MALware technical reports

MALware technical reports document residencies and research which have taken place in and through the lab. Rather than white papers which are typically authoritative statements about solutions or policies, our technical reports are intended to be more processual—they can describe the progress or process of research, teaching, research or creative activity in the MAL, or they may simply outline a particular problem in or related to the MAL. Our hope is that these technical reports provide a media studies and humanities-oriented outlet for investigations into technology.

Author & TitlePublishedAbstract 
James Hodges
Timothy Leary’s ​Mind Mirror
10/2016Research concerning the cultural, historical, and technical significance of software and computer-related artifacts presents several unique methodological challenges. This technical report uses ​Timothy Leary​’s Mind Mirror (Electronic Arts, 1985/1986) as a case study in ways that new users may begin to identify physical, textual, and bibliographic features unique to a given software artifact. Specific features investigated relate to the many computing environments, hardware/software configurations, copying techniques, and supplementary documentation comprising ​Mind Mirror today. The methods used to investigate these features are presented not only as approaches to analyzing ​Mind Mirror, but also as ways to approach historical software in general. These methods include software execution across a variety of platforms, as well as textual analysis of supporting documents and electronic file analysis using hex editors.Downloadable PDF
Jamie Allen
How to Build a Lie
07/2016How to Build a Lie experiments with “artistic research practice” that tries to escape disciplinary boundaries and look to as many aspects of a single technology, media, or topic as it can. This extra-disciplinary practice, as Brian Holmes and others have intimated, intersects with media and technology to direct artistic work toward institutional critique without aesthetic distance. How to Build a Lie is gonzo media studies that engages directly – physically and operationally – with the technological structures that frame our lives. What would it be to do research, but include the material engagements and framings of media, as a kind of hands-on technical inquiry?
The text of this book was presented as a lecture on May 16, 2016, as part of Jamie Allen’s exhibit “How to Build a Lie: Apocryphal Technologies & Works” at the Dateline gallery in Denver, and also as part of his artist residency in the Media Archaeology Lab in May 2016.
Purchase at
Counterpath Press
libi rose striegl Heyer Inc. Conqueror Stencil Duplicator 177708/2017This document serves as a brief look at the history of mimeography generally and of the Heyer
Inc. Conqueror Stencil Duplicators specifically. In addition, it serves as a technical manual for
the operation of the Conqueror Stencil Duplicators that are housed in the collection at the
Media Archaeology Lab and a record of the sensory experience of interaction with them.
Finally, it offers some speculative propositions for revitalizing the machines for present-day use.
Downloadable PDF