Thursday, February 13, 2020

Cinematography of the film Casablanca Essay Example | Topics and Well Written Essays - 750 words

Cinematography of the film Casablanca - Essay Example Edeson helped director Michael Curtiz in visualizing by focusing on the shadows and maximizing the use of proper lighting and angles. Wide-angle shots are placed in the beginning scenes giving importance to the place of Casablanca and how a German plane flies behind the sign for Rick's Cafe. The wide shot of the planes just over the cafe shows how important this place will be in the next parts of the story. An establishing shot will soon be noticed as camera angles focuses inside Rick’s cafe as if the audience were walking inside for the first time, giving wide angle shots of the patrons inside the club. Some medium shots are placed on individual characters such as the colored man piano player, until an extreme close up shot of a slip of paper is shown with an â€Å"OK† sign by Rick. Here it is established that Rick is an important man, in a medium shot, he is shown slowly puffing a cigarette. The shots through out the scenes create such continuity and gives credibility to the empty life of Rick. The intensity of the setting in a neutral country of Morocco is established with the mix of characters from the Allied forces and the Germans. It also creates an impression on how â€Å"all is fair in love and war† as what the story line would develop. There is also a use of proper lighting maximized with the proper dà ©cor to create at 1940’s kind of American cafà © with live band and gambling, but still the production team maintained certain props to make sure that the audience would remember that it is still in Morocco like the Islamic architecture that remains obvious in the interior. There is heightened use of lighting to create shadows especially to give focus on melancholic state like after curfew encounters at Rick’s cafe with Renault as he searches for money or documents. It creates a touch of mystery establishing that the main character Rick is an amoral man who after a painful heartbreak has remained to be neutral and cynical. He is portrayed as a bitter and sad man, as focused on the medium and close up shots of a face that seems to be sad and old despite earthly success. He moves slow and somehow gloomy with the background of shadows and smoke that surrounds his cafe. As for Iisa the leading lady, angles are focused on her sad and somehow glowing face with eyes that appears to be always in tears. The musical score also creates an impression. Most part of the film revolves around the song â€Å"As Time Goes By† as it somehow relives a memorable time in Paris by both Rick and Iisa. Songs from the 1930’s to the 1940’s are also el oquently highlighted and combined with national anthems from France and Germany, The audience are reminded that this is not just another love story, it maintains the political issues of World War II. Bogart plays a superb role of a romantic leading man, the sad and indifferent bad boy ruined by a past love. At first he seems to be the typical strong man, full of machismo and ego without caring for anyone in the world but himself. But a sense of humanity is shown by how he treats his employees such as Sam, the piano player. As Bergman enters the scene, we notice that indeed this could be the woman that has created all this illusion. When Sam had an encounter with Iisa, he pretends to have never met her before. It is obvious then that this woman would be someone important. Bergman portrays the role of Iisa with so much justice. The focus on her soft face makes a

Saturday, February 1, 2020

CLOUD COMPUTING Essay Example | Topics and Well Written Essays - 1250 words - 1

CLOUD COMPUTING - Essay Example However, the issue of cloud security is the main focus for the various cloud computing potential customers and it is also considered the major barrier to most of its widespread applications (Patrick, 2013). This research paper will focus on current research done on cloud security. The main focus of the paper will be to survey the popular cloud computing security models as well as the diverse parameters of cloud security which will involve virtualization, compliance, framework, risk management, dynamic access security, internet access security and access management. Introduction The biggest problem facing network computing and distributed systems is security. Cloud computing refers to internet computing and it is the latest concept that has the capability to increase an organization’s service delivery efficiency. The security models of cloud computing that are cloud multiple tenancy model of NIST, cloud risk accumulation model of CSA, Jerico forum’s cloud cube model and the mapping model of cloud, compliance and security are supported by the three cloud services models. Resources for cloud computing are scalable and dynamic .The representation of cloud computing is elaborated through three cloud computing service models which are platform as a service (PaaS), Infrastructure as a Service (IaaS) and Software as a Service (SaaS) (Patrick, 2013). The main aim of these cloud computing service models is to be able to provide the IT departments with focus on the various strategic projects as well as cutting down on the operational costs (Ritesh, Anant war& Swati, 2012). The cloud computing models are considered to have a variety of dimensions that are used to further worsen the security problem. The cloud computing model comprises of two main features which are elasticity and multi-tenancy. Elasticity depends on the presence of secure placement strategies andsecures service migration while multi-tenancy feature results to virtualization and thus the boundaries among different host services need to be improved. At present the available security strategies are only for the single cloud user and single cloud provider but if cloud computing in the future moves to a multiple provider environment security there will be a greater challenge in addressing the issue of security (Patrick, 2013). Users of cloud computing are able to access their database resources from the internet regardless of their location. It is quite clear that the use of cloud services is important and offers a lot of benefits to the user or the enterprise that has ad apted the new technology. Cloud computing can thus be regarded as a model that enables convenience on the demand network access to the shared computing resources. As stated by Amarnath et. al.2010 virtualization technology is used to optimize the performance of the application in a cost effective way but this technology can introduce some security risks. Therefore, cloud computing security plays a major role because the customers outsource computation tasks and data on cloud computing servers which are managed by cloud providers who cannot be trusted (Amarnath, 2010). Cloud computing has become popular as a result of many enterprise applications moving to the cloud platforms. However, the issue of security has become a major barrier point for cloud computing adoption. Based on a recent survey research conducted by the International Data Corporation almost 87.5% of the IT executives stated that security is a major challenge that must be dealt with in each cloud service. Therefore, th ere is need to come up with applications that will be used to curb the threats brought about by security by using some security