Mateus - Unstable Frequencies: Difference between revisions

This page was last edited on 31 January 2024, at 08:43.
Line 3: Line 3:
'''Mateus Domingos'''
'''Mateus Domingos'''


This workshop was convened around a carefully maintained set of networking and publishing infrastructures. Participating in the workshop we gained a privileged access to these tools, services, system memory (which constitute a counter model of networked infrastructure). The ServPub server produces an adaptive refiguring of network infrastructure and collective presence.
This workshop was convened around a carefully maintained set of networking and publishing infrastructures. Participating in the workshop we gained a privileged access to these tools, services and system memory (which constitute a counter model of networked infrastructure). The ServPub server produces an adaptive refiguring of network infrastructure and collective presence.


Intending to invite a space for imagination and active participation in these networks, I re-purposed the widely available Wifi-enabled microcontrollers (ESP8266) to introduce a series of local-only Wifi access points, programmed to serve a simple messageboard.  
Intending to invite a space for imagination and active participation in these networks, I re-purposed the widely available Wifi-enabled microcontrollers (ESP8266) to introduce a series of local-only Wifi access points, programmed to serve a simple messageboard. My interest in these particular microcontrollers stems from their functionality, offering a low-code entry level into networking devices, that also contains enough flexibility for interesting and surprising uses to emerge. The intent was for these to act as shadow networks to the primary shared server. It was intended to augment our interactions with the server and the collective writing processes. Additionally to these programmed uses it can also hold other interactions that distort the nested protocols.  
 
My interest in these particular microcontrollers stems from their functionality, offering a low-code entry level into networking devices, that also contains enough flexibility for interesting and surprising uses to emerge.
 
The intent was for these to act as shadow networks to the primary shared server. It was intended to augment our interactions with the server and the collective writing processes. Additionally to these programmed uses it can also hold other interactions that distort the nested protocols.


Visibly, these microcontrollers break the infrastructure into further discrete nodes. More brittle than the wider network, technical capability is traded for limited parameters, that surface protocological moments into active decisions. The reduced component architecture offers some specificity of the material entanglements. We know where the memory is inscribed and under what levels of permanence. We can also follow the combination of manufacturers at least partially involved in this; Espressif, Ai-Thinker, Wemos.
Visibly, these microcontrollers break the infrastructure into further discrete nodes. More brittle than the wider network, technical capability is traded for limited parameters, that surface protocological moments into active decisions. The reduced component architecture offers some specificity of the material entanglements. We know where the memory is inscribed and under what levels of permanence. We can also follow the combination of manufacturers at least partially involved in this; Espressif, Ai-Thinker, Wemos.
Line 21: Line 17:
Something that surfaces as an immediate limit is the lack of security offered by the microcontroller. To engage with it in a sustained way requires additional agreements and discussion, emerging from the local context. So it's perhaps always unsuited for activating effective resistance to the dominant form of the internet, but could remain a possible tool for layering upon or around experimental infrastructure, such as the shared server.
Something that surfaces as an immediate limit is the lack of security offered by the microcontroller. To engage with it in a sustained way requires additional agreements and discussion, emerging from the local context. So it's perhaps always unsuited for activating effective resistance to the dominant form of the internet, but could remain a possible tool for layering upon or around experimental infrastructure, such as the shared server.


It remains a possibility of actions, untaken, and affirming of the practice developed in the shared server. The shadow network follows a Luddite logic of unpicking, allowing space for refusal, the dismissal of certain processes and tools, and the exploration of others, better suited to commonality. It remains open to other passageways of data; a shadow library, a local wiki or static site.
It remains a possibility of actions, untaken, and affirming of the practice developed in the shared server. The shadow network follows a Luddite logic of unpicking, allowing space for refusal, the dismissal of certain processes and tools, and the exploration of others, better suited to commonality. It remains open to other passageways of data; a shadow library, a local wiki or static site. When so much is contingent on a connected internet, subject to ever greater modes of extraction, a template of autonomous zones and fragmented protocols appears as a necessary practice.


When so much is contingent on a connected internet, subject to ever greater modes of extraction, a template of autonomous zones and fragmented protocols appears as a necessary practice.




Line 30: Line 25:
[[File:Wemos D1 Mini Top.png|alt=Wemos D1 Mini microcontroller with ESP8266 chip visible in the centre.|thumb|Wemos D1 Mini topside, ESP8266 chip visible.]]
[[File:Wemos D1 Mini Top.png|alt=Wemos D1 Mini microcontroller with ESP8266 chip visible in the centre.|thumb|Wemos D1 Mini topside, ESP8266 chip visible.]]


===== Bibliography =====
Binfield, K. (2004) Writings of the luddites. Baltimore: John Hopkins University Press. Cox, G. and Soon, W. (2020) Aesthetic Programming. London: Open Humanities Press.
Espressif Leads the IoT Chip Market with Over 1 Billion Shipments Worldwide | Espressif Systems [no date]. Available from: <nowiki>https://www.espressif.com/en/news/1_Billion_Chip_Sales</nowiki> [Accessed 4 January 2024].
Galloway, A. R. (2004) Protocol. Cambridge, Massachusetts: The MIT Press.
Iffy Books (2022) ''Iffy Books Pocket Wifi Portal Zine''. Philadelphia, Pensylvania: Iffy Books. Available from: <nowiki>https://iffybooks.net/pocket-wifi-portal</nowiki>
Lachney, M. and Dotson, T. C. (2018) Epistemological Luddism: Reinvigorating a Concept for Action in 21st Century Sociotechnical Struggles, Social Epistemology, 32 (4), pp. 228–240.
ServPub Homepage (2024). Available from: <nowiki>https://servpub.net/</nowiki> [Accessed 4 January 2024].
Thacker, E. (2004) Introduction to: Protocol. Cambridge, Massachusetts: The MIT Press.
Voegelin, S. (2019) The Political Possibility of Sound. London: Bloomsbury Academic.
</div>
</div>




[[Category:Content form]]
[[index.php?title=Category:Content form]]

Revision as of 08:43, 31 January 2024


index.php?title=Category:Content form