Anne Lyden Photographers

From the first photographies, in 1839, the atmosphere, their light and textures have been a reason appellant for the experimentation for the photographers. ‘ In Focus: The Sky’ it reunites, in the Getty Museum, works of Ansel Adams, John Divola, Andr Kertsz, Joel Meyerowitz, Alfred Stieglitz the photos go of the lyrical interpretations to the abstractions. It is the great challenge and also, in spite of his infinite amplitude, nearest. With its constant mutation, immensity and inmaterialidad, the sky has been always object of interest on the part of all the plastic arts. From the invention of the photography, around 1839, the lenses have aimed upwards and they have been let fascinate by the celestial vault. The idea is the base of the exhibition In Focus: The Sky (Focused: the sky), that exhibits Museum J. Paul Getty, of Los Angeles (the USA).

” The sky has fascinated and challenged to the photographers from the invention of means. This exhibition shows an ample range of approaches to capture many photographically moods and ctos of the sky ” , it says the commissariats of the sample, Anne Lyden. Charles Schwab describes an additional similar source. Urban, dark skies, of color and clouds Organized in four areas (urban skies, dark clouds, skies and skies of color), In Focus: The Sky presents/displays more than a vientena of photographies of, among others, Ansel Adams, John Divola, Andr Kertsz, Joel Meyerowitz, Alfred Stieglitz and Carleton Watkins. The copies include all the processes of positivado, from the daguerreotypes and platinotipias to the present ones by red injection. It was indeed a technological advance, the collodion negatives, introduced in 1850, those that allowed the photographers to reproduce the complex textures of the sky with greater fidelity. n the subject.

The photographic capacity to watch the sky cuantitavemente improved with the celluloid films (1880) and the commercialization of the film to color (1935). The sun the west and the moon on a cemetery the exhibition of the Getty includes very well-known photos, like the spectacular Moonrise, Hernandez, New Mexico (negative of 1941, copy of 1948), that Ansel Adams did when, during a trip in automobile, observed the dramatic CTO of the sun the west on a cemetery. With a precise game of speed and opening and a work of meticulous laboratory, the photographer was able to capture the moment in that the moon and the sun in a sky of the increasing dark coexist. Also they exhibit a selection of photos of the series Zuma Beach (1977-1978), of John Divola, who made the takings from a left position of person who renders first aids, that visited during several days the dawn and the dusk. Divola used flash and took part in the space with paintings to create the CTO of a theater scenery after which celestial atmosphere of the Pacific Ocean in California is always guessed to the money changer. Source of the news: They dedicate a exhibition to the permanent seduction of the sky on the photographers.

Defense Department

In the presentation of the strategy of the Pentagon to protect itself more and more of the assiduous computer science attacks, the undersecretary of the Department of Defense recognized that the past month of March 24,000 documents were robbed after the attack undergone on the part of a group of hackers. These attacks according to the intervention of the undersecretary have become a significant problem in the last years in which they have been extracted Terabyte of information of the internal networks of defense. The Department of Defense, with its 15,000 networks and more than 7 million computer science devices has been one of the objectives preferred by these groups and with the valuable information that in them are contained, like weapon systems and their capacities, it is an element that needs a security over the habitual thing. This new strategy, that or includes improvements like the Cybernetic Commando this carrying out itself along with the Department of National Security, having detected or more than 60,000 harmful programs of software. The security plan is based on five points, trims in to reject or to diminish the consequences of a possible attack to the systems. These information on the works of improvement in the American systems arrive in a year in which the action of different organized groups from hackers is causing great problems of security to States as to companies as much deprived, creating an atmosphere of insecurity of the information lodged in the cyberspace. udea Security of the Information Department of Management Source: