Sunday, February 23, 2020

How Latin American Music Has Developed Essay Example | Topics and Well Written Essays - 1750 words

How Latin American Music Has Developed - Essay Example The Development Process The actual origins of Latin American music cannot be traced easily, however, various explanations have been put up explaining this. Tiemstra (1992) suggests that one of the major explanations is cultural interactions: people from the European countries moved to America and were later followed by the African slaves. The two traditions together with the American one mixed and came up with an impure culture. Latin American music is a form of art which is associated with countries of Latin America, such as Cuba, and it is usually popular due to its unique rhythmical structures. Slonimsky (1946) explains it is both vocal as well as instrumental and formally derived from African traditional ceremonies. Its main characteristic is the unique rhythm it exhibits when numerous rhythms are played together to produce one exiting rhythm. Traditionally, the music was played using percussion and other string instruments like the timbales, guitar, tres, congas and the bongo (Thompson & Chase, 1947). With developments in the music industry, instruments like guitars were replaced by the piano and other instruments such as trumpets, trombones, woodwinds and the bass to play riffs and also melodies. The exiting rhythm produced in Latin music is normally called â€Å"clave† which has a pattern of 2-3, and it is the basis of all the music of Cuba (Bloomington & In Orrego, 1971). The clave can be said to be a rhythmic pattern that is syncopated which is the revolution point of the band and is normally played using two sticks. In describing the form exhibited by the Latin music Bloomington & In Orrego (1971) say that it is usually played using three main forms. One starts with a long verse of introduction which is then followed by a section known as montuno; here the band plays an instrument called vamp. This instrument is blended appropriately with other instruments such as the mambo in order to build intensity (here the front line members play riffs of the contrasting nature). Finally, the whole choir members shift their focus to the verse, and close their presentation with a coda, which is a way of closing a piece which is precise and predetermined (Tiemstra, 1992). Having described and presented what Latin music is one needs to understand the developments that have taken place in this music. Bloomington & In Orrego (1971) assert that even before the colonial era the people who were involved in this music industry were mainly the Amerindian, Europeans mainly the Iberian, Mestizo as well as Africans. It was a mixed cultured scenario and the music which was played at this time reflected a multi-cultured origin. However, the emergence of the colonial era between the 16th to 19th centuries marked a major transformation in Latin music history. Majority of the people with Amerindian origin were decima ted and many of their traditional musical instruments destroyed together with their Iberians people’s culture (Thompson & Chase, 1947). Currently, there is very little

Thursday, February 6, 2020

Hackers slang Essay Example | Topics and Well Written Essays - 1000 words

Hackers slang - Essay Example The existence of slang dictionaries, of course, cancels the effectiveness of certain words. Abbreviation. Hackers denote a word by only several of its component letters. For example: "RTFM" - "read the following manual", "IMHO" - "in my humble opinion", "BTW" - "by the way" or "LOL" - "lay of laugh". Verb doubling. Hackers double verbs as a concise, sometimes sarcastic comment on what the implied subject does. Also, a doubled verb is often used to terminate a conversation, in the process remarking on the current state of affairs or what the speaker intends to do next. Typical examples involve win, lose, hack, flame, barf, and chomp, i.e. "The disk heads just crashed." "Lose, lose." Sound-alike slang. Hackers will often make rhymes or puns in order to convert an ordinary word or phrase into something more interesting, i.e. "Plug&Play" is transformed to "Plug&Pray", "Government Property - Do Not Duplicate" to "Government Duplicity - Do Not Propagate" or "Macintosh" to "Macintrash". Overgeneralization. Many hackers love to take various words and add the wrong endings to them to make nouns and verbs, often by extending a standard rule to non-uniform cases (or vice versa). For example: "win" extends to "winnitude", "winnage", "disgust" to "disgustitude", "hack" to "hackification". "Marketdroid" is a member of a company's marketing department, especially one who promises users that the next version of a product will have features that are not actually scheduled for inclusion, are extremely difficult to implement. "Careware" is a variety of shareware for which either the author suggests that some payment be made to a nominated charity or a levy directed to charity is included on top of the distribution charge. Spoken inarticulations. Words such as "mumble", "sigh", and "groan" are spoken in places where their referent might more naturally be used. It derives from the impossibility of representing such noises in a chat or by e-mail. Anthropomorphization. Hackers often anthropomorphize hardware and software, for example, it's possible to say, "the protocol handler got confused" or "the program is died". () Comparatives. Many words in hacker slang have to be understood as members of sets of comparatives. This is especially true of the adjectives and nouns used to describe the beauty and functional quality of code. Here is an approximately correct spectrum: "monstrosity brain-damage screw bug lose misfeature" or "crock kluge hack win feature elegance perfection". (Levi, 1984, pp.56-78) Numerization. Hackers often include soundalike numbers in place of words or parts of words, for example "4 you", "2 do". (Kelly-Bootle, 1995, pp.36-101) Terms of computer hackers' dialect are often particular to their subculture. Raymond (1996) writes, "The hacker culture' is actually a loosely networked collection of subcultures that is nevertheless conscious of some important shared experiences, shared roots, and shared values. It has its own myths, heroes, villains, folk epics, in-jokes, taboos, and dreams. Because hackers as a group are particularly creative people who define themselves partly by rejection of normal' values and working habits, it has unusually rich and conscious traditions for an intentional culture less than 40 years