Copying Art

Back in the days before copyright existed, it was not only common for artists to paint copies of famous art to learn how to paint, to learn their craft, but sometimes because that was the only way they could get access to the subjects they wanted to paint.

Take monarchs, for instance.

This is one of the many anonymous copies of the official portraits of Henry VIII.
[I felt that the framing of the digital image was a bit too tight; there wasn’t enough head room. So I’ve digitally reframed the picture, extending the space between the top of Henry’s head and the frame.]

Sitting for a painted portrait was a gruelling task, magnitudes worse than having your photograph taken. Still, it was one of the things that was expected of a monarch in the days before photography. In the 16th Century, the King of England was expected to take some time out of his busy schedule to pose for a official portraits on occasion.

But the King wouldn’t just sit for any artist, he’d only sit for the best.

In the same way movie stars and presidents and monarchs vied for a chance to be immortalized in black and white by Canada’s world class portrait photographer Yousef Karsh in the 20th Century, Henry VIII wanted only the best. Hans Holbein the Younger was a portrait artist good enough to be appointed King’s Painter, and his work immortalized both Henry VIII and his court. The most famous and perhaps most regal painting that Holbein created was on a mural on the wall of the Privy Chamber of the new Whitehall Palace.

Kinh Henry's official portrait made him look taller and more impressive

“Portrait of Henry VIII … is one of the most iconic images of Henry and is one of the most famed portraits of any British monarch.”

WIKIPEDIA: Portrait of Henry VIII

Henry himself was pleased enough with this work that he encouraged other artists to copy the portrait. What that means to both artists and historians of today is that the work was not lost, even though the original of that iconic painting was destroyed by fire in 1698.

But the painting lives on, and continues to be famous today because it was widely copied.

None of these artists would ever have been able to get access to the king, yet being able to copy official portraits undoubtedly gave them the means to make a living in the art field. Many of artists who made these copies never achieved fame of Hans Holbein the Younger, and many of the surviving copies of this and the other paintings of Henry were in fact painted by artists whose names have been lost. The attribution customarily given the copies is “after Hans Holbein the Younger. But although their names have been lost, an important work of art is preserved for the sake of both our history and our culture.

I don’t know any artists who want to see their work lost. Had the copyright laws of today been in place back then, this work would in fact be lost forever.


2011 in review

angel doll head and shoulders

Happy New Year!

The WordPress.com stats helper monkeys prepared a 2011 annual report for this blog.

Here’s an excerpt:

A San Francisco cable car holds 60 people. This blog was viewed about 3,600 times in 2011. If it were a cable car, it would take about 60 trips to carry that many people.

Click here to see the complete report.

car and horse and buggy meet on rainy night

It’s been a pretty busy year here in the forest, so there haven’t been as many new posts as we would have liked to see. But it was good to see the blog stats hold up regardless. With a little luck there will be many more posts for 2011.  Because after all, art is still all around!

Thanks for visiting Lothlaurien’s Lore :)


gift card vs. cool gift

Doing some last minute Chrishanukwandiwaleid shopping today, my friend was telling me why she hates gift cards. If you’re going to give a gift, she said, give an appropriate gift. If you want to give a gift of money, give real money, not a gift card.

When you give a gift card, you are forcing the recipient to shop in a specific store. Maybe they can’t find anything they want there. Maybe it will be a hardship for them to get to that store. How many kilometers away is it? Is it accessible by transit?

When your recipient finds something in it they want to buy, if it costs less than the amount on the card, they might be left with a card that has sixteen cents left on it. Or if they buy something that costs more, they have to give additional funds to the store.

Who does a gift card benefit, anyway?

I’m wondering how many gift cards never get used. Even if each card is left with a few cents unspent, the store benefits. In essence, the gift card is more of a gift to the seller.

One of my favorite stores is a shop called Green Earth, which can be found in Conestoga Mall in the southern Ontario town of Waterloo.

looking at the storefront in the mall

It’s part of a chain, so you might find one in the mall nearest you, too :)

pegboard wall of masks

Find everything from masks…

faerie perched on the edge of a shelf

… to faeries …

a shelf fulh

… little piggies …

Buddha sculpture

… garden gurus …

a Woman is like a tea bag ... you never know how strongshe is until you put her in hot water

… pithy sayings …

Close up of a stuffed tiger's face

… and furry friends.

text reads: what good can come from a day ... that starts with getting up

Full disclosure: I am not affiliated with Green Earth except as a customer.  Green Earth is a great store full of fun and off the beaten path gifts. Chances are you’ll find just the thing for that hard-to-find-the-right-thing-for person on your list. Whatever you need to get for Chrishanukwandiwaleid

Sculptures of hands holding uo two fingers to form the peace  or victory symbol

Tell you what, if you decide it is cooler to buy a fabulous gift rather than a boring old gift card, drop round Green Earth this week.

When you do, make sure to tell them you read about it here in Lothlaurien’s Lore :)


Be Safe Online

hackers or crackers

First, I’m sick of people blaming “hackers” for online security breaches. Hollywood may think that “hackers” are the people breaking online security, but I know too many computer peeps who call themselves hackers, and say a “hack” is a creative solution, not a criminal activity. They call the badguys “crackers.”

Crackers maliciously “crack” open your security, sometimes for fun, the way vandals find vandalism fun, but more often for profit. This is a large part of identity theft; this is the growth are of the crime world.

safe or not

Too often the websites and institutions that are supposed to be keeping us safe online are just making it look safe.

Debit/Credit Cards
: I am so tired of the new “chip cards” that are being foisted on us. Supposedly they are supposed to bring increased security. I haven’t figured out how, exactly. What it does is make the transaction take longer. I have to leave the card in until it is finished. A merchant told me that increases the incidence of forgotten cards. This new technology costs the merchants more (in effect costing us more, too) but does it actually improve our security? Don’t think so.

the appearance of security?

The Internet has happened so fast, most of us don’t understand it. But we need to start taking responsibility for our own security.

After people find themselves victimized by a breach of an email account or a highjacking of a domain name, they start thinking about security. The first thing we look at is the password. Suddenly we think this isn’t enough.

That’s why banks and sites have started adding “security questions.” Not to make us more safe, but to make us feel more safe.

passwords

I’ve heard it said that a username and password is fine if the password is good, and if you keep it secure.

But if your password is “password” or anything:

  1. easily guessable (your birthdate, middle name, dog’s name, etc.) or
  2. simple enough that password cracking software can breach it
  3. a password you use in more than one place
  4. a password stored “in the cloud”

then you are playing with fire.

Any public information is insecure. One thing that would help enormously with online security would be if we were to stop giving out personally identifiable information everywhere we go.

Lie

When I walk into WalMart, I don’t have to show the greeter ID, or tell them where I live. If they asked that, customers would turn around and walk out.

So why should I have to tell a website I visit my name and post code? None of their business. But if they ask, it usually means you can’t get into the site without giving the information. Rule of thumb: if they don’t have the right to ask for the information in real life, they don’t have the right online.

If you buy something from the site, obviously you need to give them the real info. But if you are just shopping, or doing price comparisons, it is none of their business who you are or where you live. The only thing to do is lie.

Find a post code located far away, tell them a made up name. If you’re feeling really adventurous, change your age or your gender. There are also places where you can get disposable email addresses if you need to validate. Like Mailinator.com

The more people with access to your personal information means there is more chance that your personal security will be breached.

public = anyone can find out

Once you have given it out, used it anywhere, online, EVER, it is not secure. Online anonymity is only as anonymous as you make it. The Electronic Frontier Foundation says in most cases all it takes is three personally identifiable pieces of information to find you.

questioning the questions

Adding a “second layer” doesn’t help when the question is “mother’s maiden name” or “elementary school” as the question. Seems to me those “security questions” are rubbish, only giving the appearance of security. When the answer to “security” questions are publicly identifiable information, you end up using public personally identifiable information which identity thieves can use to crack your account.   #FAIL

You can get around this by answering a different question, so the question and answer no longer make sense. Mother’s Maiden Name: Pepperoni Pizza … but then you have to keep track of the question and answer, too, so instead of keeping one password per site you have to keep track of username, password, question, answer and perhaps another question and answer. So now instead of one reasonably secure password, you need a book or file to keep track of it all. This makes it much easier for the bad guys to grab hold of this. So this “security” nonsense can end up being even less secure.

Funny story: I forgot my bank question thing, but was able to get online access back, over the phone, by telling them my mother’s maiden name. This is my BANK. You know, the ones pushing the chip cards.   #FAIL

real security

Better security can be achieved by keeping out malware. Start with a trusted virus protection program. AVG is good. Check for spyware periodically too.

Don’t open suspect email. If anyone you know has had their identity stolen or sitejacked, don’t open email from their old account. Don’t open attachments. Or apps.

I use the Firefox Browser. Before I click a link on a webpage I am new to, I can hover over it with the curser arrow, and the link’s URL appears in the lower right corner of my screen. This way I can see that the link will take me where the site says it will take me.

One of the ways malware find itself onto people’s computers is through security holes in FLASH which allows crackers entry to *your* computer when you upgrade (don’t do it!) or, my personal favorite: javascript.

I use NoScript because when you allow javascript free reign on your computer, you run the risk allowing executable code on your computer. This means that the java script can have a trojan horse in it, it can start a program to do all kinds of things to your computer. Nowadays they don’t usually turn your computer into a brick, at least right away. Usually they will suck information on your family and friends or record your keystrokes and so find your passwords. Malware, viruses etc.

When I come across a website that is broken without forcing me to load Flash, or worse, that has been javascrippled, I leave. The security risks are simply too high.

passwords

Just so you know: if you use your mother’s maiden name as your password, it doesn’t take a cracker to crack it. The seven year old two doors down the block could likely manage it for a laugh.

Internet bad guys just use a different set of tools. Think of your email password as the lock to your front door. Who would you share the combination with?

If you give the combo to the builders, after they’ve done the job, it is time to change it. The beauty of passwords is that they are much easier to change than physical locks are.

When in doubt, change it.

Keep it secret. Keep it safe.


Comment on “Inconstant Moon” comments by Laurel L. Russwurm

Yes teach. 🙂 Seriously; thanks for the feedback.

(You know, Rich, I’ll be in the market for beta readers for the next novel pretty soon… )

It’s really easy to forget whose head you’re in when tweaking, and I’ve already learned some valuable lessons… the chief of which is to not fiddle with stuff (i.e. rewriting lines here and there) to make it format nicely). What I’m doing now is correcting errors caused in haste by excessive fiddling. The finished product will form the basis of the eBook version and revised print version.

Meantime, in response to your critique, I’ve backed out of Wolfrom’s head in the Chapter 99 line up. The one observation that may appear to be his POV is actually neutral narration.

If I’m not mistaken, there are a couple of sequences that work best with a mid scene POV change. (Elsie and Eric in the coffee shop had to be that way.)

Comment on “Inconstant Moon” comments by Richard Harstone

Hi Laurie. I think it is great you are self publishing this novel. Some quick comments. Your dialogue is strong, sharp and short – realistic – well done.

Try to keep the adverbs ending in “ly” to a minimum. Such words “tell” us rather than “show” us. Example: rather than telling us: “Maggie twists her hands together nervously .”, show us she is nervous: “Maggie twists her hands together; her palms are wet, she wipes them on her hips.” Telling is lazier than showing and doesn’t engage the reader as well.

Also, in the police line-up scene you have two point-of-view characters. Maggie is the primary one, but a couple of times you have us in the head of Wolfrom. More than one point-of-view characters in a scene is usually a no-no.

Other than that, you are moving the scenes along well and I look forward to the next installment.