The Future of Work Is Now BARGAINING STRATEGIES: from Machine Breaking to Artificial Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

The Future of Work Is Now BARGAINING STRATEGIES: from Machine Breaking to Artificial Intelligence The Future of Work is Now BARGAINING STRATEGIES: From Machine Breaking to Artificial Intelligence David Rosenfeld1 Weinberg, Roger & Rosenfeld Alameda, California September 2018 1 Thanks also to Caren Sencer, David Fujimoto and Andrea Don for reading, commenting and criticizing the paper. TABLE OF CONTENTS Page I. INTRODUCTION .............................................................................................................. 1 II. “THE WITHDRAWAL OF EFFICIENCY” HOW THE LUDDITES AND THE WOBBLIES DEALT WITH TECHNOLOGY .................................................................. 2 A. THE LUDDITES .................................................................................................... 2 B. THE WOBBLIES ................................................................................................... 3 C. THE PRESENT ...................................................................................................... 5 III. MANAGEMENT UNDERSTANDS THESE CHANGES AND IS PREPARING FOR THEM ................................................................................................. 6 IV. ARTIFICIAL INTELLIGENCE IN THE WORKPLACE................................................. 9 V. THE APPLICATION OF THE UNILATERAL CHANGE DOCTRINE TO TECHNOLOGY ............................................................................................................... 23 A. THE BASIC PRINCIPLES REGARDING BARGAINING OVER ARTIFICIAL INTELLIGENCE ARE NOT NEW, BUT THERE ARE NEW TECHNIQUES THAT WE CAN USE TO MAKE SUCH BARGAINING MORE EFFECTIVE................................................................... 23 VI. THE BOARD HAS FACED THE PROBLEM OF TECHNOLOGY CHANGES IN THE WORKPLACE.................................................................................................... 27 VII. THE EFFECT OF THE CHANGING LEGAL LANDSCAPE ON THE UNILATERAL CHANGE DOCTRINE .......................................................................... 32 VIII. THE CONTRACT WAIVER VERSUS THE CONTRACT COVERAGE DOCTRINE ...................................................................................................................... 35 IX. THE USE OF INFORMATION REQUESTS TO BARGAIN OVER TECHNOLOGY ............................................................................................................... 41 A. THE GENERAL STANDARD FOR PROVIDING INFORMATION................ 41 B. THE USE OF THE RIGHT TO OBTAIN INFORMATION IN THE TECHNOLOGY SETTING.................................................................................. 42 C. CONFIDENTIALITY ASSERTIONS CONCERNING INFORMATION ......... 44 i X. TAKING ADVANTAGE OF BARGAINING OVER THE FINANCIAL ASPECT OF TECHNOLOGY ......................................................................................................... 48 XI. BARGAINING OVER EMPLOYER RULES WHICH CONCERN TECHNOLOGY ............................................................................................................... 49 A. INTRODUCTION ................................................................................................ 49 B. EMPLOYER RULES REGARDING TECHNOLOGY ...................................... 50 C. THE COMPETING DOCTRINES UTILIZED IN EVALUATING RULES...... 51 XII. MOST COMPANIES HAVE RULES WHICH REQUIRE THAT EMPLOYEES MAINTAIN THE CONFIDENTIALITY OF COMPANY INFORMATION; THESE RULES ENCOMPASS TECHNOLOGY ISSUES............................................. 56 A. EXAMPLES OF SPECIFIC RULES.................................................................... 57 1. Use of Recording Devices.............................................................................. 57 2. Broad Prohibition Against Use of Company Systems ................................... 58 3. The Reporting Provision ................................................................................ 59 4. Employee Privacy .......................................................................................... 60 5. Surveillance.................................................................................................... 62 6. Confidential Information................................................................................ 63 7. After Employment Ends................................................................................. 66 XIII. TECHNOLOGY WILL CREATE MANY OTHER OPPORTUNITIES ........................ 67 A. BARGAINING OVER DATA RETENTION AND SECURITY........................ 67 B. BARGAINING OVER DATA BREACHES ....................................................... 67 C. UNION’S AFFIRMATIVE BARGAINING PROPOSALS ................................ 67 D. BYOD ................................................................................................................... 68 E. ACCESS ............................................................................................................... 68 F. BARGAINING OVER MONITORING AND SURVEILLANCE...................... 69 G. BARGAINING ABOUT SOCIAL MEDIA......................................................... 70 H. WORK PRESERVATION ................................................................................... 70 ii I. UNIONS CAN NEGOTIATE WHETHER THE WORK IS PERFORMED BY BARGAINING UNIT MEMBERS OR OTHERS OUTSIDE THE BARGAINING UNIT........................................................................................... 70 XIV. CONCLUSION................................................................................................................. 70 iii I. INTRODUCTION The Future of Work is Now. Short term and long term. We have to address it. There is nothing new about the obvious proposition that technology is changing the workplace. The Luddites opposed mechanization in the early part of the 19th Century. They did it through industrial sabotage. They failed. There is a long history of industrial sabotage as the weapon of workers to avoid changes in the workplace. The real difference between then and now is the speed and breadth of change. Artificial intelligence is not just on the horizon; it is already here in many forms and affects members of all unions. It affects them in two ways, which are converging. It affects the nature of business and it affects the nature of work, along with the management of workers. Not to be lost in this equation are the forces of competition, both national and transnational. The Labor Board has faced issues about bargaining over technology, whether we call it automation, robotics, mechanization, artificial intelligence, or any other similar term. It has always delayed its reaction to these issues for years and sometimes decades. It is, in that regard, an agency which is truly ossified. The purpose of this paper is to address how, with offensive bargaining techniques, we can respond to and be prepared for these changes in the workplace. These technological changes offer more opportunity to bargain than other changes. The courts and legislatures are slowly facing these problems. When they do, they often ignore the rights of workers, and unions must assert and protect workers’ rights. Throughout this paper, we use various terms. We would use the term artificial intelligence shortened to “AI,” but few readers would feel comfortable. It should, however, be understood that our references to technology include all forms of technological change, including automation, robotics, digitalization, and other such forms that are transforming the workplace. Below, we first address how labor has historically approached forms of technological advancement. The historical references are to establish that techniques of resistance are ineffectual in the long term and short term. More effective is to leverage protection and change which benefits workers. We use this paper to show how unions can use bargaining techniques to obtain leverage when issues of technology are raised either by the employer or a union. Initially for example, data breaches are becoming more and more common. Employers are subject to them. Unions have the right to bargain over the impact they may have on the privacy of their members. Employers should have to respond to requests by unions to bargain over cybersecurity issues, including seeking information on the data security measures taken by their employers. This will raise confidentiality and security issues. But certainly it is a mandatory subject of bargaining. This is just one example of the myriad of issues which can be raised. 1 This naturally leads to bargaining over data storage. What data is stored about employees and their work? How is it used? What controls are there? How much of the data is confidential or proprietary? Do we get to bargain about such data and its use? II. “THE WITHDRAWAL OF EFFICIENCY” HOW THE LUDDITES AND THE WOBBLIES DEALT WITH TECHNOLOGY A. THE LUDDITES Luddite song: And night by night when all is still And the moon is hid behind the hill, We forward march to do our will With hatchet, pike, and gun! Oh, the cropper lads for me, The gallant lads for me, Who with lusty stroke, The shear frames broke, The cropper lads for me!2 The term “Luddite” applies to the English workers who are also known as “machine breakers.” They arose rather suddenly in March of 1811 and were largely defeated by early 1813. There was an active period of frame breaking, which occurred for about a year between November of 1811 and the fall of 1812. The Luddites were groups of workers located in the “Midlands” of England who, usually in small groups, would enter factories to destroy certain of the machinery
Recommended publications
  • Blood Tide: Design of a 3D Computer Game
    Project Number: RL1-P109 Blood Tide: Design of a 3D Computer Game A Major Qualifying Project Report submitted to the Faculty of the Worcester Polytechnic Institute in partial fulfillment of the requirements for the Degree of Bachelor of Science on May 4, 2010 Submitted By: Joseph Alea, Garret Doe, Sarah Gilkey, Chris Willams, Frank Williams Advised By: Professor Jennifer deWinter and Professor Robert Lindeman Abstract Blood Tide: Design of a 3D Computer Game By Joseph Alea, Garret Doe, Sarah Gilkey, Chris Willams, Frank Williams This report discusses the results of the implementation of the game Blood Tide for a joint Interactive Media and Game Development and Professional Writing Major Qualifying Project. Blood Tide is a multiplayer, online, action, real-time strategy game that combines the strategic planning of a real-time strategy game with the fast paced combat of an action game. This report will detail the game‘s vision, the artistic and technical designs, the gameplay features, the successes and shortcomings of the project, and research on effective strategies for providing in-game help. This report will begin by introducing the game features of Blood Tide, then it will discuss the implementation of the game, and finally it will discuss the results. In addition to the results of the implementation, this report includes a post mortem from the project team that discusses lessons that were learned from the hurdles and successes of this project. ii Acknowledgements We would like to acknowledge Robert Lindeman and Jennifer deWinter for their assistance and guidance as our advisors. Additionally, we would like to express our gratitude toward Sean Beck, who helped us during the implementation phase of the project.
    [Show full text]
  • Download Levitz Musicological Elite.Pdf
    The Musicological Elite Tamara Levitz Musicologists have been gripped by the desire to democratize, diversify, decolonize, and popularize their discipline. Driven by a growing moral demand to challenge the Eurocentric, heteronormative, exclusionary, colonial, settler colonial, non-diverse, and white supremacist legacies of a discipline plagued by its rootedness in European classical musical tradi- tions, they have recently accelerated their efforts to expand the traditional canon, reform curriculum, and explore new mediums for the dissemina- tion of ideas (for example, “popular” internet blogs over expensive aca- demic monographs). In spring 2017, the Department of Music at Harvard University symbolically led the charge in this effort by announcing they would no longer require music theory and other courses, but rather ask students to pick “no more than two” of each type of course in their pro- gram, design their study plan with the Director of Undergraduate Studies, and include a rationale that outlines their path through the major. The only requirements left are the “Concentration Tutorials” that include courses on “Thinking about Music” and “Critical Listening.”1 Harvard Professors stressed that this change would create more “flexible pathways” through their program, eliminate the class-based implicit requirements to enter it, and, most importantly, allow for a greater diversity of students and student interests.2 Reactions to these plans on social media have been vehement and fiercely divided.3 That the standard curriculum in musicology programs has become an open wound or festering reminder of the labor injustice, class division, exclusions, structures of white supremacy, and inequality in the discipline became apparent again in October 2017, when an acrimonious debate, this time about eliminating the language requirements in musicology programs, erupted on the listserv of the American Musicological Society.
    [Show full text]
  • Eccentric Spaces and Filmic Traces
    Eccentric Spaces and Filmic Traces: Portals in Aperture Laboratories and New York City Patrick LeMieux Stephanie Boluk University of Florida University of Florida Fine Arts Building C - 101 4008 Turlington Hall P.O. Box 115801, Gainesville, FL 32611-5801 P.O. Box 117310, Gainesville, FL 32611-7318 1-352-359-8225 1-352-359-3060 [email protected] [email protected] ABSTRACT in the industry . For any one who attends meetings like This paper examines the way in which time and space are figured the Gam e Developers Conference (GDC), the within a new genre of what we are calling "eccentric games" and Electronic Entertainment Expo (E3), or SIGGRAPH, it a site-specific video sharing application called Trover by Dan quickly becom es apparent that thes e concerns are Provost. Taking Valve’s Portal as our cas e s tudy, a chias matic voiced almost exclus ively from the des ire to enhance relationship emerges between thes e different m odes of eccentric the game world's realism [11], p. 215-16. media. In order to acces s eccentric s pace the video gam es we Within the last three y ears, am idst this industry -driven push examine appropriate the logic of film whereas Provost' s video towards realis m, there has been a movement in gaming towards application Trover is informed by an eccentric logic of games. what we are calling eccentric games. Eccentric games employ spaciotemporal effects which give the play er acces s to logics Categories and Subject Description indigenous to digital environments . These logics often reference pop-physics theories and paradoxes such as those related to time travel, parallel realities, navigating multiple dimensions, folding time and space, quantum mechanics, probability engines, and the General Terms conflation of virtual and actual space (see Figure 1).
    [Show full text]
  • Trend Report Modelling and Simulation Group (MSG) Workshop Series on Exploiting Commercial Technologies and Games for Use in NATO
    Trend Report Modelling and Simulation Group (MSG) Workshop Series on Exploiting Commercial Technologies and Games for Use in NATO Project: Contractor Support for HQ SACT NATO Commercial Games Workshop Trend Reports NATO-HQ-SACT-PO-1334001448 Prepared and Submitted by: G.R. Gendron Reviewed by: Dr. A. Tolk January 8, 2014 Trend Report TR - 1 Modelling and Simulation Group (MSG) Workshop Series on Exploiting Commercial Technologies and Games for Use in NATO Executive Summary Nearly ten years ago, the training and modelling and simulations (M&S) communities teamed up to tackle a burgeoning issue – the use of commercial technologies and games in NATO. The challenge came from the cultural change inherent in the domain. Small businesses were the leaders in the game space, yet they were perceived as risks among acquisition authorities. The proponents pushed forward by forming a Modelling and Simulation Group workshop series called “Exploiting Commercial Technologies and Games for Use in NATO” to bridge the cultural gaps. Over ten years, twelve workshops have convened. Successes have been achieved and predictions made five years ago have been attained. This report provides (a) findings such as trends and possible explanations for factors contributing to attainment of workshop predications; (b) trends within technology, industry, and government with respect to commercial technologies and games for education and training; and (c) recommendations for consideration in planning future MSG commercial technology and games workshops. A semantic analysis of report text was the primary means of discerning factors and trends. The data (corpus) included 157 pages of workshop reports since 2009. This MSG workshops series has investigated trends in this area for nearly 10 years.
    [Show full text]
  • 1522459394788.Pdf
    INTRODUCTION <The following is a placeholder introduction, and will be changed at a later date.> The Remnant System, humanity decided, was pretty darn amazing. Every planet was stuffed to the brim with ancient alien technology. Eventually, they managed to reverse engineer some of it, creating working teleporter tech and revitalizing galactic colonization efforts. But, with all this tech, where were the aliens? The answer: preparing an assault on humanity. They were heavily outnumbered, but somehow managed to effortlessly beat back humanity's fleets, and only later would analysis reveal that their remaining fighters at the end of the battle were sent back to the beginning, using time travel to preempt every strategy used against them. All would have been lost, but at the last minute, the alien troops fractured, splitting among themselves into three groups: one group of eleven-foot-tall bipeds, and two groups of squidlike cyborgs. This division and feuding in the ranks might be exactly what humanity needed to regroup... Take 1000 Chrono Points. ORIGIN (You may be choose to be unaffected by your origin's memories or personality.) HUMAN (Free) With two arms, pale skin, and an eye toward the stars, humanity's colonization efforts were revolutionized by long-lost technology found on abandoned planets, then hampered by an all- out assault from the combined forces of the Coremind. Now, after the Coremind's mysterious demise, uncertain alliances and hostilities do not hamper humanity's desire to travel the stars. VECGIR (Free) Ten feet tall, the Vecgir stand forewarned and four-armed. Once, the Vecgir were slaves to the Coremind, their minds and bodies not their own, forced to enact its will.
    [Show full text]
  • Heuristics for Evaluating Video Games: a Two-Tier Set Incorporating
    Heuristics for Evaluating Video Games: A Two-Tier Set Incorporating Universal and Genre-Specific Elements Joseph Macey University of Tampere School of Information Sciences Internet and Game Studies M.Sc. thesis Supervisor: Janne Paavilainen October 2016 University of Tampere School of Information Sciences Computer Science / Interactive Media Joseph Macey - Heuristics for Evaluating Video Games: A Two-Tier Set Incorporating Universal and Genre-Specific Elements, 113 pages, 49 index and appendix pages October 2016 - Abstract The continued significance of video games in contemporary society has led to the production of many heuristic sets by which the playability of games can be evaluated. These sets encompass a wide range of aims and theoretical perspectives, furthermore, they have been developed via a number of distinct methods. This thesis is the result of a two-stage investigation, the first of which was to identify and extract any heuristics that could be considered as having universal relevance, irrespective of the method or theoretical position by which they were developed. The second stage of the investigation complemented this universal list with genre-specific elements, providing a model by which further information can be added in the future. Comparative analysis was used to extract common principles from a selected body of work, resulting in a list of 19 heuristics. In addition, open and axial coding was applied to data sourced from online game reviews, extracting information relating to the Real-Time Strategy genre. This information was then converted into 25 RTS-specific heuristics and integrated with the set developed in the first stage. The results of this study, therefore, clearly demonstrate the existence of a core set of universal heuristics, and the value of incorporating genre-specific information.
    [Show full text]
  • April 2015 Volume 34, Issue 4
    APRIL 2015 VOLUME 34, ISSUE 4 Technology, Tools and Tactics for Public Sector IT SERIOUS GAMES SCORE IN AGENCY TRAINING PAGE 6 Finding storagethe right New virtualization techniques and emerging flash technologies baare giving data centeranc operators more control over how theye manage storage systems, speed backups and reduce costs. PUBLIC SAFETY COMMUNICATIONS: Colorado first responders take FirstNet for a test drive Page 28 0415gcn_001.indd 1 3/30/15 3:13 PM 2015 FEDERAL EMPLOYEES ALMANAC The Almanac is your one-stop resource on federal policy information — used annually by thousands of federal employees to reference the latest 2015 rules, regulations, and procedures. NOW IN STOCK - ORDER TODAY! Single copies start as low as $23.95 Federal Soup subscribers save an additional 10%! FederalSoup.com/FedStore • 800-989-3363 INSIDE FEATURE BRIEFING 6 Serious games scoring 22 Finding the right storage big in government balance 7 Who’s online now? New storage technique and technologies are 18F builds web analytics dashboards giving data center operators more control over how they manage storage systems and reduce 8 How to keep legacy costs systems from becoming liabilities BY CAROLYN DUFFY MARSAN 9 NIST funds center to CASE STUDIES model disaster recovery strategies 28 COLORADO TAKES FIRSTNET FOR A TEST DRIVE 10 Cities tap Yelp to improve health inspection process The mobile LTE network supported video, situational awareness, mapping and photo apps 12 DARPA makes strides for first responders searching the ‘deep web’ BY STEPHANIE KANOWITZ 13
    [Show full text]
  • The Bulletin of Denison University a College of Liberal Arts Founded 1831 Catalog Number 1938-1939
    DENISON UNIVERSITY BULLETIN NCEMENTS CATALOG NUMBER 1939-40 1938-39 Volume XXXIX, No. 1 January, 1939 The Bulletin of Denison University A College of Liberal Arts Founded 1831 CATALOG Number 1938-1939 The I'mveralty Bulletin is liaiied Iri-monthly nncl entered nl the Post Office In Qrhnvllle, Ohio, HH until matter of the Second Class. ' Primed by Thr Gmnville Timei A Publiahinl Co GRANVII.U. OHIO Correspond ence I o facilitate correspondence inquiries should be addressed .1- follows. Correspondence on matter- oi general interest to the PRESIDENT of the University. Requests for catalogs and other numbers of the Univer- sity Bulletin to the REGISTRAR. Entrance credentials for new students, requests concern- ing requirements for graduation to the REGISTRAR. Correspondence concerning room- for women to the DEAN OF WOMEN; for men. to the DEAN OF MEN. Correspondence concerning business, financial aid, and payment of bills to the BURSAR. Correspondence concerning work in Music to the DI- RECTOR OF THE CONSERVATORY. Correspondence concerning Extension Courses to the DEAN OF MEN. Correspondence on matter- pertaining to the Board of Trustees gifts, or legaciec to the SECRETARY OF THE BOARD OF TRUSTEES, Broadway Office Building. Correspondence regarding publicity and advertising to the DIRECTOR OF PUBLICITIY. Table of Contents Page University Calendar 1939-1940... 5 Board of Trustees 6 Faculty and Administrative Officers... S Denison History.... 15 Aim 17 mnel Work and Guidance... 18 Method and Terms of Admission 21 Degree Requirements 28 Expenses . 34 Scholarships and Loans.. 3S Scholastic Awards 41 Academic Buildings 47 Health 49 Library 51 Student Organizations. 51 Departments and Courses of instruction .
    [Show full text]
  • Eccentric Spaces and Filmic Traces
    Eccentric Spaces and Filmic Traces: Portals in Aperture Laboratories and New York City Patrick LeMieux Stephanie Boluk University of Florida University of Florida Fine Arts Building C - 101 4008 Turlington Hall P.O. Box 115801, Gainesville, FL 32611-5801 P.O. Box 117310, Gainesville, FL 32611-7318 1-352-359-8225 1-352-359-3060 [email protected] [email protected] ABSTRACT in the industry. For anyone who attends meetings like This paper examines the way in which time and space are figured the Game Developers Conference (GDC), the within a new genre of what we are calling "eccentric games" and Electronic Entertainment Expo (E3), or SIGGRAPH, it a site-specific video sharing application called Trover by Dan quickly becomes apparent that these concerns are Provost. Taking Valve’s Portal as our case study, a chiasmatic voiced almost exclusively from the desire to enhance relationship emerges between these different modes of eccentric the game world's realism [11], p. 215-16. media. In order to access eccentric space the video games we Within the last three years, amidst this industry-driven push examine appropriate the logic of film whereas Provost's video towards realism, there has been a movement in gaming towards application Trover is informed by an eccentric logic of games. what we are calling eccentric games. Eccentric games employ spaciotemporal effects which give the player access to logics Categories and Subject Description indigenous to digital environments. These logics often reference pop-physics theories and paradoxes such as those related to time travel, parallel realities, navigating multiple dimensions, folding time and space, quantum mechanics, probability engines, and the General Terms conflation of virtual and actual space (see Figure 1).
    [Show full text]
  • The New Chancellor
    FLAL 2010 THE NEW CHANCELLOR R andy Woodson works to keep NC State engineering strong SURVEY THEN, SURVEY NOW Civil engineering students have been conducting land surveys on the Court of North Carolina for — how long now? At least since 1918, when the photo below of an NC State “survey squad” was taken outside the 1911 Building on the court’s west end. Today, students still use the Court to learn surveying, the practice of determining the position of points and the angles and distances between them. In July, high school senior Jenna Dwyer (left) tried her hand as a surveyor with NC State freshman Liya Weldegebriel during one of NC State’s summer camps for high school students. One big change since the beginning of the last century is to the Court itself. Those stairs behind the students were installed this past spring, perhaps providing the backdrop to another 100 years of surveying at NC State. contents FALL 2010 FEATURES 16 LEADER. ADVOCATE. FAN. New NC State Chancellor Randy Woodson believes engineering plays a pivotal role in the University’s success. 20 A WOLFPACK WORLD NC State engineering students, faculty and research are found in every corner of the globe. 16 22 SUPERSTARS OF ENGINEERING NC State’s 10 National Academy of Engineering members have produced world-changing ideas and inventions. 26 BTEC = JOBS The Golden LEAF Biomanufacturing Training and Education Center is fueling the state’s growing biotechnology sector. 28 THE SMARTS OF THE SMART GRID How the NSF FREEDM Systems Center, headquartered at NC State, is building the “Energy Internet.” 22 DEPARTMENTS 03 FROM THE DEAN A new building, landmark research awards and more exciting college news.
    [Show full text]
  • Denison University Bulletin, Granville, Ohio 1958-1960, 128Th and 129Th Academic Years
    — *• »- /n.i. ENISON UN IVERS ITY BULLETIN CATALOG NUMBER I9B0-6O I 4 I 5ENISON UNIVERSITY MMntoE&lVI N CATALOG NUMBER 1958-6O ••• :•..••••:•: v .: •••..• . ■ ■ & •:■■■■ .... ■ '■, ,..■ ; ;• .-• I El IISON UN1VRRSIT* GRANVILLE.- Qn-uo L 3 S^ rf DENISON UNIVERSITY BULLETIN Granville, Ohio 1958-60 128t/t and 129tli -Academic ljearit A COLLEGE OF LIBERAL ARTS AND SCIENCES w, Ixva Founded 1831 CATALOG NUMBER Volume LVIII, No. 4 November, 1958 The Danison University Bulletin it published by Danison University. Granville. Ohio, lour limes o yaor in Juna. August. October, and November. Entered at second clan matter at tha Poit Office at Granville. Ohio, undar tha Act o( August 24, 1912. CALENDAR 1958-1959 • IHt van immi ■ ■». Saturday-Thuraday. »- « II n ■ J\s; \I:Y Thuoday, September v r»i » s S M T W 1 p a It Claae** h*«tn MMNWI September 1* * 1 - » 10 ii i: - . Omhtf 4 Mill,! i : iy Itmiii, Itrlnaw 28 ; - ■ . .. he«ini 31 .. .. H - - *\~i .— !«. N ■•■". *r Jfi. noon •'acation end* I, noon 1 "»' ■ , *t.«l» Saturday. B M I W I P B - u r W 1 i : bar 13 l : l i 6 $ 1 l Friday. I»eceml.er 19. noon ■ 10 11 1Z I - ■ • i . EC 1 . Ul Vacation endi « J I . ■. noon 8BPTBM M UU H IB imir.a'iona. - M 1 W l l .- - M I w r F s '•ru»f| 8-10 < lutM end Friday. I t I 4 t I i : .i 4 i *, : J . 1 1 9 10 11 12 13 14 11 It I - ■ ■8108) Reading • .: ■ \ ... I - ! i> \\ — t rvl.17, January II f' *>f» > ■ 1 • \,- aiiona for Grad- .*s.1*»-Saturday.
    [Show full text]
  • A Hebrew Liederabend an Evening of Hebrew Song Tuesday, June 4, 2019
    A Hebrew Liederabend An Evening of Hebrew Song Tuesday, June 4, 2019 ANNE E. LEIBOWITZ MEMORIAL CONCERT Program 6:00pm Pre-Concert Lecture Including music by 7:00pm Concert JOSEPH ACHRON JOEL ENGEL Performed by ALEXANDER KREIN ILANA DAVIDSON PAUL BEN-HAIM RAPHAEL FRIEDER OFER BEN-AMOTS ELIZABETH SHAMMASH and poetry by YEHUDI WYNER and guest artist RONN YEDIDIA SHAUL TCHERNICHOVSKY AVIGDOR HAMEIRI Devised by YEHUDA HALEVI NEIL W. LEVIN LEAH GOLDBERG RACHEL HAYIM NAHMAN BIALIK This event is part of the Smithsonian Year of Music. and others… YIVO INSTITUTE FOR JEWISH RESEARCH in the Center for Jewish History 15 WEST 16TH STREET · NYC PROGRAM INTERMISSION אומרים: ישנה ארץ | THEY SAY THERE IS A LAND נעמי שמר | Music by Naomi Shemer | 1930-2004 שאול טשרניחובסקי | Words by Shaul Tchernichovsky | 1875-1943 כיבוי אורות | LIGHTS OUT נעמי שמר | Music and Words by Naomi Shemer | 1930-2004 אומרים: ישנה ארץ | THEY SAY THERE IS A LAND מנחם ויזנברג | Arranged by Menachem Wiesenberg | 1950- יואל אנגל | Music by Joel Engel | 1868-1927 שאול טשרניחובסקי | Words by Shaul Tchernichovsky | 1875-1943 שיר ליקינתון | THE HYACINTH רבקה גוילי | Melody by Rivka Gwily שני מכתבים | TWO LETTERS לאה גולדברג | Words by Lea Goldberg | 1911-1970 יואל אנגל | Music by Joel Engel | 1868-1927 מנחם ויזנברג | Arranged by Menachem Wiesenberg | 1950- אביגדור המאירי | Words by Avigdor Hameiri | 1890-1970 הנך יפה רעיתי | BEHOLD, THOU ART FAIR גלות | IN EXILE ידידיה אדמון | Music by Yedidiya Admon | 1894-1982 היינריך שליט | Music by Heinrich Schalit | 1886-1976 שיר השירים | Words
    [Show full text]