Michelangeo’s Freedom of Art

The WSJ explores the influences and supposedly hidden messages of Michelangelo in an interview with Roy Doliner:

Q: So these images aren’t exclusively Jewish?

What Michelangelo was doing was trying to remind Rome five centuries ago that Jesus was a Jew, he came from Jews, and that Christianity is based on Judaism. Florence in his time was proud of that connection, whereas Rome was not only trying to separate the two religions but to negate in great part its roots in Judaism — and even forcibly separate Jews and Christians. There were many Papal bulls outlawing fraternization and friendship between Jews and Christians, whereas in Florence everybody was partying together.

Q: Was Michelangelo simply promoting the Florentine agenda in Rome?

Absolutely. In his poems he complains about the abuses of power and hypocrisy of the church. It’s not us imagining it; it’s in his own words and work. This was not somebody who was thrilled about working for the Vatican on a ceiling.

Although today the message might be subtle, perhaps in his lifetime it was as open as his poetry.

One only has to be
finding windows and doors
a member among those with a key
to unlock what we all stare towards

2008 National Professor of the Year

I just heard the news that Mike Wesch, an untenured assistant professor at Kansas State University, was chosen as National Professor of the Year by the Carnegie Foundation (CASE). It soon will be announced in an official ceremony in Washington DC.

Congratulations to Mike as well as Marty and Harald. :)

Date: Sat, 15 Nov 2008 07:19:51 -0600
From: Mike Wesch
Subject: Mike Wesch is 2008 National Prof of the Year

Winning this has been a bit surreal and has inspired quite a bit of reflection on what led up to it. When I walked into Marty Ottenheimer’s class in Fall 1995 I had no idea what anthropology was. As you know, Marty speaks smoothly and almost serenely, even while lobbing out intellectual fire bombs that blow minds. My mind was blown. He had me asking questions I had never asked before. Soon after that I was TAing for Harald. I remember him describing teaching the Intro class as akin to an act of shamanism. It is not just about teaching a bunch of facts, but guiding students through a transformative initiation. That imagery has guided my approach to teaching ever since. I have no doubt that it was the extraordinary attention our program places on undergraduate excellence that propelled me to this point in my career. I feel blessed to have stumbled into KSU Anthropology in 1995, and even more blessed to be a part of it today.

~ Mike

If you deal with the safety (security) of social networks, you definitely should watch Mike’s presentation at the Library of Congress, June 23rd 2008:

1800s Vampire Killing Kit

The Antiques and the Arts Online has an example of some old security nonsense:

A complete and authentic vampire killing kit — made around 1800 and complete with stakes, mirrors, a gun with silver bullets, crosses, a Bible, holy water, candles and even garlic, all housed in a American walnut case with a carved cross on top — attained $14,850 in the Jimmy Pippen estate sale by Stevens October 3–4 in the new Natchez Convention Center.

If it actually killed vampires it would be worth a lot more, just saying…

MA law on information security

Massachusetts has passed an Executive Order No. 504 that goes into effect in 2009, to protect personal data. Here’s an excerpt:

Section 3. All state agencies shall develop, implement and maintain written information security programs governing their collection, use, dissemination, storage, retention and destruction of personal information. The programs shall ensure that agencies collect the minimum quantity of personal information reasonably needed to accomplish the legitimate purpose for which the information is collected; securely store and protect the information against unauthorized access, destruction, use, modification, disclosure or loss; provide access to and disseminate the information only to those persons and entities who reasonably require the information to perform their duties; and destroy the information as soon as it is no longer needed or required to be maintained by state or federal record retention requirements. The security programs shall address, without limitation, administrative, technical and physical safeguards, and shall comply with all federal and state privacy and information security laws and regulations, including but not limited to all applicable rules and regulations issued by the Secretary of State’s Supervisor of Public Records under Chapter 93H.