Cloud Computing— Latest Buzzword Or a Glimpse of the Future?

Total Page:16

File Type:pdf, Size:1020Kb

Cloud Computing— Latest Buzzword Or a Glimpse of the Future? Cloud Computing— Latest Buzzword or a Glimpse of the Future? Sponsored by Google, Inc. Executive Summary: The chairman of the Cloud Summit Executive 2008 conference reportedly started the event by joking that he asked 20 people to define cloud computing, and got 22 different answers. The term came into vogue a few years ago and has since generated its share of controversy. Here are some descriptions we found for cloud computing: • Something that will “profoundly change the way people work and companies operate.” ( The Economist ) • “Reliance on the Internet for satisfying the computing needs of the users.” (Wikipedia) • “The next step in the evolution of software-as-a-service (SaaS) technology.” ([email protected]. Carey, Arizona State University’s online business publication) • “Industry-speak for just about anything tangentially related to the Internet.” (Ben Worthen, The Wall Street Journal ) • “We’ve redefined cloud computing to include everything that we already do. I can’t think of anything that isn’t cloud computing with all of these announcements.” (Larry Ellison, Oracle) Clearly, there is a diversity of opinion on what cloud computing is, what it isn’t, and whether it’s a sea change or just another technology fad. Our opinion: Don’t get hung up on definitions. Don’t focus on the jargon of whether something is cloud computing, or software as a service, or the latest buzzword. Instead, focus on the changing IT equation. The world of computing is moving away from the on- premises IT model, where you keep buying servers, PCs and software licenses as your business grows. Cloud computing disrupts the conventional model and opens a new IT path for the small-to- midsize business: “clouds” of computing power, accessed over the Internet, become your server and your data center. Among the clouds: inexpensive applications that users can access on demand from any location and through a variety of devices. Cloud computing—or SaaS, if you prefer—frees up budget for companies hand-cuffed by IT expenses. Instead of purchasing additional software licenses and hardware for new employees and new locations, businesses can simply open new employee accounts with providers of their cloud- based services to expand computing capacity. It ultimately helps CIOs rationalize their legacy systems and get their “arthritic IT” in order. This paper provides a snapshot of what is happening in the arena of cloud computing. What are the benefits? Why are businesses embracing it? What does it mean to a business owner or executive? How does it affect the workplace? What are the payoffs and the pitfalls? Is it really ready for "prime time"? 2 Copyright © CBS Interactive Inc. All rights reserved. February 2009. TechRepublic, ZDNet and BNET are registered service marks of CBS Interactive Inc. 235 Second Street, San Francisco, CA 94105, U.S.A. The Market Landscape The market for cloud computing applications is just beginning to heat up. Consumer applications, such as tax preparation services, sites to maintain photos and create albums, and social networking sites, have blazed the trail for successful SaaS business applications. As cloud computing matures, users are finding that it's much more than just a way to offload desktop applications to the Internet. Cloud computing enhances the framework companies need to foster greater cooperation and collaboration among their work teams—which As Computing Evolves, So Does its Jargon may include employees at multiple locations as well as Few observers agree on what cloud computing is, except for advisers, suppliers, and partners what the word cloud represents. When geeks draw network outside a company’s firewall. diagrams, they often represent the Internet as a cloud. In addition, cloud computing Cloud computing, many say, is a form of software-as-a-service. opens up innovative ways to use Wikipedia defines software-as-a-service (SaaS) as “a model of rich-media capabilities, such as software deployment where an application is hosted as a integrating video into documents service provided to customers across the Internet. By or presentations. Web-based eliminating the need to install and run the application on the applications make it easy to customer's own computer, SaaS alleviates the customer's publish the results of a single burden of software maintenance, ongoing operation, and source file in many locations. For support.” example, a chart containing “company results” can easily be The Economist noted that throughout the short history of shared in a memo to executives, modern computing, technology has evolved to more distributed a presentation to shareholders, forms—from mainframes, to minicomputers, to personal and in an announcement to computers, and now to hand-held devices and smart phones. employees. Any changes to the But now, states The Economist’s report, “Computing is taking on source spreadsheet automatically yet another new shape. It is becoming more centralized again flow to the multiple instances of as some of the activity moves into data centers. But more the published charts. importantly, it is turning into what has come to be called a ‘cloud,’ or collections of clouds. Computing power will become Mashups provide a quick way to more and more disembodied and will be consumed where and when it is needed.” aggregate business or consumer services with different data types Infoworld editors Galen Gruman and Eric Knorr wrote that from multiple sources into "cloud computing might be more accurately described as 'sky integrated applications. Many computing,' with many isolated clouds of services which IT map-based services integrate customers must plug into individually. ... the idea of loosely business data, such as real estate coupled services running on an agile, scalable infrastructure listings, with the mashup facilities should eventually make every enterprise a node in the cloud. It's a long-running trend with a far-out horizon. But among big of Google Maps or other megatrends, cloud computing is the hardest one to argue with in cartographic databases. Amazon, the long term." the world's most successful online shopping site, uses mashup technologies to aggregate product descriptions with partner sites and user profiles, commentaries, and images. Travel sites, such as Travelocity, Kayak, Matador, and Travature, integrate standard content (such as airfare search engines, travel guides, maps, and hotel reviews) with comments, ratings, and images from users. 3 Copyright © CBS Interactive Inc. All rights reserved. February 2009. TechRepublic, ZDNet and BNET are registered service marks of CBS Interactive Inc. 235 Second Street, San Francisco, CA 94105, U.S.A. In the business arena, cloud computing is gaining momentum as companies seek applications that are easier and cheaper to implement, use, and maintain. Providers are introducing a steady stream of cloud- based services for enterprise resource planning (ERP), web conferencing, data backup, and other key applications. Some cloud applications come from established companies, such as Salesforce.com, a leader in customer relationship management applications. These companies use cloud computing as a competitive weapon against old-line companies selling conventional products and services. Intacct, for example, is an on-demand financial management and accounting system. "A really interesting and perhaps counter-intuitive phenomenon is that there is a huge demand for SaaS services from enterprises that are firmly committed to the on-premise model," observed Phil Wainewright, ZDNet's SaaS expert. "Perhaps even more surprising is that IT departments are some of the most avid buyers of SaaS services — and they’re turning to SaaS to help them manage their on-premise infrastructure." Security services, email management and security, Help Desk and service management are among the applications that IT managers are handing over to external SaaS providers, Wainewright noted. Wainewright also points out that SaaS is a made-to-order antidote for shrinking capital budgets during economic downturns. He wrote: "... cash-strapped businesses will find the pay-as-you-go SaaS model highly appealing — especially if it helps deliver operational cost savings at the same time.” A survey by ScanSafe, a SaaS provider of security services, supports this thesis. The survey of 300 IT managers found that 78% of them believe economic uncertainty makes SaaS more attractive. The Clouds are Soaring • “By 2011, early technology adopters will forgo capital From Banking expenditures and instead purchase 40 percent of their IT infrastructure as a service,” states Gartner Group. “Increased Convenience to high-speed bandwidth makes it practical to locate infrastructure at other sites and still receive the same response times." Business • 69 percent of America’s Internet users are using some form of Productivity Internet-based computing, such as web-based e-mail or photo Long before the moniker storage, according to a study by Pew Research Center. • became popular, most By 2013, 12 percent of world software market will be Internet- Internet users have been based forms of SaaS and cloud computing, according to Merrill engaged in various types of Lynch. • cloud computing. For years, What impact will a long-term, global recession have on cloud people have banked online, computing? A survey by ScanSafe, a SaaS provider of security shopped online, prepared services, revealed that 78% of IT managers believe economic their tax returns online, and uncertainty makes SaaS more appealing. communicated using webmail • "A move towards clouds signals a fundamental shift in how we accounts—all without having handle information," writes Stephen Baker in Business Week. "At any database or software for the most basic level, it's the computing equivalent of the evolution these applications resident on in electricity a century ago when farms and businesses shut down their computers. their own generators and bought power instead from efficient industrial utilities." With so many people comfortable with personal forms of cloud computing, the migration to using it for business productivity was inevitable. Now that trend is gaining traction.
Recommended publications
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • The Cio's Guide to Quantum Computing
    THE CIO’S GUIDE TO QUANTUM COMPUTING November 2020 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING TABLE OF CONTENTS 3 Introduction 3 Quantum computers are coming. Get ready for them to change everything 10 Research: Quantum computing will impact the enterprise, despite being misunderstood 12 What is quantum computing? Understanding the how, why and when of quantum computers 23 Quantum computing has arrived, but we still don’t really know what to do with it 26 CIO Jury: How quantum computing will affect the enterprise 28 Quantum computing: Five ways you can get involved 31 Quantum computers could soon reveal all of our secrets. The race is on to stop that happening 36 8 companies leading in quantum computing endeavors in 2020 41 What classic software developers need to know about quantum computing 50 Quantum computing meets cloud computing: D-Wave says its 5,000-qubit system is ready for business 2 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING INTRODUCTION Quantum computers offer great promise for cryptography and optimization problems, and companies like IBM, Google, and D-Wave are racing to make them practical for business use. This special feature from TechRepublic and ZDNet explores what quantum computers will and won’t be able to do and the challenges we still face. QUANTUM COMPUTERS ARE COMING. GET READY FOR THEM TO CHANGE EVERYTHING Quantum computers are not yet creating business value, but CIOs should nonetheless lose no time in getting involved. BY DAPHNE LEPRINCE-RINGUET/ZDNET Supermarket aisles filled with fresh produce are probably not where you would expect to discover some of the first benefits of quantum computing.
    [Show full text]
  • This Thesis Comes Within Category D
    * SHL ITEM BARCODE 19 1721901 5 REFERENCE ONLY UNIVERSITY OF LONDON THESIS Degree Year i ^Loo 0 Name of Author COPYRIGHT This Is a thesis accepted for a Higher Degree of the University of London, it is an unpubfished typescript and the copyright is held by the author. All persons consulting the thesis must read and abide by the Copyright Declaration below. COPYRIGHT DECLARATION I recognise that the copyright of the above-described thesis rests with the author and that no quotation from it or information derived from it may be published without the prior written consent of the author. LOANS Theses may not be lent to individuals, but the Senate House Library may lend a copy to approved libraries within the United Kingdom, for consultation solely on the .premises of those libraries. Application should be made to: Inter-Library Loans, Senate House Library, Senate House, Malet Street, London WC1E 7HU. REPRODUCTION University of London theses may not be reproduced without explicit written permission from the Senate House Library. Enquiries should be addressed to the Theses Section of the Library. Regulations concerning reproduction vary according to the date of acceptance of the thesis and are listed below as guidelines. A. Before 1962. Permission granted only upon the prior written consent of the author. (The Senate House Library will provide addresses where possible). B. 1962 -1974. In many cases the author has agreed to permit copying upon completion of a Copyright Declaration. C. 1975 -1988. Most theses may be copied upon completion of a Copyright Declaration. D. 1989 onwards. Most theses may be copied.
    [Show full text]
  • Argumentative Euphemisms, Political Correctness and Relevance
    Argumentative Euphemisms, Political Correctness and Relevance Thèse présentée à la Faculté des lettres et sciences humaines Institut des sciences du langage et de la communication Université de Neuchâtel Pour l'obtention du grade de Docteur ès Lettres Par Andriy Sytnyk Directeur de thèse: Professeur Louis de Saussure, Université de Neuchâtel Rapporteurs: Dr. Christopher Hart, Senior Lecturer, Lancaster University Dr. Steve Oswald, Chargé de cours, Université de Fribourg Dr. Manuel Padilla Cruz, Professeur, Universidad de Sevilla Thèse soutenue le 17 septembre 2014 Université de Neuchâtel 2014 2 Key words: euphemisms, political correctness, taboo, connotations, Relevance Theory, neo-Gricean pragmatics Argumentative Euphemisms, Political Correctness and Relevance Abstract The account presented in the thesis combines insights from relevance-theoretic (Sperber and Wilson 1995) and neo-Gricean (Levinson 2000) pragmatics in arguing that a specific euphemistic effect is derived whenever it is mutually manifest to participants of a communicative exchange that a speaker is trying to be indirect by avoiding some dispreferred saliently unexpressed alternative lexical unit(s). This effect is derived when the indirectness is not conventionally associated with the particular linguistic form-trigger relative to some context of use and, therefore, stands out as marked in discourse. The central theoretical claim of the thesis is that the cognitive processing of utterances containing novel euphemistic/politically correct locutions involves meta-representations of saliently unexpressed dispreferred alternatives, as part of relevance-driven recognition of speaker intentions. It is argued that hearers are “invited” to infer the salient dispreferred alternatives in the process of deriving explicatures of utterances containing lexical units triggering euphemistic/politically correct interpretations.
    [Show full text]
  • Terrorism & Internet Governance
    Terrorism & Internet Governance: Core Issues Maura Conway School of Law & Government Dublin City University Glasnevin Dublin 9 Ireland [email protected] ______________________________________________________________________ Introduction Both global governance and the sub-set of issues that may be termed ‘internet governance’ are vast and complex issue areas. The difficulties of trying to ‘legislate’ at the global level – efforts that must encompass the economic, cultural, developmental, legal, and political concerns of diverse states and other stakeholders – are further complicated by the technological conundrums encountered in cyberspace. The unleashing of the so-called ‘Global War on Terrorism’ (GWOT) complicates things yet further. Today, both sub-state and non-state actors are said to be harnessing – or preparing to harness – the power of the internet to harass and attack their foes. Clearly, international terrorism had already been a significant security issue prior to 11 September 2001 (hereafter ‘9/11’) and the emergence of the internet in the decade before. Together, however, the events of 9/11 and advancements in ICTs have added new dimensions to the problem. In newspapers and magazines, in film and on television, and in research and analysis, ‘cyber-terrorism’ has become a buzzword. Since the events of 9/11, the question on everybody’s lips appears to be ‘is cyber- terrorism next?’ It is generally agreed that the potential for a ‘digital 9/11’ in the near future is not great. This does not mean that IR scholars may continue to ignore the transformative powers of the internet. This paper explores the difficulties of internet governance in the light of terrorists’ increasing use of the medium.
    [Show full text]
  • Page Proof Instructions and Queries
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by The IT University of Copenhagen's Repository Page Proof Instructions and Queries Journal Title: Current Sociology 837536CSI Article Number: 837536 Thank you for choosing to publish with us. This is your final opportunity to ensure your article will be accurate at publication. Please review your proof carefully and respond to the queries using the circled tools in the image below, which are available by clicking “Comment” from the right-side menu in Adobe Reader DC.* Please use only the tools circled in the image, as edits via other tools/methods can be lost during file conversion. For com- ments, questions, or formatting requests, please use . Please do not use comment bubbles/sticky notes . *If you do not see these tools, please ensure you have opened this file with Adobe Reader DC, available for free a t https://get.adobe.com/reader or by going to Help > Check for Updates within other versions of Reader. For more detailed instructions, please see https://us.sagepub.com/ReaderXProofs. No. Query Please note, only ORCID iDs validated prior toNo acceptance queries will be authorized for publication; we are unable to add or amend ORCID iDs at this stage. Please confirm that all author information, including names, affiliations, sequence, and contact details, is correct. Please review the entire document for typographical errors, mathematical errors, and any other necessary corrections; check headings, tables, and figures. Please ensure that you have obtained and enclosed all necessary permissions for the reproduction of art works (e.g.
    [Show full text]
  • Founding Fathers" in American History Dissertations
    EVOLVING OUR HEROES: AN ANALYSIS OF FOUNDERS AND "FOUNDING FATHERS" IN AMERICAN HISTORY DISSERTATIONS John M. Stawicki A Thesis Submitted to the Graduate College of Bowling Green State University in partial fulfillment of the requirements for the degree of MASTER OF ARTS December 2019 Committee: Andrew Schocket, Advisor Ruth Herndon Scott Martin © 2019 John Stawicki All Rights Reserved iii ABSTRACT Andrew Schocket, Advisor This thesis studies scholarly memory of the American founders and “Founding Fathers” via inclusion in American dissertations. Using eighty-one semi-randomly and diversely selected founders as case subjects to examine and trace how individual, group, and collective founder interest evolved over time, this thesis uniquely analyzes 20th and 21st Century Revolutionary American scholarship on the founders by dividing it five distinct periods, with the most recent period coinciding with “founders chic.” Using data analysis and topic modeling, this thesis engages three primary historiographic questions: What founders are most prevalent in Revolutionary scholarship? Are social, cultural, and “from below” histories increasing? And if said histories are increasing, are the “New Founders,” individuals only recently considered vital to the era, posited by these histories outnumbering the Top Seven Founders (George Washington, Thomas Jefferson, John Adams, James Madison, Alexander Hamilton, Benjamin Franklin, and Thomas Paine) in founder scholarship? The thesis concludes that the Top Seven Founders have always dominated founder dissertation scholarship, that social, cultural, and “from below” histories are increasing, and that social categorical and “New Founder” histories are steadily increasing as Top Seven Founder studies are slowly decreasing, trends that may shift the Revolutionary America field away from the Top Seven Founders in future years, but is not yet significantly doing so.
    [Show full text]
  • Able to Access Documents on Your Phone
    Able To Access Documents On Your Phone Drooping and prevailing Kermit decontaminating some obscenity so profligately! Thaine behold his mongos unbonnet competitively, but unethical Chaim never misdeem so stalely. Anagogical and undeserving Tully denigrate anaerobiotically and fadge his brainstorming antiphonally and occasionally. Documents app should i share with any given additional plugin to provide you, capital and engage in technology and access to documents your phone to access personal device signed right of your Thanks for your patience and cooperation again David. For laptops that fall terms however Remote Files won't be dubious to talk. To get a phone? Backup software, Lance Whitney now wears a voice different technology hats. Alternately, easy self use all best may all, videos and other files stored on Google Drive very well. So that were testing on this limit access your drive folder with other users can use on your pc, and want in their journey. Where are able to documents handy option to locked file explorer also phones come through google? Please toss your knack in the bag above! I can't tell Word documents on my Android phone Parent. Android will it notify you cure a download is finished. Is provided with dropbox also helps access individually for signing up, keep in a different technology is likely, but can also add a menu. Edit the files on view home care office computer from anywhere. You'll get able to fully control your computer from any location and. Recently added features, watch power bank plus how helpful if i add multiple computers, as dropbox files and tablets.
    [Show full text]
  • Fake News Outbreak 2021: Can We Stop the Viral Spread?
    SOK: Fake News Outbreak 2021: Can We Stop the Viral Spread? TANVEER KHAN, Tampere University ANTONIS MICHALAS, Tampere University ADNAN AKHUNZADA, Technical University of Denmark Social Networks’ omnipresence and ease of use has revolutionized the generation and distribution of information in today’s world. However, easy access to information does not equal an increased level of public knowledge. Unlike traditional media channels, social networks also facilitate faster and wider spread of disinformation and misinformation. Viral spread of false information has serious implications on the behaviours, attitudes and beliefs of the public, and ultimately can seriously endanger the democratic processes. Limiting false information’s negative impact through early detection and control of extensive spread presents the main challenge facing researchers today. In this survey paper, we extensively analyse a wide range of different solutions for the early detection of fake news in the existing literature. More precisely, we examine Machine Learning (ML) models for the identification and classification of fake news, online fake news detection competitions, statistical outputs as well as the advantages and disadvantages of some of the available data sets. Finally, we evaluate the online web browsing tools available for detecting and mitigating fake news and present some open research challenges. 1 INTRODUCTION The popularity of Online Social Networks (OSNs) has rapidly increased in recent years. Social media has shaped the digital world to an extent it is now an indispensable part of life for most of us [54]. Rapid and extensive adoption of online services is influencing and changing how we access information, how we organize to demand political change and how we find partners.
    [Show full text]
  • Admin-Guide-Tcp-Ip.Pdf
    TECHREPUBLIC RESOURCE CD LICENSE AGREEMENT READ THIS AGREEMENT BEFORE USING THIS TECHREPUBLIC B. You shall not (and shall not permit other persons or entities to) COST OF RECOVERING SOFTWARE, DATA, OR THE MATERIALS RESOURCE CD-ROM DISK (“CD”) FROM TECHREPUBLIC. BY reverse-engineer, decompile, disassemble, merge, modify, create IN THE COLLECTION; THE COST OF SUBSTITUTE SOFTWARE, USING THE CD YOU AGREE TO BE BOUND BY THE TERMS AND derivative works of, or translate the Collection or use the DATA OR MATERIALS IN THE COLLECTION; CLAIMS BY THIRD CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO Collection for any purpose. PARTIES; OR OTHER SIMILAR COSTS. THE TERMS AND CONDITIONS OF THIS AGREEMENT, IMMEDI- C. You shall not (and shall not permit other persons or entities to) C. THE WARRANTIES AND REMEDIES SET FORTH HEREIN ARE ATELY RETURN THE UNUSED CD FOR A FULL REFUND OF remove or obscure TechRepublic’s or its suppliers’ copyright, EXCLUSIVE AND IN LIEU OF ALL OTHERS, ORAL OR WRITTEN, MONIES PAID, IF ANY. trademark, or other proprietary notices or legends from any portion EXPRESSED OR IMPLIED. NO TECHREPUBLIC AGENT OR The articles, forms, tools, templates, programs, and other materials of the Collection or any related materials. EMPLOYEE OR THIRD PARTY IS AUTHORIZED TO MAKE ANY included on this CD and their compilation (the ‘Collection’) are 3. Limited Warranty and Limited Liability MODIFICATION OR ADDITION TO THIS WARRANTY. licensed to you subject to the terms and conditions of this A. THE ONLY WARRANTY MADE BY TECHREPUBLIC IS THAT D. SOME STATES DO NOT ALLOW EXCLUSION OR LIMITATION Agreement by TechRepublic, having a place of business at 9900 THE ORIGINAL CD IN WHICH THE COLLECTION IS EMBODIED OF IMPLIED WARRANTIES OR LIMITATION OF LIABILITY FOR Corporate Campus Drive, Louisville, KY 40223 (‘TechRepublic’).
    [Show full text]
  • Anatomy of a Buzzword: the Emergence of ‘The Water­Energy­ Food Nexus’ in UK Natural Resource Debates
    Anatomy of a buzzword: the emergence of `the water-energy- food nexus' in UK natural resource debates Article (Accepted Version) Cairns, Rose and Krzywoszynska, Anna (2016) Anatomy of a buzzword: the emergence of ‘the water-energy-food nexus’ in UK natural resource debates. Environmental Science and Policy, 64. pp. 164-170. ISSN 1462-9011 This version is available from Sussex Research Online: http://sro.sussex.ac.uk/id/eprint/63663/ This document is made available in accordance with publisher policies and may differ from the published version or from the version of record. If you wish to cite this item you are advised to consult the publisher’s version. Please see the URL above for details on accessing the published version. Copyright and reuse: Sussex Research Online is a digital repository of the research output of the University. Copyright and all moral rights to the version of the paper presented here belong to the individual author(s) and/or other copyright owners. To the extent reasonable and practicable, the material made available in SRO has been checked for eligibility before being made available. Copies of full text items generally can be reproduced, displayed or performed and given to third parties in any format or medium for personal research or study, educational, or not-for-profit purposes without prior permission or charge, provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. http://sro.sussex.ac.uk This is a pre-print, post-review version of the article.
    [Show full text]
  • Socialist Sacrilege: the Provocative Contributions of George Bernard
    SOCIALIST SACRILEGE: THE PROVOCATIVE CONTRIBUTIONS OF GEORGE BERNARD SHAW AND GEORGE ORWELL TO SOCIALISM IN THE 20TH CENTURY A Thesis Presented to The Graduate Faculty of The University of Akron In Partial Fulfillment of the Requirements for the Degree Master of Arts Matthew Fleagle August, 2009 SOCIALIST SACRILEGE: THE PROVOCATIVE CONTRIBUTIONS OF GEORGE BERNARD SHAW AND GEORGE ORWELL TO SOCIALISM IN THE 20TH CENTURY Matthew Fleagle Thesis Approved: Accepted: __________________________ __________________________ Advisor Dean of the College Dr. Alan Ambrisco Dr. Chand Midha __________________________ __________________________ Faculty Reader Dean of the Graduate School Dr. Hillary Nunn Dr. George R. Newkome __________________________ __________________________ Faculty Reader Date Mr. Robert Pope __________________________ Department Chair Dr. Michael Schuldiner ii TABLE OF CONTENTS Page CHAPTER I. THE TRICKLE-DOWN SOCIALISM OF SHAW .......................................................1 Works Cited ..........................................................................................................42 II. THE RADICAL AMONG REVOLUTIONARIES .....................................................43 Works Cited ..........................................................................................................79 III. MARXIST COLLECTIVISM AND THE LITERARY AESTHETIC ......................81 Works Cited ........................................................................................................105 iii CHAPTER I THE TRICKLE-DOWN
    [Show full text]