coming and going of data through our network cables, routers and wireless devices. This data is not just 1s and 0s, but bits of the conversations, images, sounds, thoughts and other forms of information that result from our interaction with the world around us. If we can speak of a global ambience, it is certainly derived from this constant flow of data. It is an endless murmur that speaks to our machines and gives us a sense of awareness of a certain form of surrounding that is independent from our actual, physical location. The constant “presence” of data around us is something that we have become largely aware of. Already in 1994, Phil Agre stated in an article in WIRED Magazine: “We're so accustomed to data that hardly anyone questions it” (1). Agre indicated that this data is in fact a representation of the world, the discrete bits of information that form the reality we are immersed in. He also proposed that it should be “brought to life” by exploring its relationships with other data and the world itself. A decade later, these relationships had become the core of the new paradigm of the World Wide Web and our interaction with cyberspace. As Mitchell Whitelaw puts it: “The web is increasingly a set of interfaces to datasets ... . On the contemporary web the data pour has become the rule, rather than the exception. The so-called ‘web 2.0’ paradigm further abstracts web content into feeds, real-time flows of XML data” ("Art against Information"). These feeds and flows have been used by artists and researchers in the creation of different forms of dynamic visualisations, in which data is mapped according to a set of parameters in order to summarise it in a single image or structure. Lev Manovich distinguishes in these visualisations those made by artists, to which he refers as “data art”. Unlike other forms of mapping, according to Manovich data art has a precise goal: “The more interesting and at the end maybe more important challenge is how to represent the personal subjective experience of a person living in a data society” (15). Therefore, data artists extract from the bits of information available in cyberspace a dynamic representation of our contemporary environment, the ambience of our digital culture, our shared, intimate and at the same time anonymous, subjectivity. In this article I intend to present some of the ways in which artists have dealt with the murmur of data creatively, exploring the immense amounts of user generated content in forms that interrogate our relationship with the virtual environment and the global community. I will discuss several artistic projects that have shaped the data flow on the Internet in order to take the user back to a state of contemplation, as a listener, an observer, and finally encountering the virtual in a physical form. Listening The concept of ambience particularly evokes an auditory experience related to a given location: in filmmaking, it refers to the sounds of the surrounding space and is the opposite of silence; as a musical genre, ambient music contributes to create a certain atmosphere. In relation to flows of data, it can be said that the applications that analyze Internet traffic and information are “listening” to it, as if someone stands in a public place, overhearing other people's conversations. The act of listening also implies a reception, not an emission, which is a substantial distinction given the fact that data art projects work with given data instead of generating it. As Mitchell Whitelaw states: “Data here is first of all indexical of reality. Yet it is also found, or to put it another way, given. ... Data's creation — in the sense of making a measurement, framing and abstracting something from the flux of the real — is left out” (3). One of the most interesting artistic projects to initially address this sort of “listening” is Carnivore (2001) by the Radical Software Group. Inspired by DCS1000, an e-mail surveillance software developed by the FBI, Carnivore (which was actually the original name of the FBI's program) listens to Internet traffic and serves this data to interfaces (clients) designed by artists, which interpret the provided information in several ways. The data packets can be transformed into an animated graphic, as in amalgamatmosphere (2001) by Joshua Davis, or drive a fleet of radio controlled cars, as in Police State (2003) by Jonah Brucker-Cohen. Yet most of these clients treat data as a more or less abstract value (expressed in numbers) that serves to trigger the reactions in each client. Carnivore clients provide an initial sense of the concept of ambience as reflected in the data circulating the Internet, yet other projects will address this subject more eloquently. Fig. 1: Ben Rubin, Mark Hansen, Listening Post (2001-03). Multimedia installation. Photo: David Allison.Listening Post (2001-04) by Mark Hansen and Ben Rubin is an installation consisting of 231 small electronic screens distributed in a semicircular grid [fig.1: Listening Post]. The screens display texts culled from thousands of Internet chat rooms, which are read by a voice synthesiser and arranged synchronically across the grid. The installation thus becomes a sort of large panel, somewhere between a videowall and an altarpiece, which invites the viewer to engage in a meditative contemplation, seduced by the visual arrangement of the flickering texts scrolling on each screen, appearing and disappearing, whilst sedated by the soft, monotonous voice of the machine and an atmospheric musical soundtrack. The viewer is immersed in a particular ambience generated by the fragmented narratives of the anonymous conversations extracted from the Internet. The setting of the piece, isolated in a dark room, invites contemplation and silence, as the viewer concentrates on seeing and listening. The artists clearly state that their goal in creating this installation was to recreate a sense of ambience that is usually absent in electronic communications: “A participant in a chat room has limited sensory access to the collective 'buzz' of that room or of others nearby – the murmur of human contact that we hear naturally in a park, a plaza or a coffee shop is absent from the online experience. The goal of Listening Post is to collect this buzz and render it at a human scale” (Hansen 114-15). The "buzz", as Hansen and Rubin describe it, is in fact nonexistent in the sense that it does not take place in any physical environment, but is rather the imagined output of the circulation of a myriad blocks of data through the Net. This flow of data is translated into audible and visible signals, thus creating a "murmur" that the viewer can relate to her experience in interacting with other humans. The ambience of a room full of people engaged in conversation is artificially recreated and expanded beyond the boundaries of a real space. By extracting chats from the Internet, the murmur becomes global, reflecting the topics that are being shared by users around the world, in an improvised, ever-changing embodiment of the Zeitgeist, the spirit of the time, or even a certain stream of consciousness on a planetary scale. Fig. 2: Gregory Chatonsky, L'Attente - The Waiting (2007). Net artwork. Photo: Gregory Chatonsky.The idea of contemplation and receptiveness is also present in another artwork that elaborates on the concept of the Zeitgeist. L'Attente [The Waiting] (2007) by Gregory Chatonsky is a net art piece that feeds from the data on the Internet to create an open, never-ending fiction in real time [Fig.2: The Waiting]. In this case, the viewer experiences the artwork on her personal computer, as a sort of film in which words, images and sounds are displayed in a continuous sequence, driven by a slow paced soundtrack that confers a sense of unity to the fragmented nature of the work. The data is extracted in real time from several popular sites (photos from Flickr, posts from Twitter, sound effects from Odeo), the connection between image and text being generated by the network itself: the program extracts text from the posts that users write in Twitter, then selects some words to perform a search on the Flickr database and retrieve photos with matching keywords. The viewer is induced to make sense of this concatenation of visual and audible content and thus creates a story by mentally linking all the elements into what Chatonsky defines as "a fiction without narration" (Chatonsky, Flußgeist). The murmur here becomes a story, but without the guiding voice of a narrator. As with Listening Post, the viewer is placed in the role of a witness or a voyeur, subject to an endless flow of information which is not made of the usual contents distributed by mainstream media, but the personal and intimate statements of her peers, along with the images they have collected and the portraits that identify them in the social networks. In contrast to the overdetermination of History suggested by the term Zeitgeist, Chatonsky proposes a different concept, the spirit of the flow or Flußgeist, which derives not from a single idea expressed by multiple voices but from a "voice" that is generated by listening to all the different voices on the Net (Chatonsky, Zeitgeist). Again, the ambience is conceived as the combination of a myriad of fragments, which requires attentive contemplation. The artist describes this form of interacting with the contents of the piece by making a reference to the character of the angel Damiel in Wim Wenders’s film Wings of Desire (Der Himmel über Berlin, 1987): “to listen as an angel distant and proximate the inner voice of people, to place the hand on their insensible shoulder, to hold without being able to hold back” (Chatonsky, Flußgeist). The act of listening as described in Wenders's character illustrates several key aspects of the above mentioned artworks: there is, on the one hand, a receptiveness, carried out by the applications that extract data from the Internet, which cannot be “hold back” by the user, unable to control the flow that is evolving in front of her. On the other hand, the information she receives is always fragmentary, made up of disconnected parts which are, in the words of the artist Lisa Jevbratt, “rubbings ... indexical traces of reality” (1). Observing The observation of our environment takes us to consider the concept of landscape. Landscape, in its turn, acquires a double nature when we compare our relationship with the physical environment and the digital realm. In this sense, Mitchell Whitelaw stresses that while data moves at superhuman speed, the real world seems slow and persistent (Landscape). The overlapping of dynamic, fast-paced, virtual information on a physical reality that seems static in comparison is one of the distinctive traits of the following projects, in which the ambience is influenced by realtime data in a visual form that is particularly subtle, or even invisible to the naked eye. Fig. 3: Carlo Zanni, The Fifth Day (2009). Net artwork. Screenshot retrieved on 4/4/2009. Photo: Carlo Zanni. The Fifth Day (2009) by Carlo Zanni is a net art piece in which the artist has created a narration by displaying a sequence of ten pictures showing a taxi ride in the city of Alexandria [Fig.3: The Fifth Day]. Although still, the images are dynamic in the sense that they are transformed according to data retrieved from the Internet describing the political and cultural status of Egypt, along with data extracted from the user's own identity on the Net, such as her IP or city of residence. Every time a user accesses the website where the artwork is hosted, this data is collected and its values are applied to the photos by cloning or modifying particular elements in them. For instance, a photograph of a street will show as many passersby as the proportion of seats held by women in national parliament, while the reflection in the taxi driver's mirror in another photo will be replaced by a picture taken from Al-Jazeera's website. Zanni addresses the viewer's perception of the Middle East by inserting small bits of additional information and also elements from the viewer's location and culture into the images of the Egyptian city. The sequence is rendered as the trailer of a political thriller, enhanced by a dramatic soundtrack and concluded with the artwork's credits. As with the abovementioned projects, the viewer must adopt a passive role, contemplating the images before her and eventually observing the minute modifications inserted by the data retrieved in real time. Yet, in this case, the ambience is not made manifest by a constant buzz to which one must listen, but quite more subtly it is suggested by the fact that not even a still image is always the same. As if observing a landscape, the overall impression is that nothing has changed while there are minor transformations that denote a constant evolution. Zanni has explored this idea in previous works such as eBayLandscape (2004), in which he creates a landscape image by combining data extracted from several websites, or My Temporary Visiting Position from the Sunset Terrace Bar (2007), in which a view of the city of Ahlen (Germany) is combined with a real time webcam image of the sky in Naples (Italy). Although they may seem self-enclosed, these online, data-driven compositions also reflect the global ambience, the Zeitgeist, in different forms. As Carlo Giordano puts it: "Aesthetically, the work aims to a nearly seamless integration of mixed fragments. The contents of these parts, reflecting political and economical issues ... thematize actuality and centrality, amplifying the author's interest in what everybody is talking about, what happens hic et nunc, what is in the fore of the media and social discourse" (16-17). A landscape made of data, such as Zanni's eBayLandscape, is the most eloquent image of how an invisible layer of information is superimposed over our physical environment. Fig. 4: Clara Boj and Diego Díaz, Red Libre, Red Visible (2004-06). Intervention in the urban space. Photo: Lalalab.Artists Clara Boj and Diego Díaz, moreover, have developed a visualisation of the actual flows of data that permeate the spaces we inhabit. In Red Libre, Red Visible [Free Network, Visible Network] (2004-06), Boj and Díaz used Augmented Reality (AR) technology to display the flows of data in a local wireless network by creating AR marker tags that were placed on the street. A Carnivore client developed by the artists enabled anyone with a webcam pointing towards the marker tag and connected to the Wi-Fi network to see in real time the data packets flowing from their computer towards the tag [Fig.4: Red Libre]. The marker tags therefore served both as a tool for the visualisation of network activity as well as a visual sign of the existence of an open network in a particular urban area. Later on, they added the possibility of inserting custom made messages, 3D shapes and images that would appear when a particular AR marker tag was seen through the lens of the webcam. With this project, Boj and Díaz give the user the ability to observe and interact with a layer of her environment that was previously invisible and in some senses, out of reach. The artists developed this idea further in Observatorio [Observatory] (2008), a sightseeing telescope that reveals the existence of Wi-Fi networks in an urban area. In both projects, an important yet unnoticed aspect of our surroundings is brought into focus. As with Carlo Zanni's projects, we are invited to observe what usually escapes our perception. The ambience in our urban environment has also been explored by Julian Oliver, Clara Boj, Diego Díaz and Damian Stewart in The Artvertiser (2009-10), a hand-held augmented reality (AR) device that allows to substitute advertising billboards with custom made images. As Naomi Klein states in her book No Logo, the public spaces in most cities have been dominated by corporate advertising, allowing little or no space for freedom of expression (Klein 399). Oliver's project faces this situation by enabling a form of virtual culture jamming which converts any billboard-crowded plaza into an unparalleled exhibition space. Using AR technology, the artists have developed a system that enables anyone with a camera phone, smartphone or the customised "artvertiser binoculars" to record and substitute any billboard advertisement with a modified image. The user can therefore interact with her environment, first by observing and being aware of the presence of these commercial spaces and later on by inserting her own creations or those of other artists. By establishing a connection to the Internet, the modified billboard can be posted on sites like Flickr or YouTube, generating a constant feedback between the real location and the Net. Gregory Chatonsky's concept of the Flußgeist, which I mentioned earlier, is also present in these works, visually displaying the data on top of a real environment. Again, the user is placed in a passive situation, as a receptor of the information that is displayed in front of her, but in this case the connection with reality is made more evident. Furthermore, the perception of the environment minimises the awareness of the fragmentary nature of the information generated by the flow of data. Embodying In her introduction to the data visualisation section of her book Digital Art, Christiane Paul stresses the fact that data is “intrinsically virtual” and therefore lacking a particular form of manifestation: “Information itself to a large extent seems to have lost its 'body', becoming an abstract 'quality' that can make a fluid transition between different states of materiality” (Paul 174). Although data has no “body”, we can consider, as Paul suggests, any object containing a particular set of information to be a dataspace in its own. In this sense, a tendency in working with the Internet dataflow is to create a connection between the data and a physical object, either as the end result of a process in which the data has been collected and then transferred to a physical form, or providing a means of physically reshaping the object through the variable input of data. The objectification of data thus establishes a link between the virtual and the real, but in the context of an artwork it also implies a particular meaning, as the following examples will show.Fig. 5: Gregory Chatonsky, Le Registre - The Register (2007). Book shelf and books. Photo: Pau Waelder. In Le Registre [The Register] (2007), Gregory Chatonsky developed a software application that gathers sentences related to feelings found on blogs. These sentences are recorded and put together in the form a 500-page book every hour. Every day, the books are gathered in sets of 24 and incorporated to an infinite library. Chatonsky has created a series of bookshelves to collect the books for one day, therefore turning an abstract process into an object and providing a physical embodiment of the murmur of data that I have described earlier [Fig.5: Le Registre]. As with L'Attente, in this work Chatonsky elaborates on the concept of Flußgeist, by “listening” to a specific set of data (in a similar way as in Hansen and Rubin's Listening Post) and bringing it into salience. The end product of this process is not just a meaningless object but actually what makes this work profoundly ironic: printing the books is a futile effort, but also constitutes a borgesque attempt at creating an endless library of something as ephemeral as feelings. In a similar way, but with different intentions, Jens Wunderling brings the online world to the physical world in Default to Public (2009). A series of objects are located in several public spaces in order to display information extracted from users of the Twitter network. Wunderling's installation projects the tweets on a window or prints them in adhesive labels, while informing the users that their messages have been taken for this purpose. The materialisation of information meant for a virtual environment implies a new approach to the concept of ambiance as described previously, and in this case also questions the intimacy of those participating in social networks. As the artist puts it: "In times of rapid change concerning communication behavior, media access and competence, the project Default to Public aims to raise awareness of the possible effects on our lives and our privacy" (Wunderling 155). Fig. 6: Moisés Mañas, Stock (2009). Networked installation. Photo: Moisés Mañas. Finally, in Stock (2009), Moisés Mañas embodies the flow of data from stock markets in an installation consisting of several trench coats hanging from automated coat hangers which oscillate when the stock values of a certain company rise. The resulting movement of the respective trench coat simulates a person laughing. In this work, Mañas translates the abstract flow of data into a clearly understandable gesture, providing at the same time a comment on the dynamics of stock markets [Fig.6: Stock]. Mañas´s project does not therefore simply create a physical output of a specific information (such as the stock value of a company at any given moment), but instead creates a dynamic sculpture which suggests a different perception of an otherwise abstract data. On the one hand, the trenchcoats have a ghostly presence and, as they move with unnatural spams, they remind us of the Freudian concept of the Uncanny (Das Umheimliche) so frequently associated with robots and artificial intelligence. On the other hand, the image of a person laughing, in the context of stock markets and the current economical crisis, becomes an ironic symbol of the morality of some stockbrokers. In these projects, the ambience is brought into attention by generating a physical output of a particular set of data that is extracted from certain channels and piped into a system that creates an embodiment of this immaterial flow. Yet, as the example of Mañas's project clearly shows, objects have particular meanings that are incorporated into the artwork's concept and remind us that the visualisation of information in data art is always discretionary, shaped in a particular form in order to convey the artist's intentions. Beyond the Buzz The artworks presented in this article revealt that, beyond the murmur of sentences culled from chats and blogs, the flow of data on the Internet can be used to express our difficult relationship with the vast amount of information that surrounds us. As Mitchell Whitelaw puts it: “Data art reflects a contemporary worldview informed by data excess; ungraspable quantity, wide distribution, mobility, heterogeneity, flux. Orienting ourselves in this domain is a constant challenge; the network exceeds any overview or synopsis” (Information). This excess is compared by Lev Manovich with the Romantic concept of the Sublime, that which goes beyond the limits of human measure and perception, and suggests an interpretation of data art as the Anti-Sublime (Manovich 11). Yet, in the projects that I have presented, rather than making sense of the constant flow of data there is a sort of dialogue, a framing of the information under a particular interpretation. Data is channeled through the artworks's interfaces but remains as a raw material, unprocessed to some extent, retrieved from its original context. These works explore the possibility of presenting us with constantly renewed content that will develop and, if the artwork is preserved, reflect the thoughts and visions of the next generations. A work constantly evolving in the present continuous, yet also depending on the uncertain future of social network companies and the ever-changing nature of the Internet. The flow of data will nevertheless remain unstoppable, our ambience defined by the countless interactions that take place every day between our divided self and the growing number of machines that share information with us. References Agre, Phil. “Living Data.” Wired 2.11 (Nov. 1994). 30 April 2010 ‹http://www.wired.com/wired/archive/2.11/agre.if.html›. Chatonsky, Gregory. “Flußgeist, une fiction sans narration.” Gregory Chatonsky, Notes et Fragments 13 Feb. 2007. 28 Feb. 2010 ‹http://incident.net/users/gregory/wordpress/13-flusgeist-une-fiction-sans-narration/›. ———. “Le Zeitgeist et l'esprit de 'nôtre' temps.” Gregory Chatonsky, Notes et Fragments 21 Jan. 2007. 28 Feb. 2010 ‹http://incident.net/users/gregory/wordpress/21-le-zeigeist-et-lesprit-de-notre-temps/›. Giordano, Carlo. Carlo Zanni. Vitalogy. A Study of a Contemporary Presence. London: Institute of Contemporary Arts, 2005. Hansen, Mark, and Ben Rubin. “Listening Post.” Cyberarts 2004. International Compendium – Prix Ars Electronica 2004. Ed. Hannes Leopoldseder and Christine Schöpf. Ostfildern: Hate Cantz, 2004. 112-17. ———. “Babble Online: Applying Statistics and Design to Sonify the Internet.” Proceedings of the 2001 International Conference on Auditory Display, Espoo, Finland. 30 April 2010 ‹http://www.acoustics.hut.fi/icad2001/proceedings/papers/hansen.pdf›. Jevbratt, Lisa. “Projects.” A::minima 15 (2003). 30 April 2010 ‹http://aminima.net/wp/?p=93&language=en›. Klein, Naomi. No Logo. [El poder de las marcas]. Barcelona: Paidós, 2007. Manovich, Lev. “Data Visualization as New Abstraction and Anti-Sublime.” Manovich.net Aug. 2002. 30 April 2010 ‹http://www.manovich.net/DOCS/data_art_2.doc›. Paul, Christiane. Digital Art. London: Thames & Hudson, 2003. Whitelaw, Mitchell. “Landscape, Slow Data and Self-Revelation.” Kerb 17 (May 2009). 30 April 2010 ‹http://teemingvoid.blogspot.com/2009/05/landscape-slow-data-and-self-revelation.html›. ———. “Art against Information: Case Studies in Data Practice.” Fibreculture 11 (Jan. 2008). 30 April 2010 ‹http://journal.fibreculture.org/issue11/issue11_whitelaw.html›. Wunderling, Jens. "Default to Public." Cyberarts 2009. International Compendium – Prix Ars Electronica 2004. Ed. Hannes Leopoldseder, Christine Schöpf and Gerfried Stocker. Ostfildern: Hate Cantz, 2009. 154-55.
APA, Harvard, Vancouver, ISO, and other styles
25

Broeckmann, Andreas. "Minor Media - Heterogenic Machines." M/C Journal 2, no. 6 (September 1, 1999). http://dx.doi.org/10.5204/mcj.1788.

Full text
Abstract:
1. A Minor Philosopher According to Guattari and Deleuze's definition, a 'minor literature' is the literature of a minority that makes use of a major language, a literature which deterritorialises that language and interconnects meanings of the most disparate levels, inseparably mixing and implicating poetic, psychological, social and political issues with each other. In analogy, the Japanese media theorist Toshiya Ueno has refered to Félix Guattari as a 'minor philosopher'. Himself a practicing psychoanalyst, Guattari was a foreigner to the Grand Nation of Philosophy, whose natives mostly treat him like an unworthy bastard. And yet he has established a garden of minor flowers, of mongrel weeds and rhizomes that are as polluting to philosophy as Kafka's writing has been to German literature (cf. Deleuze & Guattari, Kafka). The strategies of 'being minor' are, as exemplified by Guattari's writings (with and without Deleuze), deployed in multiple contexts: intensification, re-functionalisation, estrangement, transgression. The following offers a brief overview over the way in which Guattari conceptualises media, new technologies and art, as well as descriptions of several media art projects that may help to illustrate the potentials of such 'minor machines'. Without wanting to pin these projects down as 'Guattarian' artworks, I suggest that the specific practices of contemporary media artists can point us in the direction of the re-singularising, deterritorialising and subjectifying forces which Guattari indicated as being germane to media technologies. Many artists who work with media technologies do so through strategies of appropriation and from a position of 'being minor': whenever a marginality, a minority, becomes active, takes the word power (puissance de verbe), transforms itself into becoming, and not merely submitting to it, identical with its condition, but in active, processual becoming, it engenders a singular trajectory that is necessarily deterritorialising because, precisely, it's a minority that begins to subvert a majority, a consensus, a great aggregate. As long as a minority, a cloud, is on a border, a limit, an exteriority of a great whole, it's something that is, by definition, marginalised. But here, this point, this object, begins to proliferate ..., begins to amplify, to recompose something that is no longer a totality, but that makes a former totality shift, detotalises, deterritorialises an entity.' (Guattari, "Pragmatic/Machinic") In the context of media art, 'becoming minor' is a strategy of turning major technologies into minor machines. a. Krzysztof Wodiczko (PL/USA): Alien Staff Krzysztof Wodiczko's Alien Staff is a mobile communication system and prosthetic instrument which facilitates the communication of migrants in their new countries of residence, where they have insufficient command of the local language for communicating on a par with the native inhabitants. Alien Staff consists of a hand-held staff with a small video monitor and a loudspeaker at the top. The operator can adjust the height of the staff's head to be at a level with his or her own head. Via the video monitor, the operator can replay pre-recorded elements of an interview or a narration of him- or herself. The recorded material may contain biographical information when people have difficulties constructing coherent narratives in the foreign language, or it may include the description of feelings and impressions which the operator normally doesn't get a chance to talk about. The Staff is used in public places where passers-by are attracted to listen to the recording and engage in a conversation with the operator. Special transparent segments of the staff contain memorabilia, photographs or other objects which indicate a part of the personal history of the operator and which are intended to instigate a conversation. The Alien Staff offers individuals an opportunity to remember and retell their own story and to confront people in the country of immigration with this particular story. The Staff reaffirms the migrant's own subjectivity and re-singularises individuals who are often perceived as representative of a homogenous group. The instrument displaces expectations of the majority audience by articulating unformulated aspects of the migrant's subjectivity through a medium that appears as the attractive double of an apparently 'invisible' person. 2. Mass Media, New Technologies and 'Planetary Computerisation' Guattari's comments about media are mostly made in passing and display a clearly outlined opinion about the role of media in contemporary society: a staunch critique of mass media is coupled with an optimistic outlook to the potentials of a post-medial age in which new technologies can develop their singularising, heterogenic forces. The latter development is, as Guattari suggests, already discernible in the field of art and other cultural practices making use of electronic networks, and can lead to a state of 'planetary computerisation' in which multiple new subject-groups can emerge. Guattari consistently refers to the mass media with contempt, qualifying them as a stupefying machinery that is closely wedded to the forces of global capitalism, and that is co-responsible for much of the reactionary hyper-individualism, the desperation and the "state of emergency" that currently dominates "four-fifth of humanity" (Guattari, Chaosmosis 97; cf. Guattari, Drei Ökologien 16, 21). Guattari makes a passionate plea for a new social ecology and formulates, as one step towards this goal, the necessity, "to guide these capitalist societies of the age of mass media into a post-mass medial age; by this I mean that the mass media have to be reappropriated by a multiplicity of subject-groups who are able to administer them on a path of singularisation" (Guattari, "Regimes" 64). Guattari consistently refers to the mass media with contempt, qualifying them as a stupefying machinery that is closely wedded to the forces of global capitalism, and that is co-responsible for much of the reactionary hyper-individualism, the desperation and the "state of emergency" that currently dominates "four-fifth of humanity" (Guattari, Chaosmosis 97; cf. Guattari, Drei Ökologien 16, 21). Guattari makes a passionate plea for a new social ecology and formulates, as one step towards this goal, the necessity, "to guide these capitalist societies of the age of mass media into a post-mass medial age; by this I mean that the mass media have to be reappropriated by a multiplicity of subject-groups who are able to administer them on a path of singularisation" (Guattari, "Regimes" 64). b. Seiko Mikami (J/USA): World, Membrane and the Dismembered Body An art project that deals with the cut between the human subject and the body, and with the deterritorialisation of the sense of self, is Seiko Mikami's World, Membrane and the Dismembered Body. It uses the visitor's heart and lung sounds which are amplified and transformed within the space of the installation. These sounds create a gap between the internal and external sounds of the body. The project is presented in an-echoic room where sound does not reverberate. Upon entering this room, it is as though your ears are no longer living while paradoxically you also feel as though all of your nerves are concentrated in your ears. The sounds of the heart, lungs, and pulse beat are digitised by the computer system and act as parameters to form a continuously transforming 3-d polygonal mesh of body sounds moving through the room. Two situations are effected in real time: the slight sounds produced by the body itself resonate in the body's internal membranes, and the transfigured resonance of those sounds is amplified in the space. A time-lag separates both perceptual events. The visitor is overcome by the feeling that a part of his or her corporeality is under erasure. The body exists as abstract data, only the perceptual sense is aroused. The visitor is made conscious of the disappearance of the physical contours of his or her subjectivity and thereby experiences being turned into a fragmented body. The ears mediate the space that exists between the self and the body. Mikami's work fragments the body and its perceptual apparatus into data, employing them as interfaces and thus folding the body's horizon back onto itself. The project elucidates the difference between an actual and a virtual body, the actual body being deterritorialised and projected outwards towards a number of potential, virtual bodies that can, in the installation, be experienced as maybe even more 'real' than the actual body. 3. Artistic Practice Guattari's conception of post-media implies criss-crossing intersections of aesthetic, ethical, political and technological planes, among which the aesthetic, and with it artistic creativity, are ascribed a position of special prominence. This special role of art is a trope that recurs quite frequently in Guattari's writings, even though he is rarely specific about the artistic practices he has in mind. In A Thousand Plateaus, Deleuze and Guattari give some detailled attention to the works of artists like Debussy, Boulez, Beckett, Artaud, Kafka, Kleist, Proust, and Klee, and Chaosmosis includes longer passages and concrete examples for the relevance of the aesthetic paradigm. These examples come almost exclusively from the fields of performing arts, music and literature, while visual arts are all but absent. One reason for this could be that the performing arts are time-based and processual and thus lend themselves much better to theorisation of flows, transformations and differentiations. The visual arts can be related to the abstract machine of faciality (visageité) which produces unified, molar, identical entities out of a multiplicity of different singularities, assigning them to a specific category and associating them with particular social fields (cf. Deleuze & Guattari, Tausend Plateaus 167-91) This semiotic territorialisation is much more likely to happen in the case of static images, whether two- or three-dimensional, than in time-based art forms. An interesting question, then, would be whether media art projects, many of which are time-based, processual and open-ended, can be considered as potential post-medial art practices. Moreover, given the status of computer software as the central motor of the digital age, and the crucial role it plays in aesthetic productions like those discussed here, software may have to be viewed as the epitome of post-medial machines. Guattari seems to have been largely unaware of the beginnings of digital media art as it developed in the 1980s. In generalistic terms he suggests that the artist is particularly well-equipped to conceptualise the necessary steps for this work because, unlike engineers, he or she is not tied to a particular programme or plan for a product, and can change the course of a project at any point if an unexpected event or accident intrudes (cf. Guattari, Drei Ökologien 50). The significance of art for Guattari's thinking comes primarily from its close relation with processes of subjectivation. "Just as scientific machines constantly modify our cosmic frontiers, so do the machines of desire and aesthetic creation. As such, they hold an eminent place within assemblages of subjectivation, themselves called to relieve our old social machines which are incapable of keeping up with the efflorescence of machinic revolutions that shatter our epoch' (Guattari, Chaosmosis 54). The aesthetic paradigm facilitates the development of new, virtual forms of subjectivity, and of liberation, which will be adequate to these machinic revolutions. c. Knowbotic Research + cF: IO_Dencies The Alien Staff project was mentioned as an example for the re-singularisation and the virtualisation of identity, and World, Membrane and the Dismembered Body as an instance of the deterritorialisation and virtualisation of the human body through an artistic interface. The recent project by Knowbotic Research, IO_Dencies -- Questioning Urbanity, deals with the possibilities of agency, collaboration and construction in translocal and networked environments. It points in the direction of what Guattari has called the formation of 'group subjects' through connective interfaces. The project looks at urban settings in different megacities like Tokyo, São Paulo or the Ruhr Area, analyses the forces present in particular local urban situations, and offers experimental interfaces for dealing with these local force fields. IO_Dencies São Paulo enables the articulation of subjective experiences of the city through a collaborative process. Over a period of several months, a group of young architects and urbanists from São Paulo, the 'editors', provided the content and dynamic input for a database. The editors collected material (texts, images, sounds) based on their current situation and on their personal urban experience. A specially designed editor tool allowed the editors to build individual conceptual 'maps' in which to construct the relations between the different materials in the data-pool according to the subjective perception of the city. On the computational level, connectivities are created between the different maps of the editors, a process that is driven by algorithmic self-organisation whose rules are determined by the choices that the editors make. In the process, the collaborative editorial work in the database generates zones of intensities and zones of tension which are visualised as force fields and turbulences and which can be experienced through interfaces on the Internet and at physical exhibition sites. Participants on the Net and in the exhibition can modify and influence these electronic urban movements, force fields and intensities on an abstract, visual level, as well as on a content-based, textual level. This engagement with the project and its material is fed back into the database and influences the relational forces within the project's digital environment. Characteristic of the forms of agency as they evolve in networked environments is that they are neither individualistic nor collective, but rather connective. Whereas the collective is determined by an intentional and empathetic relation between agents within an assemblage, the connective rests on any kind of machinic relation and is therefore more versatile, more open, and based on the heterogeneity of its components or members. In the IO_Dencies interfaces, the different networked participants become visible for each other, creating a trans-local zone of connective agency. The inter-connectedness of their activities can be experienced visually, acoustically, and through the constant reconfiguration of the data sets, an experience which can become the basis of the formation of a specific, heterogeneous group subject. 4. Guattari's Concept of the Machinic An important notion underlying these analyses is that of the machine which, for Guattari, relates not so much to particular technological or mechanical objects, to the technical infrastructure or the physical flows of the urban environment. 'Machines' can be social bodies, industrial complexes, psychological or cultural formations, they are assemblages of heterogeneous parts, aggregations which transform forces, articulate and propel their elements, and force them into a continuous state of transformation and becoming. An important notion underlying these analyses is that of the machine which, for Guattari, relates not so much to particular technological or mechanical objects, to the technical infrastructure or the physical flows of the urban environment. 'Machines' can be social bodies, industrial complexes, psychological or cultural formations, they are assemblages of heterogeneous parts, aggregations which transform forces, articulate and propel their elements, and force them into a continuous state of transformation and becoming. d. Xchange Network My final example is possibly the most evocative in relation to Guattari's notions of the polyvocity and heterogenesis that new media technologies can trigger. It also links up closely with Guattari's own engagement with the minor community radio movement. In late 1997, the E-Lab in Riga initiated the Xchange network for audio experiments on the Internet. The participating groups in London, Ljubljana, Sydney, Berlin, and many other minor and major places, use the Net for distributing their original sound programmes. The Xchange network is "streaming via encoders to remote servers, picking up the stream and re-broadcasting it purely or re-mixed, looping the streams" (Rasa Smite). Xchange is a distributed group, a connective, that builds creative cooperation in live-audio streaming on the communication channels that connect them. They explore the Net as a sound-scape with particular qualities regarding data transmission, delay, feedback, and open, distributed collaborations. Moreover, they connect the network with a variety of other fields. Instead of defining an 'authentic' place of their artistic work, they play in the transversal post-medial zone of media labs in different countries, mailing lists, net-casting and FM broadcasting, clubs, magazines, stickers, etc., in which 'real' spaces and media continuously overlap and fuse (cf. Slater). 5. Heterogenic Practices If we want to understand the technological and the political implications of the machinic environment of the digital networks, and if we want to see the emergence of the group subjects of the post-media age Guattari talks about, we have to look at connectives like Xchange and the editor-participant assemblages of IO_Dencies. The far-reaching machinic transformations which they articulate, hold the potential of what Guattari refers to as the 'molecular revolution'. To realise this revolution, it is vital to "forge new analytical instruments, new concepts, because it is ... the transversality, the crossing of abstract machines that constitute a subjectivity and that are incarnated, that live in very different regions and domains and ... that can be contradictory and antagonistic". For Guattari, this is not a mere theoretical question, but one of experimentation, "of new forms of interactions, of movement construction that respects the diversity, the sensitivities, the particularities of interventions, and that is nonetheless capable of constituting antagonistic machines of struggle to intervene in power relations" (Guattari, "Pragmatic/Machinic" 4-5). The implication here is that some of the minor media practices pursued by artists using digital technologies point us in the direction of the positive potentials of post media. The line of flight of such experimentation is the construction of new and strong forms of subjectivity, "an individual and/or collective reconstitution of the self" (Guattari, Drei Ökologien 21), which can strengthen the process of what Guattari calls "heterogenesis, that is a continuous process of resingularisation. The individuals must, at the same time, become solidary and ever more different" (Guattari, Drei Ökologien 76). References Deleuze, Gilles, and Felix Guattari. Kafka: Pour une Litterature Mineur. Paris: Ed. de Minuit, 1975. ---. Tausend Plateaus. (1980) Berlin: Merve, 1992. Guattari, Félix. Cartographies Schizoanalytiques. Paris: Ed. Galilée, 1989. ---. Chaosmosis: An Ethico-Aesthetic Paradigm. (1992) Sydney: Power Publications, 1995. ---. Die drei Ökologien. (1989) Wien: Passagen Verlag, 1994. ---. "Pragmatic/Machinic." Discussion with Guattari, conducted and transcribed by Charles J. Stivale. (1985) Pre/Text 14.3-4 (1995). ---. "Regimes, Pathways, Subjects." Die drei Ökologien. (1989) Wien: Passagen Verlag, 1994. 95-108. ---. "Über Maschinen." (1990) Schmidgen, 115-32. Knowbotic Research. IO_Dencies. 1997-8. 11 Sep. 1999 <http://io.khm.de/>. De Landa, Manuel. "The Machinic Phylum." Technomorphica. Eds. V2_Organisation. Rotterdam: V2_Organisation, 1997. Mikami, Seiko. World, Membrane and the Dismembered Body. 1997. 11 Sep. 1999 <http://www.ntticc.or.jp/permanent/mikami/mikami_e.php>. Schmidgen, Henning, ed. Ästhetik und Maschinismus: Texte zu und von Félix Guattari. Berlin: Merve, 1995. ---. Das Unbewußte der Maschinen: Konzeptionen des Psychischen bei Guattari, Deleuze und Lacan. München: Fink, 1997. Slater, Howard. "Post-Media Operators." Nettime, 10 June 1998. 11 Sep. 1999 <http://www.factory.org>. Wodiczko, Krzysztof. 11 Sep. 1999 <http://cavs.mit.edu/people/kw.htm>. Xchange. 11 Sep. 1999 <http://xchange.re-lab.net>. (Note: An extended, Dutch version of this text was published in: Oosterling/Thissen, eds. Chaos ex Machina: Het ecosofisch Werk van Félix Guattari op de Kaart Gezet. Rotterdam: CFK, 1998. Citation reference for this article MLA style: Andreas Broeckmann. "Minor Media -- Heterogenic Machines: Notes on Félix Guattari's Conceptions of Art and New Media." M/C: A Journal of Media and Culture 2.6 (1999). [your date of access] <http://www.uq.edu.au/mc/9909/minor.php>. Chicago style: Andreas Broeckmann, "Minor Media -- Heterogenic Machines: Notes on Félix Guattari's Conceptions of Art and New Media," M/C: A Journal of Media and Culture 2, no. 6 (1999), <http://www.uq.edu.au/mc/9909/minor.php> ([your date of access]). APA style: Andreas Broeckmann. (1999) Minor Media -- Heterogenic Machines: Notes on Félix Guattari's Conceptions of Art and New Media. M/C: A Journal of Media and Culture 2(6). <http://www.uq.edu.au/mc/9909/minor.php> ([your date of access]).
APA, Harvard, Vancouver, ISO, and other styles
26

Holloway, Donell Joy, Lelia Green, and Danielle Brady. "FireWatch: Creative Responses to Bushfire Catastrophes." M/C Journal 16, no. 1 (March 19, 2013). http://dx.doi.org/10.5204/mcj.599.

Full text
Abstract:
IntroductionBushfires have taken numerous lives and destroyed communities throughout Australia over many years. Catastrophic fire weather alerts have occurred during the Australian summer of 2012–13, and long-term forecasts predict increased bushfire events throughout several areas of Australia. This article highlights how organisational and individual responses to bushfire in Australia often entail creative responses—either improvised responses at the time of bushfire emergencies or innovative (organisational, strategic, or technological) changes which help protect the community from, or mitigate against, future bushfire catastrophes. These improvised or innovative responses include emergency communications systems, practices, and devices. This article reports on findings from a research project funded by the Australian Research Council titled Using Community Engagement and Enhanced Visual Information to Promote FireWatch Satellite Communications as a Support for Collaborative Decision-making. FireWatch is a Web-based public information product based on near real time satellite data produced by the West Australian (WA) Government entity, Landgate. The project researches ways in which remote and regional publics can be engaged and mobilised through the development of a more user-friendly FireWatch site to make fire information accessible and usable, allowing a community-focused response to risk.The significance of the research project is evident both in how it addresses the important and life-threatening challenge of bushfires; and also in how Australia’s increasingly hot, dry, long summers are adding to historically-established risks. This innovative project uses an iterative, participatory design process incorporating action-research practices. This will ensure that the new Firewatch interface is redesigned, tested, observed, and reflected upon multiple times—and will incorporate the collective creativity of users, designers, and researchers.The qualitative findings reported on in this article are based on 19 interviews with community members in the town of Kununurra in the remote Kimberley region of WA. The findings are positioned within a reconceptualised framework in which creativity is viewed as an essential component of successful emergency responses. This includes, we argue, two critical aspects of creativity: improvisation during a catastrophic event; and ongoing innovation to improve future responses to catastrophes—including communication practices and technologies. This shifts the discourse within the literature in relation to the effective management and community responses to the changing phenomenon of fire catastrophes. Findings from the first round of interviews, and results of enquiries into previous bushfires in Australia, are used to highlight how these elements of creativity often entail a collective creativity on the part of emergency responders or the community in general. An additional focus is on the importance of the critical use of communication during a bushfire event.ImprovisationThe notion of "improvisation" is often associated with artistic performance. Nonetheless, improvisation is also integral to making effectual responses during natural catastrophes. “Extreme events present unforeseen conditions and problems, requiring a need for adaptation, creativity, and improvisation while demanding efficient and rapid delivery of services under extreme conditions” (Harrald 257).Catastrophes present us with unexpected scenarios and require rapid, on the spot problem solving and “even if you plan for a bushfire it is not going to go to plan. When the wind changes direction there has to be a new plan” (Jeff. Personal Interview. 2012). Jazz musicians or improvisational actors “work to build their knowledge across a range of fields, and this knowledge provides the elements for each improvisational outcome” (Kendra and Wachendorf 2). Similarly, emergency responders’ knowledge and preparation can be drawn “upon in the ambiguous and dynamic conditions of a disaster where not every need has been anticipated or accounted for” (Kendra and Wachtendorf 2). Individuals and community organisations not associated with emergency services also improvise in a creative and intuitive manner in the way they respond to catastrophes (Webb and Chevreau). For example, during the 9/11 terrorism catastrophe in the USA an assorted group of boat owners rapidly self-organised to evacuate Lower Manhattan. On their return trips, they carried emergency personnel and supplies to the area (Kendra and Wachendorf 5). An interviewee in our study also recalls bush fire incidents where creative problem solving and intuitive decision-making are called for. “It’s like in a fire, you have to be thinking fast. You need to be semi self-sufficient until help arrives. But without doing anything stupid and creating a worse situation” (Kelly. Personal Interview. 2012). Kelly then describes the rapid community response she witnessed during a recent fire on the outskirts of Kununurra, WA.Everyone had to be accounted for, moving cars, getting the tractors out, protecting the bores because you need the water. It happens really fast and it is a matter of rustling everyone up with the machinery. (2012)In this sense, the strength of communities in responding to catastrophes or disasters “results largely from the abilities of [both] individuals and organisations to adapt and improvise under conditions of uncertainty” (Webb and Chevreau 67). These improvised responses frequently involve a collective creativity—where groups of neighbours or emergency workers act in response to the unforseen, often in a unified and self-organising manner. InnovationCatastrophes also stimulate change and innovation for the future. Disasters create a new environment that must be explored, assessed, and comprehended. Disasters change the physical and social landscape, and thereby require a period of exploration, learning, and the development of new approaches. (Kendra and Wachtendorf 6)These new approaches can include organisational change, new response strategies, and technologies and communication improvements. Celebrated inventor Benjamin Franklin, for instance, facilitated the formation of the first Volunteer Fire department in the 1850s as a response to previous urban fire catastrophes in the USA (Mumford 258). This organisational innovation continues to play an instrumental part in modern fire fighting practices. Indeed, people living in rural and remote areas of Australia are heavily reliant on volunteer groups, due to the sparse population and vast distances that need to be covered.As with most inventions and innovations, new endeavours aimed at improving responses to catastrophes do not occur in a vacuum. They “are not just accidents, nor the inscrutable products of sporadic genius, but have abundant and clear causes in prior scientific and technological development” (Gifillian 61). Likewise, the development of our user-friendly and publically available FireWatch site relies on the accumulation of preceding inventions and innovations. This includes the many years spent developing the existing FireWatch site, a site dense in information of significant value to scientists, foresters, land managers, and fire experts.CommunicationsOften overlooked in discussions regarding emergency communications is the microgeographical exchanges that occur in response to the threat of natural disasters. This is where neighbours fill the critical period before emergency service responders can appear on site. In this situation, it is often local knowledge that underpins improvised grassroots communication networks that inform and organise the neighbourhood. During a recent bushfire on peri-rural blocks on the outskirts of Kununurra, neighbours went into action before emergency services volunteers could respond.We phoned around and someone would phone and call in. Instead of 000 being rung ten times, make sure that one person rang it in. 40 channel [CB Radio] was handy – two-way communication, four wheelers – knocking on doors making sure everyone is out of the house, just in case. (Jane. Personal Interview. 2012) Similarly, individuals and community groups have been able to inform and assist each other on a larger scale via social network technologies (SNTs). This creative application of SNTs began after the 9/11 terror attacks in 2001 when individuals created wikis in order to find missing persons (Palen and Lui). Twitter has experienced considerable growth and was used freely during the 2009 Black Saturday fires in Australia. Studies of tweeting activity during these fires indicate that “tweets made during Black Saturday are laden with actionable factual information which contrasts with earlier claims that tweets are of no value made of mere random personal notes” (Sinnappan et al. n.p.).Traditionally, official alerts and warnings have been provided to the public via television and radio. However, several inquiries into the recent bushfires within Australia show concern “with the way in which fire agencies deliver information to community members during a bushfire...[and in order to] improve community safety from bushfire, systems need to be implemented that enable community members to communicate information to fire agencies, making use of local knowledge” (Elsworth et al. 8).Technological and social developments over the last decade mean the public no longer relies on a single source of official information (Sorensen and Sorensen). Therefore, SNTs such as Twitter and Facebook are being used by the media and emergency authorities to make information available to the public. These SNTs are dynamic, in that there can be a two-way flow of information between the public and emergency organisations. Nonetheless, there has been limited use of SNTs by emergency agencies to source information posted by in situ residents, in order to help in decision-making (Freeman). Organisational use of multiple communication channels and platforms to inform citizens about bushfire emergencies ensures a greater degree of coverage—in case of communication systems breakdowns or difficulties—as in the telephone alert system breakdown in Kelmscott-Roleystone, WA or a recent fire in Warrnambool, Victoria which took out the regional telephone exchange making telephone calls, mobiles, landlines, and the Internet non-operational (Johnson). The new FireWatch site will provide an additional information option for rural and remote Australians who, often rely on visual sightings and on word-of-mouth to be informed about fires in their region. “The neighbour came over and said - there is a fire, we’d better get our act together because it is going to hit us. No sooner than I turned around, I thought shit, here it comes” (Richard. Personal Interview. 2012). The FireWatch ProjectThe FireWatch project involves the redevelopment of an existing FireWatch website to extend the usability of the product from experts to ordinary users in order to facilitate community-based decision-making and action both before and during bushfire emergencies. To this purpose, the project has been broken down to two distinct, yet interdependent, strands. The community strand involves collaboration within a community (in this case the Kununurra community) in order to carry out a community-centred approach to further development of the site. The design strand involves the development of an intuitive and accessible Web presentation of complex information in clear, unambiguous ways to inform action in stressful circumstances. At this stage, a first round of 19 semi-structured interviews with stakeholders has been conducted in Kununurra to determine fire-related information-seeking behaviours, attitudes to mediated information services in the region, as well as user feedback on a prototype website developed in the design strand of the project. Stakeholders included emergency services personnel (payed and volunteer), shire representatives, tourism operators, small business operators (including tourism operators), a forest manager, a mango farmer, an Indigenous ranger team manager as well as general community members. Interviewees reported dissatisfaction with current information systems. They gave positive feedback about the website prototype. “It’s very much, very easy to follow” (David. Personal Interview. 2012). “It looks so much better than [the old site]. You couldn’t get in that close on [the other site]. It is fantastic” (Lance. Personal Interview. 2012). They also added thought-provoking contributions to the design of the website (to be discussed later).Residents of Kununurra who were interviewed for this research project found bushfire warning communications unsatisfactory, especially during a recent fire on the outskirts of town. People who called 000 had difficulties passing the information on, having to explain exactly where Kununurra was and the location of fires to operators not familiar with the area. When asked how the Kununurra community gets their fire information a Shire representative explained: That is not very good at the moment. The only other way we can think about it is perhaps more updates on things like Facebook, perhaps on a website, but with this current fire there really wasn’t a lot of information and a lot of people didn’t know what was going on. We [the shire] knew because we were talking to the [fire] brigades and to FESA [Fire and Emergency Services Authority] but most residents didn’t have any idea and it looks pretty bad. (Ginny. Personal Interview. 2012) All being well, the new user-friendly FireWatch site will add another platform through which fire information messages are transmitted. Community members will be offered continuously streamed bushfire location information, which is independent of any emergency services communication systems. In particular, rural and remote areas of Australia will have fire information at the ready.The participatory methodology used in the design of the new FireWatch website makes use of collaborative creativity, whereby users’ vision of the website and context are incorporated. This iterative process “creates an equal evolving participatory process between user and designer towards sharing values and knowledge and creating new domains of collective creativity” (Park 2012). The rich and sometimes contradictory suggestions made by interviewees in this project often reflected individual visions of the tasks and information required, and individual preferences regarding the delivery of this information. “I have been thinking about how could this really work for me? I can give you feedback on what has happened in the past but how could it work for me in the future?” (Keith. Personal Interview. 2012). Keith and other community members interviewed in Kununurra indicated a variety of extra functions on the site not expected by the product designers. Some of these unexpected functions were common to most interviewees such as the great importance placed on the inclusion of a satellite view option on the site map (example shown in Figure 1). Jeremy, a member of an Indigenous ranger unit in the Kununurra area, was very keen to incorporate the satellite view options on the site. He explained that some of the older rangers:can’t use GPSs and don’t know time zones or what zones to put in, so they’ll use a satellite-style view. We’ll have Google Earth up on one [screen], and also our [own] imagery up on another [screen] and go that way. Be scrolling in and see – we’ve got a huge fire scar for 2011 around here; another guy will be on another computer zoning in and say, I think it is here. It’s quite simplistic but it works. (Personal Interview. 2012) In the case above, where rangers are already switching between computer screens to incorporate a satellite view into their planning, the importance of a satellite view layer on the FireWatch website makes user context an essential part of the design process. Incorporating many layers on one screen, as recommended by participants also ensures a more elegant solution to an existing problem.Figure 1: Satellite view in the Kununurra area showing features such as gorges, rivers, escarpments and dry riverbedsThis research project will involve further consultation with participants (both online and offline) regarding bushfire safety communications in their region, as well as the further design of the site. The website will be available over multiple devices (for example desktops, smart phones, and hand held tablet devices) and will be launched late this year. Further work will also be carried out to determine if social media is appropriate for this community of users in order to build awareness and share information regarding the site.Conclusion Community members improvise and self-organise when communicating fire information and organising help for each other. This can happen at a microgeographical (neighbourhood) level or on a wider level via social networking sites. Organisations also develop innovative communication systems or devices as a response to the threat of bushfires. Communication innovations, such as the use of Twitter and Facebook by fire emergency services, have been appropriated and fine-tuned by these organisations. Other innovations such as the user-friendly Firewatch site rely on previous technological developments in satellite-delivered imagery—as well as community input regarding the design and use of the site.Our early research into community members’ fire-related information-seeking behaviours and attitudes to mediated information services in the region of Kununurra has found unexpectedly creative responses, which range from collective creativity on the part of emergency responders or the community in general during events to creative use of existing information and communication networks. We intend to utilise this creativity in re-purposing FireWatch alongside the creative work of the designers in the project.Although it is commonplace to think of graphic design and new technology as incorporating creativity, it is rarely acknowledged how frequently these innovations harness everyday perspectives from non-professionals. In the case of the FireWatch developments, the creativity of designers and technologists has been informed by the creative responses of members of the public who are best placed to understand the challenges posed by restricted information flows on the ground in times of crisis. In these situations, people respond not only with new ideas for the future but with innovative responses in the present as they communicate with each other to deal with the challenge of a fast-moving and unpredictable situation. Such improvisation, honed through close awareness of the contours and parameters of both community and communication, are one of the ways through which people help keep themselves and each other safe in the face of dramatic developments.ReferencesElsworth, G., and K. Stevens, J. Gilbert, H. Goodman, A Rhodes. "Evaluating the Community Safety Approach to Bushfires in Australia: Towards an Assessment of What Works and How." Biennial Conference of the Eupopean Evaluation Society, Lisbon, Oct. 2008. Freeman, Mark. "Fire, Wind and Water: Social Networks in Natural Disasters." Journal of Cases on Information Technology (JCIT) 13.2 (2011): 69–79.Gilfillan, S. Colum. The Sociology of Invention. Chicago: Follett Publishing, 1935.Harrald, John R. "Agility and Discipline: Critical Success Factors for Disaster Response." The Annals of the American Academy of Political and Social Science 604.1 (2006): 256–72.Johnson, Peter. "Australia Unprepared for Bushfire”. Australian Broadcasting Corporation 17 Dec. 2012. 3 Jan. 2013 ‹http://www.abc.net.au/environment/articles/2012/12/17/3654075.htm›.Keelty, Mick J. "A Shared Responsibility: the Report of the Perth Hills Bushfires February 2011". Department of Premier and Cabinet, Government of Western Australia, Perth.Kendra, James, and Tricia Wachtendorf. "Improvisation, Creativity, and the Art of Emergency Management." NATO Advanced Research Workshop on Understanding and Responding to Terrorism: A Multi-Dimensional Approach. Washington, DC, 8-9 Sep. 2006.———. "Creativity in Emergency Response after the World Trade Centre Attack". Amud Conference of the International Emergency Management Society. University of Delaware. 14-17 May 2002. Mumford, Michael D. "Social Innovation: Ten Cases from Benjamin Franklin." Creativity Research Journal 14.2 (2002): 253–66.Palen, Leysia, and Sophia.B. Liu. "Citizen Communications in Crisis: Anticipating a Future of ICT-Supported Public Participation." Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. San Jose, 28 Apr. - 3 May 2007.Park, Ji Yong. "Design Process Excludes Users: The Co-Creation Activities between User and Designer." Digital Creativity 23.1 (2012): 79–92. Sinnappan, Suku, Cathy Farrell, and Elizabeth Stewart. "Priceless Tweets! A Study on Twitter Messages Posted During Crisis: Black Saturday." Proceedings of 21st Australasian Conference on Information Systems (ACIS 2010). Brisbane, Australia, 1-3 Dec 2010.Sorensen, John H., and Barbara Vogt Sorensen. "Community Processes: Warning and Evacuation." Handbook of Disaster Research. Eds. Havidán Rodríguez, Enrico Louis Quarantelli, and Russell Rowe Dynes. New York: Springer, 2007. 183–99.Webb, Gary R., and Francois-Regis Chevreau. "Planning to Improvise: The Importance of Creativity and Flexibility in Crisis Response." International Journal of Emergency Management 3.1 (2006): 66–72.
APA, Harvard, Vancouver, ISO, and other styles
27

Luger, Jason David. "Must Art Have a ‘Place’? Questioning the Power of the Digital Art-Scape." M/C Journal 19, no. 3 (June 22, 2016). http://dx.doi.org/10.5204/mcj.1094.

Full text
Abstract:
Introduction Artist: June 2 at 11.26pm:‘To be truly radical is to make hope possible rather than despair convincing.’ - Raymond Williams. (Singaporean Artists’ public Facebook Post) Can the critical arts exist without ‘place’?There is an ongoing debate on ‘place’ and where it begins and ends; on the ways that cities exist in both material and immaterial forms, and thereby, how to locate and understand place as an anchoring point amidst global flows (Massey; Merrifield). This debate extends to the global art- scape, as traditional conceptions of art and art-making attached to place require re-thinking in a paradigm where digital and immaterial networks, symbols and forums both complement and complicate the role that place has traditionally played (Luger, “Singaporean ‘Spaces of Hope?”). The digital art-scape has allowed for art-led provocations, transformations and disturbances to traditional institutions and gatekeepers (see Hartley’s “ Communication, Media, and Cultural Studies” concept of ‘gatekeeper’) of the art world, which often served as elite checkpoints and way-stations to artistic prominence. Still, contradictory and paradoxical questions emerge, since art cannot be divorced of place entirely, and ‘place’ often features as a topic, subject, or site of critical expression for art regardless of material or immaterial form. Critical art is at once place-bound and place-less; anchored to sites even as it transcends them completely.This paper will explore the dualistic tension – and somewhat contradictory relationship – between physical and digital artistic space through the case study of authoritarian Singapore, by focusing on a few examples of art-activists and the way that they have used and manipulated both physical and digital spaces for art-making. These examples draw upon research which took place in Singapore from 2012-2014 and which involved interviews with, and observation of, a selected sample (30) of art-activists (or “artivists”, to use Krischer’s definition). Findings point to a highly co-dependent relationship between physical and digital art places where both offer unique spaces of possibility and limitations. Therefore, place remains essential in art-making, even as digital avenues expand and amplify what critical art-practice can accomplish.Singapore’s Place-Bound and Place-Less Critical Art-Scape The arts in Singapore have a complicated, and often tense relationship with places such as the theatre, the gallery, and the public square. Though there has been a recent push (in the form of funding to arts groups and physical arts infrastructure) to make Singapore more of an arts and cultural destination (see Luger “The Cultural Grassroots and the Authoritarian City”), the Singaporean arts-scape remains bound by restrictions and limitations, and varying degrees of de facto (and de jure) censorship and self-policing. This has opened up spaces for critical art, albeit in sometimes creative and surprising forms. As explained to me by a Singaporean playwright,So they’re [the state] making venues, as well as festival organizers, as well as theatre companies, to …self-police, or self-censor. But for us on the ground, we use that as a way to focus on what we still want to say, and be creative about it, so that we circumvent the [state], with the intention of doing what we want to do. (Research interview, Singaporean playwright)Use of cyber-spaces is one way that artists circumvent repressive state structures. Restrictions on the use of place enliven cyberspace with an emancipatory and potentially transformative potential for the critical arts. Cyber-Singapore has a vocal art-activist network and has allowed some artists (such as the “Sticker Lady”) to gain wide national and even international followings. However, digital space cannot exist without physical place; indeed, the two exist, simultaneously, forming and re-forming each other. The arts cannot ‘happen’ online without a corresponding physical space for incubation, for practice, for human networking.It is important to note that in Singapore, art-led activism (or ‘artivism’) and traditional activism are closely related, and research indicated that activist networks often overlap with the art world. While this may be the case in many places, Singapore’s small geography and the relatively wide-berth given to the arts (as opposed to political activism) make these relationships especially strong. Therefore, many arts-spaces (theatres, galleries, studios) function as activist spaces; and non-art spaces such as public squares and university campuses often host art events and displays. Likewise, many of the artists that I interviewed are either directly, or indirectly, involved in more traditional activism as well.Singapore is an island-nation-city-state with a carefully planned urban fabric, the vast majority of which is state-owned (at least 80 % - resulting from large-scale land transfers from the British in the years surrounding Singapore’s independence in 1965). Though it has a Westminster-style parliamentary system (another colonial vestige), a single ruling party has commanded power for 50 years (the People’s Action Party, or PAP). Despite free elections and a liberal approach toward business, foreign investment and multiculturalism, Singapore retains a labyrinthine geography of government control over free expression, dictated through agencies such as the Censorship Review Committee (CRC); the Media Development Authority (MDA), and the National Arts Council (NAC) which work together in a confusing grid of checks and balances. This has presented a paradoxical and often contradictory approach to the arts and culture in which gradual liberalisations of everything from gay nightlife to university discourse have come hand-in-hand with continued restrictions on political activism and ‘taboo’ artistic / cultural themes. These ‘out of bounds’ themes (see Yue) include perceived threats to Singapore’s racial, religious, or political harmony – a grey area that is often at the discretion of particular government bureaucrats and administrators.Still, the Singaporean arts place (take the theatre, for example) has assumed a special role as a focal point for not only various types of visual and performance art, but also unrelated (or tangentially-related) activist causes as well. I asked a theatre director of a prominent alternative theatre where, in Singapore’s authoritarian urban fabric, there were opportunities for provocation? He stressed the theatres’ essential role in providing a physical platform for visual tensions and disturbance:You know, and on any given evening, you’ll see some punks or skinheads hanging outside there, and they kind of – create this disturbance in this neighbourhood, where, you know a passer-by is walking to his posh building, and then suddenly you know, there’s this bunch of boys with mohawks, you know, just standing there – and they are friendly! There’s nothing antagonistic or threatening, whatever. So, you know, that’s the kind of tension that we actually love to kind of generate!… That kind of surprise, that kind of, ‘oh, oh yes!’ we see this nice, expensive restaurant, this nice white building, and then these rough edges. And – that is where uh, those points where – where factions, where the rough edges meet –are where dialogue occurs. (Theatre Director, Singapore)That is not to say that the theatre comes without limits and caveats. It is financially precarious, as the Anglo-American model of corporate funding for the arts is not yet well-established in Singapore; interviews revealed that even much of the philanthropic donating to arts organizations comes from Singapore’s prominent political families and therefore the task of disentangling state interests from non-ideological arts patronage becomes difficult. With state - funding come problems with “taboo” subjects, as exemplified by the occasional banned-play or the constant threat of budget cuts or closure altogether: a carrot and stick approach by the state that allows arts organizations room to operate as long as the art produced does not disturb or provoke (too) much.Liew and Pang suggest that in Singapore, cyberspace has allowed a scale, a type of debate and a particularly cross-cutting conversation to take place: in a context where there are peculiar restrictions on the use and occupation of the built environment. They [ibid] found an emerging vocal, digital artistic grassroots that increasingly challenges the City-State’s dominant narratives: my empirical research therefore expands upon, and explores further, the possibility that Singapore’s cyber-spaces are both complementary to, and in some ways, more important than its material places in terms of providing spaces for political encounters.I conducted ‘netnography’ (see Kozinets) across Singapore’s web-scape and found that the online realm may be the ‘… primary site for discursive public activity in general and politics in particular’ (Mitchell, 122); a place where ‘everybody is coming together’ (Merrifield, 18). Without fear of state censorship, artists, activists and art-activists are not bound by the (same) set of restrictions that they might be if operating in a theatre, or certainly in a public place such as a park or square. Planetary cyber-Singapore exists inside and outside the City-State; it can be accessed remotely, and can connect with a far wider audience than a play performed in a small black box theatre.A number of blogs and satirical sites – including TheOnlineCitizen.sg, TheYawningBread.sg, and Demon-Cratic Singapore, openly criticize government policy in ways rarely heard in-situ or in even casual conversation on the street. Additionally, most activist causes and coalitions have digital versions where information is spread and support is gathered, spanning a range of issues. As is the case in material sites of activism in Singapore, artists frequently emerge as the loudest, most vocal, and most inter-disciplinary digital activists, helping to spearhead and cobble together cultural-activist coalitions and alliances. One example of this is the contrast between the place bound “Pink Dot” LGBTQ event (limited to the amount of people that can fit in Hong Lim Park, a central square) and its Facebook equivalent, We are Pink Dot public ‘group’. Pink Dot occurs each June in Singapore and involves around 10,000 people. The Internet’s representations of Pink Dot, however, have reached millions: Pink Dot has been featured in digital (and print) editions of major global newspapers including The Guardian and The New York Times. While not explicitly an art event, Pink Dot is artistic in nature as it uses pink ‘dots’ to side-step the official designation of being an LGBTQ pride event – which would not be sanctioned by the authorities (Gay Pride has not been allowed to take place in Singapore).The street artist Samantha Lo – also known as “Sticker Lady” – was jailed for her satirical stickers that she placed in various locations around Singapore. Unable to freely practice her art on city streets, she has become a sort of local artist - Internet celebrity, with her own Facebook Group called Free Sticker Lady (with over 1,000 members as of April, 2016). Through her Facebook group, Lo has been able to voice opinions that would be difficult – or even prohibited – with a loudspeaker on the street, or expressed through street art. As an open lesbian, she has also been active (and vocal) in the “Pink Dot” events. Her speech at “Pink Dot” was heard by the few-thousand in attendance at the time; her Facebook post (public without privacy settings) is available to the entire world:I'll be speaking during a small segment at Pink Dot tomorrow. Though only two minutes long, I've been spending a lot of time thinking about my speech and finding myself at a position where there's just so much to say. All my life, I've had to work twice as hard to prove myself, to be taken seriously. At 18, I made a conscious decision to cave in to societal pressures to conform after countless warnings of how I wouldn't be able to get a job, get married, etc. I grew my hair out, dressed differently, but was never truly comfortable with the person I became. That change was a choice, but I wasn't happy.Since then, I learnt that happiness wasn't a given, I had to work for it, for the ability to be comfortable in my own skin, to do what I love and to make something out of myself. (Artists’ Facebook Post)Yet, without the city street, Lo would not have gained her notoriety; without use of the park, Pink Dot would not have a Facebook presence or the ability to gather international press. The fact that Singaporean theatre exists at all as an important instigator of visual and performative tension demonstrates the significance of its physical address. Physical art places provide a crucial period of incubation – practice and becoming – that cannot really be replicated online. This includes schools and performance space but also in Singapore’s context, the ‘arts-housing’ that is provided by the government to small-scale, up-and-coming artists through a competitive grant process. Artists can receive gallery, performance or rehearsal space for a set amount of time on a rotating basis. Even with authoritarian restrictions, these spaces have been crucial for arts development:There’s a short-term [subsidised] residency studio …for up to 12 months. And so that –allows for a rotating group of artists to come with an idea in mind, use it for whatever- we’ve had artists who were preparing for a major show, and say ‘my studio space, my existing studio space is a bit too tiny, because I’m prepping for this show, I need a larger studio for 3 months. (Arts Administrator, Singapore)Critical and provocative art, limited and restricted by place, is thus still intrinsically bound to it. Indeed, the restrictions on artistic place allow cyber-art to flourish; cyber-art can only flourish with a strong place- based anchor. Far from supplanting place-based art, the digital art-scape forms a complement; digital and place-based art forms combine to form new hybridities in which local context and global forces write and re-write each other in a series of place and ‘placeless’ negotiations. Conclusion The examples that have been presented in this paper paint a picture of a complex landscape where specific urban sites are crucial anchoring nodes in a critical art ecosystem, but much artistic disturbance actually occurs online and in immaterial forms. This may hint at the possibility that globally, urban sites themselves are no longer sufficient for critical art to flourish and reach its full potential, especially as such sites have increasingly fallen prey to austerity policies, increasingly corporate and / or philanthropic programming and curation, and the comparatively wider reach and ease of access that digital spaces offer.Electronic or digital space – ranging from e-mail to social media (Twitter, blogs, Facebook and many others) has opened a new frontier in which, “… material public spaces in the city are superseded by the fora of television, radio talk shows and computer bulletin boards” (Mitchell. 122). The possibility now emerges whether digital space may be even more crucial than material public spaces in terms of emancipatory or critical potential– especially in authoritarian contexts where public space / place comes with particular limits and restrictions on assembling, performance, and critical expression. These contexts range from Taksim Square, Istanbul to Tiananmen Square, Beijing – but indeed, traditional public place has been increasingly privatized and securitized across the Western-liberal world as well. Where art occurs in place it is often stripped of its critical potential or political messages, sanctioned or sponsored by corporate groups or sanitized by public sector authorities (Schuilenburg, 277).The Singapore case may be especially stark due to Singapore’s small size (and corresponding lack of visible public ‘places’); authoritarian restrictions and correspondingly (relatively) un-policed and un-censored cyberspace. But it is fair to say that at a time when Youtube creates instant celebrities and Facebook likes or Instagram followers indicate fame and (potential) fortune – it is time to re-think and re-conceptualise the relationship between place, art, and the place-based institutions (such as grant-funding bodies or philanthropic organizations, galleries, critics or dealers) that have often served as “gatekeepers” to the art-scape. This invites challenges to the way these agents operate and the decision making process of policy-makers in the arts and cultural realm.Mitchell (124) reminded that there has “never been a revolution conducted exclusively in electronic space; at least not yet.” But that was 20 years ago. Singapore may offer a glimpse, however, of what such a revolution might look like. This revolution is neither completely place bound nor completely digital; it is one in which the material and immaterial interplay and overlap in post-modern complexity. Each platform plays a role, and understanding the way that art operates both in place and in “placeless” forms is crucial in understanding where key transformations take place in both the production of critical art and the production of urban space.What Hartley (“The Politics of Pictures”) called the “space of citizenry” is not necessarily confined to a building, the city street or a public square (or even private spaces such as the home, the car, the office). Sharon Zukin likewise suggested that ultimately, a negotiation of a city’s digital sphere is crucial for current-day urban research, arguing that:Though I do not think that online communities have replaced face to face interaction, I do think it is important to understand the way web-based media contribute to our urban imaginary. The interactive nature of the dialogue, how each post feeds on the preceding ones and elicits more, these are expressions of both difference and consensus, and they represent partial steps toward an open public sphere. (27)Traditional gatekeepers such as the theatre director, the museum curator and the state or philanthropic arts funding body have not disappeared, though they must adapt to the new cyber-reality as artists have new avenues around these traditional checkpoints. Accordingly – “old” problems such as de-jure and de-facto censorship reappear in the cyber art-scape as well: take the example of the Singaporean satirical bloggers that have been sued by the government in 2013-2016 (such as the socio-political bloggers and satirists Roy Ngerng and Alex Au). No web-space is truly open.A further complication may be the corporate nature of sites such as Facebook, Instagram, Youtube, or Twitter: far from truly democratic platforms or “agoras” in the traditional sense, these are for-profit (massive) corporations – which a small theatre is not. Singapore’s place based authoritarianism may be multiplied in the corporate authoritarianism or “CEO activism” of tech titans like Mark Zuckerberg, who allow for diverse use of digital platforms and encourage open expression and unfettered communication – as long as it is on their terms, within company policies that are not always transparent.Perhaps the questions then really are not where ‘art’ begins and ends, or where a place starts or stops – but rather where authoritarianism, state and corporate power begin and end in the hyper-connected global cyber-scape? And, if these power structures are now stretched across space and time as Marxist theorists such as Massey or Merrifield claimed, then what is the future for critical art and its relationship to ‘place’?Despite these unanswered questions and invitations for further exploration, the Singapore case may hint at what this emerging geography of place and ‘placeless’ art resembles and how such a new world may evolve moving forward. ReferencesHartley, John. The Politics of Pictures: the Creation of the Public in the Age of Popular Media. Perth: Psychology Press, 1992.———. Communication, Media, and Cultural Studies: The Key Concepts. Oxford: Routledge, 2012. Kozinets, Robert. Netnography: Doing Ethnographic Research Online. New York: Sage, 2010. Krischer, Oliver. “Lateral Thinking: Artivist Networks in East Asia.” ArtAsia Pacific 77 (2012): 96-110. Liew, Kai Khiun. and Natalie Pang. “Neoliberal Visions, Post Capitalist Memories: Heritage Politics and the Counter-Mapping of Singapore’s City-Scape.” Ethnography 16.3 (2015): 331-351.Luger, Jason. “The Cultural Grassroots and the Authoritarian City: Spaces of Contestation in Singapore.” In T. Oakes and J. Wang, eds., Making Cultural Cities in Asia: Mobility, Assemblage, and the Politics of Aspirational Urbanism. London: Routledge, 2015: 204-218. ———. “Singaporean ‘Spaces of Hope?' Activist Geographies in the City-State.” City: Analysis of Urban Trends, Culture, Theory, Policy, Action 20.2 (2016): 186-203. Massey, Doreen. Space, Place and Gender. Minneapolis: University of Minnesota Press, 1995. Merrifield, Andy. The Politics of the Encounter: Urban Theory and Protest under Planetary Urbanization. Athens: University of Georgia Press, 2013. Mitchell, Don. “The End of Public Space? People’s Park, Definitions of the Public, and Democracy.” Annals of the Association of American Geographers 85.1 (1996): 108-133. Schuilenburg, Marc. The Securitization of Society: Crime, Risk and Social Order. New York: New York University Press, 2015. Shirky, Clay. Here Comes Everybody: The Power of Organizing without Organizations. New York: Penguin, 2008. Yue, Audrey. “Hawking in the Creative City: Rice Rhapsody, Sexuality and the Cultural Politics of New Asia in Singapore. Feminist Media Studies 7.4 (2007): 365-380. Zukin, Sharon. The Naked City: The Death and Life of Authentic Urban Places. London and New York: Oxford University Press, 2010.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography