Premium Essay

Dsadsa

In:

Submitted By elanyashinsky
Words 397
Pages 2
saAlthough fine artists have used crowdsourcing during the “Relational Art” movement in the 90s to produce works of art long before the word dsadsaState of Play,” “The Last King of Scotland”) solicited videos shot around the globe on July 24, 2010. From more than 80,000 submissions, they fashioned a 90-minute film representing a day in the life of the world — that part of the world with a video camera and an Internet connection, anyway.
It’s a hard movie to engage with or even sit through, despite the fact that much of the material is interesting in its own right. Oddly, but perhaps predictably, the problem is the resolutely conventional and soft-headed way in which that material has been assembled. Given the chance to do whatever they wanted, the filmmakers ended up with something resembling a sentimental credit-card commercial stretched to feature length: a chronological pseudonarrative that intersperses obvious montages — people getting out of bed, people making coffee — with more specific biographical passages and sets it all to a sugary, manipulative soundtrack. (There are some violent or emotionally difficult moments, but the overall tone remains gee-whiz.)
The most compelling scenes — a girl with a helmet-cam climbing to the top of a human tower at a circus; a man and his son saying morning prayers before a photograph of an absent woman — are like trailers for films we won’t get to see. Otherwise, “Life in a Day” is “Koyaanisqatsi” minus the consistent visual imagination that made that film bearable. But rest assured: several of the contributors knew how to do time-lapse shots of gathering clouds.

Although fine artists have used crowdsourcing during the “Relational Art” movement in the 90s to produce works of art long before the word even existed, more creative organizations are experimenting with it. This Movie is Broken, a film which recently

Similar Documents

Free Essay

Dsadsa

...Introduction and Abstract Copyright(c), 1984, Fred Cohen - All Rights Reserved This paper defines a major computer security problem called a virus. The virus is interesting because of its ability to attach itself to other programs and cause them to become viruses as well. There are two spellings for the plural of virus; 'virusses', and 'viruses'. We use the one found in Webster's 3rd International Unabridged Dictionary Given the wide spread use of sharing in current computer systems, the threat of a virus carrying a Trojan horse [Anderson72] [Linde75] is significant. Although a considerable amount of work has been done in implementing policies to protect from the illicit dissemination of information [Bell73] [Denning82], and many systems have been implemented to provide protection from this sort of attack [McCauley79] [Popek79] [Gold79] [Landwehr83], little work has been done in the area of keeping information entering an area from causing damage [Lampson73] [Biba77]. There are many types of information paths possible in systems, some legitimate and authorized, and others that may be covert [Lampson73], the most commonly ignored one being through the user. We will ignore covert information paths throughout this paper. The general facilities exist for providing provably correct protection schemes [Feiertag79], but they depend on a security policy that is effective against the types of attacks being carried out. Even some quite simple protection systems cannot be proven 'safe' [Harrison76]...

Words: 8970 - Pages: 36