Verified Document

Net To Acquire Background Information On The Term Paper

¶ … net to acquire background information on the infamous Astor Place Riots in the early 19th Century. B. Do the same with Harriet Beecher Stowe and Uncle Tom's Cabin. C. Read the play, Uncle Tom's Cabin. The Astor Place Riots: What happened? (Approximately one page) In what respects was the Astor Place Riots a continuation of the themes found in the play, The Contrast? (Approximately one page) Uncle Tom's Cabin: Discuss two themes in the play. Also, do you find the play still relevant? Did it move you? (Approximately two pages) The Astor Place riots: What happened?

The Astor Place riots were a result of the professional rivalry between two great tragedians, that of the American actor Edwin Forrest vs. The Englishman William Charles Macready. The two actors had offered the theater-going public of New York their contrasting interpretations of Hamlet, and when both actors were scheduled to play Macbeth on the same night, rioting began on May 10, 1849 at the Astor Place Opera House. "It will be remembered that on Mr. Forrest's former visit to England, he was not only well received, but the press, with but one or two exceptions, was enthusiastic in his praise. All this to Macready was gall and wormwood; and in consultation with his friends -- and more particularly John Forster -- a plan was adopted to crush his successful rival" (Turney n.d).

The Astor Place riots were not simply about literature, but also highlighted the anxieties between Americans and their founding mother country in terms of claiming the right to interpret great works of art. This tension was already seen in an earlier work of American drama, entitled The Contrast, which used the stereotypes...

The values of England were seen as corrupt, foolish, and foppish. The hero of the play, Colonel Manly likewise "praises the homespun, the prudent and modest, the person who steers his own independent way, quite indifferent to imported fashion and manners" (The Contrast, The Metropolitan Playhouse, 2011). The heroine Maria chooses Manly over Billy Dimple. Dimple has recently returned from Europe and has adopted Europe's foppish, aristocratic, and exclusive attitudes.
However, there is an irony -- much as Americans rioted in support of an American actor in the name of patriotism, they were doing so in a war over who had the right to interpret Shakespeare's words. And The Contrast borrowed heavily from the Anglo-Irish dramatist Robert Sheridan's social satire School for Scandal. America was striving to break away, culturally, in its drama, but was only partially succeeding in doing so, given that it still showed evident ties to its British literary origins. Success in Shakespeare was the standard by which all English-speaking actors were measured.

Uncle Tom's Cabin: Two themes in the play

The two, most striking themes in the play inspired by Harriet Beecher's famous novel Uncle Tom's Cabin are the evils of slavery and the ability of goodness to elevate even the most lowly creature to Christ. The novel depicts the escape to freedom by the novel's two romantic protagonists, the slaves George and Eliza, and the martyrdom of the slave Uncle Tom at the hands of the evil overseer Simon Legree. The novel begins showing slavery in its most supposedly 'benign' fashion in the stately home of Mr. Shelby. The tender-hearted Shelbys are supposed to…

Sources used in this document:
Works Cited

The Contrast. The Metropolitan Playhouse. 2011. [23 May 2012]

http://www.metropolitanplayhouse.org/contrastessay

Turney, Wayne. "The Astor Place Riots." A Glimpse of Theater History. [23 May 2012]

http://www.wayneturney.20m.com/astorplaceriot.htm
Cite this Document:
Copy Bibliography Citation

Related Documents

Net-Centric Computing Computers, More Specifically
Words: 1629 Length: 5 Document Type: Term Paper

Access to all the tools necessary to succeed academically allows for access to someone 24/7 who can assist in specific needs. There is an online library that has a huge collection available for electronic delivery (immediate) or access to other databases and materials delivered through email or mail; no residency requirement, no commute, and the ability to build unique and individualzed ways of synthesizing the learning experience between classes (Experience

Information Technology to Transform a
Words: 2228 Length: 6 Document Type: Term Paper

And this money is required to be raised from the market as the company does not generate this amount of revenue either from profits or from internal accruals. (DeHayes, 2003) 5. What should Tim do now? After taking into account all the known and understood pros and cons, there are some points on which Tim has to take action. These are (i) the manner in which to raise capital needed either

Computer Security Information Warfare Iw
Words: 5531 Length: 20 Document Type: Research Paper

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Net Present Value Mergers and Acquisitions
Words: 1444 Length: 5 Document Type: Case Study

NPV Obviously the easiest and most error-free way of doing this is in Excel. Thus, we get the following table for the NPV calculation. Flow NPV (1-5) $2,031,369.67 Total NPV $281,369.67 Google should accept the project, because it has a positive net present value. All projects with a positive net present value add to shareholder wealth. Unless there is a comparison between two mutually exclusive projects, any project with a positive NPV should be accepted. In Google's

Information Security Model and Cyber Terrorism
Words: 2900 Length: 10 Document Type: Capstone Project

goals of this study are to reveal some of the common and prevailing cyber security threats. Here we plan to explore the risk that is most difficult to defend: social engineering. We seek answers to the human elements and characteristics that contribute to the frauds and how they themselves unwittingly give out information that eventually leads to difficult situations. There are many ways in which the attackers 'phish' their

Information Security Evaluation for OSI Systems a Case Study
Words: 4698 Length: 10 Document Type: Case Study

OSIIT An analysis of IT policy transformation The aim of this project is to evaluate the effectiveness of information security policy in the context of an organization, OSI Systems, Inc. With presence in Africa, Australia, Canada, England, Malaysia and the United States, OSI Systems, Inc. is a worldwide company based in California that develops and markets security and inspection systems such as airport security X-ray machines and metal detectors, medical monitoring anesthesia

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now