History of Rock, Part One
About this Course
This course, part 1 of a 2-course sequence, examines the history of rock, primarily as it unfolded in the United States, from the days before rock (pre-1955) to the end of the 1960s. This course covers the music of Elvis Presley, Chuck Berry, Phil Spector, Bob Dylan, the Beatles, the Rolling Stones, Jimi Hendrix, Cream, and many more artists, with an emphasis both on cultural context and on the music itself. We will also explore how developments in the music business and in technology helped shape the ways in which styles developed. Rock emerged in the mid 1950s as a blending of mainstream pop, rhythm and blues, and country and western--styles that previously had remained relatively separate. This new style became the music of the emerging youth culture and was often associated with teen rebellion. We will follow the story of how this rowdy first wave of rock and roll (1955-59) was tamed in the early 60s but came roaring back with the Beatles and the Rolling Stones and then went psychedelic by the end of the decade.Created by: University of Rochester

Related Online Courses
Despite major gains in sexual and reproductive health and gender equity worldwide, abortion remains a topic rife with misinformation, disinformation and influenced by non-evidence-based policies.... more
In this course, you will learn how to apply satisfiability (SAT/SMT) tools to solve a wide range of problems. Several basic examples are given to get the flavour of the applications: fitting... more
This course covers deep learning (DL) methods, healthcare data and applications using DL methods. The courses include activities such as video lectures, self guided programming labs, homework... more
In this 2-hour project-based course, you will learn how to import data into Pandas, create embeddings with SentenceTransformers, and build a retrieval augmented generation (RAG) system with your... more
This is a self-paced lab that takes place in the Google Cloud console. Learn how to restrict access selected authenticated users with Identity-Aware Proxy without special programming. Discover how... more