Writing the Biography of a Notebook

Total Page:16

File Type:pdf, Size:1020Kb

Writing the Biography of a Notebook Writing the Biography of a Notebook Interpreting a richly decorated baroque notebook from the collection of the Rijksmuseum Amsterdam MA thesis Conservation and Restoration of Cultural Heritage: Technical Art History Student: Anneke Hoekstra Student number: 10454780 Thesis supervisor: prof. dr. H.H.M. (Erma) Hermens Second reader: dr. H. (Herman) den Otter Word count: 17992 University of Amsterdam, Amsterdam July 2020 Writing the Biography of a Notebook Abstract Juli 2020, Anneke Hoekstra (10454780) In het interdisciplinaire MA-scriptieonderzoek aan de Universiteit van Amsterdam ‘Writing the Biography of a Notebook: interpreting a richly decorated baroque notebook from the collection of the Rijksmuseum Amsterdam’, fungeert het object BK-17172 als primaire bron. De ‘levensloop’ van het object wordt onderzocht, om te achterhalen hoe, waar en wanneer het is vervaardigd en op welke wijze en door wie het is gebruikt. July 2020, Anneke Hoekstra (10454780) In the interdisciplinary MA thesis project at the University of Amsterdam ‘Writing the Biography of a Notebook: interpreting a richly decorated baroque notebook from the collection of the Rijksmuseum Amsterdam’, the object BK-17172 is the primary source. The object’s ‘life cycle’ is investigated, to determine how, where and when it was manufactured and in what manner and by whom it was used. 2 Hoekstra, UvA, 2020 Writing the Biography of a Notebook Figure 1a, b, c. From left to right: front, inside, and back of the notebook. Anonymous, Notebook of tortoise, with decorations of gold, enamel and gemstones. In the closing a pencil, decorated with an enamelled bust, Rijksmuseum Amsterdam, Amsterdam (BK-17172), ca. 1710-1730, Dresden, Tortoise, gold, enamel and gemstones, h. 10.8cm x w. 6.4cm x d. 1.5cm. Credit: photography by Rijksmuseum Amsterdam. 3 Hoekstra, UvA, 2020 Writing the Biography of a Notebook Table of Contents Abstract .................................................................................................................................................................................. 2 Table of Contents ............................................................................................................................................................... 4 Acknowledgements ........................................................................................................................................................... 6 Glossary .................................................................................................................................................................................. 7 Introduction ......................................................................................................................................................................... 8 Object description ......................................................................................................................................................... 8 Aim and Research question .................................................................................................................................... 10 Structure and Methodology ................................................................................................................................... 10 Relevance for Technical Art History ................................................................................................................... 11 1. Previous research ....................................................................................................................................................... 12 1.1 Provenance, function, date, and attribution ............................................................................................ 12 1.2 Technical examination ...................................................................................................................................... 15 2. The Making: manufacture, materials, and techniques ................................................................................ 17 2.1 Tortoiseshell ......................................................................................................................................................... 18 2.1.1 Tortoiseshell as an artist’s material ................................................................................................... 19 2.1.2 Harvesting, properties, and workability ........................................................................................... 21 2.1.3 Tortoiseshell as bookbinding material .............................................................................................. 21 2.2 Metal ......................................................................................................................................................................... 23 2.2.1 Book fittings .................................................................................................................................................. 23 2.2.2 Stylus ............................................................................................................................................................... 31 2.2.3 Settings ........................................................................................................................................................... 33 2.2.4 Conclusion ..................................................................................................................................................... 34 2.3 Enamel ..................................................................................................................................................................... 36 2.3.1 Technique: basse-taille ............................................................................................................................. 36 2.3.2 Enamel composition .................................................................................................................................. 37 2.3.3 Conclusion ..................................................................................................................................................... 41 2.4 Gemstones .............................................................................................................................................................. 43 2.4.1 Preliminary characterisation................................................................................................................. 44 2.4.2 Enhancements ............................................................................................................................................. 49 2.4.3 Conclusion ..................................................................................................................................................... 50 2.5 Conclusion .............................................................................................................................................................. 52 3. Style and Iconography .............................................................................................................................................. 53 3.1 Book fittings .......................................................................................................................................................... 53 3.2 Iconography .......................................................................................................................................................... 54 3.3 Re-attribution to the workshop of Köhler? .............................................................................................. 56 4 Hoekstra, UvA, 2020 Writing the Biography of a Notebook 3.4 Conclusion .............................................................................................................................................................. 58 4. The content: owner, function, and use .............................................................................................................. 61 4.1 Content .................................................................................................................................................................... 61 4.1.1 Content description ................................................................................................................................... 61 4.1.2 Languages and scripts .............................................................................................................................. 61 4.1.3 Names .............................................................................................................................................................. 62 4.2 The owner .............................................................................................................................................................. 63 4.2.1 Upbringing and education of Anna Petrovna.................................................................................. 63 4.2.2 Anna Petrovna and Karl Friedrich of Holstein-Gottorp.............................................................. 64 4.3 Function and use ................................................................................................................................................. 66 4.3.1 Souvenir d’amitie? Carnet de bal? Album amicorum? ................................................................... 66 4.3.2 When was it used? ....................................................................................................................................
Recommended publications
  • ROADS and BRIDGES: the UNSEEN LABOR BEHIND OUR DIGITAL INFRASTRUCTURE Preface
    Roads and Bridges:The Unseen Labor Behind Our Digital Infrastructure WRITTEN BY Nadia Eghbal 2 Open up your phone. Your social media, your news, your medical records, your bank: they are all using free and public code. Contents 3 Table of Contents 4 Preface 58 Challenges Facing Digital Infrastructure 5 Foreword 59 Open source’s complicated relationship with money 8 Executive Summary 66 Why digital infrastructure support 11 Introduction problems are accelerating 77 The hidden costs of ignoring infrastructure 18 History and Background of Digital Infrastructure 89 Sustaining Digital Infrastructure 19 How software gets built 90 Business models for digital infrastructure 23 How not charging for software transformed society 97 Finding a sponsor or donor for an infrastructure project 29 A brief history of free and public software and the people who made it 106 Why is it so hard to fund these projects? 109 Institutional efforts to support digital infrastructure 37 How The Current System Works 38 What is digital infrastructure, and how 124 Opportunities Ahead does it get built? 125 Developing effective support strategies 46 How are digital infrastructure projects managed and supported? 127 Priming the landscape 136 The crossroads we face 53 Why do people keep contributing to these projects, when they’re not getting paid for it? 139 Appendix 140 Glossary 142 Acknowledgements ROADS AND BRIDGES: THE UNSEEN LABOR BEHIND OUR DIGITAL INFRASTRUCTURE Preface Our modern society—everything from hospitals to stock markets to newspapers to social media—runs on software. But take a closer look, and you’ll find that the tools we use to build software are buckling under demand.
    [Show full text]
  • Hierarchical Categorisation of Web Tags for Delicious
    HIERARCHICAL CATEGORISATION OF WEB TAGS FOR DELICIOUS J. Parra-Arnau, A. Perego, E. Ferrari, J. Forné and D. Rebollo-Monedero1 INTRODUCTION In the scenario of social bookmarking, a user browsing the Web bookmarks web pages and assigns free-text labels (i.e., tags) to them according to their personal preferences. The benefits of social tagging are clear – tags enhance Web content browsing and search. However, since these tags may be publicly available to any Internet user, a privacy attacker may collect this information and extract an accurate snapshot of users’ interests or user profiles, containing sensitive information, such as health-related information, political preferences, salary or religion. In order to hinder attackers in their efforts to profile users, this report focuses on the practical aspects of capturing user interests from their tagging activity. More accurately, we study how to categorise a collection of tags posted by users in one of the most popular bookmarking services, Delicious (http://delicious.com). METHODOLOGY As frequently done in collaborative tagging sites, the profile of a user is modelled as a tag cloud, that is, a visual representation where tags are weighted according to their frequency of use. Note that tag clouds are in essence equivalent to normalized histograms of tags. Nevertheless, the representation of a user profile as a cloud, or equivalently as a normalized histogram, of all the tags submitted by users is clearly an inappropriate approach; not only because of the intractability of the profile, but also because it makes it difficult to have a quick overview of the user interests. For example, for users posting the tags “welfare”, “Dubya” and “Katrina” it would be preferable to have a higher level of abstraction that enables us to conclude, directly from the inspection of the user profile, that these users are interested in politics.
    [Show full text]
  • A Survey on Content Management System, Software's and Tools
    ISSN (Online) 2393-8021 IARJSET ISSN (Print) 2394-1588 International Advanced Research Journal in Science, Engineering and Technology ISO 3297:2007 Certified Vol. 4, Issue 11, November 2017 A Survey on Content Management System, Software's and Tools Madhura K Assistant Professor, Computer Science Department, Presidency University, Bangalore1 Abstract: This paper contains a survey of content management system, content management process, architecture and working. Also contains different types of tools and software. Content Management (CM) is the process for collection, delivery, retrieval, governance and overall management of information in any format. The term is typically used in reference to administration of the digital content lifecycle, from creation to permanent storage or deletion. The content involved may be images, video, audio and multimedia as well as text. A Content Management System (CMS) is a computer application that supports the creation and modification of digital content. It is typically used to support multiple users working in a collaborative environment. A Content Management System (CMS) is a tool for creating and managing digital content such as documents, text, web pages, videos and images.A content management system (CMS) is a software application or set of related programs that are used to create and manage digital content. CMSes are typically used for Enterprise Content Management (ECM) and Web Content Management (WCM). An ECM facilitates collaboration in the workplace by integrating document management, digital asset management and records retention functionalities, and providing end users with role-based access to the organization's digital assets. A WCM facilitates collaborative authoring for websites. ECM software often includes a WCM publishing functionality, but ECM webpages typically remain behind the organization's firewall.
    [Show full text]
  • Dubina Lukáš
    Tvorba webových aplikací s využitím Open source CMS Creating web applications using Open source CMS Bakalářská práce Lukáš Dubina Vedoucí „závěrečné“ práce: PaedDr. Petr Pexa Jihočeská univerzita v Českých Budějovicích Pedagogická fakulta Katedra Informatiky 2010 Prohlášení Prohlašuji, ţe svoji bakalářskou práci jsem vypracoval samostatně pouze s pouţitím pramenů a literatury uvedených v seznamu citované literatury. Prohlašuji, ţe v souladu s § 47b zákona č. 111/1998 Sb. v platném znění souhlasím se zveřejněním své bakalářské práce, a to v nezkrácené podobě elektronickou cestou ve veřejně přístupné části databáze STAG provozované Jihočeskou univerzitou v Českých Budějovicích na jejích internetových stránkách. V Českých Budějovicích dne 24. 4. 2010 Anotace Cílem této práce je popsat problematiku tvorby webových stránek s vyuţitím CMS (content management system, redakční systém, systém pro správu obsahu), vytvořit průvodce redakčními systémy a provést jejich srovnání. V úvodní části práce autor popisuje, jak vznikaly redakční systémy a začínajícím uţivatelům upřesňuje jejich funkce, instalaci a moţnosti jejich rozšíření pomocí komponent a modulů. V praktické části autor prezentuje své projekty přímo na internetu, hodnotí a testuje dle kritérií a vyzdvihuje výhody či nevýhody srovnávaných systémů. V závěru je uvedeno doporučení, který redakční systém si vybrat pro určitý typ projektu. Abstract The aim of this work is to describe the problems of creating web pages by using a CMS (content management system, editorial system, system for repair content), create a guide to kontent management system and make their comparison. In the introductory part of the work the author describes, how content management systems started up and for novice users specifies the functions, installation and upgrade with the possibility of thein components and modules.
    [Show full text]
  • Customized Book List Computer
    ABC springer.de Springer Customized Book List Computer FRANKFURT BUCHMESSE 2007 springer.com/booksellers Computer 1 N. Abdennahder, University of Applied Sciences, Solothurn, J. Abonyi, Pannon University, Hungary; B. Feil, Pannon University, P. Abrahamsson, VTT Technical Research Center, Finland; N. Bad- Switzerland; F. Kordon, Université Pierre & Marie Curie, Paris, Hungary doo, University of Hertfordshire, UK; T. Margaria, University of France (Eds.) Postdam, Germany; R. Messnarz, ISCN, Austria (Eds.) Cluster Analysis for Data Mining Reliable Software Technologies - and System Identification Software Process Improvement Ada-Europe 2007 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007, Proceedings 12th Ada-Europe Intenational Conference on Reliable Soft- ware Technologies, Geneva, Switzerland, June 25-29, 2007, This book presents new approaches to data mining Proceedings and system identification. Algorithmsthat can be used for the clustering of data have been overviewed. This book constitutes the refereed proceeding of the New techniques andtools are presented for the clus- 14th European Software Process Improvement Con- This book constitutes the refereed proceedings of the tering, classification, regression and visualization of- ference, EuroSPI 2007, held in Potsdam, Germany, in 12th International Conference on Reliable Software complex datasets. Special attention is given to the September 2007. The 18 revised full papers present- Technologies, Ada-Europe 2007, held in Geneva, analysis of historical process data,tailored algorithms ed together with an introductory paper were careful- Switzerland, in June 2007. The 18 revised full papers are presented for the data driven modeling of dy- ly reviewed and selected from 60 submissions. The presented were carefully reviewed and selected from namical systems,determining the model order of papers are organized in topical sections on enforce- numerous submissions.
    [Show full text]
  • Hierarchical Categorisation of Tags for Delicious
    HIERARCHICAL CATEGORISATION OF TAGS FOR DELICIOUS J. Parra-Arnau, A. Perego, E. Ferrari, J. Forné and D. Rebollo-Monedero1 July 2012 INTRODUCTION In the scenario of social bookmarking, a user browsing the Web bookmarks web pages and assigns free-text labels (i.e., tags) to them according to their personal preferences. The benefits of social tagging are clear – tags enhance Web content browsing and search. However, since these tags may be publicly available to any Internet user, a privacy attacker may crawl through this information and extract an accurate snapshot of users’ interests or user profiles, containing sensitive information, such as health-related information, political preferences, salary or religion. In this technical report, we approach one of the practical aspects when it comes to represent users' interests from their tagging activity, namely the categorization of tags into high-level categories of interest. The reason is that the representation of user profiles on the basis of the myriad of tags available on the Web is certainly unfeasible from various practical perspectives; mainly concerning the unavailability of data to reliably, accurately measure interests across such fine-grained categorisation, and, should the data be available, its overwhelming computational intractability. Motivated by this, our study presents the results of a categorization process whereby a collection of tags posted at Delicious (http://delicious.com) are classified into 200 subcategories of interest. The methodology used to conduct such categorisation is in line with other works in the field [1] [2]. J. Parra Arnau, J. Forné and D. Rebollo-Monedero are with the Department of Telematics Engineering, Universitat Politècnica de Catalunya, C.\ Jordi Girona 1-3, E-08034 Barcelona, Catalonia.
    [Show full text]
  • Lenguajes De Marcado Ligero Developements in the Preparation of Technical Documentation: Lightweight Markup Languages
    Desarrollos en elaboración de documentación técnica: lenguajes de marcado ligero Developements in the preparation of technical documentation: Lightweight markup languages Jesús Tramullas https://orcid.org/0000-0002-5374-9993 Universidad de Zaragoza Departamento de Ciencias de la Documentación C/ Pedro Cerbuna, 12. 50009 Zaragoza, España http://tramullas.com [email protected] Tramullas, Jesús (2019). “Desarrollos en elaboración de documentación técnica: los lenguajes de marcado ligero”. Anuario ThinkEPI, v. 13, e13f03. https://doi.org/10.3145/thinkepi.2019.e13f03 Publicado en IweTel el 18 de febrero de 2019 Resumen: Los lenguajes de marcado ligero se han consolidado como la lingua fran- ca para la elaboración de documentación técnica en los entornos digitales. Se revi- san sus fundamentos e historia, así como los principales lenguajes y los programas utilizados para la generación de documentos. Palabras clave: Lenguajes de marcado ligero; MarkDown; ReStructuredText; Do- cumentación técnica. Abstract: Lightweight markup languages have been consolidated as the lingua franca for the preparation of technical documents. Their foundations and history are revised, as well as the main languages and documentation generators. Keywords: Lightweight markup language; MarkDown; ReStructuredText; Techni- cal documentation. 1. Introducción Las últimas versiones de WordPress han popularizado entre los editores de contenidos el uso de un lenguaje de marcado conocido como Markdown, al que se identifica como un “lenguaje de marcado ligero” (lightweight markup language). Y no es la única plataforma de este tipo que puede hacer uso de Markdown. Dado el volumen de sedes web que se desarrollan sobre este sistema de gestión de con- tenidos, tarde o temprano puede extenderse su utilización en la edición y publicación de contenidos en otras plataformas.
    [Show full text]
  • FUSE: Finding File Upload Bugs Via Penetration Testing
    FUSE: Finding File Upload Bugs via Penetration Testing Taekjin Lee∗yz, Seongil Wi∗y, Suyoung Leey, Sooel Sony ySchool of Computing, KAIST zThe Affiliated Institute of ETRI Abstract—An Unrestricted File Upload (UFU) vulnerability is an uploaded PHP file that allows unrestricted access to internal a critical security threat that enables an adversary to upload server resources. her choice of a forged file to a target web server. This bug evolves into an Unrestricted Executable File Upload (UEFU) Unrestricted File Upload (UFU) [18] is a vulnerability vulnerability when the adversary is able to conduct remote code that exploits bugs in content-filtering checks in a server-side execution of the uploaded file via triggering its URL. We design web application. An adversary, called an upload attacker, and implement FUSE, a penetration testing tool designed to leverages her limited privilege to upload a malformed file by discover UFU and UEFU vulnerabilities in server-side PHP web exploiting a UFU vulnerability. The successful uploading of applications. The goal of FUSE is to generate upload requests; a forged file poses a potential code execution risk [18]. A each request becomes an exploit payload that triggers a UFU or system administrator may accidentally run this forged but still UEFU vulnerability. However, this approach entails two technical challenges: (1) it should generate an upload request that bypasses executable file while vetting the new file, or a bug in an existing all content-filtering checks present in a target web application; software can facilitate the execution of the uploaded file. and (2) it should preserve the execution semantic of the resulting This UFU vulnerability becomes even more critical when uploaded file.
    [Show full text]
  • Byers, Dorf, and Nelson Technology Ventures: from Idea to Enterprise Mcgraw-Hill Higher Education
    End-of-Chapter Answer Keys (Selected Exercises in Red) Byers, Dorf, and Nelson Technology Ventures: From Idea to Enterprise McGraw-Hill Higher Education 1.8 Exercises 1.1 What is the difference between an idea and an opportunity? Why is this difference important to entrepreneurs? The primary purpose of this question is to ensure the student understands the distinction between having an idea for a company and the process of assessing if the idea is a viable oppportunity. Many of the chapters and frameworks in this book address a number of the key questions an entrepreneur must answer about their idea to determine if it is worth pursuing and investing time and money to make happen. An opportunity can be considered a fully vetted idea where the customer need is clear, the market potential is assessed, the competitive landscape is understood, the market context is addressed, and the next steps that must be taken to start the new venture are clear. The business plan and business presentations are common methods of communicating and refining an idea to a specific, targetable opportunity. Figure 1.1 provides some of the key characteristics of an attractive opportunity. 1.2 Consider opportunities that have occurred to you over the past month and list them in a column. Then, describe your strong interests and passions, and list them in a second column. Finally, create a list of your capabilities in a third column. Is there a natural match of opportunity, interests, and capabilities? If so, does this opportunity appear to offer a good chance to build an enterprise? What would you need to do to make this opportunity an attractive chance to build an enterprise business? 1.3 Name an entrepreneur that you personally admire.
    [Show full text]
  • 14 Free CMS Options for Web
    14 free CMS options for Web Design Professionals Reviewed http://blog.webdistortion.com/2008/05/17/13-free-cms-options-for-we... web design services blog forum contact Home > Reviews > 14 free CMS options for Web Design Professionals Reviewed May 17th 14 free CMS options for Web Design Professionals Reviewed posted in: Reviews , Web Design At the center of most (if not all) web development projects is the old chestnut we call content management systems. Choosing a CMS for your website, or indeed for your enterprise is no easy task - in Europe alone, you have around 500 systems to choose from. Whether that system is something complex or something simple (i.e. hand editing), it is an essential part of a successful site. Enabling content editors to perform website updates (however inexperienced) with the web has always been something of a challenge for developers, thankfully there are a number of platforms and open source projects out there which take the hassle out of developing your own system, and can put you in the running for projects normally outside of your scope. The following hopefully provides a comprehensive overview of some of the best out there, and we’ve tried to be as comprehensive in our review of each. Impress CMS Technology : PHP RDMS: a MySQL (others are planned) Setup time: 10 minutes Supported OS: Unix / Windows, MacOS Features: Flexible group-based permission system Fully module-based Built-in cache system URL : http://www.impresscms.org FEATURE URL: http://www.impresscms.org/modules/mastop_publish/?tac=Roadmap I’ve recently come across an impressive contender that I’ve had to add to the list.
    [Show full text]
  • List of Open Source PHP Mysql Based Blogging Softwares
    The Customize Windows Technology Blog https://thecustomizewindows.com List of Open Source PHP MySQL Based Blogging Softwares Author : abhishek List of Open Source PHP MySQL Based Blogging Softwares lists the most commonly used and available softwares those can run on any LAMP server easily. This List of Open Source PHP MySQL Based Blogging Softwares covers the possible Server Softwares to promote Open Source softwares. List of Open Source PHP MySQL Based Blogging Softwares Our intention is to create a List of Open Source PHP MySQL Based Blogging Softwares, from simple blogs to complex blogging Softwares has been listed here. However, we might have missed any good software to list in this Tera sized in this List of Open Source PHP MySQL Based Blogging Softwares. If you know more, kindly add via comments. Basically you will need a LAMP server to run these List of Open Source PHP MySQL Based Blogging Softwares, however, some might be able to run on Windows Server. Apache Web Server is expected, individual tweaks might be needed to run on nginx. Installation for most is easy like WordPress. List of List of Open Source PHP MySQL Based Blogging Softwares Blogging Softwares 1 / 3 The Customize Windows Technology Blog https://thecustomizewindows.com 1. WordPress : Millions of publishers are using, most used self-hosted software. 2. b2evolution : Officially they says that, it is comparable to own hosted Movable Type blogging platform. 3. LifeType : Lifetype is an open-source blogging platform with support for multiple blogs and users in a single installation. 4. DotClear : Dotclear is an open-source web publishing software created in 2002 by Olivier Meunier.
    [Show full text]
  • Eugene Alvin Villar 22 January 2009
    Textpattern A N I N T R O D U C T I O N Eugene Alvin Villar 22 January 2009 Textpattern flexible elegant easy-to-use content management system free open-source web magazines portfolbio lsoitegs s newslebtrteocrs hures UUXX MMaaggaazziinnee TThhee UUsseerr EExxppeerriieennccee MMaaggaazziinnee uxmag.com/ BBllooggeennyyoo blogenyo.codedgraphic.com/ C R E A T O R Dean Allen textism.com/ typographer book designer Textism blogger founder of TextDrive hosting provider of A List Apart H I S T O R Y ALPHA 2001 GAMMA 1.1x 2004 RELEASE CANDIDATES 2005 FINAL 4.0 2005 CURRENT 4.0.7 2008 NEXT 4.0.8 2009 FUTURE 4.1.x 20xx * Dean Allen left the core development team soon after 4.0; development is maintained by the community cult following among web designers 2001 MovableType 2004 Textpattern 2008 WordPress W E L L - K N O W N U S E R Jon Hicks graphic designer web designer icon and logo designer created the logos for Mozilla Firefox and Mozilla Thunderbird hihicckksdsdeessiiggnn hicksdesign.co.uk/ When I first discovered Textpattern in 2004, I was looking for a flexible CMS that could not only power my blog but also power my whole site, especially the portfolio. I keep trying other alternatives, “but always come back to Textpattern. To my mind, no other system can compete with its flexibility and the strength of its community. ―Jon Hi”cks P L A T F O R M LAMP Linux OS Apache Web Server MySQL RDBMS PHP language L I C E N S E GNU GPL GNU General Public License 4.0.x BSD Berkeley Software Distribution License 4.1.x F E A T U R E S Textile textile.thresholdstate.com/ *OMG!* <strong>OMG!</strong> _really_ <em>really</em> "Google":http://google.com <a href="http://google.
    [Show full text]