On Hijacking LED Walls

نویسندگان

چکیده

In recent years, the LED walls originally used in outdoor spaces by advertising companies to extend consumption of images our daily life have been appropriated artists and installed gallery spaces. When viewed nearby or when walking around them, become some way dysfunctional: The fade, points color distortions appear, spectacle machine interruputs habitual viewing patterns. This article focuses on three works which disrupt immersive regimes through what I call “hijacking” advanced technology. Lucy Raven (Tucson, AZ, USA), Demolition a Wall (Album 2), 2022. Eija-Liisa Ahtila (Helsinki, Finland), Potentiality for Love, 2018. Marco Fusinato (Sidney, Australia), Desastres, Australian Pavilion, Venice Biennale, These use sculptural spectacular effect freestanding attention capitalist relation Through performative narrative pieces, these deploy poetic artistic effects explore politics technological immersion societies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hijacking AFS

We have identified several techniques that allow uncontrolled access to files managed by AFS 3.0. One method relies on administrative (or root) access to a user’s workstation. Defending against this sort of attack is very difficult. Another class of attacks comes from promiscuous access to the physical network. Stronger cryptographic protocols, such as those employed by AFS 3.1, obviate this pr...

متن کامل

Process Hijacking

Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migration technique, called process hijacking, that uses dynamic program re-writing techniques to add checkpointing capability to a running program. Process hijacking makes it possible to checkpoint and migrate proprietary...

متن کامل

A Forensic Case Study on AS Hijacking

The Border Gateway Protocol (BGP) was designed without security in mind. Until today, this fact makes the Internet vulnerable to hijacking attacks that intercept or blackhole Internet traffic. So far, significant effort has been put into the detection of IP prefix hijacking, while AS hijacking has received little attention. AS hijacking is more sophisticated than IP prefix hijacking, and is aim...

متن کامل

Hijacking the Linux Kernel

In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a different function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The attack is applicable to all kernels f...

متن کامل

Hijacking translation in addiction

Two studies suggest that the reduced activity of a translation initiation factor called eIF2α might be partly responsible for the increased risk of drug addiction seen in adolescents.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Arts

سال: 2023

ISSN: ['2076-0752']

DOI: https://doi.org/10.3390/arts12030108