Archive is a form of conditioned research. The legibility of the archive is maintained by background operations that only in the most extraordinary situations concede their ideological convictions. Its authority and gate keeping supersede the subjectivity of the archive. When the archiva[b]l[e] forces the ideology to bear loose, snap and/or shows an unwillingness to be slotted, it is marked as an anomaly unless the research allows itself to be restructured. The unfit is often placed out of sight like oversized flat files.
Power corridors are motivated or directly produced by neo-liberal economy. Often fickle and temporary they highlight the frequented spaces of the art world's focus. Istanbul, Abu Dhabi, Moscow, Hong Kong are examples of power corridors at this time. They often fold over with emerging markets, energy markets, and arms markets. Even if there may be profoundly complex and strong artistic contexts in places like East Europe, they do not become power corridors for the dirty work of privatization of life has already taken there and there is little left to exploit.
Molecular Production vs. Main Stream Institutions:
Common to cities like Istanbul, evidently Madrid, and others, there is an increasing evaporation of medium-scale institutions such as art centers and art institutions. The possible closure of ICA London could also be thought within this paradigm. “The middle” drops off precisely because of a particular market demand for large-scale institutions that also calls for a disregard for those things that fly under the radar. Limited by the pressure to demonstrate their constant presence through programming, medium-scale institutions can neither operate small enough to show the kind of on/off flexibility of molecular productions/institutions, nor can they seek the kind of funds available to large-scale institutions. The working remedy is then the establishment of ethical, non-hegemonic working structures between the molecular and the large-scale to bridge potentialities.
Term learned on 20.10.2010:
The act of exploiting a bug or design flaw in a software application to gain access to resources that normally would have been protected from an application or user. The result is that the application performs actions with more privileges than intended by the application developer or system administrator.