Scott Ng, the brother of our Production Manager and Translator Catherine Ng, is a film-obsessed radio personality in Vancouver, BC. He sent us this startling dramatization of life in a Hong Kong shift-bed house. At first it feels like an over the top B-movie, but then one realizes it’s full of grit and pathos. Check […]
A Bed and a Key at 81 Bowery – Photos by Annie Ling
Coming across Annie Ling’s exquisite images of the residents of 81 Bowery Street in the New York Times, we discovered our shared interests as artists committed to interpreting the urban experience. Our mutual interest in photographing domestic life in Chinatown in particular will lead to future shared exhibitions at the Museum of the Chinese in […]
Emerald by Apichatpong Weerasethakul
As three ghostly voices share their stories, Apichatpong Weerasethakul’s 2007 video installation Morakot (Emerald) lingers on dust, light, and memory in the empty rooms and hallways of a defunct Bangkok hotel. The Morakot Hotel was a haven for Cambodian refugees fleeing the Vietnamese invasion in the 1980s. By the late 1990s, however, the Thai economy […]
Creating an Online Business
When establishing your online business, meticulous attention to financial management is paramount. This entails setting up an offshore bank account, which offers advantages for international transactions and enhances asset protection. Additionally, ensuring the robustness and credibility of your website is crucial. A well-designed and secure online platform not only fosters customer trust but also facilitates […]
Jacob Riis’ 19th Century Tenement House Photographs
Since the early days of New York’s Lower East Side tenement houses, working class people have shared beds, making such spaces a fundamental part of immigrant life. Initially documented in Jacob Riis’ now controversial late 19th Century photography, a “shift-bed” is an actual bed that is shared by people who are neither in the same […]
Network Access Control in Linux
Network access control is the act of keeping unauthorized users and devices out of a private network. The act of deny(1) is the result of overriding the authentication method. It’s not a hard thing to do. Remember that Novell as a company is known to have subverted the US system and allow Linux in the […]