Posts tagged network
In 1959, as the director of a secret military computer research centre, Kitov turned his attention to devoting ‘unlimited quantities of reliable calculating processing power’ to better planning the national economy, which was the most persistent information-coordination problem besetting the Soviet socialist project. (It was discovered in 1962, for example, that a handmade calculation error in the 1959 census goofed the population prediction by 4 million people.) Kitov wrote his thoughts down in the ‘Red Book letter’, which he sent to Khrushchev. He proposed allowing ‘civilian organisations’ to use functioning military computer ‘complexes’ for economic planning in the nighttime hours, when most military men were sleeping. Here, he thought, economic planners could harness the military’s computational surplus to adjust for census problems in real-time, tweaking the economic plan nightly if needed. He named his military-civilian national computer network the Economic Automated Management System.
qaul.net implements a redundant, open communication principle, in which wireless-enabled computers and mobile devices can directly form a spontaneous network. Text messaging, file sharing and voice calls are possible independent of internet and cellular networks. Qaul.net can spread like a virus, and an Open Source Community can modify it freely. In a time of communication blackouts in places like Egypt, Burma, and Tibet, and given the large power outages often caused by natural disasters, qaul.net has taken on the challenge of critically examining existing communication pathways while simultaneously exploring new horizons.
every device is a target for colonization, as each successfully exploited target is theoretically useful as a means to infiltrating another possible target. Port scanning and downloading banners to identify which software is operating on the target system is merely the first step of the attack (Figure 8). Top secret documents from the NSA seen by Heise demonstrate that the involved spy agencies follow the common methodology of online organized crime (Figure 9): reconnaissance (Figure 10) is followed by infection (Figure 11), command and control (Figure 12), and exfiltration (Figure 13). The NSA presentation makes it clear that the agency embraces the mindset of criminals. In the slides, they discuss techniques and then show screenshots of their own tools to support this criminal process (Figure 14, 15 and 16).
For now, however, it is only the village of Löwenstedt that has succeeded in mobilising the solidarity of its inhabitants to build a high-speed Internet network. Other villages have been slower and found it more difficult to follow Löwenstedt’s lead. “At least 68 percent of households in a village have to promise to subscribe to the fibre-optic network before we start work,” said BBNG chief Ute Gabriel-Boucsein.
What if a future decentralized social networking platform allowed everyone to connect their capture node, for the use of any other artist, or just a chosen circle of friends? We already use Google Street View for location scouting. What if it enabled us to change to any angle and scrub back and forth in time as well, and from any “open” node near it, side to side, and from drones above, not just from a single Google car that passed by once? This is the Constant Moment. This is as close to a time machine as we’re likely to get. Great technological leaps will be required to fulfill the furthest reaches of the Constant Moment. Massive gains in the quality of search and organization, not to mention cost of storage, and resolution. Perhaps even some form of a neural interface. But it’s clear to me this is a “when,” not an “if,” and artists need to begin anticipating this future, to inspire and guide the technologists, and to keep up with the military dreamers (it’s been said that in childhood development the destructive urge precedes the creative one by months, as blocks get knocked down long before they get stacked.) To the photographer that still thinks photography mostly means being physically present, crouched behind their Leica, finger poised to capture the classic vision of the Decisive Moment, this coming Constant Moment might be terrifyingly sacrilegious, or perhaps just terrifying, like an insect eye dispassionately staring.
Kirkyan is a currently-theoretical “Thing” (PDF) related to both blogject (early example here by originator of the kirkyan concept) and spime. At the core, the concept revolves around the idea that the same data used to create a physical spime can be used to also create a virtual spime, and that the two can then be connected via the same ubiquitous computing network. Where spimes have a number of predefined limitations (e.g. “Cradle-to-cradle” life-spans), a kirkyan is inherently redundant and thus has additional capabilities. Furthermore, while the physical and the virtual are related and in constant networked contact, they are, to a significant degree, autonomous.