A Machiavellian Christian: Analyzing the Political Theology of 'The Rp Ince' John G

Total Page:16

File Type:pdf, Size:1020Kb

A Machiavellian Christian: Analyzing the Political Theology of 'The Rp Ince' John G University of Arkansas, Fayetteville ScholarWorks@UARK History Undergraduate Honors Theses History 5-2016 A Machiavellian Christian: Analyzing the Political Theology of 'The rP ince' John G. Addison University of Arkansas Follow this and additional works at: http://scholarworks.uark.edu/histuht Part of the Ethics and Political Philosophy Commons, Intellectual History Commons, Political History Commons, and the Religious Thought, Theology and Philosophy of Religion Commons Recommended Citation Addison, John G., "A Machiavellian Christian: Analyzing the Political Theology of 'The rP ince'" (2016). History Undergraduate Honors Theses. 5. http://scholarworks.uark.edu/histuht/5 This Thesis is brought to you for free and open access by the History at ScholarWorks@UARK. It has been accepted for inclusion in History Undergraduate Honors Theses by an authorized administrator of ScholarWorks@UARK. For more information, please contact [email protected], [email protected]. A Machiavellian Christian: Analyzing the Political Theology of The Prince An Honors Thesis submitted in partial fulfillment of the requirements for Honors Studies in History By John Grant Addison Spring 2016 History J. William Fulbright College of Arts and Sciences The University of Arkansas Acknowledgements I want to first and foremost acknowledge my thesis director and mentor, Dr. Freddy Cristobal Dominguez. Without his assistance and guidance, I would have never been able to undertake such a comprehensive study, and without his patience and forgiveness I would have never been able to continue to pass his class. Additionally, I would like to acknowledge the mentorship of Dr. Andrew Dowdle throughout my undergraduate career, especially in relation to my pursuit of a second degree in political science. I want to also thank him for his participation in my thesis process. Further, I would like to acknowledge the accommodation and assistance given to me by Dr. Charles Muntz in agreeing to participate on my thesis committee when I was found in desperate need. I would like to acknowledge my parents, Greg and Janet Addison, for their constant support and words of uplifting encouragement. At this time I would like to thank my various friends, peers, and social media constituents for continuing to count me in those respective categories throughout the long months of this process. I would like to acknowledge my cousin and life-long friend, Ben Addison, for always being open to listen and discuss with his specific perspective and unique personal understanding. I would like to give a special thank you to my last-minute lifesaver, Taylor Dunn, for coming to my rescue when my laptop charger decided to inexplicably commit suicide within my final ten hours of writing. I thank my roommate, Austin Boatright Taylor, for his patience when I became overly verbose, and for his bedroom door when it all became too much. As promised, I would like to mention specifically those whom desired to be acknowledged in their own words—beginning with my good friend, colleague, and vocal savant, William Simpson, for originating such a tradition. I would like to acknowledge Mike Norton and Bailey Moon for remaining friends throughout the thesis process and putting up with my incessant social media posts about the fact I was writing a thesis; I hope this prevents them from feeling “salty.” I would like to acknowledge John Linde, Tanner Wilson, and Dylan Brown for being businessmen, and not politicians. I would like to acknowledge Brandon Kempf, not only for his years of friendship, but also his technical expertise. I would like to acknowledge Kyle Byrnes, who has not forgotten that I “bailed” as his roommate. I would like to acknowledge Keefer Roach for the “sick jams” during Twelfth Night and for remaining a steady friend throughout the entire process. I would like to acknowledge Daniel Simonson for maintaining an attitude of excitement rather than irritation in discussing this project with me. To Lia Cattaneo, I would like to acknowledge my sincere condolences for not being able to put the x-arms- girl emoji into this document due to technological inadequacy. Additionally, I would like to acknowledge the following people: Isaac “Day Man…Master of the Night Man” Foley, Mary Kirchner, Dwayne J. Bensing, Joseph & Judith Ramos, Melissa Byrd, Ross Wagner, Bill Rogers, Jeremy Ramos, Jordan Pino, 2 Erin Dugan, Gina Densmore, McKenzie Schultz, Lilith Winkler-Schor, Mark Nabors, Farha Syed, Ryan O. Miller, Tanner Bone, Matt Bohannon, Payton Lynne, Range Weeks, Michael Moore, Nathan Chadwick, Sara Rains, Sid Sebastian Tanner, Allie Watson, Sydney Combs, Amanda Leigh Want, Rachel Freeman, Richard Moran, Caitlin Britt, Ashley Louks, Will Strickland, Victoria Maloch, Emma Ellis, Joe Hendricks, and Matt Hansen. I would like to also give a special acknowledgement to the stranger who stole my clearly designated workspace during the Wednesday of Spring Break, despite there being quite- literally an entire library for him choose from. I have not forgotten. #ThanksObama (h/t Ben Fogel). Finally, I would like to thank Lin Manuel Miranda along with the entire cast of “Hamilton” for providing me with the strength to go on when I was forced to write like I needed it to survive. 3 Table of Contents Acknowledgements ....................................................................................................................... 2 Table of Contents .......................................................................................................................... 4 Introduction ................................................................................................................................... 5 The Nature of Things .................................................................................................................... 14 Human Nature ............................................................................................................................... 15 The Nature of God ........................................................................................................................ 28 Nature of Fortune .......................................................................................................................... 50 The Nature of Purpose .................................................................................................................. 60 Nature of Outcome ........................................................................................................................ 67 The Nature of Friendship .............................................................................................................. 91 Conclusion .................................................................................................................................... 98 Bibliography of Primary Sources ............................................................................................ 106 Bibliography of Secondary Sources ........................................................................................ 108 4 Introduction Few individuals in the history of political philosophy are as polarizing as Niccolò Machiavelli. One of the most prominent figures of the Renaissance, the name of Machiavelli quickly became known to his contemporaries and to posterity as a symbol of duplicity, immorality, and ruthless pragmatism. After its posthumous publication in 1532,1 The Prince granted its author recognition throughout Christendom as being “of the devil,” and this historical tradition has continued to dominate the majority of scholarly and public opinion on Machiavelli ever since.2 Machiavelli was hardly alone in promulgating a political philosophy that was not in perfect synchronization with Christian morality, yet he stands above all others in the ranks of those considered irreligious and heretical. A long line of philosophers, theorists, and even reformers such as Martin Luther advised actions that opposed prevailing religious sentiment and teaching, and most have seen history and scholarship either ignore or vindicate their positions—with the seemingly singular exception of Machiavelli. As noted by historian Quentin Skinner: “so much notoriety has gathered around Machiavelli’s name that the charge of being a Machiavellian still remains a serious accusation in political debate.”3 Seminal and formative scholarship on Machiavelli has hitherto largely dismissed or generalized the interplay between the author and the religious Christian intellectual milieu of Renaissance Florence. In his Foundations of Modern Political Thought—an 1 Niccolò Machiavelli, The Prince, trans. by George Bull (London: Penguin, 1999). Except where noted, all references in English are to Bull’s edition, hereafter cited as Bull, The Prince, here xii. 2 Maurizio Viroli, Redeeming The Prince: The Meaning of Machiavelli’s Masterpiece (Princeton: Princeton University Press, 2014), 1. 3 Quentin Skinner, Machiavelli: A Very Short Introduction (New York: Oxford University Press, 2000), 1. erudite and expansive two-volume introduction to the transitional period of political thought spanning from the late thirteenth-century to the end of the sixteenth-century— Skinner innovatively argued that, contrary to prevailing belief, The Prince was not a work sui generis, but rather: a “contribution to the genre of advice-books for princes which at the same time revolutionized the genre itself.”4 Though Skinner conducts his reading of The Prince within the surrounding context of Italian humanism,
Recommended publications
  • Machiavelli: the Prince
    The Prince by Niccolo Machiavelli The Project Gutenberg EBook of The Prince, by Nicolo Machiavelli This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org Title: The Prince Author: Nicolo Machiavelli Translator: W. K. Marriott Release Date: February 11, 2006 [EBook #1232] Last Updated: November 5, 2012 Language: English Character set encoding: ASCII *** START OF THIS PROJECT GUTENBERG EBOOK THE PRINCE *** Produced by John Bickers, David Widger and Others THE PRINCE by Nicolo Machiavelli Translated by W. K. Marriott Nicolo Machiavelli, born at Florence on 3rd May 1469. From 1494 to 1512 held an official post at Florence which included diplomatic missions to various European courts. Imprisoned in Florence, 1512; later exiled and returned to San Casciano. Died at Florence on 22nd June 1527. CONTENTS INTRODUCTION YOUTH Aet. 1-25—1469-94 OFFICE Aet. 25-43—1494-1512 LITERATURE AND DEATH Aet. 43-58—1512-27 THE MAN AND HIS WORKS DEDICATION THE PRINCE CHAPTER I HOW MANY KINDS OF PRINCIPALITIES THERE ARE CHAPTER II CONCERNING HEREDITARY PRINCIPALITIES CHAPTER III CONCERNING MIXED PRINCIPALITIES CHAPTER IV WHY THE KINGDOM OF DARIUS, CONQUERED BY ALEXANDER CHAPTER V CONCERNING THE WAY TO GOVERN CITIES OR PRINCIPALITIES CHAPTER VI CONCERNING NEW PRINCIPALITIES WHICH ARE ACQUIRED CHAPTER VII CONCERNING NEW PRINCIPALITIES WHICH ARE ACQUIRED CHAPTER VIII CONCERNING
    [Show full text]
  • On the NIST Lightweight Cryptography Standardization
    On the NIST Lightweight Cryptography Standardization Meltem S¨onmez Turan NIST Lightweight Cryptography Team ECC 2019: 23rd Workshop on Elliptic Curve Cryptography December 2, 2019 Outline • NIST's Cryptography Standards • Overview - Lightweight Cryptography • NIST Lightweight Cryptography Standardization Process • Announcements 1 NIST's Cryptography Standards National Institute of Standards and Technology • Non-regulatory federal agency within U.S. Department of Commerce. • Founded in 1901, known as the National Bureau of Standards (NBS) prior to 1988. • Headquarters in Gaithersburg, Maryland, and laboratories in Boulder, Colorado. • Employs around 6,000 employees and associates. NIST's Mission to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life. 2 NIST Organization Chart Laboratory Programs Computer Security Division • Center for Nanoscale Science and • Cryptographic Technology Technology • Secure Systems and Applications • Communications Technology Lab. • Security Outreach and Integration • Engineering Lab. • Security Components and Mechanisms • Information Technology Lab. • Security Test, Validation and • Material Measurement Lab. Measurements • NIST Center for Neutron Research • Physical Measurement Lab. Information Technology Lab. • Advanced Network Technologies • Applied and Computational Mathematics • Applied Cybersecurity • Computer Security • Information Access • Software and Systems • Statistical
    [Show full text]
  • Fra Sabba Da Castiglione: the Self-Fashioning of a Renaissance Knight Hospitaller”
    “Fra Sabba da Castiglione: The Self-Fashioning of a Renaissance Knight Hospitaller” by Ranieri Moore Cavaceppi B.A., University of Pennsylvania 1988 M.A., University of North Carolina 1996 Thesis Submitted in partial fulfillment of the requirements for the Degree of Doctor of Philosophy in the Department of Italian Studies at Brown University May 2011 © Copyright 2011 by Ranieri Moore Cavaceppi This dissertation by Ranieri Moore Cavaceppi is accepted in its present form by the Department of Italian Studies as satisfying the dissertation requirement for the degree of Doctor of Philosophy. Date Ronald L. Martinez, Advisor Recommended to the Graduate Council Date Evelyn Lincoln, Reader Date Ennio Rao, Reader Approved by the Graduate Council Date Peter M. Weber, Dean of the Graduate School iii CURRICULUM VITAE Ranieri Moore Cavaceppi was born in Rome, Italy on October 11, 1965, and moved to Washington, DC at the age of ten. A Fulbright Fellow and a graduate of the University of Pennsylvania, Ranieri received an M.A. in Italian literature from the University of North Carolina at Chapel Hill in 1996, whereupon he began his doctoral studies at Brown University with an emphasis on medieval and Renaissance Italian literature. Returning home to Washington in the fall of 2000, Ranieri became the father of three children, commenced his dissertation research on Knights Hospitaller, and was appointed the primary full-time instructor at American University, acting as language coordinator for the Italian program. iv PREFACE AND ACKNOWLEDGMENTS I deeply appreciate the generous help that I received from each member of my dissertation committee: my advisor Ronald Martinez took a keen interest in this project since its inception in 2004 and suggested many of its leading insights; my readers Evelyn Lincoln and Ennio Rao contributed numerous observations and suggestions.
    [Show full text]
  • Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications
    Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications Dušan Božilov1,2, Miroslav Knežević1 and Ventzislav Nikov1 1 NXP Semiconductors, Leuven, Belgium 2 COSIC, KU Leuven and imec, Belgium [email protected] Abstract. Threshold implementations have emerged as one of the most popular masking countermeasures for hardware implementations of cryptographic primitives. In the original version of TI, the number of input shares was dependent on both security order d and algebraic degree of a function t, namely td + 1. At CRYPTO 2015, a new method was presented yielding to a d-th order secure implementation using d + 1 input shares. In this work, we first provide a construction for d + 1 TI sharing which achieves the minimal number of output shares for any n-input Boolean function of degree t = n − 1. Furthermore, we present a heuristic for minimizing the number of output shares for higher order td + 1 TI. Finally, we demonstrate the applicability of our results on d + 1 and td + 1 TI versions, for first- and second-order secure, low-latency and low-energy implementations of the PRINCE block cipher. Keywords: Threshold Implementations · PRINCE · SCA · Masking 1 Introduction Historically, the field of lightweight cryptography has been focused on designing algorithms that leave as small footprint as possible when manufactured in silicon. Small area implicitly results in low power consumption, which is another, equally important, optimization target. Hitting these two targets comes at a price since the performance and energy consumption of lightweight cryptographic primitives are far from being competitive and, for most online applications, they are often not meeting the requirements.
    [Show full text]
  • A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications
    A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications Howard M. Heys Memorial University of Newfoundland, St. John's, Canada email: [email protected] Dec. 10, 2020 2 Abstract In this article, we discuss basic strategies that can be used to implement block ciphers in both software and hardware environments. As models for discussion, we use substitution- permutation networks which form the basis for many practical block cipher structures. For software implementation, we discuss approaches such as table lookups and bit-slicing, while for hardware implementation, we examine a broad range of architectures from high speed structures like pipelining, to compact structures based on serialization. To illustrate different implementation concepts, we present example data associated with specific methods and discuss sample designs that can be employed to realize different implementation strategies. We expect that the article will be of particular interest to researchers, scientists, and engineers that are new to the field of cryptographic implementation. 3 4 Terminology and Notation Abbreviation Definition SPN substitution-permutation network IoT Internet of Things AES Advanced Encryption Standard ECB electronic codebook mode CBC cipher block chaining mode CTR counter mode CMOS complementary metal-oxide semiconductor ASIC application-specific integrated circuit FPGA field-programmable gate array Table 1: Abbreviations Used in Article 5 6 Variable Definition B plaintext/ciphertext block size (also, size of cipher state) κ number
    [Show full text]
  • Ellen Meiksins Wood
    EMPIRE OF CAPITAL V EMPIRE OF CAPITAL ------------♦------------ ELLEN MEIKSINS WOOD V VERSO London • New York For George Comninel, with thanks for many years of conversation First published by Verso 2003 © Ellen Meiksins Wood 2003 This paperback edition first published by Verso 2005 © Ellen Meiksins Wood 2005 All rights reserved The moral rights of the author have been asserted 13579 10 8642 Verso U K: 6 Meard Street, London w i f o e g USA: 180 Varick Street, New York, n y 10014-4606 www.versobooks.com Verso is the imprint of New Left Books i s b n 1-84467-518-1 British Library Cataloguing in Publication Data Wood, Ellen Meiksins Empire o f capital 1. Capitalism— History 2. Imperialism 3. Globalization 4. International relations 5. Imperialism— History I. Title 330.l'22 ISBN 1844675181 Library o f Congress Cataloging-in-Publication Data A Catalog record for this book is available from the Library of Congress Typeset by SetSystems Ltd, Saffron Walden, Essex Printed by R. R. Donnelley & Son, USA CONTENTS ACKNOWLEDGEMENTS vii PREFACE TO THE PAPERBACK EDITION ix PREFACE XV INTRODUCTION 1 1 THE DETACHMENT OF ECONOMIC POWER 9 2 THE EMPIRE OF PROPERTY 26 3 THE EMPIRE OF COMMERCE 44 4 A NEW KIND OF EMPIRE 73 5 THE OVERSEAS EXPANSION OF ECONOMIC IMPERATIVES 89 6 THE INTERNATIONALIZATION OF CAPITALIST IMPERATIVES l l 8 7 ‘SURPLUS IMPERIALISM’, WAR WITHOUT END 14 3 NOTES 16 9 INDEX 177 ACKNOWLEDGEMENTS I have been exceptionally fortunate over the years in having first-rate post-graduate students, whose own work has inspired me and whose friendship I have continued to enjoy long after they finished their studies.
    [Show full text]
  • State of the Art in Lightweight Symmetric Cryptography
    State of the Art in Lightweight Symmetric Cryptography Alex Biryukov1 and Léo Perrin2 1 SnT, CSC, University of Luxembourg, [email protected] 2 SnT, University of Luxembourg, [email protected] Abstract. Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (nist...) and international (iso/iec...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers’ preference for arx-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: ultra-lightweight and IoT cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the Aes and modern hash function are costly but which have to provide a high level security due to their greater connectivity. Keywords: Lightweight cryptography · Ultra-Lightweight · IoT · Internet of Things · SoK · Survey · Standards · Industry 1 Introduction The Internet of Things (IoT) is one of the foremost buzzwords in computer science and information technology at the time of writing.
    [Show full text]
  • Between Friends Discourses of Power and Desire in the Machiavelli
    JOHN M. NAJEMY Between Friends Discourses of Power and Desire in the Machiavelli-Vettori Letters of 1513-1515 PRINCETON LEGACY LIBRARY c."Between friends DISCOURSES OF POWER AND DESIRE IN THE MACHIAVELLI-VETTORI LETTERS OF 1513-1515 John M. Najemy PRINCETON UNIVERSITY PRESS • PRINCETON, NEW JERSEY Copyright © 1993 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, Chichester, Wesr Sussex All Rights Reserved Library of Congress Cataloging-in-Publication Data Najemy, John M., 1943- Between friends : discourses of power and desire in the Machiavelli-Vettori letters of 1513-1515 / John M. Najemy. p. cm. Includes bibliographical references and index. ISBN 0-691-03262-9 z. Machiavelli, Niccolo, 1469-1527-Correspondence. 2. Vettori, Francesco, 1474-1539-Correspondence. 3. Italy-Intellectual life-1268-1559. DG738.14.M2A4 1993 320.1'092-dc20 93-9737 CIP This book has been composed in Garamond typeface Princeton University Press books are printed on acid-free paper and meet the guidelines fur permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources Printed in the United States of America IO 9 8 7 6 5 4 3 2 Princeton Legacy Library edition 2019 Paperback ISBN: 978-0-691-65522-2 Hardcover ISBN: 978-0-691-65664-9 To the memory of Hans Baron (1900-1988) and Edward P. Morris (1924-1989) ?f CONTENTS ?f Prefac e ix Abbreviations xiii INTRODUCTION : The Letters in Machiavelli
    [Show full text]
  • Triathlon of Lightweight Block Ciphers for the Internet of Things
    Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, and Alex Biryukov SnT and CSC, University of Luxembourg Maison du Nombre, 6, Avenue de la Fonte, L–4364 Esch-sur-Alzette, Luxembourg {dumitru-daniel.dinu,yann.lecorre,dmitry.khovratovich,leo.perrin}@uni.lu {johann.groszschaedl,alex.biryukov}@uni.lu Abstract. In this paper we introduce a framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. Our framework is able to evaluate the execution time, RAM footprint, as well as binary code size, and allows one to define a custom “figure of merit” according to which all evaluated candidates can be ranked. We used the framework to benchmark implementations of 19 lightweight ciphers, namely AES, Chaskey, Fantomas, HIGHT, LBlock, LEA, LED, Piccolo, PRE- SENT, PRIDE, PRINCE, RC5, RECTANGLE, RoadRunneR, Robin, Simon, SPARX, Speck, and TWINE, on three microcontroller platforms: 8-bit AVR, 16-bit MSP430, and 32-bit ARM. Our results bring some new insights to the question of how well these lightweight ciphers are suited to secure the Internet of Things (IoT). The benchmarking framework provides cipher designers with an easy-to-use tool to compare new algorithms with the state-of-the-art and allows standardization organizations to conduct a fair and consistent evaluation of a large number of candidates. Keywords: IoT, lightweight cryptography, block ciphers, evaluation framework, benchmarking. 1 Introduction The Internet of Things (IoT) is a frequently-used term to describe the currently ongoing evolution of the Internet into a network of smart objects (“things”) with the ability to communicate with each other and to access centralized resources via the IPv6 (resp.
    [Show full text]
  • Renaissance Quarterly Books Received: January–March 2011
    Renaissance Quarterly Books Received: January–March 2011 EDITIONS AND TRANSLATIONS: Alexander, Gavin R. Writing after Sidney: The Literary Response to Sir Philip Sidney 1586– 1640. Paperback edition. Oxford: Oxford University Press, 2010. xliv + 380 pp. index. illus. bibl. $55. ISBN: 978–0–19–959112–1. Barbour, Richmond. The Third Voyage Journals: Writing and Performance in the London East India Company, 1607–10. New York: Palgrave Macmillan, 2009. 281 pp. index. append. illus. gloss. bibl. $75. ISBN: 978–0–230–61675–2. Buchanan, George. Poetic Paraphrase of The Psalms of David. Ed. Roger P. H. Green. Geneva: Librairie Droz S.A., 2011. 640 pp. index. append. bibl. $115. ISBN: 978–2–600–01445–8. Campbell, Gordon, and Thomas N. Corns, eds. John Milton: Life, Work, and Thought. Paperback edition. Oxford: Oxford University Press, 2010. xv + 488 pp. index. illus. map. bibl. $24.95. ISBN: 978–0–19–959103–9. Calderini, Domizio. Commentary on Silius Italicus. Travaux d’Humanisme et Renaissance 477. Ed. Frances Muecke and John Dunston. Geneva: Librairie Droz S.A., 2010. 958 pp. index. tbls. bibl. $150. ISBN: 978–2–600–01434–2 (cl), 978–2–600–01434–2 (pbk). Campanella, Tommaso. Selected Philosophical Poems of Tommaso Campanella: A Bilingual Edition. Ed. Sherry L. Roush. Chicago: The University of Chicago Press, 2011. xi + 248 pp. index. bibl. $45. ISBN: 978–0–226–09205–8. Castner, Catherine J., trans. Biondo Flavio’s Italia Illustrata: Text, Translation, and Commentary. Volume 2: Central and Southern Italy. Binghamton: Global Academic Publishing, 2009. xvi + 488 pp. index. illus. map. bibl. $36. ISBN: 978–1–58684–278–9.
    [Show full text]
  • The Present and the History of the Own Time: an Historical Approach
    The present and the history of the own time: an historical approach Gonzalo Pasamar Alzuria Universidad de Zaragoza The expression ‘History of the Present’ spans over a diversity of trends different in their political birth, main issues, and historical traditions from which they have derived It is however true that from the nineties onward, the ‘Zeitsgeschichte’, the ‘Contemporary History’, and the ‘Histoire du Temps Present’, quoting only the most noteworthy, have underwent changes, and even have approximated to one another. Born in the period of Cold War, supported by institutions and journals, the disappearance of the Soviet Union and the globalization has obliged them to revise their former approaches, and provided them with new opportunities for research. Nevertheless, these all have coincided in being pioneers in signalling the importance of the twentieth century and recent times by claiming the importance that witnesses, memories, and proximity to events have for historians. Even they have shown highly aware of being breaking with clichés coming from the first generations of professional historians, who ignored the recent times because of an assumed lack of perspective, or influenced by the dictum that ‘history must be about the past’. It is not coincidence that some authors had considered them, beyond designations, as a ‘new history’ (Aróstegui 2004, 19-61). To the members of the French Institute d’ Histoire du Temps Present, for instance, this trend should be regarded as a ‘démarche’, as a way of representing the present in motion; a recent time –the time of the contemporary historian- where events, processes, and memories converge (Tresbitsch 1993, 65).
    [Show full text]
  • The Prince.' Machiavelli
    The Prince Nicolo Machiavelli This eBook was designed and published by Planet PDF. For more free eBooks visit our Web site at http://www.planetpdf.com/. To hear about our latest releases subscribe to the Planet PDF Newsletter. The Prince Nicolo Machiavelli, born at Florence on 3rd May 1469. From 1494 to 1512 held an official post at Florence which included diplomatic missions to various European courts. Imprisoned in Florence, 1512; later exiled and returned to San Casciano. Died at Florence on 22nd June 1527. 2 of 239 The Prince INTRODUCTION Nicolo Machiavelli was born at Florence on 3rd May 1469. He was the second son of Bernardo di Nicolo Machiavelli, a lawyer of some repute, and of Bartolommea di Stefano Nelli, his wife. Both parents were members of the old Florentine nobility. His life falls naturally into three periods, each of which singularly enough constitutes a distinct and important era in the history of Florence. His youth was concurrent with the greatness of Florence as an Italian power under the guidance of Lorenzo de’ Medici, Il Magnifico. The downfall of the Medici in Florence occurred in 1494, in which year Machiavelli entered the public service. During his official career Florence was free under the government of a Republic, which lasted until 1512, when the Medici returned to power, and Machiavelli lost his office. The Medici again ruled Florence from 1512 until 1527, when they were once more driven out. This was the period of Machiavelli’s literary activity and increasing influence; but he died, within a few weeks of the expulsion of the Medici, on 22nd June 1527, in his fifty-eighth year, without having regained office.
    [Show full text]