Friday, 17 June 2011


This is a video of my final animation. There is a very small audio fault which I will fix before showing.

Wednesday, 27 April 2011

Child Development - File History

This piece is a file history log of a child's development. It's written in a binary format with the two tone background.


The two timelines at the bottom are to show the age of the child at the corresponding entry, and as a design feature the file size at that point is in the second timeline.

Encryption Parenting

This is to do with the idea that from birth parents encrypt data into their children, starting with such basic things as their name.


The idea that parents can also issue a child with a date of birth is somewhat a futuristic idea, so it may in the future be possible.


As a child grows up parents 'code' into them some 'tools' they will need as they grow up. This is illustrated in this web-like submission form.


Going with the idea of encryption this form is very digital, and has a padlock by the SUBMIT button to show encryption, just as you see in many places online. I think that this whole concept is a possible future way of living for humans.
The idea here is that the data (red dots) in encrypted inside firewalls and other computer security systems (black dots). In an arrow shape, it is simulated that this data is in motion or moving, processing and being accessed by people around the world.

The 'Hacking' Of Secret Information

The hacking of secret knowledge, information or data is when an intruder gains access from their personal efforts to something which they legally should not be able to see. This is obviously illegal.

It's like someone being in your house for two days and you not knowing about them, then suddenly they take all your the stuff in your house, and you realise you've been 'hacked'. This is physical hacking, as opposed to digital hacking, although they are essentially the same process.

Secret/Hidden Information

There are lots of ways I can explore the idea of hidden knowledge or information. This militarised font is commonly associated with like a 'top secret stamp', something you see used in movies to get across the message. Usually written in red so it is taken seriously, and with caution.
A padlock is an obvious method of security. Used by the general population to lock their garden shed, it doesn't provide the best style of security. The golden padlock is more associated with computer security, whereas the blue padlock is a drawing of a real 3D one.
Computer security is typically based on encryption. Various chunks of personal information are stored in databases which only a computer itself can read and edit. This way no one person can access your information, and it stays safe and secure. There are obviously cases where this information is breached by so called 'hackers'. This is where a human can view the data encrypted.
For example, the recent case where Sony servers which hold the personal details of PS3 users was breached, allowing open access to the hacker. This is an example of secret information intrusion.
Similarly phone hacking is the intrusion into peoples personal conversations, where information may change hands verbally.
Secret data is also stored in us. Our finger prints and DNA are unique, and if someone was to obtain that they could use it for all sorts of purposes. They could commit crimes and frame you.

We also store another kind of secret information - in our brains. Human beings can be quite secretive at times. They can store information that can change things for other people, or affect entire populations. I think this is the kind of secret knowledge that ties in most with the idea of the Illuminati.

God Save The Queen

In the album cover by Jamie Reid, "GOD SAVE THE QUEEN" is written across the Queen's mouth and eyes, almost silencing her. This portrays the Queen in a negative way, which may ask why we need her and questions why we should 'save her'.