Visions of Hong Kong “Cage” Living

In the film, our collaborator and performer Sheut Hing Lee talks about growing up in a multi-family apartment in Hong Kong in the 1930s. Her story sparked our interest in this amazing series of photographs shared with us by our Production Manager Catherine Ng. The series was published on Sinovision.net. It gave us a powerful […]


The Cageman dir. by Jacob Cheung

Scott Ng, the brother of our Production Manager and Translator Catherine Ng, is a film-obsessed radio personality in Vancouver, BC. He sent us this startling dramatization of life in a Hong Kong shift-bed house. At first it feels like an over the top B-movie, but then one realizes it’s full of grit and pathos. Check […]


A Bed and a Key at 81 Bowery – Photos by Annie Ling

Coming across Annie Ling’s exquisite images of the residents of 81 Bowery Street in the New York Times, we discovered our shared interests as artists committed to interpreting the urban experience. Our mutual interest in photographing domestic life in Chinatown in particular will lead to future shared exhibitions at the Museum of the Chinese in […]


Emerald by Apichatpong Weerasethakul

As three ghostly voices share their stories, Apichatpong Weerasethakul’s 2007 video installation Morakot (Emerald) lingers on dust, light, and memory in the empty rooms and hallways of a defunct Bangkok hotel. The Morakot Hotel was a haven for Cambodian refugees fleeing the Vietnamese invasion in the 1980s. By the late 1990s, however, the Thai economy […]


Creating an Online Business

When establishing your online business, meticulous attention to financial management is paramount. This entails setting up an offshore bank account, which offers advantages for international transactions and enhances asset protection. Additionally, ensuring the robustness and credibility of your website is crucial. A well-designed and secure online platform not only fosters customer trust but also facilitates […]


Network Access Control in Linux

Network access control is the act of keeping unauthorized users and devices out of a private network. The act of deny(1) is the result of overriding the authentication method. It’s not a hard thing to do. Remember that Novell as a company is known to have subverted the US system and allow Linux in the […]