Information
Technology
Software
Perl
Descriptions & Essays
Enter project here:
Commissioned by the Whitney Museum
ADA Editor 16-06-2015
Comment by John Klima:
Alex's piece is unique in that it has no "front end" and is simply an appreciation of the code and, in this case, very much of what that code can be used for. I can't say I was reticent to click on the links like Martin was, I figured Alex is savvy enough not to destroy the computers of visitors to the Whitney Museum. What's interesting here is just how simple it is to hack a Hotmail password, or create an email worm, particularly when the user's software is so blatantly vulnerable to it, as is the case with Outlook and Hotmail. Hmmm, both are Microsoft products.
ADA Editor: What You See Is What You Get, 16-06-2015, in: Archive of Digital Art Comment by John Klima:
Alex's piece is unique in that it has no "front end" and is simply an appreciation of the code and, in this case, very much of what that code can be used for. I can't say I was reticent to click on the links like Martin was, I figured Alex is savvy enough not to destroy the computers of visitors to the Whitney Museum. What's interesting here is just how simple it is to hack a Hotmail password, or create an email worm, particularly when the user's software is so blatantly vulnerable to it, as is the case with Outlook and Hotmail. Hmmm, both are Microsoft products.
ADA Editor 16-06-2015
Comment by Scott Snibbe:
"Your piece, WYSIWIG, shows in a strong way that a program is just a text file -- only once this file is compiled, interpreted, run or even read, that's when it is activated. By including the "Confidential Business Proposal" as part of your code, you've made this distinction extremely clear. "Running" any of these programs could cause great harm and like many hacks, the user/recipient is the most important step in execution -- unwittingly running a mysterious executable or sending off signed blank letterhead to Nigeria. CODeDOC also wants to include reading in the execution loop, and your piece eases them into that process. In fact, your work is better read than executed for the majority of us! It also reminds me that most artwork is experience through documentation rather than personal experience. As a side-note, this is also the only truly useful client in the CODeDOC pantheon."
ADA Editor: What You See Is What You Get, 16-06-2015, in: Archive of Digital Art Comment by Scott Snibbe:
"Your piece, WYSIWIG, shows in a strong way that a program is just a text file -- only once this file is compiled, interpreted, run or even read, that's when it is activated. By including the "Confidential Business Proposal" as part of your code, you've made this distinction extremely clear. "Running" any of these programs could cause great harm and like many hacks, the user/recipient is the most important step in execution -- unwittingly running a mysterious executable or sending off signed blank letterhead to Nigeria. CODeDOC also wants to include reading in the execution loop, and your piece eases them into that process. In fact, your work is better read than executed for the majority of us! It also reminds me that most artwork is experience through documentation rather than personal experience. As a side-note, this is also the only truly useful client in the CODeDOC pantheon."
ADA Editor 16-06-2015
Comment by Martin Wattenberg:
Ok, I confess: I was genuinely worried about clicking the links in Alex's piece. That proves the potency of this exploration of the tools and vocabulary of the internet underworld.
ADA Editor: What You See Is What You Get, 16-06-2015, in: Archive of Digital Art Comment by Martin Wattenberg:
Ok, I confess: I was genuinely worried about clicking the links in Alex's piece. That proves the potency of this exploration of the tools and vocabulary of the internet underworld.
Literature
Galloway, Alexander. »What you see is what you get?.« In The archive in motion: new conceptions of the archive in contemporary thought and new media practices, edited by Eivind Røssaak, 155-182. Oslo: Novus Press, 2010.
Lampo, Luca and Marco Deseriis and Domenico Quaranta. Connessioni Leggendarie. Net.art 1995-2005. Milano: ready-made, 2005.

Paul, Christiane. »CODeDOC II: curator's statement.« http://www.aec.at/CODeDOCII.
Exhibitions & Events
2003
Festival :