RAR, Volume 14, 1994

Total Page:16

File Type:pdf, Size:1020Kb

RAR, Volume 14, 1994 The RUTGERS A.RT REVIEW Published by the Graduate Students of the Department of Art History at Rutgers, The State University of New Jersey Volume XIV, 1994 Rutgers Art Review Volume XIV Co-Editors: Pamela Phillips and Zbynek Smetana Editorial Board: Adrienne De Angelis Joanna Gardner Carol Guttzeit Alison Licalsi Maggie Patrick-Sternin Marice Rose Johanna Schiller James Zemaitis Faculty Advisor: Matthew Baigell Consulting Editor: Shelly Adams Advisory Board: Sarah Brett Smith Patricia Fortini Brown Frema Hofrichter Joan Marter Sarah Blake McHam The Editorial Board of the Rutgers Art Revieiv Volume XIV gratefully acknowledges the sound advice and expertise of the faculty of the Department of Art History, and in particular of our faculty advisor Matthew Baigell. We are also very grateful to all of the professional readers of papers submitted for this issue. The Editors of Volume XIV extend special thanks to Anand Commissiong, Office Director of the Catharine R. Stimpson Graduate Publications Office of Rutgers Univer­ sity, without whom this issue would never have been published. The Rutgers Art Review would like to extend appreciation and gratitude to Nikola Stojsin and Donald Fallon, members of the Graduate Student Association/Graduate Publications Committee, Rutgers University. Their continued financial assistance and professional support have been crucial to the ongoing success of the RAR. Benefactors ($1,000 or more) The Graduate School, Rutgers, The State University of New Jersey The Graduate Student Association, Rutgers, The State University of New Jersey Contributors ($100 or more) Shelly Adams and Edgar Morales Robert Bergman Rona Goffen Sarah Blake McHam Friends ($25 or more) Barbara Anderman A.S. Arbury Evan Brownstein Arnold Victor Coonin Marianne Ficarra Maggie Patrick-Sternin Marice Rose David G. Wilkins The Rutgers Art Review is run entirely by graduate students of the Department of Art History of Rutgers, The State University of New Jersey, with assistance from the RAR's faculty advisor and advisory board. The RAR publishes articles on a wide range of topics concerning the history of art, architecture, and material culture, and considers submissions on art criticism, aesthetics, film, and photography. Each volume features an interview with a prominent art historian or a contemporary artist. The RAR may be found in over one hundred of the finest academic, public, and museum library collections in the U.S. and abroad. Articles appearing in the Rutgers Art Review are indexed/abstracted in America: History and Life, Artbibliographies Modern, Historical Abstracts, Repertoire d'Art et d'Archeologie, RILA, Ulrich's International Periodical Direc­ tory, and Zeitschrift fiir Kiinstgeschichte. Guidelines for Submissions: All graduate students of art history and related disciplines are eligible to submit papers, including those who have completed their Ph.D. degrees within the last year. Each manuscript must be an original, scholarly contribution, and only after the recommendation of the editorial board and two outside scholars may a paper be published. For matters of usage and form, authors should consult the most recent version of the Art Bulletin, noting the following exception: the RAR uses endnotes rather than footnotes, and does not augment them with a bibliography. Manuscripts submitted for consideration should be in duplicate. Once accepted for publication, final maunuscripts must be submitted both on paper and computer disk in a commonly employed wordprocessing program. Authors are responsible for supplying all photographs to be used, and for securing necessary rights to reproduce them. Photographs should be submitted with the final version of the manuscript. Copies of manuscripts and correspondence should be directed to: Editors Rutgers Art Review Department of Art History Voorhees Hall, CAC Rutgers University New Brunswick, NJ 08903 Copyright ©1996 by Rutgers, The State University of New Jersey All rights reserved Manufactured in the United States of America ISSN 0194-Q49X Typeset by Anand Commissiong, Pamela Phillips, and Zbynek Smetana at the Catharine R. Stimpson Publications Center, Graduate Student Association. Contents Volume XIV 1994 ARTICLES A Mystery Solved: The Discovery of a Sixteenth-Century Expulsion of Adam and Eve 1 Anne Turpin Three Rosette Ivory Caskets with Scenes from the Lives of Adam and Eve 5 Lilian H. Zirpolo Reconsidering the Influence of African Art on Cubism 29 Stephanie Peeples Johnson The Portrait of an Abbess: Lucrezia Agliardi Vertova 43 Cheryl A. Schutt Brown INTERVIEW An Interview with Marilyn Aronberg Lavin 53 Pamela Phillips and Zbynek Smetana Fig. 1 Dirk Vellert, The Expulsion of Adam and Eve from the Garden of Eden, n.d., pen and brown ink, Santa Barbara Museum of Art, Gift of Professor Alfred Moir Rutgers Art Review, 14 (1994) A Mystery Solved: The Discovery of a Sixteenth Century Expulsion of Adam and Eve Anne Turpin Previously given the descriptive title Nude Man and Woman Fleeing Man Bearing Torch, this drawing by Dirk Vellert in the collection of the Santa Barbara Museum of Art represents the expulsion of Adam and Eve from the Garden of Paradise (Fig. I).1 The artist composed the work with elements seemingly incongruous to the biblical story: a torch, a wingless angel, extraneous figures, and monumental architecture. Though these factors initially prohibited a decisive subject identification, they can be inter­ preted through close observation and pictorial precedent. The monogram D*V, visible below the right figure's arm, was not identified as belonging to the Sixteenth Century Flemish artist Dirk Jacobsz. Vellert until Gustav Gliick established the connection in 1901.2 Before this time, the initialled works were attributed to such names as Dirk van Staren and Thiery van Star—the latter employed specifically by Adam Bartsch.3 In addition to the monogram, the artist often inscribed his works with the day, month, and year. Unfortunately, The Expulsion of Adam and Eve has no such date. A stained glass roundel, The Triumph of Time, is Vellert's earliest known work dated 21 April 1517; the latest is an engraving called The Flood of 1544.4 Most famous for his stained glass window designs, the artist is particularly noted for those at Kings College Chapel, Cambridge (c. 1515-1530). The original biblical account of the Expulsion, Genesis 3:24, reads: He [God] drove out the man; and at the east of the garden of Eden He placed the cherubim, and a flaming sword which turned every way, to guard the tree of life. Upon close inspection, Vellert's drawing reveals that the torch held by the pursuer is actually a sword—the blade defined by faint contour lines stretching through the fire and smoke. This flaming sword establishes the initial link between the text and the drawing. This subject designation can be further grounded by showing compositional precedent for it. In his instrumental passage on the Expulsion in Iconographie de L'Art Chretien, Louis Reau explains that early Christian art followed the staging suggested in Genesis by placing God in the role of the expeller.5 After the thirteenth century, a new convention emerged: the pursuer became an angel bearing a sword. Reau further elaborates by specifying that the free hand of the angel is often placed on either Adam or Eve who is turned away. Among the more pertinent examples of this figural composition are those by Albrecht Durer (B.2) and Lucas van Leyden (B.4), both of whom were major influences on Vellert. Focusing on Lucas' 1529 Expulsion, Reau emphasizes that it breaks with the tradition of representing the event in somber slow- motion and, alternatively, puts the figures into flight "as if they had the devil at their heels."6 Though now the drawing does not seem as enigmatic, some unexplained elements remain. Why does the angel have no wings? Could the figure be God? According to Reau, this method of composing the story had ceased two hundred years previously. In addition, God is never depicted partially clad or carrying the flaming sword. Perhaps the drawing is unfinished, as the transparency of the sword's blade suggests. In apparent contradiction of the story of the first man and woman, two pairs of figures stand at the end of the tunnel. However, their shared presence with the foreground couple can be understood in terms of a continuous narrative. Lucas van Leyden demonstrates a more fully realized use of this technique in his 1512 woodcut The Fall of Man. In Vellert's drawing, the tunnel thrusts back into space to focus on the small, unfinished figures. The pair on the right is smaller and barely visible. Possibly, these two sets of figures are evidence of the artist's two separate attempts to render effectively a related moment in the Creation story. One of the more troublesome aspects of Vellert's version of the Expulsion, the monumental architecture, refuses to be dismissed as a mere "Gate of Paradise," a common pictorial convention added to the biblical text. Again, this oddity can be explained through a comparison to Lucas van Leyden's woodcut which includes a fortress-like structure with a city wall extending from it. A later version of the Lucas van Leyden woodcut (1516-19) with a similar, though reversed composition features a Romanesque church (B. 2). And yet another Creation scene depicting extensive architecture is that of Marcantonio Raimondi, an artist often suggested as an influence on Vellert (B. I).7 Frequently, Vellert employed similar monumental backdrops. He also repeatedly emphasized three-dimensional space with a variety of compositional devices such as the barrel vault (B. 8) and windows which open to distant views (B.9). It is interesting to note that his vaulted passageway in the Santa Barbara drawing by Vellert (Fig.l) is not unlike that of Lucas' depiction. Vellert's inclusion of architecture in The Expulsion serves purposes other than the creation of a more dramatic and focused drawing.
Recommended publications
  • Data Preparation & Descriptive Statistics
    Data Preparation & Descriptive Statistics (ver. 2.4) Oscar Torres-Reyna Data Consultant [email protected] PU/DSS/OTR http://dss.princeton.edu/training/ Basic definitions… For statistical analysis we think of data as a collection of different pieces of information or facts. These pieces of information are called variables. A variable is an identifiable piece of data containing one or more values. Those values can take the form of a number or text (which could be converted into number) In the table below variables var1 thru var5 are a collection of seven values, ‘id’ is the identifier for each observation. This dataset has information for seven cases (in this case people, but could also be states, countries, etc) grouped into five variables. id var1 var2 var3 var4 var5 1 7.3 32.27 0.1 Yes Male 2 8.28 40.68 0.56 No Female 3 3.35 5.62 0.55 Yes Female 4 4.08 62.8 0.83 Yes Male 5 9.09 22.76 0.26 No Female 6 8.15 90.85 0.23 Yes Female 7 7.59 54.94 0.42 Yes Male PU/DSS/OTR Data structure… For data analysis your data should have variables as columns and observations as rows. The first row should have the column headings. Make sure your dataset has at least one identifier (for example, individual id, family id, etc.) id var1 var2 var3 var4 var5 First row should have the variable names 1 7.3 32.27 0.1 Yes Male 2 8.28 40.68 0.56 No Female Cross-sectional data 3 3.35 5.62 0.55 Yes Female 4 4.08 62.8 0.83 Yes Male 5 9.09 22.76 0.26 No Female 6 8.15 90.85 0.23 Yes Female 7 7.59 54.94 0.42 Yes Male id year var1 var2 var3 1 2000 7 74.03 0.55 Group 1 1 2001 2 4.6 0.44 At least one identifier 1 2002 2 25.56 0.77 2 2000 7 59.52 0.05 Cross-sectional time series data Group 2 2 2001 2 16.95 0.94 or panel data 2 2002 9 1.2 0.08 3 2000 9 85.85 0.5 Group 3 3 2001 3 98.85 0.32 3 2002 3 69.2 0.76 PU/DSS/OTR NOTE: See: http://www.statistics.com/resources/glossary/c/crossdat.php Data format (ASCII)… ASCII (American Standard Code for Information Interchange).
    [Show full text]
  • Art in the Modern World
    Art in the Modern World A U G U S T I N E C O L L E G E Arnold SCHOENBERG in 1911 Gurre Lieder 190110 Arnold SCHOENBERG in 1911 Gurre Lieder Pierrot lunaire, opus 21 190110 1912 First Communion 1874 Pablo PICASSO Portrait of Dora Maar Portrait of Dora Maar 1939 | Pablo PICASSO 1942 | Pablo PICASSO Portrait of Dora Maar MAN RAY Compassion 1897 William BOUGUEREAU Mont Sainte-Victoire 1904 | Paul CEZANNE Mont Sainte-Victoire Poppy Field 1904 1873 Paul CEZANNE Claude MONET Lac d’Annecy 1896 | Paul CEZANNE Turning Road at Mont Geroult 1898 Paul CEZANNE CUBISM Houses at l’Estaque 1908 Georges BRAQUE Grandes baigneuses 1900-06 | Paul CEZANNE Les demoiselles d’Avignon 1907 Pablo PICASSO African mask The Portuguese 1911-12 Georges BRAQUE Fruit Dish and Glass 1912 Georges BRAQUE Woman with Guitar 1913 Georges BRAQUE Woman with Guitar 1913 Georges BRAQUE Blue Trees 1888 Paul GAUGUIN Absinthe Drinker 1902 | Pablo PICASSO The Ascetic 1903 Pablo PICASSO The Accordionist 1911 Pablo PICASSO Musical Instruments 1912 Pablo PICASSO Face 1928 lithograph Pablo PICASSO Fruit Dish 1908-09 Pablo PICASSO Still-life with Liqueur Bottle 1909 Pablo PICASSO Woman in an Armchair 1913 | Pablo PICASSO Figures on the Beach 1937 | Pablo PICASSO Study for Figures on the Beach 1937 | Pablo PICASSO Weeping Woman 1937 | Pablo PICASSO Guernica 1937 | Pablo PICASSO Guernica details Guernica detail The Seamstress 1909-10 Fernand LEGER The City 1919 | Fernand LEGER Propellers 1918 Fernand LEGER Three Women 1921 | Fernand LEGER Divers on a Yellow Background 1941 | Fernand LEGER FAUVISM Fruit and Cafetière 1899 | Henri MATISSE Male Model 1900 | Henri MATISSE Open Window 1905 Henri MATISSE Woman with a Hat 1905 Henri MATISSE Bonheur de vivre (The Joy of Life) 1906 | Henri MATISSE Terrace, St.
    [Show full text]
  • The New Yorker
    Kindle Edition, 2015 © The New Yorker COMMENT SEARCH AND RESCUE BY PHILIP GOUREVITCH On the evening of May 22, 1988, a hundred and ten Vietnamese men, women, and children huddled aboard a leaky forty-five-foot junk bound for Malaysia. For the price of an ounce of gold each—the traffickers’ fee for orchestrating the escape—they became boat people, joining the million or so others who had taken their chances on the South China Sea to flee Vietnam after the Communist takeover. No one knows how many of them died, but estimates rose as high as one in three. The group on the junk were told that their voyage would take four or five days, but on the third day the engine quit working. For the next two weeks, they drifted, while dozens of ships passed them by. They ran out of food and potable water, and some of them died. Then an American warship appeared, the U.S.S. Dubuque, under the command of Captain Alexander Balian, who stopped to inspect the boat and to give its occupants tinned meat, water, and a map. The rations didn’t last long. The nearest land was the Philippines, more than two hundred miles away, and it took eighteen days to get there. By then, only fifty-two of the boat people were left alive to tell how they had made it—by eating their dead shipmates. It was an extraordinary story, and it had an extraordinary consequence: Captain Balian, a much decorated Vietnam War veteran, was relieved of his command and court- martialled, for failing to offer adequate assistance to the passengers.
    [Show full text]
  • Full Document
    R&D Centre for Mobile Applications (RDC) FEE, Dept of Telecommunications Engineering Czech Technical University in Prague RDC Technical Report TR-13-4 Internship report Evaluation of Compressibility of the Output of the Information-Concealing Algorithm Julien Mamelli, [email protected] 2nd year student at the Ecole´ des Mines d'Al`es (N^ımes,France) Internship supervisor: Luk´aˇsKencl, [email protected] August 2013 Abstract Compression is a key element to exchange files over the Internet. By generating re- dundancies, the concealing algorithm proposed by Kencl and Loebl [?], appears at first glance to be particularly designed to be combined with a compression scheme [?]. Is the output of the concealing algorithm actually compressible? We have tried 16 compression techniques on 1 120 files, and the result is that we have not found a solution which could advantageously use repetitions of the concealing method. Acknowledgments I would like to express my gratitude to my supervisor, Dr Luk´aˇsKencl, for his guidance and expertise throughout the course of this work. I would like to thank Prof. Robert Beˇst´akand Mr Pierre Runtz, for giving me the opportunity to carry out my internship at the Czech Technical University in Prague. I would also like to thank all the members of the Research and Development Center for Mobile Applications as well as my colleagues for the assistance they have given me during this period. 1 Contents 1 Introduction 3 2 Related Work 4 2.1 Information concealing method . 4 2.2 Archive formats . 5 2.3 Compression algorithms . 5 2.3.1 Lempel-Ziv algorithm .
    [Show full text]
  • Pack, Encrypt, Authenticate Document Revision: 2021 05 02
    PEA Pack, Encrypt, Authenticate Document revision: 2021 05 02 Author: Giorgio Tani Translation: Giorgio Tani This document refers to: PEA file format specification version 1 revision 3 (1.3); PEA file format specification version 2.0; PEA 1.01 executable implementation; Present documentation is released under GNU GFDL License. PEA executable implementation is released under GNU LGPL License; please note that all units provided by the Author are released under LGPL, while Wolfgang Ehrhardt’s crypto library units used in PEA are released under zlib/libpng License. PEA file format and PCOMPRESS specifications are hereby released under PUBLIC DOMAIN: the Author neither has, nor is aware of, any patents or pending patents relevant to this technology and do not intend to apply for any patents covering it. As far as the Author knows, PEA file format in all of it’s parts is free and unencumbered for all uses. Pea is on PeaZip project official site: https://peazip.github.io , https://peazip.org , and https://peazip.sourceforge.io For more information about the licenses: GNU GFDL License, see http://www.gnu.org/licenses/fdl.txt GNU LGPL License, see http://www.gnu.org/licenses/lgpl.txt 1 Content: Section 1: PEA file format ..3 Description ..3 PEA 1.3 file format details ..5 Differences between 1.3 and older revisions ..5 PEA 2.0 file format details ..7 PEA file format’s and implementation’s limitations ..8 PCOMPRESS compression scheme ..9 Algorithms used in PEA format ..9 PEA security model .10 Cryptanalysis of PEA format .12 Data recovery from
    [Show full text]
  • Steganography and Vulnerabilities in Popular Archives Formats.| Nyxengine Nyx.Reversinglabs.Com
    Hiding in the Familiar: Steganography and Vulnerabilities in Popular Archives Formats.| NyxEngine nyx.reversinglabs.com Contents Introduction to NyxEngine ............................................................................................................................ 3 Introduction to ZIP file format ...................................................................................................................... 4 Introduction to steganography in ZIP archives ............................................................................................. 5 Steganography and file malformation security impacts ............................................................................... 8 References and tools .................................................................................................................................... 9 2 Introduction to NyxEngine Steganography1 is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. When it comes to digital steganography no stone should be left unturned in the search for viable hidden data. Although digital steganography is commonly used to hide data inside multimedia files, a similar approach can be used to hide data in archives as well. Steganography imposes the following data hiding rule: Data must be hidden in such a fashion that the user has no clue about the hidden message or file's existence. This can be achieved by
    [Show full text]
  • Winzip 12 Reviewer's Guide
    Introducing WinZip® 12 WinZip® is the most trusted way to work with compressed files. No other compression utility is as easy to use or offers the comprehensive and productivity-enhancing approach that has made WinZip the gold standard for file-compression tools. With the new WinZip 12, you can quickly and securely zip and unzip files to conserve storage space, speed up e-mail transmission, and reduce download times. State-of-the-art file compression, strong AES encryption, compatibility with more compression formats, and new intuitive photo compression, make WinZip 12 the complete compression and archiving solution. Building on the favorite features of a worldwide base of several million users, WinZip 12 adds new features for image compression and management, support for new compression methods, improved compression performance, support for additional archive formats, and more. Users can work smarter, faster, and safer with WinZip 12. Who will benefit from WinZip® 12? The simple answer is anyone who uses a PC. Any PC user can benefit from the compression and encryption features in WinZip to protect data, save space, and reduce the time to transfer files on the Internet. There are, however, some PC users to whom WinZip is an even more valuable and essential tool. Digital photo enthusiasts: As the average file size of their digital photos increases, people are looking for ways to preserve storage space on their PCs. They have lots of photos, so they are always seeking better ways to manage them. Sharing their photos is also important, so they strive to simplify the process and reduce the time of e-mailing large numbers of images.
    [Show full text]
  • The Ark Handbook
    The Ark Handbook Matt Johnston Henrique Pinto Ragnar Thomsen The Ark Handbook 2 Contents 1 Introduction 5 2 Using Ark 6 2.1 Opening Archives . .6 2.1.1 Archive Operations . .6 2.1.2 Archive Comments . .6 2.2 Working with Files . .7 2.2.1 Editing Files . .7 2.3 Extracting Files . .7 2.3.1 The Extract dialog . .8 2.4 Creating Archives and Adding Files . .8 2.4.1 Compression . .9 2.4.2 Password Protection . .9 2.4.3 Multi-volume Archive . 10 3 Using Ark in the Filemanager 11 4 Advanced Batch Mode 12 5 Credits and License 13 Abstract Ark is an archive manager by KDE. The Ark Handbook Chapter 1 Introduction Ark is a program for viewing, extracting, creating and modifying archives. Ark can handle vari- ous archive formats such as tar, gzip, bzip2, zip, rar, 7zip, xz, rpm, cab, deb, xar and AppImage (support for certain archive formats depends on the appropriate command-line programs being installed). In order to successfully use Ark, you need KDE Frameworks 5. The library libarchive version 3.1 or above is needed to handle most archive types, including tar, compressed tar, rpm, deb and cab archives. To handle other file formats, you need the appropriate command line programs, such as zipinfo, zip, unzip, rar, unrar, 7z, lsar, unar and lrzip. 5 The Ark Handbook Chapter 2 Using Ark 2.1 Opening Archives To open an archive in Ark, choose Open... (Ctrl+O) from the Archive menu. You can also open archive files by dragging and dropping from Dolphin.
    [Show full text]
  • How to 'Zip and Unzip' Files
    How to 'zip and unzip' files The Windows 10 operating system provides a very easy way to zip-up any file (or folder) you want by using a utility program called 7-zip (Seven Zip). The program is integrated in the context menu which you get when you right-click on anything selected. Here are the basic steps you need to take in order to: Zip a file and create an archive 1. Open a folder in your machine and select any file (by clicking on it once). I selected a single file called 'how-to send an email.docx' 2. Now right click the mouse to have the context menu appear 3. In the context menu you should be able to see some commands like the capture below 4. Since we want to zip up the file you need to select one of the bottom two options a. 'Add to archive' will actually open up a dialog of the 7-zip application and will give you the opportunity to customise the archive. b. 'Add to how-to send an email.zip' is actually the quickest way possible to create an archive. The software uses the name of the file and selects a default compression scheme (.zip) so that you can, with two clicks, create a zip archive containing the original file. 5. Now you can use the 'how-to send an email.zip' file and send it as a 'smaller' email attachment. Now consider that you have just received (via email) the 'how-to send an email.zip' file and you need to get (the correct phrase is extract) the file it contains.
    [Show full text]
  • Rapc) 97 6.1 Compression Scheme
    UCC Library and UCC researchers have made this item openly available. Please let us know how this has helped you. Thanks! Title Content-aware compression for big textual data analysis Author(s) Dong, Dapeng Publication date 2016 Original citation Dong, D. 2016. Content-aware compression for big textual data analysis. PhD Thesis, University College Cork. Type of publication Doctoral thesis Rights © 2016, Dapeng Dong. http://creativecommons.org/licenses/by-nc-nd/3.0/ Embargo information No embargo required Item downloaded http://hdl.handle.net/10468/2697 from Downloaded on 2021-10-11T16:19:07Z Content-aware Compression for Big Textual Data Analysis Dapeng Dong MSC Thesis submitted for the degree of Doctor of Philosophy ¡ NATIONAL UNIVERSITY OF IRELAND, CORK FACULTY OF SCIENCE DEPARTMENT OF COMPUTER SCIENCE May 2016 Head of Department: Prof. Cormac J. Sreenan Supervisors: Dr. John Herbert Prof. Cormac J. Sreenan Contents Contents List of Figures . iv List of Tables . vii Notation . viii Acknowledgements . .x Abstract . xi 1 Introduction 1 1.1 The State of Big Data . .1 1.2 Big Data Development . .2 1.3 Our Approach . .4 1.4 Thesis Structure . .8 1.5 General Convention . .9 1.6 Publications . 10 2 Background Research 11 2.1 Big Data Organization in Hadoop . 11 2.2 Conventional Compression Schemes . 15 2.2.1 Transformation . 15 2.2.2 Modeling . 17 2.2.3 Encoding . 22 2.3 Random Access Compression Scheme . 23 2.3.1 Context-free Compression . 23 2.3.2 Self-synchronizing Codes . 25 2.3.3 Indexing . 26 2.4 Emerging Techniques for Big Data Compression .
    [Show full text]
  • Billboard 1967-11-04
    EijilNOVEMBER 4, 1967 SEVENTY -THIRD YEAR 75 CENTS The International Music -Record Newsweekly Labels Hold Boston Capitol to Back Labels Int'l Pop Fest Koppelman & Rubin Talent) Parties in Of By ELIOT TIEGEL Planned for N.Y. NEW YORK - Capitol Rec- Koppelman, co -owner of the ords will finance and distribute two -year -old independent disk All -Out Artist Hunt a series of pop labels formed producing firm /music publish- By HANK FOX by Charles Koppelman and Don ing combine, said Capitol's in- To Help Charity BOSTON - "Stand up straight -talent scouts Rubin. The affiliation marks vestment in the first of his new are watching you" is the advice circulating the record manufacturer's sec- labels, The Hot Biscuit Disc By CLAUDE HALL through this town and Cambridge. Record com- ond such deal with an out- Co., was over $1 million. Hot moving side interest. The Beach Boys' Biscuit's debut single, sched- NEW YORK -An International Pop Music panies and independent producers are 40 of the world's into the region, furiously signing local talent for Brother Records was launched uled for release in two weeks, Festival, featuring more than top artists and groups, is being planned for late a major onslaught of releases by Boston -based several months ago from the introduces a new New York Coast. (Continued on page 10) June next year in Central Park here. Sid Bern- groups due to hit the market in January. organizing Boston and Cambridge groups are stein, the promoter- manager who is At least six it more than scheduled for release in January, and the Festival, believes will draw already for a three -day event.
    [Show full text]
  • Deduplicating Compressed Contents in Cloud Storage Environment
    Deduplicating Compressed Contents in Cloud Storage Environment Zhichao Yan, Hong Jiang Yujuan Tan* Hao Luo University of Texas Arlington Chongqing University University of Nebraska Lincoln [email protected] [email protected] [email protected] [email protected] Corresponding Author Abstract Data compression and deduplication are two common approaches to increasing storage efficiency in the cloud environment. Both users and cloud service providers have economic incentives to compress their data before storing it in the cloud. However, our analysis indicates that compressed packages of different data and differ- ently compressed packages of the same data are usual- ly fundamentally different from one another even when they share a large amount of redundant data. Existing data deduplication systems cannot detect redundant data among them. We propose the X-Ray Dedup approach to extract from these packages the unique metadata, such as the “checksum” and “file length” information, and use it as the compressed file’s content signature to help detect and remove file level data redundancy. X-Ray Dedup is shown by our evaluations to be capable of breaking in the boundaries of compressed packages and significantly Figure 1: A user scenario on cloud storage environment reducing compressed packages’ size requirements, thus further optimizing storage space in the cloud. will generate different compressed data of the same con- tents that render fingerprint-based redundancy identifi- cation difficult. Third, very similar but different digital 1 Introduction contents (e.g., files or data streams), which would other- wise present excellent deduplication opportunities, will Due to the information explosion [1, 3], data reduc- become fundamentally distinct compressed packages af- tion technologies such as compression and deduplica- ter applying even the same compression algorithm.
    [Show full text]