Pitch, Tone, and Note

Author(s):  
Bryan Parkhurst ◽  
Stephan Hammel

This chapter recasts the terms “Pitch,” “Tone,” and “Note” as far-reaching historical-materialist categories, with a view to expounding and defending the following ideas: (1) there is an immanent developmental logic to the way that Pitch, Tone, and Note have changed over time; (2) this trajectory of development is open to empirical investigation and to explanation anchored in the concrete features of human practices and institutions and their environing natural and social contexts; and (3) this developmental dynamic has had, and continues to have, appreciable consequences for many aspects and types of “musicking.” After setting up a Marxian framework, we then put these categories to explanatory work in a series of three case studies concerning the development of music’s “forces of production.” The origins of music printing, the evolution of piano manufacture, and the birth of sound synthesis are used to reveal causal linkages between changes in musical practice and trends in capitalist development.

2012 ◽  
Vol 6 (1) ◽  
pp. 76-96 ◽  
Author(s):  
Michael Sadowski

Gilligan (1996) and other feminist relational psychologists have identified a “silencing” to which adolescent girls are vulnerable when they confront pressures to conform to patriarchal values and norms in various social contexts. As Machoian (2005) and other researchers have noted, the silencing of girls’ authentic voices at adolescence is associated with heightened risk for depression and for suicide, cutting, eating disorders, and other self-harming behaviors. This article is based on in-depth interviews that examined the ways in which lesbian, gay, bisexual, transgender, and queer-identifying youth might be subject to an analogous silencing of their authentic “queer voices.” Drawing on four case studies of male youth who participated in a larger qualitative research project, the article examines how schools, families, and communities both supported and silenced the authentic expression of their voices as gay- or queer-identifying boys. Since two of the case studies are based on interviews with participants at both late adolescence and young adulthood, the article also examines the effects of supportive factors over time and how they helped contribute to a purposeful, voiced sense of queer male identity as the participants reached manhood.


Author(s):  
Sucharita BENIWAL ◽  
Sahil MATHUR ◽  
Lesley-Ann NOEL ◽  
Cilla PEMBERTON ◽  
Suchitra BALASUBRAHMANYAN ◽  
...  

The aim of this track was to question the divide between the nature of knowledge understood as experiential in indigenous contexts and science as an objective transferable knowledge. However, these can co-exist and inform design practices within transforming social contexts. The track aimed to challenge the hegemony of dominant knowledge systems, and demonstrate co-existence. The track also hoped to make a case for other systems of knowledges and ways of knowing through examples from native communities. The track was particularly interested in, first, how innovators use indigenous and cultural systems and frameworks to manage or promote innovation and second, the role of local knowledge and culture in transforming innovation as well as the form of local practices inspired innovation. The contributions also aspired to challenge through examples, case studies, theoretical frameworks and methodologies the hegemony of dominant knowledge systems, the divides of ‘academic’ vs ‘non-academic’ and ‘traditional’ vs ‘non-traditional’.


2021 ◽  
Vol 17 (3) ◽  
pp. 1-38
Author(s):  
Lauren Biernacki ◽  
Mark Gallagher ◽  
Zhixing Xu ◽  
Misiker Tadesse Aga ◽  
Austin Harris ◽  
...  

There is an increasing body of work in the area of hardware defenses for software-driven security attacks. A significant challenge in developing these defenses is that the space of security vulnerabilities and exploits is large and not fully understood. This results in specific point defenses that aim to patch particular vulnerabilities. While these defenses are valuable, they are often blindsided by fresh attacks that exploit new vulnerabilities. This article aims to address this issue by suggesting ways to make future defenses more durable based on an organization of security vulnerabilities as they arise throughout the program life cycle. We classify these vulnerability sources through programming, compilation, and hardware realization, and we show how each source introduces unintended states and transitions into the implementation. Further, we show how security exploits gain control by moving the implementation to an unintended state using knowledge of these sources and how defenses work to prevent these transitions. This framework of analyzing vulnerability sources, exploits, and defenses provides insights into developing durable defenses that could defend against broader categories of exploits. We present illustrative case studies of four important attack genealogies—showing how they fit into the presented framework and how the sophistication of the exploits and defenses have evolved over time, providing us insights for the future.


Author(s):  
Leif M. Burge ◽  
Laurence Chaput-Desrochers ◽  
Richard Guthrie

Pipelines can be exposed at water crossings where rivers lower the channel bed. Channel bed scour may cause damage to linear infrastructure such as pipelines by exposing the pipe to the flow of water and sediment. Accurate estimation of depth of scour is therefore critical in limiting damage to infrastructure. Channel bed scour has three main components: (1) general scour, (2) bed degradation, and (3) pool depth. General scour is the temporary lowering of the channel bed during a flood event. Channel bed degradation is the systematic lowering of a channel bed over time. Pool depth is depth of pools below the general bed elevation and includes the relocation of pools that result from river dynamics. Channel degradation is assessed in the field using indicators of channel incision such as channel bed armoring and bank characteristics, through the analysis of long profiles and sediment transport modelling. Pool depth is assessed using long profiles and channel movement over time. The catastrophic nature of bed lowering due to general scour requires a different assessment. A design depth of cover is based on analysis of depth of scour for a given return period (eg. 100-years). There are three main steps to predict general scour: (1) regional flood frequency analysis, (2) estimation of hydraulic variables, and (3) scour depth modelling. Typically, four scour models are employed: Lacey (1930), Blench (1969), Neill (1973), and Zeller (1981), with the average or maximum value used for design depth. We provide herein case studies for potential scour for pipeline water crossings at the Little Smoky River and Joachim Creek, AB. Using the four models above, and an analysis of channel degradation and pool depth, the recommended minimum depth of cover of 0.75 m and 0.142 m, respectively, were prescribed. Variability between scour models is large. The general scour model results varied from 0.45 m and 0.75 m for the Little Smoky River and 0.16 m to 0.51 m for Joachim Creek. While these models are more than 30 years old and do not adequately account for factors such as sediment mobility, they nevertheless do provide usable answers and should form part of the usual toolbox in water crossing scour calculations.


2021 ◽  
Vol 58 (4) ◽  
pp. 142-157
Author(s):  
Andrea Lavazza ◽  
Mirko Farina ◽  

The current Covid-19 pandemic is illustrative of both the need of more experts and of the difficulties that can arise in the face of their decisions. This happens, we argue, because experts usually interact with society through a strongly naturalistic framework, which often places experts’ epistemic authority (understood as neutrality and objectivity) at the centre, sometimes at the expenses of other pluralistic values (such as axiological ones) that people (often non-experts) cherish. In this paper, we argue that we need to supplement such a strong naturalistic framework used to promote epistemic authority with a number of virtues -both intellectual and ethical- which include i. intellectual humility, ii. courage, iii. wisdom and cares, as well as iv. relational autonomy. To illustrate this claim, we discuss these ideas in the context of the Covid-19 pandemic and analyse a set of real-life examples where important decisions have been delegated to experts merely based on their epistemic authority. We use the illustrative failures described in the case studies above-mentioned to call for a revision of current understandings of expertise (merely based on epistemic soundness). Specifically, we argue that in social contexts we increasingly need “experts in action”; that is, people with certified specialist knowledge, who can however translate it into practical suggestions, decisions, and/or public policies that are ethically more balanced and that ultimately lead to fairer, more inclusive, and more representative decisions.


2020 ◽  
Vol 56 (2) ◽  
pp. 183-206
Author(s):  
Nejc Sukljan

This paper deals with the role of ancient music theory in Gioseffo Zarlino’s Istitutioni harmoniche and, within its framework, in particular with mathematical and physical considerations and their relevance to audible music. An outline of the treatise is followed by a presentation of Zarlino’s justification of music as scienza and arte. Finally, two case studies are presented on joining ancient theory with contemporary musical practice: the division of the interval and the system of the senario.


2014 ◽  
Vol 11 (2) ◽  
pp. 461-480 ◽  
Author(s):  
Nuno Castela ◽  
Paulo Dias ◽  
Marielba Zacarias ◽  
José Tribolet

Business process models are often forgotten after their creation and its representation is not usually updated. This appears to be negative as processes evolve over time. This paper discusses the issue of business process models maintenance through the definition of a collaborative method that creates interaction contexts enabling business actors to discuss about business processes, sharing business knowledge. The collaboration method extends the discussion about existing process representations to all stakeholders promoting their update. This collaborative method contributes to improve business process models, allowing updates based in change proposals and discussions, using a groupware tool that was developed. Four case studies were developed in real organizational environment. We came to the conclusion that the defined method and the developed tool can help organizations to maintain a business process model updated based on the inputs and consequent discussions taken by the organizational actors who participate in the processes.


2014 ◽  
Vol 29 (2) ◽  
pp. 114-127 ◽  
Author(s):  
Anne Quaadgras ◽  
Peter Weill ◽  
Jeanne W Ross

As digitization becomes pervasive, many organizations struggle to drive value from the growing number of IT-related opportunities. We show how the drivers of IT value creation can be framed as firm-wide commitments to a set of IT capabilities. On the basis of 20 published case studies, we identify a small set of IT decisions that organizations must make to use IT to successfully enhance their impact. We group these decisions into a framework of four commitments. Making these commitments helps organizations reinforce what really matters over time, which in turn helps focus the attention of their employees. We demonstrate, via a survey of 210 publicly traded firms, that firms which are more effective in making these four commitments have higher business impact from IT, which in turn correlates with higher financial performance. We suggest the construct of commitment is a step toward unifying the IT value literature and creating an overarching concept that brings together many of the important management practices identified in previous work.


Author(s):  
Alfonso Siano ◽  
Mario Siglioccolo ◽  
Carmela Tuccillo ◽  
Francesca Conte

This chapter investigates the possible relationships between cultural institutions (museums, theatres, libraries etc.) and companies, which have been increasingly occurring in the last years. While cultural institutions have been progressively needing to acquire financial resources and managerial skills to survive and valorise their activities, at the same time companies are trying new ways to differentiate their image, by means of associating it with the cultural sector. The adoption of a descriptive-normative approach enables the identification of many kinds of collaboration (patronage and corporate philanthropy, volunteer program and payroll giving, cause related marketing, cultural sponsorship, co-branding, licensing and merchandising, electronic relationships, and finally, partnership), distinguished according to the intensity and duration over time. For each relationship, mutual benefits and disadvantages are described in detail, even with the support of real case studies. This joint consideration of the various possible relationships aims to provide an overall view of the issue considered, which differentiates this contribution from the literature so far produced.


Author(s):  
Frank Schimmelfennig ◽  
Thomas Winzen ◽  
Tobias Lenz ◽  
Jofre Rocabert ◽  
Loriana Crasnic ◽  
...  

This chapter introduces the case studies. It describes the rationale for studying cases, our case selection, and the structure of the case study chapters. The case studies offer an opportunity to examine the conditions under which international organizations establish international parliamentary institutions (IPIs) in more detail, take into account alternative configurations of conditions for IPI establishment, and trace the processes of strategic democratic legitimation. In addition, the cases include some of the rare cases of empowerment, in which IPIs increase their authority over time. The case selection aims at a diverse set of cases representing positive and negative cases of IPI establishment, a variety of world regions and historical periods, and stark variation across the conditions of parliamentarization.


Sign in / Sign up

Export Citation Format

Share Document