Archive Search

  • Tristero -
    ... upload their junk mail for it to be manipulated or... material that has been uploaded by the various users. As...
  • ... Java Security Settings for Whitney Museum Artport in... adjust your Java Security Settings for Whitney...
  • ... as a digital form made up of audio tracks... 1000 audio and video files interacting through a push...
  • Violating Patterns -
    ... the service of “national security”. The barbed wire, which...
  • Skulls
    ... files became the models for four sculptures cast in solid... The resulting distorted files became the models for four...
  • ... contract, engender the formation of abstract ephemeral... into a false sense of security which is then at the...
  • Echo 9 -
    ... as PSD and TIFF files. Currently all of the...
  • fünfnullplus -
    ... in the surrounding space for fractions of a second. The... "family", "care", "security", "deficits", to name...
  • ... the erosion of privacy, security, morality. Using rare...
  • ... Based VRML and conceived for immersion. Texts... closes the various sound files/poems. Text also...