Two-Sided Properties of Elements in Exchange Rings Dinesh Khurana, T

Total Page:16

File Type:pdf, Size:1020Kb

Two-Sided Properties of Elements in Exchange Rings Dinesh Khurana, T Two-Sided Properties of Elements in Exchange Rings Dinesh Khurana, T. Y. Lam, and Pace P. Nielsen Abstract For any element a in an exchange ring R, we show that there is an idempotent e 2 aR \ R a such that 1 − e 2 (1 − a) R \ R (1 − a). A closely related result is that a ring R is an exchange ring if and only if, for every a 2 R, there exists an idempotent e 2 R a such that 1 − e 2 (1 − a) R. The Main Theorem of this paper is a general two-sided statement on exchange elements in arbitrary rings which subsumes both of these results. Finally, applications of these results are given to the study of the endomorphism rings of exchange modules. x1. Introduction Throughout this paper, R denotes a unital (generally noncommutative) ring. Following [Ni1], we say that an element a 2 R is right suitable if it has the following \idempotent lifting" property: for any right ideal I ⊆ R containing a−a2, there exists an idempotent e 2 R such that e − a 2 I. The set of right suitable elements in R is denoted by suitr(R), and the set suit`(R) of left suitable elements in R is defined similarly. In [Ni2], Nicholson proved that suit`(R) = suitr(R) for any ring R. The rings R with the property that R = suitr(R) are called (right) suitable rings. In the seminal paper [Ni1], Nicholson proved that these are precisely Warfield’s exchange rings in [Wa]; namely, those rings R for which the right module RR satisfies the (finite) exchange property of Crawley and J´onsson. In our paper, we'll use the terms \suitable rings" and \exchange rings" interchangeably, noting that suitable elements are sometimes also called \exchange elements" in the literature. Various characterizations for right suitable elements in rings were given in [Ni1]. Among the most useful ones is the following \Goodearl-Nicholson characterization" (see [GW] and [Ni1]): a 2 suitr(R) if and only if there exists an idempotent e 2 aR such that 1 − e 2 (1 − a) R. (In particular, R is an exchange ring if and only if every element a 2 R has the above idempotent property.) However, the prevailing study of the suitability of elements in rings has been mostly carried out \on one side" of the ring at a time. To our best knowledge, there has been almost no work in which the existence of idempotents with \two-sided" (left and right) properties was investigated. Our main results in this paper are intended to be the beginning steps in this direction. For ease of understanding, we state explicitly below two special cases of the Main Theorem in this paper. 1 Theorem A. For every element a in an exchange ring R, there exists an idempotent e 2 aR a such that 1 − e 2 (1 − a) R (1 − a). Note that this Theorem A is in fact equivalent to the first result stated in the Abstract. One simply observes that, if an idempotent e lies in an intersection xR \ R y, then e 2 xR y. Indeed, writing e = xr = sy for some r; s 2 R, we have e = e2 = (xr)(sy) 2 xR y. And of course, xR y ⊆ xR \ R y for any x; y 2 R. Theorem A appears to be new even for a von Neumann regular ring (or a π-regular ring) R, as we have not been able to locate such a result in the standard treatises on the subject (e.g. [vN1], [vN2], or [Go]). The same result also seems to be unknown for semiperfect rings and C∗-algebras of real rank zero, both of which are well known examples of exchange rings (by [Wa] and [AG]). In the case where R is an exchange ring of stable range one, a result of Ara given in [Ni2: Corollary] states that, for every a 2 R, there exists a pair of conjugate idempotents e; e0 such that e 2 aR; 1−e 2 (1−a)R; e0 2 R a, and 1 − e0 2 R (1 − a). A version of this result for suitable elements under the assumption that R satisfies internal cancellation appeared in [KG: Proposition 4.2]. Theorem A (or more precisely, Theorem 3.6 in x3) is a substantial improvement of both of these results in that the stable range one assumption and the internal cancellation assumption on R have been dropped, and the conclusion is strengthened to yield a single idempotent e = e0 with the aforementioned properties. The second result we want to specifically mention in this Introduction is the following \left-right mixed" characterization for an exchange ring, for which we also know of no explicit reference in the literature. Theorem B. A ring R is an exchange ring if and only if, for every a 2 R, there exists an idempotent e 2 R a such that 1 − e 2 (1 − a) R. For the larger part of this paper, instead of working with exchange (or suitable) rings, we take the more flexible approach of working with suitable elements. From this viewpoint, most of our results are stated in, and applicable to, a more general \element-wise" setting. In particular, Theorem A and Theorem B above are just special cases of the Main Theorem in this paper, which is stated as Theorem 2.5 in x2. Some ramifications and applications of this Main Theorem are given in x3. The paper closes with a final section (x4), in which the two-sided properties obtained for suitable elements in x3 are applied to the study of the endomorphism rings of modules. In some sense, the decomposition results for endomorphisms obtained in x4 are generalizations of the \Fitting decompositions" in Fitting's classical paper [Fi]. The terminology and notations introduced so far in this Introduction will be used freely throughout the paper. In addition, the following useful definitions are needed in xx3-4: a ring element a 2 R is said to be clean if a = f + u for some idempo- tent f 2 R and some unit u 2 R, and a is said to be strongly clean if there exists 2 such a decomposition a = f + u with fu = uf. It is well known (from the proof of [Ni1: Proposition 1.8]) that clean elements are suitable. Next, an element a 2 R is said to be strongly π-regular if there exists an integer n ≥ 1 such that an 2 an+1R \ R an+1. According to Nicholson [Ni3: Theorem 1], strongly π-regular elements are strongly clean. As in our companion paper [KLN], we'll denote the set of idempotents in a ring R by idem (R). Other standard terminology and conventions in ring theory follow those in [AF], [Go], and [La]. Whenever it is more convenient, we'll use the widely accepted shorthand “iff” for \if and only if" in the text. x2. Main Theorem and Its Proof The goal of this section is to prove the Main Theorem 2.5 below on the existence of idempotents with certain two-sided properties arising from a \commuting unimodular equation" pq + st = 1 in a ring. We start with a lemma that will be crucial for the proof of Theorem 2.5. Lemma 2.1. (A) Let p; q; c; d be commuting elements in R. If pq + qcxd 2 idem (R) for some x 2 R, then (pq)2 + cydq 2 idem (R) for some y 2 R. (B) Let p; q; s; t be commuting elements of R with pq + st = 1. If there exists an idempotent e 2 pRq such that 1 − e 2 sR t, then there exists an idempotent g 2 pqR such that 1 − g 2 sR t. Proof. A basic fact to be used several times in this proof is that, in any ring R, ab 2 idem (R) ) (ba)2 2 idem (R). This is checked by simply noting that (ba)4 = b (ab)3 a = b (ab) a = (ba)2. (A) Since q (p + cxd) 2 idem (R), we have (pq + cxdq)2 2 idem (R). By inspection, (pq + cxdq)2 2 (pq)2 + cRdq. (B) To facilitate the proof of (B), we first observe that, for any integer n ≥ 1, (2:2) 1 − (pq)n = (1 − pq) (1 + ··· + (pq)n−1) 2 sR t: Write the given idempotent e in (B) in the form p (1 + x) q for some x 2 R. Since 1 − e = 1 − pq − pxq = st − pxq 2 sR t, we have pxq = syt for some y 2 R. Thus, (2:3) q (syt) = q (pxq) = (1 − st) xq ) xq 2 sR: Similarly, (syt) p = (pxq) p = px (1 − st) ) px 2 R t. As e = p (1 + x) q is an idempotent, so is (2:4) h:= (qp (1 + x))2 = (qp)2 + qpqpx + qpxqp + qpxqpx 2 pqR: In view of px 2 R t and (2.2) (for n = 2), we have 1−h 2 R t. Similarly, using xq 2 sR and (2.2) (for n = 3), we have 1 − hqp 2 sR. Now let g := h + h (qp) (1 − h), which is easily seen to be an idempotent by a direct calculation. This is the idempotent we want, since g 2 pqR by (2.4), and we have also 1 − g = (1 − h) − h (qp) (1 − h) = (1 − hqp) (1 − h) 2 (sR)(R t) = sR t: 3 We can now state and prove the following main result of this paper.
Recommended publications
  • FAQS and TROUBLESHOOTING Configuring the Motion Detection
    FAQS AND TROUBLESHOOTING Troubleshooting WiFi connection issues: What Ports do I need to open in my firewall for Ring Doorbells and Chimes? Here are the ports needed by Ring Doorbells for proper connections: TCP 80 TCP 443 TCP & UDP 15063 UDP range between 16500-32768 UDP 51504/51506 Here are the ports needed by Ring Chime for proper connections: TCP 80 TCP 443 TCP 9999 If these ports are blocked, Ring products will not be able to connect properly. If you are unable to complete a setup or have trouble connecting, check if you have a firewall in the way. If so, please contact the firewall provider or router provider for assistance on configuring the necessary open ports. How Motion Detection Works Ring Doorbell can detect motion as far as 30 feet away. Once motion is detected, all users associated with the Ring will instantly receive a push notification informing them of the activity. Should any user open the Ring app, they will be able to access live footage of the activity. Configuring the Motion Detection Settings Visit the Ring App and select the device you'd like to configure the motion detection settings for and then click Motion Settings. We recommend watching the motion detection tutorial located in your Ring app first and foremost to get yourself acquainted with the feature. You can also access the motion detection tutorial video at anytime by clicking here (link to YouTube video: https://www.youtube.com/watch?v=qLHy4eqQ_Ic). How to Turn On Alerts Adjust the slider first, and then tap on the zones that you'd like to receive alerts for.
    [Show full text]
  • Regressive Femininity in American J-Horror Remakes
    City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 5-2015 Lost in Translation: Regressive Femininity in American J-Horror Remakes Matthew Ducca Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/912 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] LOST IN TRANSLATION: REGRESSIVE FEMININITY IN AMERICAN J-HORROR REMAKES by Matthew Ducca A master’s thesis submitted to the Graduate Faculty in Liberal Studies in partial fulfillment of the requirements for the degree of Master of Arts, The City University of New York 2015 © 2015 MATTHEW J. DUCCA All Rights Reserved ii This manuscript has been read and accepted for the Graduate Faculty in Liberal Studies in satisfaction of the dissertation requirement for the degree of Master of Arts. Professor Edward P. Miller__________________________ _____________________ _______________________________________________ Date Thesis Advisor Professor Matthew K. Gold_________________________ ______________________ _______________________________________________ Date Executive Officer THE CITY UNIVERSITY OF NEW YORK iii Abstract Lost in Translation: Regressive Femininity in American J-Horror Remakes by Matthew Ducca Advisor: Professor Edward Miller This thesis examines the ways in which the representation of female characters changes between Japanese horror films and the subsequent American remakes. The success of Gore Verbinski’s The Ring (2002) sparked a mass American interest in Japan’s contemporary horror cinema, resulting in a myriad of remakes to saturate the market.
    [Show full text]
  • Tracking the Research Trope in Supernatural Horror Film Franchises
    City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 2-2020 Legend Has It: Tracking the Research Trope in Supernatural Horror Film Franchises Deirdre M. Flood The Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/3574 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] LEGEND HAS IT: TRACKING THE RESEARCH TROPE IN SUPERNATURAL HORROR FILM FRANCHISES by DEIRDRE FLOOD A master’s thesis submitted to the Graduate Faculty in Liberal Studies in partial fulfillment of the requirements for the degree of Master of Arts, The City University of New York 2020 © 2020 DEIRDRE FLOOD All Rights Reserved ii Legend Has It: Tracking the Research Trope in Supernatural Horror Film Franchises by Deirdre Flood This manuscript has been read and accepted for the Graduate Faculty in Liberal Studies in satisfaction of the thesis requirement for the degree of Master of Arts. Date Leah Anderst Thesis Advisor Date Elizabeth Macaulay-Lewis Executive Officer THE CITY UNIVERSITY OF NEW YORK iii ABSTRACT Legend Has It: Tracking the Research Trope in Supernatural Horror Film Franchises by Deirdre Flood Advisor: Leah Anderst This study will analyze how information about monsters is conveyed in three horror franchises: Poltergeist (1982-2015), A Nightmare on Elm Street (1984-2010), and The Ring (2002- 2018). My analysis centers on the changing role of libraries and research, and how this affects the ways that monsters are portrayed differently across the time periods represented in these films.
    [Show full text]
  • COMMUTATOR and COLLECTOR RING PERFORMANCE Commutator and Collector Ring Performance
    FACILITIES INSTRUCTIONS, STANDARDS, & TECHNIQUES Volume 3-14 COMMUTATOR AND COLLECTOR RING PERFORMANCE Commutator and Collector Ring Performance Commutator and collector ring problems on Although this is an approximate guide, the brush exciters of hydrogenerators, which have been manufacturer's specific recommendations should most prevalent in Reclamation experience, are be used. often misunderstood. This discussion, although by no means a full treatment of this complex and DO NOT INTERFERE WITH PROPER BRUSH lengthy subject, gives some basic elements of an STAGGER WHILE OPERATING A COMMUTA­ adequate maintenance program. The literature TOR WITH SOME OF THE BRUSHES LIFTED. listed in the bibliography, only a segment of that AN EQUAL NUMBER OF POSITIVE AND which has been published, should be available to NEGATIVE BRUSHES MUST COVER maintenance personnel on each project. EXACTLY THE SAME PATH ON THE Troubles which cannot be readily corrected COMMUTATOR. should be referred to D-8440 or D-8450. It is usually easiest to avoid disturbing this Good Performance of both commutators and col­ stagger pattern by removing brushes toward one lector rings is mainly dependent upon the end of the commutator, and concentrating formation of the correct thickness of surface film current on the other portion. Wear can be which is tough, glossy, and has low friction. distributed by periodically alternating portions of Moisture absorbed from the surrounding air is an the commutator being used. important component of the film. If the ambient air is abnormally dry the film dries, causes 2. - COLLECTOR RINGS friction, and the rate-of-wear increases. Unlike commutator performance, collector ring Heat increases the formation of oxides, which performance can seldom be improved by are also essential to a good low friction film.
    [Show full text]
  • The Undead Subject of Lost Decade Japanese Horror Cinema a Thesis
    The Undead Subject of Lost Decade Japanese Horror Cinema A thesis presented to the faculty of the College of Fine Arts of Ohio University In partial fulfillment of the requirements for the degree Master of Arts Jordan G. Parrish August 2017 © 2017 Jordan G. Parrish. All Rights Reserved. 2 This thesis titled The Undead Subject of Lost Decade Japanese Horror Cinema by JORDAN G. PARRISH has been approved for the Film Division and the College of Fine Arts by Ofer Eliaz Assistant Professor of Film Studies Matthew R. Shaftel Dean, College of Fine Arts 3 Abstract PARRISH, JORDAN G., M.A., August 2017, Film Studies The Undead Subject of Lost Decade Japanese Horror Cinema Director of Thesis: Ofer Eliaz This thesis argues that Japanese Horror films released around the turn of the twenty- first century define a new mode of subjectivity: “undead subjectivity.” Exploring the implications of this concept, this study locates the undead subject’s origins within a Japanese recession, decimated social conditions, and a period outside of historical progression known as the “Lost Decade.” It suggests that the form and content of “J- Horror” films reveal a problematic visual structure haunting the nation in relation to the gaze of a structural father figure. In doing so, this thesis purports that these films interrogate psychoanalytic concepts such as the gaze, the big Other, and the death drive. This study posits themes, philosophies, and formal elements within J-Horror films that place the undead subject within a worldly depiction of the afterlife, the films repeatedly ending on an image of an emptied-out Japan invisible to the big Other’s gaze.
    [Show full text]
  • J-Horror and the Ring Cycle
    Media students/03/c 3/2/06 8:16 am Page 94 CASECASE STUDY:STUDY: J-HORROR J-HORROR AND AND THE THE RING RINGCYCLECYCLE 1 2 3 4 5 6 7 • Horror cycles • Industry exploitation and circulation 8 • The beginnings of the Ring cycle • Fandom and the global concept of genre 9 • Replenishing the repertoire through repetition and • Summary: generic elements and classification 10 difference • References and further reading 11 • Building on the cycle 12 13 14 Horror cycles references to Carol Clover’s work in Chapter 3). The 15 ‘knowingness’ about horror, and cinema generally, 16 Chapter 3 emphasises the fluidity of genre as a in these films was often developed as comedy (e.g. in 17 concept, the constantly changing repertoires of Scream 2 (1998), the classroom discussion about film 18 elements and the possibility of different forms of sequels). The success of the cycle was exploited 19 ‘classification’ by producers, critics and audiences. further with a ‘spoof’ of the ‘spoof’ in the Scary Movie 20 Horror is a genre with some special characteristics series. 21 in cinema: At the end of the decade, a rather different kind of 22 consistently popular since the 1930s in Hollywood • film, a ‘ghost story with a twist’, The Sixth Sense (1999), 23 and earlier in some other national cinemas was a massive worldwide hit. It was followed by the 24 attracting predominantly youth audiences • Spanish film The Others (2001) and several other ghost 25 until the late 1960s, not given the status of a major • stories, some of which looked back to gothic traditions 26 studio release (the isolated country house shrouded in fog in The 27 ‘open’ to the influence of changes in society – in • Others), while others were more contemporary in 28 both ‘metaphorical’ (i.e.
    [Show full text]
  • Infrastructure SINET 100G Global Ring and Data Exploitation
    Infrastructure SINET 100G Global Ring and Data Exploitation Sep. 18, 2019 Tomohiro Kudoh Professor, Information Technology Center, The University of Tokyo Cross Appointment Fellow, National Institute of Advanced Industrial Science and Technology (AIST) Visiting Professor, National Institute of Informatics (NII) Data Exploitation Platform Two topics 1 • Overview of SINET • 100Gbps domestic mesh and international ring • Data Exploitation Platform • PoC environment for everyone/everyday data exploitation applications, leveraged by SINET Data Exploitation Platform SINET (Science Information Network ) 2 • Japanese academic backbone network • Operated by NII (National Institute of Informatics) • Connects more than 800 universities and research institutions. • Connects many research facilities: seismology, space science, high-energy physics, nuclear fusion, computing science, and so on. • Being used by over 2 million users • Supports international research collaboration through international lines. • More than 100Gbps connection to every prefecture in Japan • 100Gbps international ring • Started mobile connection service Data Exploitation Platform Slide provided by S. Urushidani @ NII History of SINET 1987 Packet exchange network as predecessor of SINET 1992 SINET as Internet backbone (29 sites, 6-50Mbps) 2002 Super-SINET for leading-edge science (14 sites, up to 10Gbps) in parallel to SINET 2007 SINET3 (34 prefectures, 1Gbps to 40Gbps) as integrated backbone with new services 2011 SINET4 (47 prefectures, 2.4Gbps to 40Gbps) with highly-available nodes and lines 2016 SINET5 (47 prefectures, 100Gbps or more) with 100Gbps International lines and mobile capability • Expansion of coverage area • 100Gbps line for every prefecture • Placement of SINET nodes at DCs • 100Gbps international lines • Line speed of 2.4Gbps to 40Gbps • Mobile capability Europe : Newly covered prefecture USA and Europe USA Asia Singapore © 2019 National Institute of Informatics 3 Slide provided by S.
    [Show full text]
  • Book Review of the Ring Written by Koji Suzuki
    BOOK REVIEW OF THE RING WRITTEN BY KOJI SUZUKI FINAL PROJECT In Partial Fulfillment of the Requirement For S-1 Degree in Literature In English Department, Faculty of Humanities Diponegoro University Submitted by: Gaetano Ardhanto A2B009046 FACULTY OF HUMANITIES DIPONEGORO UNIVERSITY SEMARANG 2014 PRONOUNCEMENT The writer states truthfully that this project is compiled by his without taking the result from other research in any university, in S-1, S-2, and S-3 degree and in diploma. In addition, the writer ascertains that he does not take the material from other publications or someone‘s work except for the references mentioned in bibliography. Semarang, 4 December 2013 Gaetano Ardhanto ii MOTTO AND DEDICATION First, you must decide. Then you must follow through. That‘s the only way you can get anything accomplished. (Lacus Clyne) This final project dedicated to my beloved family iii APPROVAL Approved by Advisor On 4 December 2013 Dr. Suharno, M.Ed. NIP. 195205081983031001 iv VALIDATION Approved by Strata I Final Project Examination Committee Faculty of Humanities Diponegoro University On 4 March 2014 Advisor, Reader, Dr. Suharno, M.Ed. Dra. Astri Adriani Allien, M.Hum NIP. 195205081983031001 NIP. 196006221989032001 v ACKNOWLEDGEMENT Praise is to God Almighty, who has given strength and true spirit so this final project on —Book review of The Ring written by Koji Suzuki“ came to a completion. On this occasion, the writer would like to thank all those people who have contributed to the completion of this research report. The deepest gratitude and appreciation is extended to Dr. Suharno, M.Ed. ± the writer‘s advisor- who has given his continuous guidance, helpful correction, moral support, advice and suggestion.
    [Show full text]
  • A. Well Constructions
    CHAPTER 7 Wells A WELL CONSTRUCTION 1 Modern wells 241 2.3.1 Pre-cast well rings 251 1.1 Surface works 242 2.3.2 Casting the intake column 1.1.1 The wellhead 242 at the bottom of the well 252 1.1.2 Apron and drainage 242 2.3.3 The cutting ring 252 1.2 Manual water drawing 242 2.3.4 Sinking the intake column under 1.2.1 Pulleys and winches 243 its own weight 252 1.2.2 The “shaduf” 244 2.3.5 Gravel pack 252 1.3 Diameter 244 2.4 Developing the well 252 1.4 Well lining 245 2.5 Use of explosives 254 1.5 Intake column 245 2.6 Deep wells in Mali 255 2 Construction techniques 245 3 Rehabilitation of wells 255 2.1 Digging 245 3.1 Why rehabilitate? 255 2.2 Lining 246 3.2 Rehabilitation of the well lining 256 2.2.1 Stable ground, bottom-up lining 247 3.2.1 Rehabilitation of the existing lining 256 2.2.2 Unstable ground, top-down lining 248 3.2.2 New lining and intake 256 2.2.3 Soft sands, sunk intake and lining 248 3.2.2.1 Narrow wells 256 2.2.4 Anchorages 250 3.2.2.2 Wide unlined wells 257 2.2.5 Lining thickness, concrete mixes 3.2.2.3 Backfilling the excavation 257 and reinforcement 250 3.3 Cleaning and deepening 257 2.3 Independent intake 251 4 Disinfection 258 A well is usually dug manually to reach an aquifer situated at some depth below the ground.
    [Show full text]
  • Hand Dug Well Manual
    Hand Dug Wells: Choice of Technology and Construction Manual By Stephen P. Abbott Hand Dug Wells: Choice of Technology and Construction Manual, by Stephen P. Abbott Table of Contents Lists of Technical Drawings ....................................................................................................... 2 Glossary ..................................................................................................................................... 3 1. Introduction ............................................................................................................................ 6 2. Overview................................................................................................................................ 6 3. Design choices........................................................................................................................ 9 4. Pitfalls to Avoid.................................................................................................................... 14 5. Technical Preparation ........................................................................................................... 15 6. Construction Manual............................................................................................................. 15 Appendix AEquipment List for Hand Dug Well Construction .................................................. 37 Appendix B Specification for Hand Dug Wells ......................................................................... 43 Appendix C Bill of Quantities..................................................................................................
    [Show full text]
  • The Audience and Consumers of the Lord of the Rings JENNIE S
    - COMMUNICATION AND CULTURE - MA MAJOR RESEARCH PAPER MA MAJOR RESEARCH PAPER Bearing the Ring: The Audience and Consumers of The Lord of the Rings JENNIE S. SCHEER Jennifer Burwell A Major Research Paper submitted In partial fulfillment of the requirements for the degree of Master of Arts Joint Graduate Program in Communication & Culture York University-Ryerson University Toronto, Ontario, Canada / Scheer 2 / " COMMUNICATION AND CULTURE - MA MAJOR RESEARCH PAPER STUDENT: Jennie S. Scheer Joint Graduate Program in Communication and Culture MA MAJOR RESEARCH PAPER Bearing the Ring: The Audience and Consumers of The Lord of the Rings Introduction What is it about a particular cultural text that makes it, over many other texts, iconic in its scale of adoption? Few popular culture products have the stamina to continue growing in popularity beyond an initial publicity blitz. When one comes along that catches the potential audiences' lasting attention, a small miracle occurs. The commodity swells in girth into a juggernaut of popular culture, reverberating across identity politics and understandings of the relationship between individuals, communities, and texts. For how is one to account for the rapidly changing public tastes? While no mercy may be shown to one passing fad, others manage to dazzle within the public sphere. These texts Scheer 3 reach beyond their limited origins and primary author to become modern day mythologies. Within them, truths and allegories can be found, regardless of how they are colored by fantastic elements. In fact, the more "otherworldly" the text, the greater is its potential symbolism and possible interpretation. Audiences see some manifestation of their own lives reflected and as a result desire to interact with it.
    [Show full text]
  • Engine of Disquiet
    Excessive Candour 41231033:28 PM -\,e r&ft ' service,dedication, ideatism. &x&RCt{, -*tfr rF ffitortd rsEsB*{s, "*"4f bCn FI"CSnn ffi orother charities. raxdeduct. sslsFlt*sB$ , PREVIOUS c0tuMNs Engineof Disquiet LouisianaBreakdown PatternRec0qnition TheBraided world By dshn Gj,\,$** Summerland The HauntedAir S t is tit<edropping a pebbleinto a pondand The Hard 5F watchingthe ringswiden. Koji Suzuki's SF/ Renaissance I il horrornovel Rlngu (1991),published with The Separation greatsuccess in Japan, Coraline has generatedrings of Rlngu-derivedproduct. The Mountand Suzukihimself has writtensequels and Repoftto the Men's prequels(none yet availablein English).In Cluband Other Japan there has been a TV drama (very bad), Stories two TV series (ratherbetter), a radioversion Stories of Your Lif€ and comic books (qualityunattested) and the and Others filmRinq{ (1998),made for almostnothing, WorldsThat Weren't hugelysuccessful in Japanand-for a whilein bootlegform, though later as distributedby Better t0 Have Dreamworks-eq ually successfuI subtitled into Loved:The Life of English.Late last year Gor**Ygtb.iSSXidirected an English-language "ludithMerril remake,Iile S,ng; it was a ring cycledtoo far, fatallywatered down (though NebulaAwards it rainsa lot in Seattle,where this versionis set), which may help explain Showcase2002 why the storyline,so adulteratedin its descentfrom the originalsource, has lne biftnoavor rne becomepretty confusing. But today we have the originalnovel at last, Rlng, Worldand Other very competentlytranslated by RobertB, Rohmerand GlynneWalley, a tale Stories gives off a very clear (we will now stop making ringjokes) ring. The Years of Rice and Salt The first thing to note,given the hi-techfeel of the Ring Hauntinq A Winter tale's dependencyon what have become low-tech Ey KoiiSuzuki Vitals technologies,like VHS and floppydisks, is that Verlical,lnc.
    [Show full text]