Skip to content →

Category: zettel

scraps of paper

Action at a Distance

The perfect composition for the real-time virtual space in which distance creates slight delays of an unknowable degree. The canvas for the work is real-time and yet slightly displaced at each endpoint of the network. Like real life, except moreso.

“In C”

by Terry Riley

Instruction for beginners

1 Any number of people can play this piece on any instrument or instruments (including voice).

2 The piece consists of 53 melodic patterns to be repeated any amount of times. You can choose to start a new pattern at any point. The choice is up to the individual performer! We suggest beginners are very familiar with patterns 1-12.

3 Performers move through the melodic patterns in order and cannot go back to an earlier pattern. Players should try to stay within 2-3 patterns of each other.

4 If any pattern is too technically difficult, feel free to move to the next one.

5 The eighth note pulse is constant. Always listen for this pulse. The pulse for our experience will be piano and Orff instruments being played on the stage.

6 The piece works best when all the players are listening very carefully. Sometimes it is better to just listen and not play. It is important to fit into the group sound and understand how what you decide to play affects everybody around you. If you play softly, other players might follow you and play soft. If you play loud, you might influence other players to play loud.

7 The piece ends when the group decides it ends. When you reach the final pattern, repeat it until the entire group arrives on this figure. Once everyone has arrived, let the music slowly die away.

San Francisco State University School of Music presents “In C” by Terry Riley

Join the School of Music Percussion Ensemble on Thursday, May 7th 1pm as either a participant or viewer.

Comments closed

That Place

That place where where you are
Not the moving picture
of the place where
you are not

No matter how well
it tricks the eyes and ears
No matter what images
it conjures in the mind

It’s still weak tea
compared to the place
where you are right now
As time flows
within you and without you

Comments closed

A Dent in the Maya

Our built world

Was constructed from

Fragments of a world

We imagine humans

To Inhabit

Every once in a while

The planet itself

Pierces that veil

Without words, it reaches out

To leave an imprint on

Our bodies

It takes us in hand

To set us on

A different path

One Comment

The Balance of Identity

This happened some time ago. I’m not sure when. The balance tipped.

It used to be that identity was asserted based on something you knew, something you had, or something you are. Online identity was centered on the individual. “Two factor” was another layer based on the same fundamentals.

Recently, more than a billion unique email addresses and passwords were posted to a hacking forum. Ideal for credential stuffing attacks by malicious hackers. The data was decrypted, the protective hashing removed. The breach was made up of 12 files and 87 gigabytes of plain text.

As a matter of fact, corporations and hackers have more of your identity than you do. They have more control over your identity data than you do. They can extend your identity into the world in more ways than you can. They can suck out the bits that you thought were yours alone.

The balance has shifted. Whatever it was that we thought made up our identity is now mostly in the possession of others. And not just the past, the present and the future as well.

Perhaps there’s some impression that people make upon the world that isn’t stored digitally in some corporation’s database. Maybe there’s some pattern that we repeat that isn’t used in a predictive behavior modeling program designed to increase sales.

Can it shift back the other way? What force would be strong enough to move it that way? Where would that force come from?

Comments closed