SlideShare une entreprise Scribd logo
1  sur  20
Kalonica Quigley s3237922 BA (Games Graphics Design)
A form of art that functions only on the internet and uses the internet as its theme. The internet is a medium which is constantly changing and growing and net art reacts accordingly. It differs from ‘art on the net’ which is a documentation of art created outside of the internet. Net Art  : More than 85% of all emails are spam and this has lead to the creation of a form of art that uses the text and data from junk email as the theme or method for creating art. Spam Art : One man’s spam is  ‘s art another man
Alex Dragulescu Born in Romania another man Moved to the US in 1997 Film Photography Art History Computer Science Visual Arts Computer Animation Computer Programming Web, multimedia and game design Studied: Self Taught: Worked on:
He recognized the over whelming amount of data accumulating on the internet and started to experiment with ways to harness it using algorithms and  information visualisation . -  A traditional scientific method used to create an image of data so connections can be made visually - connections that might otherwise be lost. Alex Dragulescu
This has become his art Alex Dragulescu “ Using scientific visualisation methods to  make art shows how technology changes art”
This has become his art Alex Dragulescu “ Using scientific visualisation methods to  make art shows how technology changes art”
“ Spam is a random piece of literature, it has unseen effects, it changes all the time.  And it’s led me to see text differently.” Spam Plants
Spam Plants uses algorithms that analyse text and data from junk email and uses this information to grow plant-like 3D images that visually represent the relationships between the data. -  subject line, headers, footers, message, sender’s email address, IP address, time it was sent, message size, keywords  The size, shape, growth rate and colour are all aspects of the plant that are directly created from information within the spam email.
Spam Plants uses algorithms that analyse text and data from junk email and uses this information to grow plant-like 3D images that visually represent the relationships between the data. -  subject line, headers, footers, message, sender’s email address, IP address, time it was sent, message size, keywords  The size, shape, growth rate and colour are all aspects of the plant that are directly created from information within the spam email.
is a similar project where the information in spam emails is used to influence the architecture of a structure. It also identifies patterns, keywords, and rhythms found in the text. Spam Architecture
Malwarez was commissioned by the Security Firm Message Labs. This was done for an advertising campaign and it includes visual representations of online threats: viruses, trojans, spam, worms, spyware code.  -  “ Comprehensive, cost-effective, industry-leading  messaging and web security solutions ”
Malwarez “ For each piece of disassembled code, API calls, memory addresses and subroutines are tracked and analyzed. Their frequency, density and grouping are mapped to the inputs of an algorithm that grows a virtual 3D entity. Therefore the patterns and rhythms found in the data drive the configuration of the artificial organism.”
Malwarez
Malwarez
Malwarez
Malwarez
Malwarez Because these online threats work unseen and uncontrolled hidden in the computer, the average internet user may not realize their true threat. Therefore creating a visual representation of them allows the user to see just how hostile and complex they are. Message Labs is able to use this representation to highlight that their software is able to protect their customers from these scary entities.
Alex Dragulescu ’ s net art addresses the issue of the increasing and expanding, immense amount of data on the internet and attempts to make sense of it all by conceptualising it into a visual form that is easy to understand.  Spam is often seen as pointless, obtrusive, annoying and unattractive and yet Dragulescu is able to take it and craft it into something new, intriguing and aesthetically pleasing whilst also highlighting the connections in the code and the beauty within the hidden complexities of these disregarded creations.
References “ Alex Dragulescu Official Site”  http://www.sq.ro/  “ What is Net Art?”  http://www.irational.org/cern/netart.txt  “ One man's spam is another's art” http://news.cnet.com/One-mans-spam-is-anothers-art/2100-1025_3-6098479.html  “ Phishing Scams and Viruses Can Be Beautiful, Deadly ”  http://www.gizmodo.com.au/2008/02/phishing_scams_and_viruses_can_be_beauti ful_deadly/   “ Cyber crime art revealed”  http://www.metro.co.uk/news/world/110336-cyber-crime-art-revealed   “ Know Your Enemy”  http://www.messagelabs.co.uk/threats?c=WW729BpQp4GLx7X2QWb46g%3d%3d   “ spam architecture by alex dragulescu”  http://www.designboom.com/weblog/cat/9/view/3627/spam-architecture-by-alex -dragulescu.html
Kalonica Quigley s3237922 BA (Games Graphics Design)

Contenu connexe

Similaire à Kalonica Quigley(S3237922) Alex Dragulescu

Soulitarian City: Looking for the Hacker Ethic in Glasgow by Pat Kane, The Pl...
Soulitarian City: Looking for the Hacker Ethic in Glasgow by Pat Kane, The Pl...Soulitarian City: Looking for the Hacker Ethic in Glasgow by Pat Kane, The Pl...
Soulitarian City: Looking for the Hacker Ethic in Glasgow by Pat Kane, The Pl...www.patkane.global
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
IS Undergrads Class 4
IS Undergrads Class 4IS Undergrads Class 4
IS Undergrads Class 4Joao Cunha
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsIJCSIS Research Publications
 
Maltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetMaltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetShalin Hai-Jew
 
Cj 3 d printing 6 16 nmnf power point 1
Cj 3 d printing 6 16 nmnf power point 1Cj 3 d printing 6 16 nmnf power point 1
Cj 3 d printing 6 16 nmnf power point 1C.J. Reilly III
 
Titles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdfTitles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdfinfo751436
 
Artificial intelligence and its application
Artificial intelligence and its applicationArtificial intelligence and its application
Artificial intelligence and its applicationMohammed Abdel Razek
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamAlexander Decker
 
Artificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusArtificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusStig-Arne Kristoffersen
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...IRJET Journal
 
Connected Intelligence 1
Connected Intelligence 1Connected Intelligence 1
Connected Intelligence 1New Media Days
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsLinkurious
 
The Future of Agile is Diversity
The Future of Agile is DiversityThe Future of Agile is Diversity
The Future of Agile is DiversityKarina Kohl
 

Similaire à Kalonica Quigley(S3237922) Alex Dragulescu (20)

Soulitarian City: Looking for the Hacker Ethic in Glasgow by Pat Kane, The Pl...
Soulitarian City: Looking for the Hacker Ethic in Glasgow by Pat Kane, The Pl...Soulitarian City: Looking for the Hacker Ethic in Glasgow by Pat Kane, The Pl...
Soulitarian City: Looking for the Hacker Ethic in Glasgow by Pat Kane, The Pl...
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
IS Undergrads Class 4
IS Undergrads Class 4IS Undergrads Class 4
IS Undergrads Class 4
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
 
Maltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the InternetMaltego Radium Mapping Network Ties and Identities across the Internet
Maltego Radium Mapping Network Ties and Identities across the Internet
 
Cj 3 d printing 6 16 nmnf power point 1
Cj 3 d printing 6 16 nmnf power point 1Cj 3 d printing 6 16 nmnf power point 1
Cj 3 d printing 6 16 nmnf power point 1
 
Titles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdfTitles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdf
 
Artificial intelligence and its application
Artificial intelligence and its applicationArtificial intelligence and its application
Artificial intelligence and its application
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
 
Butti mohammad
Butti mohammadButti mohammad
Butti mohammad
 
Edu.03 assignment
Edu.03 assignment Edu.03 assignment
Edu.03 assignment
 
Edu.03
Edu.03 Edu.03
Edu.03
 
Artificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virusArtificial Intelligence powered malware - A Smart virus
Artificial Intelligence powered malware - A Smart virus
 
The Detection of Suspicious Email Based on Decision Tree ...
The Detection of Suspicious Email Based on Decision Tree                     ...The Detection of Suspicious Email Based on Decision Tree                     ...
The Detection of Suspicious Email Based on Decision Tree ...
 
Internet
InternetInternet
Internet
 
Smart-Share
Smart-ShareSmart-Share
Smart-Share
 
Connected Intelligence 1
Connected Intelligence 1Connected Intelligence 1
Connected Intelligence 1
 
Cyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analyticsCyber security and attack analysis : how Cisco uses graph analytics
Cyber security and attack analysis : how Cisco uses graph analytics
 
The Future of Agile is Diversity
The Future of Agile is DiversityThe Future of Agile is Diversity
The Future of Agile is Diversity
 

Plus de Media Cultures

Merrett_Plunkett_Jeges
Merrett_Plunkett_JegesMerrett_Plunkett_Jeges
Merrett_Plunkett_JegesMedia Cultures
 
Sev_Ali / Manolya_Borg / Anthu_Tran
Sev_Ali / Manolya_Borg / Anthu_TranSev_Ali / Manolya_Borg / Anthu_Tran
Sev_Ali / Manolya_Borg / Anthu_TranMedia Cultures
 
Elena zuban s3232206 flash mob
Elena zuban s3232206 flash mobElena zuban s3232206 flash mob
Elena zuban s3232206 flash mobMedia Cultures
 
Traditional and pervasive games -- examples
Traditional and pervasive games -- examplesTraditional and pervasive games -- examples
Traditional and pervasive games -- examplesMedia Cultures
 
Daniel angelones3236600
Daniel angelones3236600Daniel angelones3236600
Daniel angelones3236600Media Cultures
 
S3193654 wei pin tan-avatars
S3193654 wei pin tan-avatarsS3193654 wei pin tan-avatars
S3193654 wei pin tan-avatarsMedia Cultures
 
Gan weicheng s3191571_socialactivismgames
Gan weicheng s3191571_socialactivismgamesGan weicheng s3191571_socialactivismgames
Gan weicheng s3191571_socialactivismgamesMedia Cultures
 
Rorysampson, the real world in games
Rorysampson, the real world in gamesRorysampson, the real world in games
Rorysampson, the real world in gamesMedia Cultures
 
Virtual reality presentation3_sama_s3239506
Virtual reality presentation3_sama_s3239506Virtual reality presentation3_sama_s3239506
Virtual reality presentation3_sama_s3239506Media Cultures
 
Virtual reality presentation2_sama_s3239506
Virtual reality presentation2_sama_s3239506Virtual reality presentation2_sama_s3239506
Virtual reality presentation2_sama_s3239506Media Cultures
 
YouTube and Small-size Productions
YouTube and Small-size ProductionsYouTube and Small-size Productions
YouTube and Small-size ProductionsMedia Cultures
 
Jacob paris Serious Games
Jacob paris Serious GamesJacob paris Serious Games
Jacob paris Serious GamesMedia Cultures
 
Children's Entertainment = Flash Games?
Children's Entertainment = Flash Games?Children's Entertainment = Flash Games?
Children's Entertainment = Flash Games?Media Cultures
 
Daniel Beilharz s3200810
Daniel Beilharz s3200810Daniel Beilharz s3200810
Daniel Beilharz s3200810Media Cultures
 
Social Impact of Youtube - Jin Wang s3237857
Social Impact of Youtube - Jin Wang s3237857Social Impact of Youtube - Jin Wang s3237857
Social Impact of Youtube - Jin Wang s3237857Media Cultures
 
Nicholas lim chong_hock_(s3186372)_mc2_assign2_serious_games_presentation
Nicholas lim chong_hock_(s3186372)_mc2_assign2_serious_games_presentationNicholas lim chong_hock_(s3186372)_mc2_assign2_serious_games_presentation
Nicholas lim chong_hock_(s3186372)_mc2_assign2_serious_games_presentationMedia Cultures
 
Game Art Gregory Smith S3233429
Game Art Gregory Smith S3233429 Game Art Gregory Smith S3233429
Game Art Gregory Smith S3233429 Media Cultures
 
S3175889 lawrence wong
S3175889 lawrence wongS3175889 lawrence wong
S3175889 lawrence wongMedia Cultures
 

Plus de Media Cultures (20)

Merrett_Plunkett_Jeges
Merrett_Plunkett_JegesMerrett_Plunkett_Jeges
Merrett_Plunkett_Jeges
 
Sev_Ali / Manolya_Borg / Anthu_Tran
Sev_Ali / Manolya_Borg / Anthu_TranSev_Ali / Manolya_Borg / Anthu_Tran
Sev_Ali / Manolya_Borg / Anthu_Tran
 
Elena zuban s3232206 flash mob
Elena zuban s3232206 flash mobElena zuban s3232206 flash mob
Elena zuban s3232206 flash mob
 
Traditional and pervasive games -- examples
Traditional and pervasive games -- examplesTraditional and pervasive games -- examples
Traditional and pervasive games -- examples
 
Daniel angelones3236600
Daniel angelones3236600Daniel angelones3236600
Daniel angelones3236600
 
S3193654 wei pin tan-avatars
S3193654 wei pin tan-avatarsS3193654 wei pin tan-avatars
S3193654 wei pin tan-avatars
 
Gan weicheng s3191571_socialactivismgames
Gan weicheng s3191571_socialactivismgamesGan weicheng s3191571_socialactivismgames
Gan weicheng s3191571_socialactivismgames
 
Logan grays3235083
Logan grays3235083Logan grays3235083
Logan grays3235083
 
Rorysampson, the real world in games
Rorysampson, the real world in gamesRorysampson, the real world in games
Rorysampson, the real world in games
 
Virtual reality presentation3_sama_s3239506
Virtual reality presentation3_sama_s3239506Virtual reality presentation3_sama_s3239506
Virtual reality presentation3_sama_s3239506
 
Virtual reality presentation2_sama_s3239506
Virtual reality presentation2_sama_s3239506Virtual reality presentation2_sama_s3239506
Virtual reality presentation2_sama_s3239506
 
YouTube and Small-size Productions
YouTube and Small-size ProductionsYouTube and Small-size Productions
YouTube and Small-size Productions
 
Jacob paris Serious Games
Jacob paris Serious GamesJacob paris Serious Games
Jacob paris Serious Games
 
S3132428 geoff walker
S3132428 geoff walkerS3132428 geoff walker
S3132428 geoff walker
 
Children's Entertainment = Flash Games?
Children's Entertainment = Flash Games?Children's Entertainment = Flash Games?
Children's Entertainment = Flash Games?
 
Daniel Beilharz s3200810
Daniel Beilharz s3200810Daniel Beilharz s3200810
Daniel Beilharz s3200810
 
Social Impact of Youtube - Jin Wang s3237857
Social Impact of Youtube - Jin Wang s3237857Social Impact of Youtube - Jin Wang s3237857
Social Impact of Youtube - Jin Wang s3237857
 
Nicholas lim chong_hock_(s3186372)_mc2_assign2_serious_games_presentation
Nicholas lim chong_hock_(s3186372)_mc2_assign2_serious_games_presentationNicholas lim chong_hock_(s3186372)_mc2_assign2_serious_games_presentation
Nicholas lim chong_hock_(s3186372)_mc2_assign2_serious_games_presentation
 
Game Art Gregory Smith S3233429
Game Art Gregory Smith S3233429 Game Art Gregory Smith S3233429
Game Art Gregory Smith S3233429
 
S3175889 lawrence wong
S3175889 lawrence wongS3175889 lawrence wong
S3175889 lawrence wong
 

Kalonica Quigley(S3237922) Alex Dragulescu

  • 1. Kalonica Quigley s3237922 BA (Games Graphics Design)
  • 2. A form of art that functions only on the internet and uses the internet as its theme. The internet is a medium which is constantly changing and growing and net art reacts accordingly. It differs from ‘art on the net’ which is a documentation of art created outside of the internet. Net Art : More than 85% of all emails are spam and this has lead to the creation of a form of art that uses the text and data from junk email as the theme or method for creating art. Spam Art : One man’s spam is ‘s art another man
  • 3. Alex Dragulescu Born in Romania another man Moved to the US in 1997 Film Photography Art History Computer Science Visual Arts Computer Animation Computer Programming Web, multimedia and game design Studied: Self Taught: Worked on:
  • 4. He recognized the over whelming amount of data accumulating on the internet and started to experiment with ways to harness it using algorithms and information visualisation . - A traditional scientific method used to create an image of data so connections can be made visually - connections that might otherwise be lost. Alex Dragulescu
  • 5. This has become his art Alex Dragulescu “ Using scientific visualisation methods to make art shows how technology changes art”
  • 6. This has become his art Alex Dragulescu “ Using scientific visualisation methods to make art shows how technology changes art”
  • 7. “ Spam is a random piece of literature, it has unseen effects, it changes all the time. And it’s led me to see text differently.” Spam Plants
  • 8. Spam Plants uses algorithms that analyse text and data from junk email and uses this information to grow plant-like 3D images that visually represent the relationships between the data. - subject line, headers, footers, message, sender’s email address, IP address, time it was sent, message size, keywords The size, shape, growth rate and colour are all aspects of the plant that are directly created from information within the spam email.
  • 9. Spam Plants uses algorithms that analyse text and data from junk email and uses this information to grow plant-like 3D images that visually represent the relationships between the data. - subject line, headers, footers, message, sender’s email address, IP address, time it was sent, message size, keywords The size, shape, growth rate and colour are all aspects of the plant that are directly created from information within the spam email.
  • 10. is a similar project where the information in spam emails is used to influence the architecture of a structure. It also identifies patterns, keywords, and rhythms found in the text. Spam Architecture
  • 11. Malwarez was commissioned by the Security Firm Message Labs. This was done for an advertising campaign and it includes visual representations of online threats: viruses, trojans, spam, worms, spyware code. - “ Comprehensive, cost-effective, industry-leading messaging and web security solutions ”
  • 12. Malwarez “ For each piece of disassembled code, API calls, memory addresses and subroutines are tracked and analyzed. Their frequency, density and grouping are mapped to the inputs of an algorithm that grows a virtual 3D entity. Therefore the patterns and rhythms found in the data drive the configuration of the artificial organism.”
  • 17. Malwarez Because these online threats work unseen and uncontrolled hidden in the computer, the average internet user may not realize their true threat. Therefore creating a visual representation of them allows the user to see just how hostile and complex they are. Message Labs is able to use this representation to highlight that their software is able to protect their customers from these scary entities.
  • 18. Alex Dragulescu ’ s net art addresses the issue of the increasing and expanding, immense amount of data on the internet and attempts to make sense of it all by conceptualising it into a visual form that is easy to understand. Spam is often seen as pointless, obtrusive, annoying and unattractive and yet Dragulescu is able to take it and craft it into something new, intriguing and aesthetically pleasing whilst also highlighting the connections in the code and the beauty within the hidden complexities of these disregarded creations.
  • 19. References “ Alex Dragulescu Official Site” http://www.sq.ro/ “ What is Net Art?” http://www.irational.org/cern/netart.txt “ One man's spam is another's art” http://news.cnet.com/One-mans-spam-is-anothers-art/2100-1025_3-6098479.html “ Phishing Scams and Viruses Can Be Beautiful, Deadly ” http://www.gizmodo.com.au/2008/02/phishing_scams_and_viruses_can_be_beauti ful_deadly/ “ Cyber crime art revealed” http://www.metro.co.uk/news/world/110336-cyber-crime-art-revealed “ Know Your Enemy” http://www.messagelabs.co.uk/threats?c=WW729BpQp4GLx7X2QWb46g%3d%3d “ spam architecture by alex dragulescu” http://www.designboom.com/weblog/cat/9/view/3627/spam-architecture-by-alex -dragulescu.html
  • 20. Kalonica Quigley s3237922 BA (Games Graphics Design)