“Art Post-Internet” was an exhibition curated by Karen Archey and Robin Peckham for the Ullens Center for Contemporary Art in Beijing in spring 2014. This is the specially designed pdf catalogue whose with the front page is created each time with the IP and quite approximated location of the user. It includes tentatively definition of “post-internet” by Cory Arcangel, Simon Denny, and Bunny Rogers, art critics Ben Davis and Paddy Johnson, academics Mark Tribe and Esther Choi, and museum professionals Christiane Paul, Raffael Dörig, Jamillah James, Ben Vickers, Omar Kholeif and Gene McHugh.
(In) Security Camera , designed by Benjamin Chang, Silvia Ruzanka and Dmitry Strakovsky, is an interactive installation made by means of a video camera connected to a computer with a particular software, through which you get a sophisticated view. The camera is designed to frame, zoom in and follow moving objects passing in front of his field of vision. Work on the basis of complex algorithms, their devices with artificial intelligence, now in use in the army and security forces U.S., coming to evaluate various levels of threat and appropriate response in real time. However, from the movie on this site, we can see that the camera will show slightly insecure. That is, is easily frightened by sudden movements, is "timid" with strangers and tends to divert direct contact with eyes, revealing to us his fallibility, as well as characteristics of the human personality, and therefore making us instinctively lean towards feelings of affection her. The relationship that develops between us and the camera becomes a "relationship typically society", as according to research at the Stanford Research Institute on the design of graphical user interfaces friendly, aimed at lowering the stress induced by new technologies. L 'installation also remembers the Alive Project of the Media Lab, inherent to the study of software agents that interpret the facial expression of' user thanks to a camera, to understand his state of mind and anticipate his reactions. Ultimately, the reversal of the relationship between a surveillance system and the supervised entities makes us reflect on the dualism between privacy and security, a subject of passionate debate, especially after the events of September 11: Since you can not stop the development of increasingly sophisticated tools used for control, equal access to information, or at least a large part of the available data, both on the part of those who control, both on the part of those who are controlled by appropriate legal instruments, such as the law on access to public information, Freedom of Information Act, would act as a deterrent against possible abuses.