sentence1
stringlengths 1
133k
| sentence2
stringlengths 1
131k
|
---|---|
of Iona is quite complex given the island's size and quite distinct from that of nearby Mull. About half of the island's bedrock is Scourian gneiss assigned to the Lewisian complex and dating from the Archaean eon making it some of the oldest rock in Britain and indeed Europe. Closely associated with these gneisses are mylonite and meta-anorthosite and melagabbro. Along the eastern coast facing Mull are steeply dipping Neoproterozoic age metaconglomerates, metasandstones, metamudstones and hornfelsed metasiltstones ascribed to the Iona Group, described traditionally as Torridonian. In the southwest and on parts of the west coast are pelites and semipelites of Archaean to Proterozoic age. There are small outcrops of Silurian age pink granite on southeastern beaches, similar to those of the Ross of Mull pluton cross the sound to the east. Numerous geological faults cross the island, many in a E-W or NW-SE alignment. Devonian aged microdiorite dykes are found in places and some of these are themselves cut by Palaeocene age camptonite and monchiquite dykes ascribed to the 'Iona-Ross of Mull dyke swarm’. More recent sedimentary deposits of Quaternary age include both present day beach deposits and raised marine deposits around Iona as well as some restricted areas of blown sand. Geography Iona lies about from the coast of Mull. It is about wide and long with a resident population of 125. Like other places swept by ocean breezes, there are few trees; most of them are near the parish church. Iona's highest point is Dùn Ì, , an Iron Age hill fort dating from 100 BC – AD 200. Iona's geographical features include the Bay at the Back of the Ocean and Càrn Cùl ri Éirinn (the Hill/Cairn of [turning the] Back to Ireland), said to be adjacent to the beach where St. Columba first landed. The main settlement, located at St. Ronan's Bay on the eastern side of the island, is called Baile Mòr and is also known locally as "The Village". The primary school, post office, the island's two hotels, the Bishop's House and the ruins of the Nunnery are here. The Abbey and MacLeod Centre are a short walk to the north.Murray (1966) pp. 82–83. Port Bàn (white port) beach on the west side of the island is home to the Iona Beach Party. There are numerous offshore islets and skerries: Eilean Annraidh (island of storm) and Eilean Chalbha (calf island) to the north, Rèidh Eilean and Stac MhicMhurchaidh to the west and Eilean Mùsimul (mouse holm island) and Soa Island to the south are amongst the largest. The steamer Cathcart Park carrying a cargo of salt from Runcorn to Wick ran aground on Soa on 15 April 1912, the crew of 11 escaping in two boats.The record is tentative, the press cutting the record refers to identifying "'Sheep Island', one of the Torran Rocks near Iona" but there is no other obvious contender. Subdivision On a map of 1874, the following territorial subdivision is indicated (from north to south): Ceann Tsear (East Head) Sliabh Meanach (Middle Mountain) Machar (Low-lying Grassy Plain) Sliginach (Shelly Area) Sliabh Siar (Rear Mountain) Staonaig (Sloping Ground) History Dál Riata In the early Historic Period Iona lay within the Gaelic kingdom of Dál Riata, in the region controlled by the Cenél Loairn (i.e. Lorn, as it was then). The island was the site of a highly important monastery (see Iona Abbey) during the Early Middle Ages. The monastery was founded in 563 by the monk Columba, also known as Colm Cille, who sailed here from Ireland to live the monastic life. Much later legends (a thousand years later, and without any good evidence) said that he had been exiled from his native Ireland as a result of his involvement in the Battle of Cul Dreimhne. Columba and twelve companions went into exile on Iona and founded a monastery there. The monastery was hugely successful, and may have played a role in the conversion to Christianity of the Picts of present-day Scotland in the late 6th century, and was certainly central to the conversion of the Anglo-Saxon kingdom of Northumbria in 635. Many satellite institutions were founded, and Iona became the centre of one of the most important monastic systems in Great Britain and Ireland. Iona became a renowned centre of learning, and its scriptorium produced highly important documents, probably including the original texts of the Iona Chronicle, thought to be the source for the early Irish annals. The monastery is often associated with the distinctive practices and traditions known as Celtic Christianity. In particular, Iona was a major supporter of the "Celtic" system for calculating the date of Easter at the time of the Easter controversy, which pitted supporters of the Celtic system against those favoring the "Roman" system used elsewhere in Western Christianity. The controversy weakened Iona's ties to Northumbria, which adopted the Roman system at the Synod of Whitby in 664, and to Pictland, which followed suit in the early 8th century. Iona itself did not adopt the Roman system until 715, according to the Anglo-Saxon historian Bede. Iona's prominence was further diminished over the next centuries as a result of Viking raids and the rise of other powerful monasteries in the system, such as the Abbey of Kells. The Book of Kells may have been produced or begun on Iona towards the end of the 8th century.Forbes, Andrew ; Henley, David (2012). Pages from the Book of Kells. Chiang Mai: Cognoscenti Books. ASIN: B00AN4JVI0 Around this time the island's exemplary high crosses were sculpted; these may be the first such crosses to contain the ring around the intersection that became characteristic of the "Celtic cross". The series of Viking raids on Iona began in 794 and, after its treasures had been plundered many times, Columba's relics were removed and divided two ways between Scotland and Ireland in 849 as the monastery was abandoned. Kingdom of the Isles As the Norse domination of the west coast of Scotland advanced, Iona became part of the Kingdom of the Isles. The Norse Rex plurimarum insularum Amlaíb Cuarán died in 980 or 981 whilst in "religious retirement" on Iona.Gregory (1881) pp. 4–6 Nonetheless, the island was sacked twice by his successors, on Christmas night 986 and again in 987. Although Iona was never again important to Ireland, it rose to prominence once more in Scotland following the establishment of the Kingdom of Scotland in the later 9th century; the ruling dynasty of Scotland traced its origin to Iona, and the island thus became an important spiritual centre for the new kingdom, with many of its early kings buried there. However, a campaign by Magnus Barelegs led to the formal acknowledgement of Norwegian control of Argyll, in 1098. Somerled, the brother-in-law of Norway's governor of the region (the King of the Isles), launched a revolt, and made the kingdom independent. A convent for Augustinian nuns was established in about 1208, with Bethóc, Somerled's daughter, as first prioress. The present buildings are of the Benedictine abbey, Iona Abbey, from about 1203, dissolved at the Reformation. On Somerled's death, nominal Norwegian overlordship of the Kingdom was re-established, but de facto control was split between
|
prioress. The present buildings are of the Benedictine abbey, Iona Abbey, from about 1203, dissolved at the Reformation. On Somerled's death, nominal Norwegian overlordship of the Kingdom was re-established, but de facto control was split between Somerled's sons, and his brother-in-law. Kingdom of Scotland Following the 1266 Treaty of Perth the Hebrides were transferred from Norwegian to Scottish overlordship. At the end of the century, King John Balliol was challenged for the throne by Robert the Bruce. By this point, Somerled's descendants had split into three groups, the MacRory, MacDougalls, and MacDonalds. The MacDougalls backed Balliol, so when he was defeated by de Bruys, the latter exiled the MacDougalls and transferred their island territories to the MacDonalds; by marrying the heir of the MacRorys, the heir of the MacDonalds re-unified most of Somerled's realm, creating the Lordship of the Isles, under nominal Scottish authority. Iona, which had been a MacDougall territory (together with the rest of Lorn), was given to the Campbells, where it remained for half a century. In 1354, though in exile and without control of his ancestral lands, John, the MacDougall heir, quitclaimed any rights he had over Mull and Iona to the Lord of the Isles (though this had no meaningful effect at the time). When Robert's son, David II, became king, he spent some time in English captivity; following his release, in 1357, he restored MacDougall authority over Lorn. The 1354 quitclaim, which seems to have been an attempt to ensure peace in just such an eventuality, took automatic effect, splitting Mull and Iona from Lorn, and making it subject to the Lordship of the Isles. Iona remained part of the Lordship of the Isles for the next century and a half. Following the 1491 Raid on Ross, the Lordship of the Isles was dismantled, and Scotland gained full control of Iona for the second time. The monastery and nunnery continued to be active until the Reformation, when buildings were demolished and all but three of the 360 carved crosses destroyed. The Augustine nunnery now only survives as a number of 13th century ruins, including a church and cloister. By the 1760s little more of the nunnery remained standing than at present, though it is the most complete remnant of a medieval nunnery in Scotland. Post-Union After a visit in 1773, the English writer Samuel Johnson remarked: The island, which was once the metropolis of learning and piety, now has no school for education, nor temple for worship. He estimated the population of the village at 70 families or perhaps 350 inhabitants. In the 19th century green-streaked marble was commercially mined in the south-east of Iona; the quarry and machinery survive, see 'Marble Quarry remains' below. Iona Abbey Iona Abbey, now an ecumenical church, is of particular historical and religious interest to pilgrims and visitors alike. It is the most elaborate and best-preserved ecclesiastical building surviving from the Middle Ages in the Western Isles of Scotland. Though modest in scale in comparison to medieval abbeys elsewhere in Western Europe, it has a wealth of fine architectural detail, and monuments of many periods. The 8th Duke of Argyll presented the sacred buildings and sites of the island to the Iona Cathedral trust in 1899. Historic Environment Scotland also recommends visiting the Augustinian nunnery, "the most complete nunnery complex to survive in Scotland". It was founded at the same time as the Abbey; many ruins from the 14th century are visible. The nunnery declined after the Scottish Reformation but was still used as a burial place for women. In front of the Abbey stands the 9th-century St Martin's Cross, one of the best-preserved Celtic crosses in the British Isles, and a replica of the 8th-century St John's Cross (original fragments in the Abbey museum). The ancient burial ground, called the Rèilig Odhrain (Eng: Oran's "burial place" or "cemetery"), contains the 12th-century chapel of St Odhrán (said to be Columba's uncle), restored at the same time as the Abbey itself. It contains a number of medieval grave monuments. The abbey graveyard is said to contain the graves of many early Scottish Kings, as well as Norse kings from Ireland and Norway. Iona became the burial site for the kings of Dál Riata and their successors. Notable burials there include: Cináed mac Ailpín, king of the Picts (also known today as "Kenneth I of Scotland") Domnall mac Causantín, alternatively "king of the Picts" or "king of Scotland" ("Donald II") Máel Coluim mac Domnaill, king of Scotland ("Malcolm I") Donnchad mac Crínáin, king of Scotland ("Duncan I") Mac Bethad mac Findlaích, king of Scotland ("Macbeth") Domnall mac Donnchada, king of Scotland ("Donald III") John Smith, Labour Party Leader In 1549 an inventory of 48 Scottish, 8 Norwegian and 4 Irish kings was recorded. None of these graves are now identifiable (their inscriptions were reported to have worn away at the end of the 17th century). Saint Baithin and Saint Failbhe may also be buried on the island. The Abbey graveyard is also the final resting place of John Smith, the former Labour Party leader, who loved Iona. His grave is marked with an epitaph quoting Alexander Pope: "An honest man's the noblest work of God". Limited archaeological investigations commissioned by the National Trust for Scotland found some evidence for ancient burials in 2013. The excavations, conducted in the area of Martyrs Bay, revealed burials from the 6th–8th centuries, probably jumbled up and reburied in the 13–15th centuries. Other early Christian and medieval monuments have been removed for preservation to the cloister arcade of the Abbey, and the Abbey museum (in the medieval infirmary). The ancient buildings of Iona Abbey are now cared for by Historic Environment Scotland (there is an entrance charge to visit them). Marble quarry remains The remains of a marble quarrying enterprise can be seen in a small bay on the south-east shore of Iona. The quarry is the source of 'Iona Marble', a beautiful translucent green and white stone, much used in brooches and other jewellery. The stone has been known of for centuries and was credited with healing and other powers. While the quarry had been used in a small way, it was not until around the end of the 18th century when it was opened up on a more industrial scale by the Duke of Argyle. The then difficulties of extracting the hard stone and transporting it meant that the scheme was short lived. Another attempt was started in 1907, this time more successful with considerable quantities of stone extracted and indeed exported, but the First World War put paid to this as well, with little quarrying after 1914 and the operation finally closing in 1919. A painting showing the quarry in operation, The Marble Quarry, Iona (1909) by David Young Cameron, is in the collection of Cartwright Hall art gallery in Bradford. Such is the site's rarity that it has been designated as a Scheduled Ancient Monument. Present day The island, other than the land owned by the Iona Cathedral Trust, was purchased from the Duke of Argyll by Hugh Fraser in 1979 and donated to the National Trust for Scotland. In 2001 Iona's population was 125 and by the time of the 2011 census this had grown to 177 usual residents. During the same period Scottish island populations as a whole grew by 4% to 103,702. The estimated permanent population in 2020 was 120. The island's tourism bureau estimated that roughly 130,000 visitors arrived each year. Many tourists come to visit the Abbey and other ecclesiastical properties and the marble quarry, or to enjoy the nine beaches that are within walking distance of the main area. Iona Community Not to be confused with the local island community, Iona (Abbey) Community is based within Iona Abbey. In 1938 George MacLeod founded the Iona Community, an ecumenical Christian community of men and women from different walks of life and different traditions in the Christian church committed to seeking new ways of living the Gospel of Jesus in today's world. This community is a leading force in the present Celtic Christian revival. The Iona Community runs 3 residential centres on the Isle of Iona and on Mull, where one can live together in community with people of every background from all over the world. Weeks at the centres often follow a programme related to the concerns of the Iona Community. The 8 tonne Fallen Christ sculpture by Ronald Rae was permanently situated outside the MacLeod Centre in February 2008. Transport Visitors can reach Iona by the 10-minute ferry trip across the Sound of Iona from Fionnphort on Mull. The most common route from the mainland is via Oban in Argyll and Bute, where regular ferries connect to Craignure on Mull, from where the scenic road runs to Fionnphort. Tourist coaches and local bus services meet the ferries. Car ownership is lightly regulated, with no requirement for an MOT Certificate or payment of Road Tax for cars kept permanently on the island, but vehicular access is restricted to permanent residents and there are few cars. Visitors are not allowed to bring vehciles onto the island although "blue badge holders with restricted mobility ... may apply for a permit under certain exemptions". Visitors will find the village, the shops, the post office, the cafe, the hotels and the abbey are all within walking distance. Bike hire is available at the pier, and on Mull. Taxi service is also available. Tourism Conde Nast Traveller recommends the island for its "peaceful atmosphere ... a popular place for spiritual retreats" but also recommends the "sandy beaches, cliffs, rocks, fields and bogs ... "wildflowers and birds such as the rare corncrake and puffins" as well as the "abundance of sea life". The Iona Council advises visitors that they can find a campsite (at Cnoc Oran), a hostel (at Lagandorain), family run bed and breakfasts, and two hotels on the island in addition to several self-catering houses. The agency also mentions that distances are short, with the Abbey a mere 10 minutes’ walk from the pier. Tourists can rent bikes or use the local taxi. Iona in Scottish painting The island of Iona has played an important role in Scottish landscape painting, especially during the Twentieth Century. As travel to north and west Scotland became easier from the mid C18 on, artists' visits to the island steadily increased. The Abbey remains in particular became frequently recorded during this early period. Many of the artists are listed and illustrated in the valuable book, Iona Portrayed – The Island through Artists' Eyes 1760–1960''', which lists over 170 artists known to have painted on the island. The C20 however saw the greatest period of influence on landscape painting, in particular through the many paintings of the island produced by F C B Cadell and S J Peploe, two of the ‘Scottish Colourists’. As with many artists, both professional and amateur, they were attracted by the unique quality of light, the white sandy beaches, the aquamarine colours of the sea and the landscape of rich greens and rocky outcrops. While Cadell and Peploe are perhaps best known, many major Scottish painters of the C20 worked on Iona and visited many times – for example George Houston, D Y Cameron, James Shearer, John Duncan and John Maclauchlan Milne, among many. Media and the arts Samuel Johnson wrote "That man is little to be envied whose patriotism would not gain force upon the plains of Marathon, or whose piety would not grow warmer amid the ruins of Iona." In Jules Verne's novel The Green Ray, the heroes visit Iona in chapters 13 to 16. The inspiration is romantic, the ruins
|
and the grammatical ending. Some of the grammatical endings are defined as follows: These are the same as in Esperanto except for -i, -ir, -ar, -or and -ez. Esperanto marks noun plurals by an agglutinative ending -j (so plural nouns end in -oj), uses -i for verb infinitives (Esperanto infinitives are tenseless), and uses -u for the imperative. Verbs in Ido, as in Esperanto, do not conjugate depending on person, number or gender; the -as, -is, and -os endings suffice whether the subject is I, you, he, she, they, or anything else. For the word "to be," Ido allows either "esas" or "es" in the present tense; however, the full forms must be used for the past tense "esis" and future tense "esos." Adjectives and adverbs are compared in Ido by means of the words plu = more, maxim = most, min = less, minim = least, kam = than/as. There exist in Ido three categories of adverbs: the simple, the derived, and the composed. The simple adverbs do not need special endings, for example: tre = very, tro = too, olim = formerly, nun = now, nur = only. The derived and composed adverbs, not being originally adverbs but derived from nouns, adjectives and verbs, have the ending -e. Syntax Ido word order is generally the same as English (subject–verb–object), so the sentence Me havas la blua libro is the same as the English "I have the blue book", both in meaning and word order. There are a few differences, however: Adjectives can precede the noun as in English, or follow the noun as in Spanish. Thus, Me havas la libro blua means the same thing. Ido has the accusative suffix -n. Unlike Esperanto, this suffix is only required when the object of the sentence is not clear, for example, when the subject-verb-object word order is not followed. Thus, La blua libron me havas also means the same thing. Ido generally does not impose rules of grammatical agreement between grammatical categories within a sentence. For example, the verb in a sentence is invariable regardless of the number and person of the subject. Nor must the adjectives be pluralized as well the nounsin Ido the large books would be la granda libri as opposed to the French les grands livres or the Esperanto la grandaj libroj. Negation occurs in Ido by simply adding ne before a verb: Me ne havas libro means "I do not have a book". This as well does not vary, and thus the "I do not", "He does not", "They do not" before a verb are simply Me ne, Il ne, and Li ne. In the same way, past tense and future tense negatives are formed by ne before the conjugated verb. "I will not go" and "I did not go" become Me ne iros and Me ne iris respectively. Yes/no questions are formed by the particle ka in front of the question. "I have a book" (me havas libro) becomes Ka me havas libro? (do I have a book?). Ka can also be placed in front of a noun without a verb to make a simple question, corresponding to the English "is it?" Ka Mark? can mean, "Are you Mark?", "Is it Mark?", "Do you mean Mark?" depending on the context. Pronouns The pronouns of Ido were revised to make them more acoustically distinct than those of Esperanto, which all end in i. Especially the singular and plural first-person pronouns mi and ni may be difficult to distinguish in a noisy environment, so Ido has me and ni instead. Ido also distinguishes between intimate (tu) and formal (vu) second-person singular pronouns as well as plural second-person pronouns (vi) not marked for intimacy. Furthermore, Ido has a pan-gender third-person pronoun lu (it can mean "he", "she", or "it", depending on the context) in addition to its masculine (il), feminine (el), and neuter (ol) third-person pronouns. ci, although technically the familiar form of the word "you" in Esperanto, is seldom used. Esperanto's inventor himself did not include the pronoun in the first book on Esperanto and only later reluctantly; later he recommended against using ci because different cultures have conflicting traditions regarding the use of the familiar and formal forms of "you". ri, iŝi, iĝi and by extension iri are proposed neologisms and are rare, but they are still used albeit seldom. ol, like English it and Esperanto ĝi, is not limited to inanimate objects, but can be used "for entities whose sex is indeterminate: babies, children, humans, youths, elders, people, individuals, horses, [cattle], cats, etc." Lu is often mistakenly labeled an epicene pronoun, that is, one that refers to both masculine and feminine beings, but in fact, lu is more properly a "pan-gender" pronoun, as it is also used for referring to inanimate objects. From Kompleta Gramatiko Detaloza di la Linguo Internaciona Ido by Beaufront: Table of correlatives Ido makes correlatives by combining entire words together and changing the word ending, with some irregularities to show distinction. The initial i can be omitted: ta, to, ti, ta. One can omit the initial a: ultempe, nultempe, ulspeca, nulspeca, ulmaniere, nulmaniere. omnatempe is correct and usable, but sempre is the actual word. Instead of irga quanto, nula quanto and la tota quanto one usually says irgo, nulo and omno. Compound formation Composition in Ido obeys stricter rules than in Esperanto, especially formation of nouns, adjectives and verbs from a radical of a different class. The reversibility principle assumes that for each composition rule (affix addition), the corresponding decomposition rule (affix removal) is valid. Hence, while in Esperanto an adjective (for instance , formed on the noun radical , can mean an attribute ( “paper-made encyclopedia”) and a relation ( “paper-making factory”), Ido will distinguish the attribute (“paper” or “of paper” (not “paper-made” exactly)) from the relation (“paper-making”). Similarly, means in both Esperanto and Ido the noun “crown”; where Esperanto allows formation of “to crown” by simply changing the ending from noun to verb (“crowning” is ), Ido requires an affix so the composition is reversible: (“the act of crowning” is ). According to Claude Piron, some modifications brought by Ido are in practice impossible to use and ruin spontaneous expression: Ido displays, on linguistic level, other drawbacks Esperanto succeeded to avoid, but I don’t have at hand documents which would allow me to go further in detail. For instance, if I remember correctly, where Esperanto only has the suffix *, Ido has several: **, **, **, which match subtleties which were meant to make language clearer, but that, in practice, inhibit natural expression. Vocabulary Vocabulary in Ido is derived from French, Italian, Spanish, English, German, and Russian. Basing the vocabulary on various widespread languages was intended to make Ido as easy as possible for the greatest number of people possible. Early on, the first 5,371 Ido word roots were analyzed compared to the vocabulary of the six source languages, and the following result was found: 2024 roots (38%) belong to 6 languages 942 roots (17%) belong to 5 languages 1111 roots (21%) belong to 4 languages 585 roots (11%) belong to 3 languages 454 roots (8%) belong to 2 languages 255 roots (5%) belong to 1 language Another analysis showed that: 4880 roots (91%) are found in French 4454 roots (83%) are found in Italian 4237 roots (79%) are found in Spanish 4219 roots (79%) are found in English 3302 roots (61%) are found in German 2821 roots (52%) are found in Russian Vocabulary in Ido is often created through a number of official prefixes and suffixes that alter the meaning of the word. This allows a user to take existing words and modify them to create neologisms when necessary, and allows for a wide range of expression without the need to learn new vocabulary each time. Though their number is too large to be included in one article, some examples include: The diminutive suffix -et-. Domo (house) becomes dometo (cottage), and libro (book) becomes libreto (novelette or short story). The pejorative suffix -ach-. Domo becomes domacho (hovel), and libro becomes libracho (a shoddy piece of work, pulp fiction, etc.) The prefix retro-, which implies a reversal. Irar (to go) becomes retroirar (to go back, backward) and venar (to come) becomes retrovenar (to return). New vocabulary is generally created through an analysis of the word, its etymology, and reference to the six source languages. If a word can be created through vocabulary already existing in the language then it will usually be adopted without need for a new radical (such as wikipedio for Wikipedia, which consists of wiki + enciklopedio for encyclopedia), and if not an entirely new word will be created. The word alternatoro for example was adopted in 1926, likely because five of the six source languages used largely the same orthography for the word, and because it was long enough to avoid being mistaken for other words in the existing vocabulary. Adoption of a word is done through consensus, after which the word will be made official by the union. Care must also be taken to avoid homonyms if possible, and usually a new word undergoes some discussion before being adopted. Foreign words that have a restricted sense and are not likely to be used in everyday life (such as the word intifada to refer to the conflict between Israel and Palestine) are left untouched, and often written in italics. Ido, unlike Esperanto, does not assume the male sex by default. For example, Ido does not derive the word for “waitress” by adding a feminine suffix to “waiter”, as Esperanto does. Instead, Ido words are defined as sex-neutral, and two different suffixes derive masculine and feminine words from the root: for a waiter of either sex, for a male waiter, and for a waitress. There are only two exceptions to this rule: First, for “father”, for “mother”, and for “parent”, and second, for “man”, for “woman”, and for “adult”. Sample The Lord's Prayer: Literature and publications Ido has a number of publications that can be subscribed to or downloaded for free in most cases. Kuriero Internaciona is a magazine produced in France every few months with a range of topics. Adavane! is a magazine produced by the Spanish Ido Society every two months that has a range of topics, as well as a few dozen pages of work translated from other languages. Progreso is the official organ of the Ido movement and has been around since the inception of the movement in 1908. Other sites can be found with
|
and endorse an international language; the request was rejected in May 1907. The Delegation then met as a Committee in Paris in October 1907 to discuss the adoption of a standard international language. Among the languages considered was a new language anonymously submitted at the last moment (and therefore against the Committee rules) under the pen name Ido. In the end the committee, always without plenary sessions and consisting of only 12 members, concluded the last day with 4 votes for and 1 abstention. They concluded that no language was completely acceptable, but that Esperanto could be accepted "on condition of several modifications to be realized by the permanent Commission in the direction defined by the conclusions of the Report of the Secretaries [Louis Couturat and Léopold Leau] and by the Ido project". Esperanto's inventor, L. L. Zamenhof, having heard a number of complaints, had suggested in 1894 a proposal for a Reformed Esperanto with several changes that Ido adopted and made it closer to French: eliminating the accented letters and the accusative case, changing the plural to an Italianesque -i, and replacing the table of correlatives with more Latinate words. However, the Esperanto community voted and rejected Reformed Esperanto, and likewise most rejected the recommendations of the 1907 Committee composed by 12 members. Zamenhof deferred to their judgment, although doubtful. Furthermore, controversy ensued when the "Ido project" was found to have been primarily devised by Louis de Beaufront, whom Zamenhof had chosen to represent Esperanto before the committee, as the committee's rules dictated that the creator of a submitted language could not defend it. The committee's language was French and not everyone could speak in French. When the president of the Committee asked who was the author of Ido's project, Couturat, Beaufront and Leau answered that they were not. Beaufront was the person who presented Ido's project and gave a description as a better, richer version of Esperanto. Couturat, Leau, Beaufront and Jespersen were finally the only members who voted, all of them for Ido's project. A month later, Couturat accidentally put Jespersen in a copy of a letter in which he acknowledged that Beaufront was the author of the Ido project. Jespersen was angered by this and asked for a public confession, which was never forthcoming. It is estimated that some 20% of Esperanto leaders and 3–4% of ordinary Esperantists switched to Ido, which from then on suffered constant modifications seeking to perfect it, but which ultimately had the effect of causing many Ido speakers to give up on trying to learn it. Although it fractured the Esperanto movement, the schism gave the remaining Esperantists the freedom to concentrate on using and promoting their language as it stood. At the same time, it gave the Idists freedom to continue working on their own language for several more years before actively promoting it. The Uniono di la Amiki di la Linguo Internaciona (Union of Friends of the International Language) was established along with an Ido Academy to work out the details of the new language. Couturat, who was the leading proponent of Ido, was killed in an automobile accident in 1914. This, along with World War I, practically suspended the activities of the Ido Academy from 1914 to 1920. In 1928 Ido's major intellectual supporter, the Danish linguist Otto Jespersen, published his own planned language, Novial. His leaving the Ido movement set it back even further. Digital era The language still has active speakers, numbering about 500. The Internet has sparked a renewal of interest in the language in recent years. A sample of 24 Idists on the Yahoo! group Idolisto during November 2005 showed that 57% had begun their studies of the language during the preceding three years, 32% from the mid-1990s to 2002, and 8% had known the language from before. Changes Few changes have been made to Ido since 1922. Camiel de Cock was named secretary of linguistic issues in 1990, succeeding Roger Moureaux. He resigned after the creation of a linguistic committee in 1991. De Cock was succeeded by Robert C. Carnaghan, who held the position from 1992 to 2008. No new words were adopted between 2001 and 2006. Following the 2008–2011 elections of ULI's direction committee, Gonçalo Neves replaced Carnaghan as secretary of linguistic issues in February 2008. Neves resigned in August 2008. A new linguistic committee was formed in 2010. In April 2010, Tiberio Madonna was appointed as secretary of linguistic issues, succeeding Neves. In January 2011, ULI approved eight new words. This was the first addition of words in many years. As of January 2021, the secretary of linguistic issues remains Tiberio Madonna. Phonology Ido has five vowel phonemes. The vowels and are interchangeable depending on speaker preference, as are and . The combinations /au/ and /eu/ become diphthongs in word roots but not when adding affixes. All polysyllabic words are stressed on the second-to-last syllable except for verb infinitives, which are stressed on the last syllableskolo, kafeo and lernas for "school", "coffee" and the present tense of "to learn", but irar, savar and drinkar for "to go", "to know" and "to drink". If an i or u precedes another vowel, the pair is considered part of the same syllable when applying the accent rulethus radio, familio and manuo for "radio", "family" and "hand", unless the two vowels are the only ones in the word, in which case the "i" or "u" is stressed: dio, frua for "day" and "early". Orthography Ido uses the same 26 letters as the English alphabet and ISO Basic Latin alphabet with three digraphs and no ligatures or diacritics. Where the table below lists two pronunciations, either is perfectly acceptable. The digraphs are: Grammar The definite article is "la" and is invariable. The indefinite article (a/an) does not exist in Ido. Each word in the Ido vocabulary is built from a root word. A word consists of a root and a grammatical ending. Other words can be formed from that word by removing the grammatical ending and adding a new one, or by inserting certain affixes between the root and the grammatical ending. Some of the grammatical endings are defined as follows: These are the same as in Esperanto except for -i, -ir, -ar, -or and -ez. Esperanto marks noun plurals by an agglutinative ending -j (so plural nouns end in -oj), uses -i for verb infinitives (Esperanto infinitives are tenseless), and uses -u for the imperative. Verbs in Ido, as in Esperanto, do not conjugate depending on person, number or gender; the -as, -is, and -os endings suffice whether the subject is I, you, he, she, they, or anything else. For the word "to be," Ido allows either "esas" or "es" in the present tense; however, the full forms must be used for the past tense "esis" and future tense "esos." Adjectives and adverbs are compared in Ido by means of the words plu = more, maxim = most, min = less, minim = least, kam = than/as. There exist in Ido three categories of adverbs: the simple, the derived, and the composed. The simple adverbs do not need special endings, for example: tre = very, tro = too, olim = formerly, nun = now, nur = only. The derived and composed adverbs, not being originally adverbs but derived from nouns, adjectives and verbs, have the ending -e. Syntax Ido word order is generally the same as English (subject–verb–object), so the sentence Me havas la blua libro is the same as the English "I have the blue book", both in meaning and word order. There are a few differences, however: Adjectives can precede the noun as in English, or follow the noun as in Spanish. Thus, Me havas la libro blua means the same thing. Ido has the accusative suffix -n. Unlike Esperanto, this suffix is only required when the object of the sentence is not clear, for example, when the subject-verb-object word order is not followed. Thus, La blua libron me havas also means the same thing. Ido generally does not impose rules of grammatical agreement between grammatical categories within a sentence. For example, the verb in a sentence is invariable regardless of the number and person of the subject. Nor must the adjectives be pluralized as well the nounsin Ido the large books would be la granda libri as opposed to the French les grands livres or the Esperanto la grandaj libroj. Negation occurs in Ido by simply adding ne before a verb: Me ne havas libro means "I do not have a book". This as well does not vary, and thus the "I do not", "He does not", "They do not" before a verb are simply Me ne, Il ne, and Li ne. In the same way, past tense and future tense negatives are formed by ne before the conjugated verb. "I will not go" and "I did not go" become Me ne iros and Me ne iris respectively. Yes/no questions are formed by the particle ka in front of the question. "I have a book" (me havas libro) becomes Ka me havas libro? (do I have a book?). Ka can also be placed in front of a noun without a verb to make a simple question, corresponding to the English "is it?" Ka Mark? can mean, "Are you Mark?", "Is it Mark?", "Do you mean Mark?" depending on the context. Pronouns The pronouns of Ido were revised to make them more acoustically distinct than those of Esperanto, which all end in i. Especially the singular and plural first-person pronouns mi and ni may be difficult to distinguish in a noisy environment, so Ido has me and ni instead. Ido also distinguishes between intimate (tu) and formal (vu) second-person singular pronouns as well as plural second-person pronouns (vi) not marked for intimacy. Furthermore, Ido has a pan-gender third-person pronoun lu (it can mean "he", "she", or "it", depending on the context) in addition to its masculine (il), feminine (el), and neuter (ol) third-person pronouns. ci, although technically the familiar form of the word "you" in Esperanto, is seldom used. Esperanto's inventor himself did not include the pronoun in the first book on Esperanto and only later reluctantly; later he recommended against using ci because different cultures have conflicting traditions regarding the use of the familiar and formal forms of "you". ri, iŝi, iĝi and by extension iri are proposed neologisms and are rare, but they are still used albeit seldom. ol, like English it and Esperanto ĝi, is not limited to inanimate objects, but can be used "for entities whose sex is indeterminate: babies, children, humans, youths, elders, people, individuals, horses, [cattle], cats, etc." Lu is often mistakenly labeled an epicene pronoun, that is, one that refers to both masculine and feminine beings, but in fact, lu is more properly a "pan-gender" pronoun, as it is also used for referring to inanimate objects. From Kompleta Gramatiko Detaloza di la Linguo Internaciona Ido by Beaufront: Table of correlatives Ido makes correlatives by combining entire words together and changing the word ending, with some irregularities to show distinction. The initial i can be omitted: ta, to, ti, ta. One can omit the initial a: ultempe, nultempe, ulspeca, nulspeca, ulmaniere, nulmaniere. omnatempe
|
games expert Neva Boyd. The short-form improv comedy television series Whose Line Is It Anyway? has familiarized American and British viewers with short-form. Longform improv performers create shows in which short scenes are often interrelated by story, characters, or themes. Longform shows may take the form of an existing type of theatre, for example a full-length play or Broadway-style musical such as Spontaneous Broadway. One of the better-known longform structures is the Harold, developed by ImprovOlympic co-founder Del Close. Many such longform structures now exist. Longform improvisation is especially performed in Chicago, New York City, Los Angeles; has a strong presence in Austin, Boston, Minneapolis, Phoenix, Philadelphia, San Francisco, Seattle, Detroit, Toronto, Vancouver, Washington, D.C.; and is building a growing following in Baltimore, Denver, Kansas City, Montreal, Columbus, New Orleans, Omaha, Rochester, NY, and Hawaii. Outside the United States, longform improv has a growing presence in the United Kingdom, especially in cities such as London, Bristol, and at the Edinburgh Festival Fringe. Non-comedic, experimental, and dramatic, narrative-based improvisational theater Other forms of improvisational theatre training and performance techniques are experimental and avant-garde in nature and not necessarily intended to be comedic. These include Playback Theatre and Theatre of the Oppressed, the Poor Theatre, the Open Theatre, to name only a few. The Open Theatre was founded in New York City by a group of former students of acting teacher Nola Chilton, and joined shortly thereafter by director Joseph Chaikin, formerly of The Living Theatre, and Peter Feldman. This avant-garde theatre group explored political, artistic, and social issues. The company, developing work through an improvisational process drawn from Chilton and Viola Spolin, created well-known exercises, such as "sound and movement" and "transformations", and originated radical forms and techniques that anticipated or were contemporaneous with Jerzy Grotowski's "poor theater" in Poland. During the sixties Chaikin and the Open Theatre developed full theatrical productions with nothing but the actors, a few chairs and a bare stage, creating character, time and place through a series of transformations the actors physicalized and discovered through improvisations. On the west coast, Ruth Zaporah developed Action Theater™, a physically-based improvisation form that treats language, movement and voice equally. Action Theater™ performances have no scripts, no preplanned ideas and create full-length shows or shorter performances. Longform, dramatic, and narrative-based improvisation is well-established on the west coast with companies such as San Francisco's BATS Improv. This format allows for full-length plays and musicals to be created improvisationally. Applying improv principles in life Many people who have studied improv have noted that the guiding principles of improv are useful, not just on stage, but in everyday life. For example, Stephen Colbert in a commencement address said, Tina Fey in her book Bossypants lists several rules of improv that apply in the workplace. There has been much interest in bringing lessons from improv into the corporate world. In a New York Times article titled "Can Executives Learn to Ignore the Script?", Stanford professor and author, Patricia Ryan Madson notes, "executives and engineers and people in transition are looking for support in saying yes to their own voice. Often, the systems we put in place to keep us secure are keeping us from our more creative selves." In film and television Many directors have made use of improvisation in the creation of both mainstream and experimental films. Many silent filmmakers such as Charlie Chaplin and Buster Keaton used improvisation in the making of their films, developing their gags while filming and altering the plot to fit. The Marx Brothers were notorious for deviating from the script they were given, their ad libs often becoming part of the standard routine and making their way into their films. Many people, however, make a distinction between ad-libbing and improvising. The British director Mike Leigh makes extensive use of improvisation in the creation of his films, including improvising important moments in the characters' lives that will not even appear in the film. This Is Spinal Tap and other mockumentary films of director Christopher Guest were created with a mix of scripted and unscripted material. Blue in the Face is a 1995 comedy directed by Wayne Wang and Paul Auster created in part by the improvisations during the filming of Smoke. Some of the best known American film directors who used improvisation in their work with actors are John Cassavetes, Robert Altman, Christopher Guest, and Rob Reiner. Improv comedy techniques have also been used in hit television shows such as HBO's Curb Your Enthusiasm created by Larry David, the UK Channel 4 and ABC television series Whose Line Is It Anyway (and its spinoffs Drew Carey's Green Screen Show and Drew Carey's Improv-A-Ganza), Nick Cannon's improv comedy show Wild 'N Out, and Thank God You're Here. A very early American improv television program was the weekly half-hour What Happens Now? which premiered on New York's WOR-TV on October 15, 1949 and ran for 22 episodes. "The Improvisers" were six actors (including Larry Blyden, Ross Martin, and Jean Alexander – Jean Pugsley at the time) who improvised skits based on situations suggested by viewers. In Canada, the series Train 48 was improvised from scripts which contained a minimal outline of each scene, and the comedy series This Sitcom Is...Not to Be Repeated incorporated dialogue drawn from a hat during the course of an episode. The American show Reno 911! also contained improvised dialogue based on a plot outline. Fast and Loose is an improvisational game show, much like Whose Line Is It Anyway?. The BBC sitcoms Outnumbered and The Thick of It also had some improvised elements in them. Psychology In the field of the psychology of consciousness, Eberhard Scheiffele explored the altered state of consciousness experienced by actors and improvisers in his scholarly paper Acting: an altered state of consciousness. According to G. William Farthing in The Psychology of Consciousness comparative study, actors routinely enter into an altered state of consciousness (ASC). Acting is seen as altering most of the 14 dimensions of changed subjective experience which characterize ASCs according to Farthing, namely: attention, perception, imagery and fantasy, inner speech, memory, higher-level thought processes, meaning or significance of experiences, time experience, emotional feeling and expression, level of arousal, self-control, suggestibility, body image, and sense of personal identity. In the growing field of Drama Therapy, psychodramatic improvisation, along with other techniques developed for Drama Therapy, are used extensively. The "Yes, and" rule has been compared to Milton Erickson's utilization process and to a variety of acceptance-based psychotherapies. Improv training has been recommended for couples therapy and therapist training, and it has been speculated that improv training may be helpful in some cases of social anxiety disorder. Structure and process Improvisational theatre often allows an interactive relationship with the audience. Improv groups frequently solicit suggestions from the audience as a source of inspiration, a way of getting the audience involved, and as a means of proving that the performance is not scripted. That charge is sometimes aimed at the masters of the art, whose performances can seem so detailed that viewers may suspect the scenes are planned. In order for an improvised scene to be successful, the improvisers involved must work together responsively to define the parameters and action of the scene, in a process of co-creation. With each spoken word or action in the scene, an improviser makes an offer, meaning that he or she defines some element of the reality of the scene. This might include giving another character a name, identifying a relationship, location, or using mime to define the physical environment. These activities are also known as endowment. It is the responsibility of the other improvisers to accept the offers that their fellow performers make; to not do so is known as blocking, negation, or denial, which usually prevents the scene from developing. Some performers may deliberately block (or otherwise break out of character) for comedic effect—this is known as gagging—but this generally prevents the scene from advancing and is frowned upon by many improvisers. Accepting an offer is usually accompanied by adding a new offer, often building on the earlier one; this is a process improvisers refer to as Yes, and... and is considered the cornerstone of improvisational technique. Every new piece of information added helps the improvisers to refine their characters and progress the action of the scene. The Yes, and... rule, however, applies to a scene's early stage since it is in this stage that a "base (or shared) reality" is established in order to be later redefined by applying the "if (this is true), then (what else can also be true)" practice progressing the scene into comedy, as explained in the 2013 manual by the Upright Citizens Brigade members. The unscripted nature of improv also implies no predetermined knowledge about the props that might be useful in a scene. Improv companies may have at their disposal some number of readily accessible props that can be called upon at a moment's notice, but many improvisers eschew props in favor of the infinite possibilities available through mime. In improv, this is more commonly known as 'space object work' or 'space work', rather than 'mime', and the props and locations created by this technique, as 'space objects' created out of 'space substance', developed as a technique by Viola Spolin. As with all improv 'offers', improvisers are encouraged to respect the validity and continuity of the imaginary environment defined by themselves and their fellow performers; this means, for example, taking care not to walk through the table or "miraculously" survive multiple bullet wounds from another improviser's gun. Because improvisers may be required to play a variety of roles without preparation, they need to be able to construct characters quickly with physicality, gestures, accents, voice changes, or other techniques as demanded by the situation. The improviser may be called upon to play a character of a different age or sex. Character motivations are an important part of successful improv scenes, and improvisers must therefore attempt to act according to the objectives that they believe their character seeks. In improv formats with multiple scenes, an agreed-upon signal is used to denote scene changes. Most often, this takes the form of a performer running in front of the scene, known as a "wipe". Tapping a character in or out can also be employed. The performers not currently part of the scene often stand at the side or back of the stage, and can enter or exit the scene by stepping into or out of the stage center. Community Many theatre troupes are devoted to staging improvisational performances and growing the improv community through their training centers. In addition to for-profit theatre troupes, there are many college-based improv groups in the United States and around the world. In Europe the special contribution to the theatre of the abstract, the surreal, the irrational and the subconscious have been part of the stage tradition for centuries. From the 1990s onwards a growing number of European Improv groups have been set up specifically to explore the possibilities offered by the use of the abstract in improvised performance, including dance, movement, sound, music, mask work, lighting, and so on. These groups are not especially interested in comedy, either as a technique or as an effect, but rather in expanding the improv genre so as to incorporate techniques and approaches that have long been a legitimate part of European theatre. Notable contributors to the field The Brave New Workshop Comedy Theater (BNW), is a sketch and improvisational comedy theater based in Minneapolis, Minnesota. Started
|
improvised theater put on stage. The audience play the part of kidnapped tourists in today's Syria in a hyperreal sensory environment. Rob Wittig and Mark C. Marino have developed a form of improv for online theatrical improvisation called netprov. The form relies on social media to engage audiences in the creation of dynamic fictional scenarios that evolve in real-time. Improvisational comedy Modern improvisational comedy, as it is practiced in the West, falls generally into two categories: shortform and longform. Shortform improv consists of short scenes usually constructed from a predetermined game, structure, or idea and driven by an audience suggestion. Many short form exercises were first created by Viola Spolin, who called them theatre games, influenced by her training from recreational games expert Neva Boyd. The short-form improv comedy television series Whose Line Is It Anyway? has familiarized American and British viewers with short-form. Longform improv performers create shows in which short scenes are often interrelated by story, characters, or themes. Longform shows may take the form of an existing type of theatre, for example a full-length play or Broadway-style musical such as Spontaneous Broadway. One of the better-known longform structures is the Harold, developed by ImprovOlympic co-founder Del Close. Many such longform structures now exist. Longform improvisation is especially performed in Chicago, New York City, Los Angeles; has a strong presence in Austin, Boston, Minneapolis, Phoenix, Philadelphia, San Francisco, Seattle, Detroit, Toronto, Vancouver, Washington, D.C.; and is building a growing following in Baltimore, Denver, Kansas City, Montreal, Columbus, New Orleans, Omaha, Rochester, NY, and Hawaii. Outside the United States, longform improv has a growing presence in the United Kingdom, especially in cities such as London, Bristol, and at the Edinburgh Festival Fringe. Non-comedic, experimental, and dramatic, narrative-based improvisational theater Other forms of improvisational theatre training and performance techniques are experimental and avant-garde in nature and not necessarily intended to be comedic. These include Playback Theatre and Theatre of the Oppressed, the Poor Theatre, the Open Theatre, to name only a few. The Open Theatre was founded in New York City by a group of former students of acting teacher Nola Chilton, and joined shortly thereafter by director Joseph Chaikin, formerly of The Living Theatre, and Peter Feldman. This avant-garde theatre group explored political, artistic, and social issues. The company, developing work through an improvisational process drawn from Chilton and Viola Spolin, created well-known exercises, such as "sound and movement" and "transformations", and originated radical forms and techniques that anticipated or were contemporaneous with Jerzy Grotowski's "poor theater" in Poland. During the sixties Chaikin and the Open Theatre developed full theatrical productions with nothing but the actors, a few chairs and a bare stage, creating character, time and place through a series of transformations the actors physicalized and discovered through improvisations. On the west coast, Ruth Zaporah developed Action Theater™, a physically-based improvisation form that treats language, movement and voice equally. Action Theater™ performances have no scripts, no preplanned ideas and create full-length shows or shorter performances. Longform, dramatic, and narrative-based improvisation is well-established on the west coast with companies such as San Francisco's BATS Improv. This format allows for full-length plays and musicals to be created improvisationally. Applying improv principles in life Many people who have studied improv have noted that the guiding principles of improv are useful, not just on stage, but in everyday life. For example, Stephen Colbert in a commencement address said, Tina Fey in her book Bossypants lists several rules of improv that apply in the workplace. There has been much interest in bringing lessons from improv into the corporate world. In a New York Times article titled "Can Executives Learn to Ignore the Script?", Stanford professor and author, Patricia Ryan Madson notes, "executives and engineers and people in transition are looking for support in saying yes to their own voice. Often, the systems we put in place to keep us secure are keeping us from our more creative selves." In film and television Many directors have made use of improvisation in the creation of both mainstream and experimental films. Many silent filmmakers such as Charlie Chaplin and Buster Keaton used improvisation in the making of their films, developing their gags while filming and altering the plot to fit. The Marx Brothers were notorious for deviating from the script they were given, their ad libs often becoming part of the standard routine and making their way into their films. Many people, however, make a distinction between ad-libbing and improvising. The British director Mike Leigh makes extensive use of improvisation in the creation of his films, including improvising important moments in the characters' lives that will not even appear in the film. This Is Spinal Tap and other mockumentary films of director Christopher Guest were created with a mix of scripted and unscripted material. Blue in the Face is a 1995 comedy directed by Wayne Wang and Paul Auster created in part by the improvisations during the filming of Smoke. Some of the best known American film directors who used improvisation in their work with actors are John Cassavetes, Robert Altman, Christopher Guest, and Rob Reiner. Improv comedy techniques have also been used in hit television shows such as HBO's Curb Your Enthusiasm created by Larry David, the UK Channel 4 and ABC television series Whose Line Is It Anyway (and its spinoffs Drew Carey's Green Screen Show and Drew Carey's Improv-A-Ganza), Nick Cannon's improv comedy show Wild 'N Out, and Thank God You're Here. A very early American improv television program was the weekly half-hour What Happens Now? which premiered on New York's WOR-TV on October 15, 1949 and ran for 22 episodes. "The Improvisers" were six actors (including Larry Blyden, Ross Martin, and Jean Alexander – Jean Pugsley at the time) who improvised skits based on situations suggested by viewers. In Canada, the series Train 48 was improvised from scripts which contained a minimal outline of each scene, and the comedy series This Sitcom Is...Not to Be Repeated incorporated dialogue drawn from a hat during the course of an episode. The American show Reno 911! also contained improvised dialogue based on a plot outline. Fast and Loose is an improvisational game show, much like Whose Line Is It Anyway?. The BBC sitcoms Outnumbered and The Thick of It also had some improvised elements in them. Psychology In the field of the psychology of consciousness, Eberhard Scheiffele explored the altered state of consciousness experienced by actors and improvisers in his scholarly paper Acting: an altered state of consciousness. According to G. William Farthing in The Psychology of Consciousness comparative study, actors routinely enter into an altered state of consciousness (ASC). Acting is seen as altering most of the 14 dimensions of changed subjective experience which characterize ASCs according to Farthing, namely: attention, perception, imagery and fantasy, inner speech, memory, higher-level thought processes, meaning or significance of experiences, time experience, emotional feeling and expression, level of arousal, self-control, suggestibility, body image, and sense of personal identity. In the growing field of Drama Therapy, psychodramatic improvisation, along with other techniques developed for Drama Therapy, are used extensively. The "Yes, and" rule has been compared to Milton Erickson's utilization process and to a variety of acceptance-based psychotherapies. Improv training has been recommended for couples therapy and therapist training, and it has been speculated that improv training may be helpful in some cases of social anxiety disorder. Structure and process Improvisational theatre often allows an interactive relationship with the audience. Improv groups frequently solicit suggestions from the audience as a source of inspiration, a way of getting the audience involved, and as a means of proving that the performance is not scripted. That charge is sometimes aimed at the masters of the art, whose performances can seem so detailed that viewers may suspect the scenes are planned. In order for an improvised scene to be successful, the improvisers involved must work together responsively to define the parameters and action of the scene, in a process of co-creation. With each spoken word or action in the scene, an improviser makes an offer, meaning that he or she defines some element of the reality of the scene. This might include giving another character a name, identifying a relationship, location, or using mime to define the physical environment. These activities are also known as endowment. It is the responsibility of the other improvisers to accept the offers that their fellow performers make; to not do so is known as blocking, negation, or denial, which usually prevents the scene from developing. Some performers may deliberately block (or otherwise break out of character) for comedic effect—this is known as gagging—but this generally prevents the scene from advancing and is frowned upon by many improvisers. Accepting an offer is usually accompanied by adding a new offer, often building on the earlier one; this is a process improvisers refer to as Yes, and... and is considered the cornerstone of improvisational technique. Every new piece of information added helps the improvisers to refine their characters and progress the action of the scene. The Yes, and... rule, however, applies to a scene's early stage since it is in this stage that a "base (or shared) reality" is established in order to be later redefined by applying the "if (this is true), then (what else can also be true)" practice progressing the scene into comedy, as explained in the 2013 manual by the Upright Citizens Brigade members. The unscripted nature of improv also implies no predetermined knowledge about the props that might be useful in a scene. Improv companies may have at their disposal some number of readily accessible props that can be called upon at a moment's notice, but many improvisers eschew props in favor of the infinite possibilities available through mime. In improv, this is more commonly known as 'space object work' or 'space work', rather than 'mime', and the props and locations created by this technique, as 'space objects' created out of 'space substance', developed as a technique by Viola Spolin. As with all improv 'offers', improvisers are encouraged to respect the validity and continuity of the imaginary environment defined by themselves and their fellow performers; this means, for example, taking care not to walk through the table or "miraculously" survive multiple bullet wounds from another improviser's gun. Because improvisers may be required to play a variety of roles without preparation, they need to be able to construct characters quickly with physicality, gestures, accents, voice changes, or other techniques as demanded by the situation. The
|
growth of three-dimensional, human-like tissues and the unusual protein crystals that can be formed in space. Investigating the physics of fluids in microgravity will provide better models of the behaviour of fluids. Because fluids can be almost completely combined in microgravity, physicists investigate fluids that do not mix well on Earth. Examining reactions that are slowed by low gravity and low temperatures will improve our understanding of superconductivity. The study of materials science is an important ISS research activity, with the objective of reaping economic benefits through the improvement of techniques used on the ground. Other areas of interest include the effect of low gravity on combustion, through the study of the efficiency of burning and control of emissions and pollutants. These findings may improve knowledge about energy production and lead to economic and environmental benefits. Exploration The ISS provides a location in the relative safety of low Earth orbit to test spacecraft systems that will be required for long-duration missions to the Moon and Mars. This provides experience in operations, maintenance as well as repair and replacement activities on-orbit. This will help develop essential skills in operating spacecraft farther from Earth, reduce mission risks, and advance the capabilities of interplanetary spacecraft. Referring to the MARS-500 experiment, a crew isolation experiment conducted on Earth, ESA states that "Whereas the ISS is essential for answering questions concerning the possible impact of weightlessness, radiation and other space-specific factors, aspects such as the effect of long-term isolation and confinement can be more appropriately addressed via ground-based simulations". Sergey Krasnov, the head of human space flight programmes for Russia's space agency, Roscosmos, in 2011 suggested a "shorter version" of MARS-500 may be carried out on the ISS. In 2009, noting the value of the partnership framework itself, Sergey Krasnov wrote, "When compared with partners acting separately, partners developing complementary abilities and resources could give us much more assurance of the success and safety of space exploration. The ISS is helping further advance near-Earth space exploration and realisation of prospective programmes of research and exploration of the Solar system, including the Moon and Mars." A crewed mission to Mars may be a multinational effort involving space agencies and countries outside the current ISS partnership. In 2010, ESA Director-General Jean-Jacques Dordain stated his agency was ready to propose to the other four partners that China, India and South Korea be invited to join the ISS partnership. NASA chief Charles Bolden stated in February 2011, "Any mission to Mars is likely to be a global effort". Currently, US federal legislation prevents NASA co-operation with China on space projects. Education and cultural outreach The ISS crew provides opportunities for students on Earth by running student-developed experiments, making educational demonstrations, allowing for student participation in classroom versions of ISS experiments, and directly engaging students using radio, videolink, and email. ESA offers a wide range of free teaching materials that can be downloaded for use in classrooms. In one lesson, students can navigate a 3D model of the interior and exterior of the ISS, and face spontaneous challenges to solve in real time. The Japanese Aerospace Exploration Agency (JAXA) aims to inspire children to "pursue craftsmanship" and to heighten their "awareness of the importance of life and their responsibilities in society". Through a series of education guides, students develop a deeper understanding of the past and near-term future of crewed space flight, as well as that of Earth and life. In the JAXA "Seeds in Space" experiments, the mutation effects of spaceflight on plant seeds aboard the ISS are explored by growing sunflower seeds that have flown on the ISS for about nine months. In the first phase of Kibō utilisation from 2008 to mid-2010, researchers from more than a dozen Japanese universities conducted experiments in diverse fields. Cultural activities are another major objective of the ISS programme. Tetsuo Tanaka, the director of JAXA's Space Environment and Utilization Center, has said: "There is something about space that touches even people who are not interested in science." Amateur Radio on the ISS (ARISS) is a volunteer programme that encourages students worldwide to pursue careers in science, technology, engineering, and mathematics, through amateur radio communications opportunities with the ISS crew. ARISS is an international working group, consisting of delegations from nine countries including several in Europe, as well as Japan, Russia, Canada, and the United States. In areas where radio equipment cannot be used, speakerphones connect students to ground stations which then connect the calls to the space station. First Orbit is a 2011 feature-length documentary film about Vostok 1, the first crewed space flight around the Earth. By matching the orbit of the ISS to that of Vostok 1 as closely as possible, in terms of ground path and time of day, documentary filmmaker Christopher Riley and ESA astronaut Paolo Nespoli were able to film the view that Yuri Gagarin saw on his pioneering orbital space flight. This new footage was cut together with the original Vostok 1 mission audio recordings sourced from the Russian State Archive. Nespoli is credited as the director of photography for this documentary film, as he recorded the majority of the footage himself during Expedition 26/27. The film was streamed in a global YouTube premiere in 2011 under a free licence through the website firstorbit.org. In May 2013, commander Chris Hadfield shot a music video of David Bowie's "Space Oddity" on board the station, which was released on YouTube. It was the first music video ever to be filmed in space. In November 2017, while participating in Expedition 52/53 on the ISS, Paolo Nespoli made two recordings of his spoken voice (one in English and the other in his native Italian), for use on Wikipedia articles. These were the first content made in space specifically for Wikipedia. In November 2021, a virtual reality exhibit called The Infinite featuring life aboard the ISS was announced. Construction Manufacturing Since the International Space Station is a multi-national collaborative project, the components for in-orbit assembly were manufactured in various countries around the world. Beginning in the mid 1990s, the U.S. components Destiny, Unity, the Integrated Truss Structure, and the solar arrays were fabricated at the Marshall Space Flight Center and the Michoud Assembly Facility. These modules were delivered to the Operations and Checkout Building and the Space Station Processing Facility (SSPF) for final assembly and processing for launch. The Russian modules, including Zarya and Zvezda, were manufactured at the Khrunichev State Research and Production Space Center in Moscow. Zvezda was initially manufactured in 1985 as a component for Mir-2, but was never launched and instead became the ISS Service Module. The European Space Agency (ESA) Columbus module was manufactured at the EADS Astrium Space Transportation facilities in Bremen, Germany, along with many other contractors throughout Europe. The other ESA-built modulesHarmony, Tranquility, the Leonardo MPLM, and the Cupolawere initially manufactured at the Thales Alenia Space factory in Turin, Italy. The structural steel hulls of the modules were transported by aircraft to the Kennedy Space Center SSPF for launch processing. The Japanese Experiment Module Kibō, was fabricated in various technology manufacturing facilities in Japan, at the NASDA (now JAXA) Tsukuba Space Center, and the Institute of Space and Astronautical Science. The Kibo module was transported by ship and flown by aircraft to the SSPF. The Mobile Servicing System, consisting of the Canadarm2 and the Dextre grapple fixture, was manufactured at various factories in Canada (such as the David Florida Laboratory) and the United States, under contract by the Canadian Space Agency. The mobile base system, a connecting framework for Canadarm2 mounted on rails, was built by Northrop Grumman. Assembly The assembly of the International Space Station, a major endeavour in space architecture, began in November 1998. Russian modules launched and docked robotically, with the exception of Rassvet. All other modules were delivered by the Space Shuttle, which required installation by ISS and Shuttle crewmembers using the Canadarm2 (SSRMS) and extra-vehicular activities (EVAs); by 5 June 2011, they had added 159 components during more than 1,000 hours of EVA. 127 of these spacewalks originated from the station, and the remaining 32 were launched from the airlocks of docked Space Shuttles. The beta angle of the station had to be considered at all times during construction. The first module of the ISS, Zarya, was launched on 20 November 1998 on an autonomous Russian Proton rocket. It provided propulsion, attitude control, communications, and electrical power, but lacked long-term life support functions. A passive NASA module, Unity, was launched two weeks later aboard Space Shuttle flight STS-88 and attached to Zarya by astronauts during EVAs. The Unity module has two Pressurised Mating Adapters (PMAs): one connects permanently to Zarya and the other allowed the Space Shuttle to dock to the space station. At that time, the Russian (Soviet) station Mir was still inhabited, and the ISS remained uncrewed for two years. On 12 July 2000, the Zvezda module was launched into orbit. Onboard preprogrammed commands deployed its solar arrays and communications antenna. Zvezda then became the passive target for a rendezvous with Zarya and Unity, maintaining a station-keeping orbit while the Zarya–Unity vehicle performed the rendezvous and docking via ground control and the Russian automated rendezvous and docking system. Zarya computer transferred control of the station to Zvezda computer soon after docking. Zvezda added sleeping quarters, a toilet, kitchen, CO2 scrubbers, dehumidifier, oxygen generators, and exercise equipment, plus data, voice and television communications with mission control, enabling permanent habitation of the station. The first resident crew, Expedition 1, arrived in November 2000 on Soyuz TM-31. At the end of the first day on the station, astronaut Bill Shepherd requested the use of the radio call sign "Alpha", which he and cosmonaut Sergei Krikalev preferred to the more cumbersome "International Space Station". The name "Alpha" had previously been used for the station in the early 1990s, and its use was authorised for the whole of Expedition 1. Shepherd had been advocating the use of a new name to project managers for some time. Referencing a naval tradition in a pre-launch news conference he had said: "For thousands of years, humans have been going to sea in ships. People have designed and built these vessels, launched them with a good feeling that a name will bring good fortune to the crew and success to their voyage." Yuri Semenov, the President of Russian Space Corporation Energia at the time, disapproved of the name "Alpha" as he felt that Mir was the first modular space station, so the names "Beta" or "Mir 2" for the ISS would have been more fitting. Expedition 1 arrived midway between the Space Shuttle flights of missions STS-92 and STS-97. These two flights each added segments of the station's Integrated Truss Structure, which provided the station with Ku-band communication for US television, additional attitude support needed for the additional mass of the USOS, and substantial solar arrays to supplement the station's four existing arrays. Over the next two years, the station continued to expand. A Soyuz-U rocket delivered the Pirs docking compartment. The Space Shuttles Discovery, Atlantis, and Endeavour delivered the Destiny laboratory and Quest airlock, in addition to the station's main robot arm, the Canadarm2, and several more segments of the Integrated Truss Structure. The expansion schedule was interrupted in 2003 by the Space Shuttle Columbia disaster and a resulting hiatus in flights. The Space Shuttle was grounded until 2005 with STS-114 flown by Discovery. Assembly resumed in 2006 with the arrival of STS-115 with Atlantis, which delivered the station's second set of solar arrays. Several more truss segments and a third set of arrays were delivered on STS-116, STS-117, and STS-118. As a result of the major expansion of the station's power-generating capabilities, more pressurised modules could be accommodated, and the Harmony node and Columbus European laboratory were added. These were soon followed by the first two components of Kibō. In March 2009, STS-119 completed the Integrated Truss Structure with the installation of the fourth and final set of solar arrays. The final section of Kibō was delivered in July 2009 on STS-127, followed by the Russian Poisk module. The third node, Tranquility, was delivered in February 2010 during STS-130 by the Space Shuttle Endeavour, alongside the Cupola, followed by the penultimate Russian module, Rassvet, in May 2010. Rassvet was delivered by Space Shuttle Atlantis on STS-132 in exchange for the Russian Proton delivery of the US-funded Zarya module in 1998. The last pressurised module of the USOS, Leonardo, was brought to the station in February 2011 on the final flight of Discovery, STS-133. The Alpha Magnetic Spectrometer was delivered by Endeavour on STS-134 the same year. By June 2011, the station consisted of 15 pressurised modules and the Integrated Truss Structure. Three modules are still to be launched, including the Prichal module, and two power modules called NEM-1 and NEM-2. Russia's latest primary research module Nauka docked in July 2021, along with the European Robotic Arm which will be able to relocate itself to different parts of the Russian modules of the station. The gross mass of the station changes over time. The total launch mass of the modules on orbit is about (). The mass of experiments, spare parts, personal effects, crew, foodstuff, clothing, propellants, water supplies, gas supplies, docked spacecraft, and other items add to the total mass of the station. Hydrogen gas is constantly vented overboard by the oxygen generators. Structure The ISS is a modular space station. Modular stations can allow modules to be added to or removed from the existing structure, allowing greater flexibility. Below is a diagram of major station components. The blue areas are pressurised sections accessible by the crew without using spacesuits. The station's unpressurised superstructure is indicated in red. Planned components are shown in white and former ones in gray. Other unpressurised components are yellow. The Unity node joins directly to the Destiny laboratory. For clarity, they are shown apart. Similar cases are also seen in other parts of the structure. Pressurised modules Zarya Zarya (), also known as the Functional Cargo Block or FGB (from the or ФГБ), is the first module of the ISS to have been launched. The FGB provided electrical power, storage, propulsion, and guidance to the ISS during the initial stage of assembly. With the launch and assembly in orbit of other modules with more specialized functionality, Zarya is now primarily used for storage, both inside the pressurized section and in the externally mounted fuel tanks. The Zarya is a descendant of the TKS spacecraft designed for the Russian Salyut program. The name Zarya ("Dawn") was given to the FGB because it signified the dawn of a new era of international cooperation in space. Although it was built by a Russian company, it is owned by the United States. Unity The Unity connecting module, also known as Node 1, is the first U.S.-built component of the ISS. It connects the Russian and U.S. segments of the station, and is where crew eat meals together. The module is cylindrical in shape, with six berthing locations (forward, aft, port, starboard, zenith, and nadir) facilitating connections to other modules. Unity measures in diameter, is long, made of steel, and was built for NASA by Boeing in a manufacturing facility at the Marshall Space Flight Center in Huntsville, Alabama. Unity is the first of the three connecting modules; the other two are Harmony and Tranquility. Zvezda Zvezda (, meaning "star"), Salyut DOS-8, also known as the Zvezda Service Module, is a module of the ISS. It was the third module launched to the station, and provides all of the station's life support systems, some of which are supplemented in the USOS, as well as living quarters for two crew members. It is the structural and functional center of the Russian Orbital Segment, which is the Russian part of the ISS. Crew assemble here to deal with emergencies on the station. The module was manufactured by RKK Energia, with major sub-contracting work by GKNPTs Khrunichev. Zvezda was launched on a Proton rocket on 12 July 2000, and docked with the Zarya module on 26 July 2000. Destiny The Destiny module, also known as the U.S. Lab, is the primary operating facility for U.S. research payloads aboard the ISS. It was berthed to the Unity module and activated over a period of five days in February 2001. Destiny is NASA's first permanent operating orbital research station since Skylab was vacated in February 1974. The Boeing Company began construction of the research laboratory in 1995 at the Michoud Assembly Facility and then the Marshall Space Flight Center in Huntsville, Alabama. Destiny was shipped to the Kennedy Space Center in Florida in 1998, and was turned over to NASA for pre-launch preparations in August 2000. It launched on 7 February 2001, aboard the Space Shuttle Atlantis on STS-98. Astronauts work inside the pressurized facility to conduct research in numerous scientific fields. Scientists throughout the world would use the results to enhance their studies in medicine, engineering, biotechnology, physics, materials science, and Earth science. Quest The Joint Airlock (also known as "Quest") is provided by the U.S. and provides the capability for ISS-based Extravehicular Activity (EVA) using either a U.S. Extravehicular Mobility Unit (EMU) or Russian Orlan EVA suits. Before the launch of this airlock, EVAs were performed from either the U.S. Space Shuttle (while docked) or from the Transfer Chamber on the Service Module. Due to a variety of system and design differences, only U.S. space suits could be used from the Shuttle and only Russian suits could be used from the Service Module. The Joint Airlock alleviates this short-term problem by allowing either (or both) spacesuit systems to be used. The Joint Airlock was launched on ISS-7A / STS-104 in July 2001 and was attached to the right hand docking port of Node 1. The Joint Airlock is 20 ft. long, 13 ft. in diameter, and weighs 6.5 tons. The Joint Airlock was built by Boeing at Marshall Space Flight Center. The Joint Airlock was launched with the High Pressure Gas Assembly. The High Pressure Gas Assembly was mounted on the external surface of the Joint Airlock and will support EVAs operations with breathing gases and augments the Service Module's gas resupply system. The Joint Airlock has two main components: a crew airlock from which astronauts and cosmonauts exit the ISS and an equipment airlock designed for storing EVA gear and for so-called overnight "campouts" wherein Nitrogen is purged from astronaut's bodies overnight as pressure is dropped in preparation for spacewalks the following day. This alleviates the bends as the astronauts are repressurized after their EVA. The crew airlock was derived from the Space Shuttle's external airlock. It is equipped with lighting, external handrails, and an Umbilical Interface Assembly (UIA). The UIA is located on one wall of the crew airlock and provides a water supply line, a wastewater return line, and an oxygen supply line. The UIA also provides communication gear and spacesuit power interfaces and can support two spacesuits simultaneously. This can be either two American EMU spacesuits, two Russian ORLAN spacesuits, or one of each design. Poisk Poisk () was launched on 10 November 2009 attached to a modified Progress spacecraft, called Progress M-MIM2, on a Soyuz-U rocket from Launch Pad 1 at the Baikonur Cosmodrome in Kazakhstan. Poisk is used as the Russian airlock module, containing two identical EVA hatches. An outward-opening hatch on the Mir space station failed after it swung open too fast after unlatching, because of a small amount of air pressure remaining in the airlock. All EVA hatches on the ISS open inwards and are pressure-sealing. Poisk is used to store, service, and refurbish Russian Orlan suits and provides contingency entry for crew using the slightly bulkier American suits. The outermost docking port on the module allows docking of Soyuz and Progress spacecraft, and the automatic transfer of propellants to and from storage on the ROS. Since the departure of the identical Pirs module on July 26, 2021, Poisk has served as the only airlock on the ROS. Harmony Harmony, also known as Node 2, is the "utility hub" of the ISS. It connects the laboratory modules of the United States, Europe and Japan, as well as providing electrical power and electronic data. Sleeping cabins for four of the crew are housed here. Harmony was successfully launched into space aboard Space Shuttle flight STS-120 on 23 October 2007. After temporarily being attached to the port side of the Unity node, it was moved to its permanent location on the forward end of the Destiny laboratory on 14 November 2007. Harmony added to the station's living volume, an increase of almost 20 percent, from . Its successful installation meant that from NASA's perspective, the station was considered to be "U.S. Core Complete". Tranquility Tranquility, also known as Node 3, is a module of the ISS. It contains environmental control systems, life support systems, a toilet, exercise equipment, and an observation cupola. The European Space Agency and the Italian Space Agency had Tranquility manufactured by Thales Alenia Space. A ceremony on 20 November 2009 transferred ownership of the module to NASA. On 8 February 2010, NASA launched the module on the Space Shuttle's STS-130 mission. Columbus Columbus is a science laboratory that is part of the ISS and is the largest single contribution to the station made by the European Space Agency. Like the Harmony and Tranquility modules, the Columbus laboratory was constructed in Turin, Italy by Thales Alenia Space. The functional equipment and software of the lab was designed by EADS in Bremen, Germany. It was also integrated in Bremen before being flown to the Kennedy Space Center in Florida in an Airbus Beluga. It was launched aboard Space Shuttle Atlantis on 7 February 2008, on flight STS-122. It is designed for ten years of operation. The module is controlled by the Columbus Control Centre, located at the German Space Operations Center, part of the German Aerospace Center in Oberpfaffenhofen near Munich, Germany. The European Space Agency has spent €1.4 billion (about US$2 billion) on building Columbus, including the experiments it carries and the ground control infrastructure necessary to operate them. Kibō The Japanese Experiment Module (JEM), nicknamed , is a Japanese science module for the International Space Station (ISS) developed by JAXA. It is the largest single ISS module, and is attached to the Harmony module. The first two pieces of the module were launched on Space Shuttle missions STS-123 and STS-124. The third and final components were launched on STS-127. Cupola The Cupola is an ESA-built observatory module of the ISS. Its name derives from the Italian word , which means "dome". Its seven windows are used to conduct experiments, dockings and observations of Earth. It was launched aboard Space Shuttle mission STS-130 on 8 February 2010 and attached to the Tranquility (Node 3) module. With the Cupola attached, ISS assembly reached 85 percent completion. The Cupola central window has a diameter of . Rassvet Rassvet (; lit. "dawn"), also known as the Mini-Research Module 1 (MRM-1) (, ) and formerly known as the Docking Cargo Module (DCM), is a component of the International Space Station (ISS). The module's design is similar to the Mir Docking Module launched on STS-74 in 1995. Rassvet is primarily used for cargo storage and as a docking port for visiting spacecraft. It was flown to the ISS aboard Space Shuttle Atlantis on the STS-132 mission on 14 May 2010, and was connected to the ISS on 18 May 2010. The hatch connecting Rassvet with the ISS was first opened on 20 May 2010. On 28 June 2010, the Soyuz TMA-19 spacecraft performed the first docking with the module. MLM outfittings In May 2010, equipment for Nauka was launched on STS-132 (as part of an agreement with NASA) and delivered by Space Shuttle Atlantis. Weighing 1.4 metric tons, the equipment was attached to the outside of Rassvet (MRM-1). It included a spare elbow joint for the European Robotic Arm (ERA) (which was launched with Nauka) and an ERA-portable workpost used during EVAs, as well as a heat radiator, internal hardware and an experiment airlock for launching CubeSats to be positioned on the modified passive forward port near the nadir end of the Nauka module. The deployable radiator will be used to add additional cooling capability to Nauka, which will enable the module to host more scientific experiments. The airlock will be used only to pass experiments inside and outside the module, with the aid of ERAvery similar to the Japanese airlock and Nanoracks Bishop Airlock on the U.S. segment of the station. The ERA will be used to remove the radiator and airlock from Rassvet and transfer them over to Nauka. This process is expected to take several months. A portable work platform will also be transferred over, which can attach to the end of the ERA to allow cosmonauts to "ride" on the end of the arm during spacewalks. Leonardo The Leonardo Permanent Multipurpose Module (PMM) is a module of the International Space Station. It was flown into space aboard the Space Shuttle on STS-133 on 24 February 2011 and installed on 1 March. Leonardo is primarily used for storage of spares, supplies and waste on the ISS, which was until then stored in many different places within the space station. It is also the personal hygiene area for the astronauts who live in the US Orbital Segment. The Leonardo PMM was a Multi-Purpose Logistics Module (MPLM) before 2011, but was modified into its current configuration. It was formerly one of two MPLM used for bringing cargo to and from the ISS with the Space Shuttle. The module was named for Italian polymath Leonardo da Vinci. Bigelow Expandable Activity Module The Bigelow Expandable Activity Module (BEAM) is an experimental expandable space station module developed by Bigelow Aerospace, under contract to NASA, for testing as a temporary module on the International Space Station (ISS) from 2016 to at least 2020. It arrived at the ISS on 10 April 2016, was berthed to the station on 16 April at Tranquility Node 3, and was expanded and pressurized on 28 May 2016. International Docking Adapters The International Docking Adapter (IDA) is a spacecraft docking system adapter developed to convert APAS-95 to the NASA Docking System (NDS). An IDA is placed on each of the ISS's two open Pressurized Mating Adapters (PMAs), both of which are connected to the Harmony module. Two International Docking Adapters are currently installed aboard the Station. Originally, IDA-1 was planned to be installed on PMA-2, located at Harmony's forward port, and IDA-2 would be installed on PMA-3 at Harmony's zenith. After IDA 1 was destroyed in a launch incident, IDA-2 was installed on PMA-2 on 19 August 2016, while IDA-3 was later installed on PMA-3 on 21 August 2019. Bishop Airlock Module The NanoRacks Bishop Airlock Module is a commercially funded airlock module launched to the ISS on SpaceX CRS-21 on 6 December 2020. The module was built by NanoRacks, Thales Alenia Space, and Boeing. It will be used to deploy CubeSats, small satellites, and other external payloads for NASA, CASIS, and other commercial and governmental customers. Nauka Nauka (), also known as the Multipurpose Laboratory Module-Upgrade (MLM-U), (Russian: Многоцелевой лабораторный модуль, усоверше́нствованный, or МЛМ-У), is a Roscosmos-funded component of the ISS that was launched on 21 July 2021, 14:58 UTC. In the original ISS plans, Nauka was to use the location of the Docking and Stowage Module (DSM), but the DSM was later replaced by the Rassvet module and moved to Zaryas nadir port. Nauka was successfully docked to Zvezdas nadir port on 29 July 2021, 13:29 UTC, replacing the Pirs module. It had a temporary docking adapter on its nadir port for crewed and uncrewed missions until Prichal arrival, where just before its arrival it was removed by a departuring Progress spacecraft. Prichal Prichal, also known as Uzlovoy Module or UM (), is a ball-shaped module that will provide the Russian segment additional docking ports to receive Soyuz MS and Progress MS spacecraft. UM was launched in November 2021. It was integrated with a special version of the Progress cargo spacecraft and launched by a standard Soyuz rocket, docking to the nadir port of the Nauka module. One port is equipped with an active hybrid docking port, which enables docking with the MLM module. The remaining five ports are passive hybrids, enabling docking of Soyuz and Progress vehicles, as well as heavier modules and future spacecraft with modified docking systems. The node module was intended to serve as the only permanent element of the cancelled Orbital Piloted Assembly and Experiment Complex (OPSEK). Unpressurised elements The ISS has a large number of external components that do not require pressurisation. The largest of these is the Integrated Truss Structure (ITS), to which the station's main solar arrays and thermal radiators are mounted. The ITS consists of ten separate segments forming a structure long. The station was intended to have several smaller external components, such as six robotic arms, three External Stowage Platforms (ESPs) and four ExPRESS Logistics Carriers (ELCs). While these platforms allow experiments (including MISSE, the STP-H3 and the Robotic Refueling Mission) to be deployed and conducted in the vacuum of space by providing electricity and processing experimental data locally, their primary function is to store spare Orbital Replacement Units (ORUs). ORUs are parts that can be replaced when they fail or pass their design life, including pumps, storage tanks, antennas, and battery units. Such units are replaced either by astronauts during EVA or by robotic arms. Several shuttle missions were dedicated to the delivery of ORUs, including STS-129, STS-133 and STS-134. , only one other mode of transportation of ORUs had been utilisedthe Japanese cargo vessel HTV-2which delivered an FHRC and CTC-2 via its Exposed Pallet (EP). There are also smaller exposure facilities mounted directly to laboratory modules; the Kibō Exposed Facility serves as an external "porch" for the Kibō complex, and a facility on the European Columbus laboratory provides power and data connections for experiments such as the European Technology Exposure Facility and the Atomic Clock Ensemble in Space. A remote sensing instrument, SAGE III-ISS, was delivered to the station in February 2017 aboard CRS-10, and the NICER experiment was delivered aboard CRS-11 in June 2017. The largest scientific payload externally mounted to the ISS is the Alpha Magnetic Spectrometer (AMS), a particle physics experiment launched on STS-134 in May 2011, and mounted externally on the ITS. The AMS measures cosmic rays to look for evidence of dark matter and antimatter. The commercial Bartolomeo External Payload Hosting Platform, manufactured by Airbus, was launched on 6 March 2020 aboard CRS-20 and attached to the European Columbus module. It will provide an additional 12 external payload slots, supplementing the eight on the ExPRESS Logistics Carriers, ten on Kibō, and four on Columbus. The system is designed to be robotically serviced and will require no astronaut intervention. It is named after Christopher Columbus's younger brother. Robotic arms and cargo cranes The Integrated Truss Structure serves as a base for the station's primary remote manipulator system, the Mobile Servicing System (MSS), which is composed of three main components: Canadarm2, the largest robotic arm on the ISS, has a mass of and is used to: dock and manipulate spacecraft and modules on the USOS; hold crew members and equipment in place during EVAs; and move Dextre around to perform tasks. Dextre is a robotic manipulator that has two arms and a rotating torso, with power tools, lights, and video for replacing orbital replacement units (ORUs) and performing other tasks requiring fine control. The Mobile Base System (MBS) is a platform that rides on rails along the length of the station's main truss, which serves as a mobile base for Canadarm2 and Dextre, allowing the robotic arms to reach all parts of the USOS. A grapple fixture was added to Zarya on STS-134 to enable Canadarm2 to inchworm itself onto the Russian Orbital Segment. Also installed during STS-134 was the Orbiter Boom Sensor System (OBSS), which had been used to inspect heat shield tiles on Space Shuttle missions and which can be used on the station to increase the reach of the MSS. Staff on Earth or the ISS can operate the MSS components using remote control, performing work outside the station without the need for space walks. Japan's Remote Manipulator System, which services the Kibō Exposed Facility, was launched on STS-124 and is attached to the Kibō Pressurised Module. The arm is similar to the Space Shuttle arm as it is permanently attached at one end and has a latching end effector for standard grapple fixtures at the other. The European Robotic Arm, which will service the Russian Orbital Segment, was launched alongside the Nauka module. The ROS does not require spacecraft or modules to be manipulated, as all spacecraft and modules dock automatically and may be discarded the same way. Crew use the two Strela () cargo cranes during EVAs for moving crew and equipment around the ROS. Each Strela crane has a mass of . Former module Pirs Pirs (Russian: Пирс, lit. 'Pier') was launched on 14 September 2001, as ISS Assembly Mission 4R, on a Russian Soyuz-U rocket, using a modified Progress spacecraft, Progress M-SO1, as an upper stage. Pirs was undocked by Progress MS-16 on 26 July 2021, 10:56 UTC, and deorbited on the same day at 14:51 UTC to make room for Nauka module to be attached to the space station. Prior to its departure, Pirs served as the primary Russian airlock on the station, being used to store and refurbish the Russian Orlan spacesuits. Planned components Axiom segment In January 2020, NASA awarded Axiom Space a contract to build a commercial module for the ISS with a launch date of 2024. The contract is under the NextSTEP2 program. NASA negotiated with Axiom on a firm fixed-price contract basis to build and deliver the module, which will attach to the forward port of the space station's Harmony (Node 2) module. Although NASA has only commissioned one module, Axiom plans to build an entire segment consisting of five modules, including a node module, an orbital research and manufacturing facility, a crew habitat, and a "large-windowed Earth observatory". The Axiom segment is expected to greatly increase the capabilities and value of the space station, allowing for larger crews and private spaceflight by other organisations. Axiom plans to convert the segment into a stand-alone space station once the ISS is decommissioned, with the intention that this would act as a successor to the ISS. Canadarm 2 will also help to berth the Axiom Space Station modules to the ISS and will continue its operations on the Axiom Space Station after the retirement of ISS in late 2020s. Proposed components Xbase Made by Bigelow Aerospace. In August 2016 Bigelow negotiated an agreement with NASA to develop a full-sized ground prototype Deep Space Habitation based on the B330 under the second phase of Next Space Technologies for Exploration Partnerships. The module is called the Expandable Bigelow Advanced Station Enhancement (XBASE), as Bigelow hopes to test the module by attaching it to the International Space Station. Independence-1 Nanoracks, after finalizing its contract with NASA, and after winning NextSTEPs Phase II award, is now developing its concept Independence-1 (previously known as Ixion), which would turn spent rocket tanks into a habitable living area to be tested in space. In Spring 2018, Nanoracks announced that Ixion is now known as the Independence-1, the first 'outpost' in Nanoracks' Space Outpost Program. Nautilus-X Centrifuge Demonstration If produced, this centrifuge will be the first in-space demonstration of sufficient scale centrifuge for artificial partial-g effects. It will be designed to become a sleep module for the ISS crew. Cancelled components Several modules planned for the station were cancelled over the course of the ISS programme. Reasons include budgetary constraints, the modules becoming unnecessary, and station redesigns after the 2003 Columbia disaster. The US Centrifuge Accommodations Module would have hosted science experiments in varying levels of artificial gravity. The US Habitation Module would have served as the station's living quarters. Instead, the living quarters are now spread throughout the station. The US Interim Control Module and ISS Propulsion Module would have replaced the functions of Zvezda in case of a launch failure. Two Russian Research Modules were planned for scientific research. They would have docked to a Russian Universal Docking Module. The Russian Science Power Platform would have supplied power to the Russian Orbital Segment independent of the ITS solar arrays. Science Power Modules 1 and 2 (Repurposed Components) Science Power Module 1 (SPM-1, also known as NEM-1) and Science Power Module 2 (SPM-2, also known as NEM-2) are modules that were originally planned to arrive at the ISS no earlier than 2024, and dock to the Prichal module, which is currently docked to the Nauka module. In April 2021, Roscosmos announced that NEM-1 would be repurposed to function as the core module of the proposed Russian Orbital Service Station (ROSS), launching no earlier than 2025 and docking to the free-flying Nauka module either before or after the ISS has been deorbited. NEM-2 may be converted into another core "base" module, which would be launched in 2028. Onboard systems Life support The critical systems are the atmosphere control system, the water supply system, the food supply facilities, the sanitation and hygiene equipment, and fire detection and suppression equipment. The Russian Orbital Segment's life support systems are contained in the Zvezda service module. Some of these systems are supplemented by equipment in the USOS. The Nauka laboratory has a complete set of life support systems. Atmospheric control systems The atmosphere on board the ISS is similar to that of Earth. Normal air pressure on the ISS is ; the same as at sea level on Earth. An Earth-like atmosphere offers benefits for crew comfort, and is much safer than a pure oxygen atmosphere, because of the increased risk of a fire such as that responsible for the deaths of the Apollo 1 crew. Earth-like atmospheric conditions have been maintained on all Russian and Soviet spacecraft. The Elektron system aboard Zvezda and a similar system in Destiny generate oxygen aboard the station. The crew has a backup option in the form of bottled oxygen and Solid Fuel Oxygen Generation (SFOG) canisters, a chemical oxygen generator system. Carbon dioxide is removed from the air by the Vozdukh system in Zvezda. Other by-products of human metabolism, such as methane from the intestines and ammonia from sweat, are removed by activated charcoal filters. Part of the ROS atmosphere control system is the oxygen supply. Triple-redundancy is provided by the Elektron unit, solid fuel generators, and stored oxygen. The primary supply of oxygen is the Elektron unit which produces and by electrolysis of water and vents overboard. The system uses approximately one litre of water per crew member per day. This water is either brought from Earth or recycled from other systems. Mir was the first spacecraft to use recycled water for oxygen production. The secondary oxygen supply is provided by burning oxygen-producing Vika cartridges (see also ISS ECLSS). Each 'candle' takes 5–20 minutes to decompose at , producing of . This unit is manually operated. The US Orbital Segment has redundant supplies of oxygen, from a pressurised storage tank on the Quest airlock module delivered in 2001, supplemented ten years later by ESA-built Advanced Closed-Loop System (ACLS) in the Tranquility module (Node 3), which produces by electrolysis. Hydrogen produced is combined with carbon dioxide from the cabin atmosphere and converted to water and methane. Power and thermal control Double-sided solar arrays provide electrical power to the ISS. These bifacial cells collect direct sunlight on one side and light reflected off from the Earth on the other, and are more efficient and operate at a lower temperature than single-sided cells commonly used on Earth. The Russian segment of the station, like most spacecraft, uses 28 V low voltage DC from two rotating solar arrays mounted on Zvezda. The USOS uses 130–180 V DC from the USOS PV array, power is stabilised and distributed at 160 V DC and converted to the user-required 124 V DC. The higher distribution voltage allows smaller, lighter conductors, at the expense of crew safety. The two station segments share power with converters. The USOS solar arrays are arranged as four wing pairs, for a total production of 75 to 90 kilowatts. These arrays normally track the Sun to maximise power generation. Each array is about in area and long. In the complete configuration, the solar arrays track the Sun by rotating the alpha gimbal once per orbit; the beta gimbal follows slower changes in the angle of the Sun to the orbital plane. The Night Glider mode aligns the solar arrays parallel to the ground at night to reduce the significant aerodynamic drag at the station's relatively low orbital altitude. The station originally used rechargeable nickel–hydrogen batteries () for continuous power during the 45 minutes of every 90-minute orbit that it is eclipsed by the Earth. The batteries are recharged on the day side of the orbit. They had a 6.5-year lifetime (over 37,000 charge/discharge cycles) and were regularly replaced over the anticipated 20-year life of the station. Starting in 2016, the nickel–hydrogen batteries were replaced by lithium-ion batteries, which are expected to last until the end of the ISS program. The station's large solar panels generate a high potential voltage difference between the station and the ionosphere. This could cause arcing through insulating surfaces and sputtering of conductive surfaces as ions are accelerated by the spacecraft plasma sheath. To mitigate this, plasma contactor units create current paths between the station and the ambient space plasma. The station's systems and experiments consume a large amount of electrical power, almost all of which is converted to heat. To keep the internal temperature within workable limits, a passive thermal control system (PTCS) is made of external surface materials, insulation such as MLI, and heat pipes. If the PTCS cannot keep up with the heat load, an External Active Thermal Control System (EATCS) maintains the temperature. The EATCS consists of an internal, non-toxic, water coolant loop used to cool and dehumidify the atmosphere, which transfers collected heat into an external liquid ammonia loop. From the heat exchangers, ammonia is pumped into external radiators that emit heat as infrared radiation, then back to the station. The EATCS provides cooling for all the US pressurised modules, including Kibō and Columbus, as well as the main power distribution electronics of the S0, S1 and P1 trusses. It can reject up to 70 kW. This is much more than the 14 kW of the Early External Active Thermal Control System (EEATCS) via the Early Ammonia Servicer (EAS), which was launched on STS-105 and installed onto the P6 Truss. Communications and computers Radio communications provide telemetry and scientific data links between the station and mission control centres. Radio links are also used during rendezvous and docking procedures and for audio and video communication between crew members, flight controllers and family members. As a result, the ISS is equipped with internal and external communication systems used for different purposes. The Russian Orbital Segment communicates directly with the ground via the Lira antenna mounted to Zvezda. The Lira antenna also has the capability to use the Luch data relay satellite system. This system fell into disrepair during the 1990s, and so was not used during the early years of the ISS, although two new Luch satellitesLuch-5A and Luch-5Bwere launched in 2011 and 2012 respectively to restore the operational capability of the system. Another Russian communications system is the Voskhod-M, which enables internal telephone communications between Zvezda, Zarya, Pirs, Poisk, and the USOS and provides a VHF radio link to ground control centres via antennas on Zvezda exterior. The US Orbital Segment (USOS) makes use of two separate radio links: S band (audio, telemetry, commanding – located on the P1/S1 truss) and Ku band (audio, video and data – located on the Z1 truss) systems. These transmissions are routed via the United States Tracking and Data Relay Satellite System (TDRSS) in geostationary orbit, allowing for almost continuous real-time communications with Christopher C. Kraft Jr. Mission Control Center (MCC-H) in Houston. Data channels for the Canadarm2, European Columbus laboratory and Japanese Kibō modules were originally also routed via the S band and Ku band systems, with the European Data Relay System and a similar Japanese system intended to eventually complement the TDRSS in this role. Communications between modules are carried on an internal wireless network. UHF radio is used by astronauts and cosmonauts conducting EVAs and other spacecraft that dock to or undock from the station. Automated spacecraft are fitted with their own communications equipment; the ATV uses a laser attached to the spacecraft and the Proximity Communications Equipment attached to Zvezda to accurately dock with the station. The ISS is equipped with about 100 IBM/Lenovo ThinkPad and HP ZBook 15 laptop computers. The laptops have run Windows 95, Windows 2000, Windows XP, Windows 7, Windows 10 and Linux operating systems. Each computer is a commercial off-the-shelf purchase which is then modified for safety and operation including updates to connectors, cooling and power to accommodate the station's 28V DC power system and weightless environment. Heat generated by the laptops does not rise but stagnates around the laptop, so additional forced ventilation is required. Portable Computer System (PCS) laptops connect to the Primary Command & Control computer (C&C MDM) as remote terminals via a USB to 1553 adapter. Station Support Computer (SSC) laptops aboard the ISS are connected to the station's wireless LAN via Wi-Fi and ethernet, which connects to the ground via Ku band. While originally this provided speeds of 10 Mbit/s download and 3 Mbit/s upload from the station, NASA upgraded the system in late August 2019 and increased the speeds to 600 Mbit/s. Laptop hard drives occasionally fail and must be replaced. Other computer hardware failures include instances in 2001, 2007 and 2017; some of these failures have required EVAs to replace computer modules in externally mounted devices. The operating system used for key station functions is the Debian Linux distribution. The migration from Microsoft Windows to Linux was made in May 2013 for reasons of reliability, stability and flexibility. In 2017, an SG100 Cloud Computer was launched to the ISS as part of OA-7 mission. It was manufactured by NCSIST of Taiwan and designed in collaboration with Academia Sinica, and National Central University under contract for NASA. Operations Expeditions Each permanent crew is given an expedition number. Expeditions run up to six months, from launch until undocking, an 'increment' covers the same time period, but includes cargo spacecraft and all activities. Expeditions 1 to 6 consisted of three-person crews. Expeditions 7 to 12 were reduced to the safe minimum of two following the destruction of the NASA Shuttle Columbia. From Expedition 13 the crew gradually increased to six around 2010. With the arrival of crew on US commercial vehicles beginning in 2020, NASA has indicated that expedition size may be increased to seven crew members, the number ISS was originally designed for. Gennady Padalka, member of Expeditions 9, 19/20, 31/32, and 43/44, and Commander of Expedition 11, has spent more time in space than anyone else, a total of 878 days, 11 hours, and 29 minutes. Peggy Whitson has spent the most time in space of any American, totalling 665 days, 22 hours, and 22 minutes during her time on Expeditions 5, 16, and 50/51/52. Private flights Travellers who pay for their own passage into space are termed spaceflight participants by Roscosmos and NASA, and are sometimes referred to as "space tourists", a term they generally dislike. , seven space tourists have visited the ISS; all seven were transported to the ISS on Russian Soyuz spacecraft. When professional crews change over in numbers not divisible by the three seats in a Soyuz, and a short-stay crewmember is not sent, the spare seat is sold by MirCorp through Space Adventures. Space tourism was halted in 2011 when the Space
|
ISS program researchers aboard the ISS and on the ground have examined aerosols, ozone, lightning, and oxides in Earth's atmosphere, as well as the Sun, cosmic rays, cosmic dust, antimatter, and dark matter in the universe. Examples of Earth-viewing remote sensing experiments that have flown on the ISS are the Orbiting Carbon Observatory 3, ISS-RapidScat, ECOSTRESS, the Global Ecosystem Dynamics Investigation, and the Cloud Aerosol Transport System. ISS-based astronomy telescopes and experiments include SOLAR, the Neutron Star Interior Composition Explorer, the Calorimetric Electron Telescope, the Monitor of All-sky X-ray Image (MAXI), and the Alpha Magnetic Spectrometer. Freefall Gravity at the altitude of the ISS is approximately 90% as strong as at Earth's surface, but objects in orbit are in a continuous state of freefall, resulting in an apparent state of weightlessness. This perceived weightlessness is disturbed by five effects: Drag from the residual atmosphere. Vibration from the movements of mechanical systems and the crew. Actuation of the on-board attitude control moment gyroscopes. Thruster firings for attitude or orbital changes. Gravity-gradient effects, also known as tidal effects. Items at different locations within the ISS would, if not attached to the station, follow slightly different orbits. Being mechanically connected these items experience small forces that keep the station moving as a rigid body. Researchers are investigating the effect of the station's near-weightless environment on the evolution, development, growth and internal processes of plants and animals. In response to some of the data, NASA wants to investigate microgravity's effects on the growth of three-dimensional, human-like tissues and the unusual protein crystals that can be formed in space. Investigating the physics of fluids in microgravity will provide better models of the behaviour of fluids. Because fluids can be almost completely combined in microgravity, physicists investigate fluids that do not mix well on Earth. Examining reactions that are slowed by low gravity and low temperatures will improve our understanding of superconductivity. The study of materials science is an important ISS research activity, with the objective of reaping economic benefits through the improvement of techniques used on the ground. Other areas of interest include the effect of low gravity on combustion, through the study of the efficiency of burning and control of emissions and pollutants. These findings may improve knowledge about energy production and lead to economic and environmental benefits. Exploration The ISS provides a location in the relative safety of low Earth orbit to test spacecraft systems that will be required for long-duration missions to the Moon and Mars. This provides experience in operations, maintenance as well as repair and replacement activities on-orbit. This will help develop essential skills in operating spacecraft farther from Earth, reduce mission risks, and advance the capabilities of interplanetary spacecraft. Referring to the MARS-500 experiment, a crew isolation experiment conducted on Earth, ESA states that "Whereas the ISS is essential for answering questions concerning the possible impact of weightlessness, radiation and other space-specific factors, aspects such as the effect of long-term isolation and confinement can be more appropriately addressed via ground-based simulations". Sergey Krasnov, the head of human space flight programmes for Russia's space agency, Roscosmos, in 2011 suggested a "shorter version" of MARS-500 may be carried out on the ISS. In 2009, noting the value of the partnership framework itself, Sergey Krasnov wrote, "When compared with partners acting separately, partners developing complementary abilities and resources could give us much more assurance of the success and safety of space exploration. The ISS is helping further advance near-Earth space exploration and realisation of prospective programmes of research and exploration of the Solar system, including the Moon and Mars." A crewed mission to Mars may be a multinational effort involving space agencies and countries outside the current ISS partnership. In 2010, ESA Director-General Jean-Jacques Dordain stated his agency was ready to propose to the other four partners that China, India and South Korea be invited to join the ISS partnership. NASA chief Charles Bolden stated in February 2011, "Any mission to Mars is likely to be a global effort". Currently, US federal legislation prevents NASA co-operation with China on space projects. Education and cultural outreach The ISS crew provides opportunities for students on Earth by running student-developed experiments, making educational demonstrations, allowing for student participation in classroom versions of ISS experiments, and directly engaging students using radio, videolink, and email. ESA offers a wide range of free teaching materials that can be downloaded for use in classrooms. In one lesson, students can navigate a 3D model of the interior and exterior of the ISS, and face spontaneous challenges to solve in real time. The Japanese Aerospace Exploration Agency (JAXA) aims to inspire children to "pursue craftsmanship" and to heighten their "awareness of the importance of life and their responsibilities in society". Through a series of education guides, students develop a deeper understanding of the past and near-term future of crewed space flight, as well as that of Earth and life. In the JAXA "Seeds in Space" experiments, the mutation effects of spaceflight on plant seeds aboard the ISS are explored by growing sunflower seeds that have flown on the ISS for about nine months. In the first phase of Kibō utilisation from 2008 to mid-2010, researchers from more than a dozen Japanese universities conducted experiments in diverse fields. Cultural activities are another major objective of the ISS programme. Tetsuo Tanaka, the director of JAXA's Space Environment and Utilization Center, has said: "There is something about space that touches even people who are not interested in science." Amateur Radio on the ISS (ARISS) is a volunteer programme that encourages students worldwide to pursue careers in science, technology, engineering, and mathematics, through amateur radio communications opportunities with the ISS crew. ARISS is an international working group, consisting of delegations from nine countries including several in Europe, as well as Japan, Russia, Canada, and the United States. In areas where radio equipment cannot be used, speakerphones connect students to ground stations which then connect the calls to the space station. First Orbit is a 2011 feature-length documentary film about Vostok 1, the first crewed space flight around the Earth. By matching the orbit of the ISS to that of Vostok 1 as closely as possible, in terms of ground path and time of day, documentary filmmaker Christopher Riley and ESA astronaut Paolo Nespoli were able to film the view that Yuri Gagarin saw on his pioneering orbital space flight. This new footage was cut together with the original Vostok 1 mission audio recordings sourced from the Russian State Archive. Nespoli is credited as the director of photography for this documentary film, as he recorded the majority of the footage himself during Expedition 26/27. The film was streamed in a global YouTube premiere in 2011 under a free licence through the website firstorbit.org. In May 2013, commander Chris Hadfield shot a music video of David Bowie's "Space Oddity" on board the station, which was released on YouTube. It was the first music video ever to be filmed in space. In November 2017, while participating in Expedition 52/53 on the ISS, Paolo Nespoli made two recordings of his spoken voice (one in English and the other in his native Italian), for use on Wikipedia articles. These were the first content made in space specifically for Wikipedia. In November 2021, a virtual reality exhibit called The Infinite featuring life aboard the ISS was announced. Construction Manufacturing Since the International Space Station is a multi-national collaborative project, the components for in-orbit assembly were manufactured in various countries around the world. Beginning in the mid 1990s, the U.S. components Destiny, Unity, the Integrated Truss Structure, and the solar arrays were fabricated at the Marshall Space Flight Center and the Michoud Assembly Facility. These modules were delivered to the Operations and Checkout Building and the Space Station Processing Facility (SSPF) for final assembly and processing for launch. The Russian modules, including Zarya and Zvezda, were manufactured at the Khrunichev State Research and Production Space Center in Moscow. Zvezda was initially manufactured in 1985 as a component for Mir-2, but was never launched and instead became the ISS Service Module. The European Space Agency (ESA) Columbus module was manufactured at the EADS Astrium Space Transportation facilities in Bremen, Germany, along with many other contractors throughout Europe. The other ESA-built modulesHarmony, Tranquility, the Leonardo MPLM, and the Cupolawere initially manufactured at the Thales Alenia Space factory in Turin, Italy. The structural steel hulls of the modules were transported by aircraft to the Kennedy Space Center SSPF for launch processing. The Japanese Experiment Module Kibō, was fabricated in various technology manufacturing facilities in Japan, at the NASDA (now JAXA) Tsukuba Space Center, and the Institute of Space and Astronautical Science. The Kibo module was transported by ship and flown by aircraft to the SSPF. The Mobile Servicing System, consisting of the Canadarm2 and the Dextre grapple fixture, was manufactured at various factories in Canada (such as the David Florida Laboratory) and the United States, under contract by the Canadian Space Agency. The mobile base system, a connecting framework for Canadarm2 mounted on rails, was built by Northrop Grumman. Assembly The assembly of the International Space Station, a major endeavour in space architecture, began in November 1998. Russian modules launched and docked robotically, with the exception of Rassvet. All other modules were delivered by the Space Shuttle, which required installation by ISS and Shuttle crewmembers using the Canadarm2 (SSRMS) and extra-vehicular activities (EVAs); by 5 June 2011, they had added 159 components during more than 1,000 hours of EVA. 127 of these spacewalks originated from the station, and the remaining 32 were launched from the airlocks of docked Space Shuttles. The beta angle of the station had to be considered at all times during construction. The first module of the ISS, Zarya, was launched on 20 November 1998 on an autonomous Russian Proton rocket. It provided propulsion, attitude control, communications, and electrical power, but lacked long-term life support functions. A passive NASA module, Unity, was launched two weeks later aboard Space Shuttle flight STS-88 and attached to Zarya by astronauts during EVAs. The Unity module has two Pressurised Mating Adapters (PMAs): one connects permanently to Zarya and the other allowed the Space Shuttle to dock to the space station. At that time, the Russian (Soviet) station Mir was still inhabited, and the ISS remained uncrewed for two years. On 12 July 2000, the Zvezda module was launched into orbit. Onboard preprogrammed commands deployed its solar arrays and communications antenna. Zvezda then became the passive target for a rendezvous with Zarya and Unity, maintaining a station-keeping orbit while the Zarya–Unity vehicle performed the rendezvous and docking via ground control and the Russian automated rendezvous and docking system. Zarya computer transferred control of the station to Zvezda computer soon after docking. Zvezda added sleeping quarters, a toilet, kitchen, CO2 scrubbers, dehumidifier, oxygen generators, and exercise equipment, plus data, voice and television communications with mission control, enabling permanent habitation of the station. The first resident crew, Expedition 1, arrived in November 2000 on Soyuz TM-31. At the end of the first day on the station, astronaut Bill Shepherd requested the use of the radio call sign "Alpha", which he and cosmonaut Sergei Krikalev preferred to the more cumbersome "International Space Station". The name "Alpha" had previously been used for the station in the early 1990s, and its use was authorised for the whole of Expedition 1. Shepherd had been advocating the use of a new name to project managers for some time. Referencing a naval tradition in a pre-launch news conference he had said: "For thousands of years, humans have been going to sea in ships. People have designed and built these vessels, launched them with a good feeling that a name will bring good fortune to the crew and success to their voyage." Yuri Semenov, the President of Russian Space Corporation Energia at the time, disapproved of the name "Alpha" as he felt that Mir was the first modular space station, so the names "Beta" or "Mir 2" for the ISS would have been more fitting. Expedition 1 arrived midway between the Space Shuttle flights of missions STS-92 and STS-97. These two flights each added segments of the station's Integrated Truss Structure, which provided the station with Ku-band communication for US television, additional attitude support needed for the additional mass of the USOS, and substantial solar arrays to supplement the station's four existing arrays. Over the next two years, the station continued to expand. A Soyuz-U rocket delivered the Pirs docking compartment. The Space Shuttles Discovery, Atlantis, and Endeavour delivered the Destiny laboratory and Quest airlock, in addition to the station's main robot arm, the Canadarm2, and several more segments of the Integrated Truss Structure. The expansion schedule was interrupted in 2003 by the Space Shuttle Columbia disaster and a resulting hiatus in flights. The Space Shuttle was grounded until 2005 with STS-114 flown by Discovery. Assembly resumed in 2006 with the arrival of STS-115 with Atlantis, which delivered the station's second set of solar arrays. Several more truss segments and a third set of arrays were delivered on STS-116, STS-117, and STS-118. As a result of the major expansion of the station's power-generating capabilities, more pressurised modules could be accommodated, and the Harmony node and Columbus European laboratory were added. These were soon followed by the first two components of Kibō. In March 2009, STS-119 completed the Integrated Truss Structure with the installation of the fourth and final set of solar arrays. The final section of Kibō was delivered in July 2009 on STS-127, followed by the Russian Poisk module. The third node, Tranquility, was delivered in February 2010 during STS-130 by the Space Shuttle Endeavour, alongside the Cupola, followed by the penultimate Russian module, Rassvet, in May 2010. Rassvet was delivered by Space Shuttle Atlantis on STS-132 in exchange for the Russian Proton delivery of the US-funded Zarya module in 1998. The last pressurised module of the USOS, Leonardo, was brought to the station in February 2011 on the final flight of Discovery, STS-133. The Alpha Magnetic Spectrometer was delivered by Endeavour on STS-134 the same year. By June 2011, the station consisted of 15 pressurised modules and the Integrated Truss Structure. Three modules are still to be launched, including the Prichal module, and two power modules called NEM-1 and NEM-2. Russia's latest primary research module Nauka docked in July 2021, along with the European Robotic Arm which will be able to relocate itself to different parts of the Russian modules of the station. The gross mass of the station changes over time. The total launch mass of the modules on orbit is about (). The mass of experiments, spare parts, personal effects, crew, foodstuff, clothing, propellants, water supplies, gas supplies, docked spacecraft, and other items add to the total mass of the station. Hydrogen gas is constantly vented overboard by the oxygen generators. Structure The ISS is a modular space station. Modular stations can allow modules to be added to or removed from the existing structure, allowing greater flexibility. Below is a diagram of major station components. The blue areas are pressurised sections accessible by the crew without using spacesuits. The station's unpressurised superstructure is indicated in red. Planned components are shown in white and former ones in gray. Other unpressurised components are yellow. The Unity node joins directly to the Destiny laboratory. For clarity, they are shown apart. Similar cases are also seen in other parts of the structure. Pressurised modules Zarya Zarya (), also known as the Functional Cargo Block or FGB (from the or ФГБ), is the first module of the ISS to have been launched. The FGB provided electrical power, storage, propulsion, and guidance to the ISS during the initial stage of assembly. With the launch and assembly in orbit of other modules with more specialized functionality, Zarya is now primarily used for storage, both inside the pressurized section and in the externally mounted fuel tanks. The Zarya is a descendant of the TKS spacecraft designed for the Russian Salyut program. The name Zarya ("Dawn") was given to the FGB because it signified the dawn of a new era of international cooperation in space. Although it was built by a Russian company, it is owned by the United States. Unity The Unity connecting module, also known as Node 1, is the first U.S.-built component of the ISS. It connects the Russian and U.S. segments of the station, and is where crew eat meals together. The module is cylindrical in shape, with six berthing locations (forward, aft, port, starboard, zenith, and nadir) facilitating connections to other modules. Unity measures in diameter, is long, made of steel, and was built for NASA by Boeing in a manufacturing facility at the Marshall Space Flight Center in Huntsville, Alabama. Unity is the first of the three connecting modules; the other two are Harmony and Tranquility. Zvezda Zvezda (, meaning "star"), Salyut DOS-8, also known as the Zvezda Service Module, is a module of the ISS. It was the third module launched to the station, and provides all of the station's life support systems, some of which are supplemented in the USOS, as well as living quarters for two crew members. It is the structural and functional center of the Russian Orbital Segment, which is the Russian part of the ISS. Crew assemble here to deal with emergencies on the station. The module was manufactured by RKK Energia, with major sub-contracting work by GKNPTs Khrunichev. Zvezda was launched on a Proton rocket on 12 July 2000, and docked with the Zarya module on 26 July 2000. Destiny The Destiny module, also known as the U.S. Lab, is the primary operating facility for U.S. research payloads aboard the ISS. It was berthed to the Unity module and activated over a period of five days in February 2001. Destiny is NASA's first permanent operating orbital research station since Skylab was vacated in February 1974. The Boeing Company began construction of the research laboratory in 1995 at the Michoud Assembly Facility and then the Marshall Space Flight Center in Huntsville, Alabama. Destiny was shipped to the Kennedy Space Center in Florida in 1998, and was turned over to NASA for pre-launch preparations in August 2000. It launched on 7 February 2001, aboard the Space Shuttle Atlantis on STS-98. Astronauts work inside the pressurized facility to conduct research in numerous scientific fields. Scientists throughout the world would use the results to enhance their studies in medicine, engineering, biotechnology, physics, materials science, and Earth science. Quest The Joint Airlock (also known as "Quest") is provided by the U.S. and provides the capability for ISS-based Extravehicular Activity (EVA) using either a U.S. Extravehicular Mobility Unit (EMU) or Russian Orlan EVA suits. Before the launch of this airlock, EVAs were performed from either the U.S. Space Shuttle (while docked) or from the Transfer Chamber on the Service Module. Due to a variety of system and design differences, only U.S. space suits could be used from the Shuttle and only Russian suits could be used from the Service Module. The Joint Airlock alleviates this short-term problem by allowing either (or both) spacesuit systems to be used. The Joint Airlock was launched on ISS-7A / STS-104 in July 2001 and was attached to the right hand docking port of Node 1. The Joint Airlock is 20 ft. long, 13 ft. in diameter, and weighs 6.5 tons. The Joint Airlock was built by Boeing at Marshall Space Flight Center. The Joint Airlock was launched with the High Pressure Gas Assembly. The High Pressure Gas Assembly was mounted on the external surface of the Joint Airlock and will support EVAs operations with breathing gases and augments the Service Module's gas resupply system. The Joint Airlock has two main components: a crew airlock from which astronauts and cosmonauts exit the ISS and an equipment airlock designed for storing EVA gear and for so-called overnight "campouts" wherein Nitrogen is purged from astronaut's bodies overnight as pressure is dropped in preparation for spacewalks the following day. This alleviates the bends as the astronauts are repressurized after their EVA. The crew airlock was derived from the Space Shuttle's external airlock. It is equipped with lighting, external handrails, and an Umbilical Interface Assembly (UIA). The UIA is located on one wall of the crew airlock and provides a water supply line, a wastewater return line, and an oxygen supply line. The UIA also provides communication gear and spacesuit power interfaces and can support two spacesuits simultaneously. This can be either two American EMU spacesuits, two Russian ORLAN spacesuits, or one of each design. Poisk Poisk () was launched on 10 November 2009 attached to a modified Progress spacecraft, called Progress M-MIM2, on a Soyuz-U rocket from Launch Pad 1 at the Baikonur Cosmodrome in Kazakhstan. Poisk is used as the Russian airlock module, containing two identical EVA hatches. An outward-opening hatch on the Mir space station failed after it swung open too fast after unlatching, because of a small amount of air pressure remaining in the airlock. All EVA hatches on the ISS open inwards and are pressure-sealing. Poisk is used to store, service, and refurbish Russian Orlan suits and provides contingency entry for crew using the slightly bulkier American suits. The outermost docking port on the module allows docking of Soyuz and Progress spacecraft, and the automatic transfer of propellants to and from storage on the ROS. Since the departure of the identical Pirs module on July 26, 2021, Poisk has served as the only airlock on the ROS. Harmony Harmony, also known as Node 2, is the "utility hub" of the ISS. It connects the laboratory modules of the United States, Europe and Japan, as well as providing electrical power and electronic data. Sleeping cabins for four of the crew are housed here. Harmony was successfully launched into space aboard Space Shuttle flight STS-120 on 23 October 2007. After temporarily being attached to the port side of the Unity node, it was moved to its permanent location on the forward end of the Destiny laboratory on 14 November 2007. Harmony added to the station's living volume, an increase of almost 20 percent, from . Its successful installation meant that from NASA's perspective, the station was considered to be "U.S. Core Complete". Tranquility Tranquility, also known as Node 3, is a module of the ISS. It contains environmental control systems, life support systems, a toilet, exercise equipment, and an observation cupola. The European Space Agency and the Italian Space Agency had Tranquility manufactured by Thales Alenia Space. A ceremony on 20 November 2009 transferred ownership of the module to NASA. On 8 February 2010, NASA launched the module on the Space Shuttle's STS-130 mission. Columbus Columbus is a science laboratory that is part of the ISS and is the largest single contribution to the station made by the European Space Agency. Like the Harmony and Tranquility modules, the Columbus laboratory was constructed in Turin, Italy by Thales Alenia Space. The functional equipment and software of the lab was designed by EADS in Bremen, Germany. It was also integrated in Bremen before being flown to the Kennedy Space Center in Florida in an Airbus Beluga. It was launched aboard Space Shuttle Atlantis on 7 February 2008, on flight STS-122. It is designed for ten years of operation. The module is controlled by the Columbus Control Centre, located at the German Space Operations Center, part of the German Aerospace Center in Oberpfaffenhofen near Munich, Germany. The European Space Agency has spent €1.4 billion (about US$2 billion) on building Columbus, including the experiments it carries and the ground control infrastructure necessary to operate them. Kibō The Japanese Experiment Module (JEM), nicknamed , is a Japanese science module for the International Space Station (ISS) developed by JAXA. It is the largest single ISS module, and is attached to the Harmony module. The first two pieces of the module were launched on Space Shuttle missions STS-123 and STS-124. The third and final components were launched on STS-127. Cupola The Cupola is an ESA-built observatory module of the ISS. Its name derives from the Italian word , which means "dome". Its seven windows are used to conduct experiments, dockings and observations of Earth. It was launched aboard Space Shuttle mission STS-130 on 8 February 2010 and attached to the Tranquility (Node 3) module. With the Cupola attached, ISS assembly reached 85 percent completion. The Cupola central window has a diameter of . Rassvet Rassvet (; lit. "dawn"), also known as the Mini-Research Module 1 (MRM-1) (, ) and formerly known as the Docking Cargo Module (DCM), is a component of the International Space Station (ISS). The module's design is similar to the Mir Docking Module launched on STS-74 in 1995. Rassvet is primarily used for cargo storage and as a docking port for visiting spacecraft. It was flown to the ISS aboard Space Shuttle Atlantis on the STS-132 mission on 14 May 2010, and was connected to the ISS on 18 May 2010. The hatch connecting Rassvet with the ISS was first opened on 20 May 2010. On 28 June 2010, the Soyuz TMA-19 spacecraft performed the first docking with the module. MLM outfittings In May 2010, equipment for Nauka was launched on STS-132 (as part of an agreement with NASA) and delivered by Space Shuttle Atlantis. Weighing 1.4 metric tons, the equipment was attached to the outside of Rassvet (MRM-1). It included a spare elbow joint for the European Robotic Arm (ERA) (which was launched with Nauka) and an ERA-portable workpost used during EVAs, as well as a heat radiator, internal hardware and an experiment airlock for launching CubeSats to be positioned on the modified passive forward port near the nadir end of the Nauka module. The deployable radiator will be used to add additional cooling capability to Nauka, which will enable the module to host more scientific experiments. The airlock will be used only to pass experiments inside and outside the module, with the aid of ERAvery similar to the Japanese airlock and Nanoracks Bishop Airlock on the U.S. segment of the station. The ERA will be used to remove the radiator and airlock from Rassvet and transfer them over to Nauka. This process is expected to take several months. A portable work platform will also be transferred over, which can attach to the end of the ERA to allow cosmonauts to "ride" on the end of the arm during spacewalks. Leonardo The Leonardo Permanent Multipurpose Module (PMM) is a module of the International Space Station. It was flown into space aboard the Space Shuttle on STS-133 on 24 February 2011 and installed on 1 March. Leonardo is primarily used for storage of spares, supplies and waste on the ISS, which was until then stored in many different places within the space station. It is also the personal hygiene area for the astronauts who live in the US Orbital Segment. The Leonardo PMM was a Multi-Purpose Logistics Module (MPLM) before 2011, but was modified into its current configuration. It was formerly one of two MPLM used for bringing cargo to and from the ISS with the Space Shuttle. The module was named for Italian polymath Leonardo da Vinci. Bigelow Expandable Activity Module The Bigelow Expandable Activity Module (BEAM) is an experimental expandable space station module developed by Bigelow Aerospace, under contract to NASA, for testing as a temporary module on the International Space Station (ISS) from 2016 to at least 2020. It arrived at the ISS on 10 April 2016, was berthed to the station on 16 April at Tranquility Node 3, and was expanded and pressurized on 28 May 2016. International Docking Adapters The International Docking Adapter (IDA) is a spacecraft docking system adapter developed to convert APAS-95 to the NASA Docking System (NDS). An IDA is placed on each of the ISS's two open Pressurized Mating Adapters (PMAs), both of which are connected to the Harmony module. Two International Docking Adapters are currently installed aboard the Station. Originally, IDA-1 was planned to be installed on PMA-2, located at Harmony's forward port, and IDA-2 would be installed on PMA-3 at Harmony's zenith. After IDA 1 was destroyed in a launch incident, IDA-2 was installed on PMA-2 on 19 August 2016, while IDA-3 was later installed on PMA-3 on 21 August 2019. Bishop Airlock Module The NanoRacks Bishop Airlock Module is a commercially funded airlock module launched to the ISS on SpaceX CRS-21 on 6 December 2020. The module was built by NanoRacks, Thales Alenia Space, and Boeing. It will be used to deploy CubeSats, small satellites, and other external payloads for NASA, CASIS, and other commercial and governmental customers. Nauka Nauka (), also known as the Multipurpose Laboratory Module-Upgrade (MLM-U), (Russian: Многоцелевой лабораторный модуль, усоверше́нствованный, or МЛМ-У), is a Roscosmos-funded component of the ISS that was launched on 21 July 2021, 14:58 UTC. In the original ISS plans, Nauka was to use the location of the Docking and Stowage Module (DSM), but the DSM was later replaced by the Rassvet module and moved to Zaryas nadir port. Nauka was successfully docked to Zvezdas nadir port on 29 July 2021, 13:29 UTC, replacing the Pirs module. It had a temporary docking adapter on its nadir port for crewed and uncrewed missions until Prichal arrival, where just before its arrival it was removed by a departuring Progress spacecraft. Prichal Prichal, also known as Uzlovoy Module or UM (), is a ball-shaped module that will provide the Russian segment additional docking ports to receive Soyuz MS and Progress MS spacecraft. UM was launched in November 2021. It was integrated with a special version of the Progress cargo spacecraft and launched by a standard Soyuz rocket, docking to the nadir port of the Nauka module. One port is equipped with an active hybrid docking port, which enables docking with the MLM module. The remaining five ports are passive hybrids, enabling docking of Soyuz and Progress vehicles, as well as heavier modules and future spacecraft with modified docking systems. The node module was intended to serve as the only permanent element of the cancelled Orbital Piloted Assembly and Experiment Complex (OPSEK). Unpressurised elements The ISS has a large number of external components that do not require pressurisation. The largest of these is the Integrated Truss Structure (ITS), to which the station's main solar arrays and thermal radiators are mounted. The ITS consists of ten separate segments forming a structure long. The station was intended to have several smaller external components, such as six robotic arms, three External Stowage Platforms (ESPs) and four ExPRESS Logistics Carriers (ELCs). While these platforms allow experiments (including MISSE, the STP-H3 and the Robotic Refueling Mission) to be deployed and conducted in the vacuum of space by providing electricity and processing experimental data locally, their primary function is to store spare Orbital Replacement Units (ORUs). ORUs are parts that can be replaced when they fail or pass their design life, including pumps, storage tanks, antennas, and battery units. Such units are replaced either by astronauts during EVA or by robotic arms. Several shuttle missions were dedicated to the delivery of ORUs, including STS-129, STS-133 and STS-134. , only one other mode of transportation of ORUs had been utilisedthe Japanese cargo vessel HTV-2which delivered an FHRC and CTC-2 via its Exposed Pallet (EP). There are also smaller exposure facilities mounted directly to laboratory modules; the Kibō Exposed Facility serves as an external "porch" for the Kibō complex, and a facility on the European Columbus laboratory provides power and data connections for experiments such as the European Technology Exposure Facility and the Atomic Clock Ensemble in Space. A remote sensing instrument, SAGE III-ISS, was delivered to the station in February 2017 aboard CRS-10, and the NICER experiment was delivered aboard CRS-11 in June 2017. The largest scientific payload externally mounted to the ISS is the Alpha Magnetic Spectrometer (AMS), a particle physics experiment launched on STS-134 in May 2011, and mounted externally on the ITS. The AMS measures cosmic rays to look for evidence of dark matter and antimatter. The commercial Bartolomeo External Payload Hosting Platform, manufactured by Airbus, was launched on 6 March 2020 aboard CRS-20 and attached to the European Columbus module. It will provide an additional 12 external payload slots, supplementing the eight on the ExPRESS Logistics Carriers, ten on Kibō, and four on Columbus. The system is designed to be robotically serviced and will require no astronaut intervention. It is named after Christopher Columbus's younger brother. Robotic arms and cargo cranes The Integrated Truss Structure serves as a base for the station's primary remote manipulator system, the Mobile Servicing System (MSS), which is composed of three main components: Canadarm2, the largest robotic arm on the ISS, has a mass of and is used to: dock and manipulate spacecraft and modules on the USOS; hold crew members and equipment in place during EVAs; and move Dextre around to perform tasks. Dextre is a robotic manipulator that has two arms and a rotating torso, with power tools, lights, and video for replacing orbital replacement units (ORUs) and performing other tasks requiring fine control. The Mobile Base System (MBS) is a platform that rides on rails along the length of the station's main truss, which serves as a mobile base for Canadarm2 and Dextre, allowing the robotic arms to reach all parts of the USOS. A grapple fixture was added to Zarya on STS-134 to enable Canadarm2 to inchworm itself onto the Russian Orbital Segment. Also installed during STS-134 was the Orbiter Boom Sensor System (OBSS), which had been used to inspect heat shield tiles on Space Shuttle missions and which can be used on the station to increase the reach of the MSS. Staff on Earth or the ISS can operate the MSS components using remote control, performing work outside the station without the need for space walks. Japan's Remote Manipulator System, which services the Kibō Exposed Facility, was launched on STS-124 and is attached to the Kibō Pressurised Module. The arm is similar to the Space Shuttle arm as it is permanently attached at one end and has a latching end effector for standard grapple fixtures at the other. The European Robotic Arm, which will service the Russian Orbital Segment, was launched alongside the Nauka module. The ROS does not require spacecraft or modules to be manipulated, as all spacecraft and modules dock automatically and may be discarded the same way. Crew use the two Strela () cargo cranes during EVAs for moving crew and equipment around the ROS. Each Strela crane has a mass of . Former module Pirs Pirs (Russian: Пирс, lit. 'Pier') was launched on 14 September 2001, as ISS Assembly Mission 4R, on a Russian Soyuz-U rocket, using a modified Progress spacecraft, Progress M-SO1, as an upper stage. Pirs was undocked by Progress MS-16 on 26 July 2021, 10:56 UTC, and deorbited on the same day at 14:51 UTC to make room for Nauka module to be attached to the space station. Prior to its departure, Pirs served as the primary Russian airlock on the station, being used to store and refurbish the Russian Orlan spacesuits. Planned components Axiom segment In January 2020, NASA awarded Axiom Space a contract to build a commercial module for the ISS with a launch date of 2024. The contract is under the NextSTEP2 program. NASA negotiated with Axiom on a firm fixed-price contract basis to build and deliver the module, which will attach to the forward port of the space station's Harmony (Node 2) module. Although NASA has only commissioned one module, Axiom plans to build an entire segment consisting of five modules, including a node module, an orbital research and manufacturing facility, a crew habitat, and a "large-windowed Earth observatory". The Axiom segment is expected to greatly increase the capabilities and value of the space station, allowing for larger crews and private spaceflight by other organisations. Axiom plans to convert the segment into a stand-alone space station once the ISS is decommissioned, with the intention that this would act as a successor to the ISS. Canadarm 2 will also help to berth the Axiom Space Station modules to the ISS and will continue its operations on the Axiom Space Station after the retirement of ISS in late 2020s. Proposed components Xbase Made by Bigelow Aerospace. In August 2016 Bigelow negotiated an agreement with NASA to develop a full-sized ground prototype Deep Space Habitation based on the B330 under the second phase of Next Space Technologies for Exploration Partnerships. The module is called the Expandable Bigelow Advanced Station Enhancement (XBASE), as Bigelow hopes to test the module by attaching it to the International Space Station. Independence-1 Nanoracks, after finalizing its contract with NASA, and after winning NextSTEPs Phase II award, is now developing its concept Independence-1 (previously known as Ixion), which would turn spent rocket tanks into a habitable living area to be tested in space. In Spring 2018, Nanoracks announced that Ixion is now known as the Independence-1, the first 'outpost' in Nanoracks' Space Outpost Program. Nautilus-X Centrifuge Demonstration If produced, this centrifuge will be the first in-space demonstration of sufficient scale centrifuge for artificial partial-g effects. It will be designed to become a sleep module for the ISS crew. Cancelled components Several modules planned for the station were cancelled over the course of the ISS programme. Reasons include budgetary constraints, the modules becoming unnecessary, and station redesigns after the 2003 Columbia disaster. The US Centrifuge Accommodations Module would have hosted science experiments in varying levels of artificial gravity. The US Habitation Module would have served as the station's living quarters. Instead, the living quarters are now spread throughout the station. The US Interim Control Module and ISS Propulsion Module would have replaced the functions of Zvezda in case of a launch failure. Two Russian Research Modules were planned for scientific research. They would have docked to a Russian Universal Docking Module. The Russian Science Power Platform would have supplied power to the Russian Orbital Segment independent of the ITS solar arrays. Science Power Modules 1 and 2 (Repurposed Components) Science Power Module 1 (SPM-1, also known as NEM-1) and Science Power Module 2 (SPM-2, also known as NEM-2) are modules that were originally planned to arrive at the ISS no earlier than 2024, and dock to the Prichal module, which is currently docked to the Nauka module. In April 2021, Roscosmos announced that NEM-1 would be repurposed to function as the core module of the proposed Russian Orbital Service Station (ROSS), launching no earlier than 2025 and docking to the free-flying Nauka module either before or after the ISS has been deorbited. NEM-2 may be converted into another core "base" module, which would be launched in 2028. Onboard systems Life support The critical systems are the atmosphere control system, the water supply system, the food supply facilities, the sanitation and hygiene equipment, and fire detection and suppression equipment. The Russian Orbital Segment's life support systems are contained in the Zvezda service module. Some of these systems are supplemented by equipment in the USOS. The Nauka laboratory has a complete set of life support systems. Atmospheric control systems The atmosphere on board the ISS is similar to that of Earth. Normal air pressure on the ISS is ; the same as at sea level on Earth. An Earth-like atmosphere offers benefits for crew comfort, and is much safer than a pure oxygen atmosphere, because of the increased risk of a fire such as that responsible for the deaths of the Apollo 1 crew. Earth-like atmospheric conditions have been maintained on all Russian and Soviet spacecraft. The Elektron system aboard Zvezda and a similar system in Destiny generate oxygen aboard the station. The crew has a backup option in the form of bottled oxygen and Solid Fuel Oxygen Generation (SFOG) canisters, a chemical oxygen generator system. Carbon dioxide is removed from the air by the Vozdukh system in Zvezda. Other by-products of human metabolism, such as methane from the intestines and ammonia from sweat, are removed by activated charcoal filters. Part of the ROS atmosphere control system is the oxygen supply. Triple-redundancy is provided by the Elektron unit, solid fuel generators, and stored oxygen. The primary supply of oxygen is the Elektron unit which produces and by electrolysis of water and vents overboard. The system uses approximately one litre of water per crew member per day. This water is either brought from Earth or recycled from other systems. Mir was the first spacecraft to use recycled water for oxygen production. The secondary oxygen supply is provided by burning oxygen-producing Vika cartridges (see also ISS ECLSS). Each 'candle' takes 5–20 minutes to decompose at , producing of . This unit is manually operated. The US Orbital Segment has redundant supplies of oxygen, from a pressurised storage tank on the Quest airlock module delivered in 2001, supplemented ten years later by ESA-built Advanced Closed-Loop System (ACLS) in the Tranquility module (Node 3), which produces by electrolysis. Hydrogen produced is combined with carbon dioxide from the cabin atmosphere and converted to water and methane. Power and thermal control Double-sided solar arrays provide electrical power to the ISS. These bifacial cells collect direct sunlight on one side and light reflected off from the Earth on the other, and are more efficient and operate at a lower temperature than single-sided cells commonly used on Earth. The Russian segment of the station, like most spacecraft, uses 28 V low voltage DC from two rotating solar arrays mounted on Zvezda. The USOS uses 130–180 V DC from the USOS PV array, power is stabilised and distributed at 160 V DC and converted to the user-required 124 V DC. The higher distribution voltage allows smaller, lighter conductors, at the expense of crew safety. The two station segments share power with converters. The USOS solar arrays are arranged as four wing pairs, for a total production of 75 to 90 kilowatts. These arrays normally track the Sun to maximise power generation. Each array is about in area and long. In the complete configuration, the solar arrays track the Sun by rotating the alpha gimbal once per orbit; the beta gimbal follows slower changes in the angle of the Sun to the orbital plane. The Night Glider mode aligns the solar arrays parallel to the ground at night to reduce the significant aerodynamic drag at the station's relatively low orbital altitude. The station originally used rechargeable nickel–hydrogen batteries () for continuous power during the 45 minutes of every 90-minute orbit that it is eclipsed by the Earth. The batteries are recharged on the day side of the orbit. They had a 6.5-year lifetime (over 37,000 charge/discharge cycles) and were regularly replaced over the anticipated 20-year life of the station. Starting in 2016, the nickel–hydrogen batteries were replaced by lithium-ion batteries, which are expected to last until the end of the ISS program. The station's large solar panels generate a high potential voltage difference between the station and the ionosphere. This could cause arcing through insulating surfaces and sputtering of conductive surfaces as ions are accelerated by the spacecraft plasma sheath. To mitigate this, plasma contactor units create current paths between the station and the ambient space plasma. The station's systems and experiments consume a large amount of electrical power, almost all of which is converted to heat. To keep the internal temperature within workable limits, a passive thermal control system (PTCS) is made of external surface materials, insulation such as MLI, and heat pipes. If the PTCS cannot keep up with the heat load, an External Active Thermal Control System (EATCS) maintains the temperature. The EATCS consists of an internal, non-toxic, water coolant loop used to cool and dehumidify the atmosphere, which transfers collected heat into an external liquid ammonia loop. From the heat exchangers, ammonia is pumped into external radiators that emit heat as infrared radiation, then back to the station. The EATCS provides cooling for all the US pressurised modules, including Kibō and Columbus, as well as
|
language of the Indo-European language family spoken in Ireland Irish people, people of Irish ethnicity, people born in Ireland and people who hold Irish citizenship Irish may also refer to: Places Irish Creek (Kansas), a stream in Kansas Irish Creek (South Dakota), a stream in South Dakota Irish Lake, Watonwan County, Minnesota Irish Sea, the body of water which separates the islands of Ireland and Great Britain Other uses Irish (name), a given name or family name Irish (game), historical tables game that was the predecessor of Backgammon Irish lace
|
and Northern Ireland Republic of Ireland, a sovereign state Irish language, a Celtic Goidelic language of the Indo-European language family spoken in Ireland Irish people, people of Irish ethnicity, people born in Ireland and people who hold Irish citizenship Irish may also refer to: Places Irish Creek (Kansas), a stream in Kansas Irish Creek (South Dakota), a stream in South Dakota Irish Lake, Watonwan County, Minnesota Irish Sea, the body of water which separates the islands of Ireland and Great Britain Other uses Irish (name), a given name or family name Irish (game), historical tables game that was the predecessor of Backgammon Irish lace Irish nationality law, law determining who
|
Much Shall We Bet – A story about betting on the long term evolution of mankind. The Dinosaurs – How some dinosaurs lived after most of them had become extinct, and how it felt to be that last existing dinosaur in an age where all the current mammals feared his kind as demons. The Form of Space – As the unnamed narrator "falls" through space, he cannot help but notice that his trajectory is parallel to that of a beautiful woman, Ursula H'x, and that of lieutenant Fenimore, who is also in love with Ursula. The narrator dreams of the shape of space changing, so that he may touch Ursula (or fight with Fenimore). The Light Years – The unnamed narrator looking at other galaxies, and spotting one with a sign pointed right at him saying "I saw you." Given that there's a gulf of 100,000,000 light years, he checks his diary to find out what he had been doing that day, and finds out that it was something he wished to hide. Then he starts to worry. The Spiral – A story about life as a
|
symbol. All at One Point – The fact that all matter and creation used to exist in a single point. "Naturally, we were all there—old Qfwfq said—where else could we have been? Nobody knew then that there could be space. Or time either: what use did we have for time, packed in there like sardines?" Without Colors – Before there was an atmosphere, everything was the same shade of gray. As the atmosphere appears, so do colors. The novelty scares off Ayl, Qfwfq's love interest. Games Without End – A galactic game of marbles back before the universe had formed much more than particles. The Aquatic Uncle – A tale on the fact that at one stage in evolution animals left the sea and came to live on land. The story is about a family living on land that is a bit ashamed of their old uncle who still lives in the sea, refusing to come ashore like "civilized" people. How Much Shall We Bet – A story about betting on the long term evolution of mankind. The Dinosaurs – How some dinosaurs lived after most of them had become extinct, and how it felt to be that last existing dinosaur in an age where all the current mammals feared his kind as demons. The Form of Space – As the unnamed narrator "falls" through space, he cannot help but notice that his trajectory is parallel to that of a beautiful woman, Ursula H'x, and that of lieutenant Fenimore, who is also in love with Ursula. The narrator dreams of the shape of space changing, so that he may touch Ursula (or fight with Fenimore). The Light Years – The unnamed narrator looking at other galaxies, and spotting one with a sign pointed right at him saying "I saw you." Given that there's a gulf of 100,000,000 light years, he checks his diary to find out what he had been doing that day, and finds
|
of x86-64, as of 2018, IA-32 protected mode versions of many modern operating systems are still maintained, e.g. Microsoft Windows (until Windows 10; Windows 11 requires x86-64-compatible processor for x86 versions) and the Debian Linux distribution. In spite of IA-32's name (and causing some potential confusion), the 64-bit evolution of x86 that originated out of AMD would not be known as "IA-64", that name instead belonging to Intel's Itanium architecture. Architectural features The primary defining characteristic of IA-32 is the availability of 32-bit general-purpose processor registers (for example, EAX and EBX), 32-bit integer arithmetic and logical operations, 32-bit offsets within a segment in protected mode, and the translation of segmented addresses to 32-bit linear addresses. The designers took the opportunity to make other improvements as well. Some of the most significant changes (relative to the 16-bit 286 instruction set) are described below. 32-bit integer capability All general-purpose registers (GPRs) are expanded from 16 bits to 32 bits, and all arithmetic and logical operations, memory-to-register and register-to-memory operations, etc., can operate directly on 32-bit integers. Pushes and pops on
|
given the contemporary prevalence of x86-64, as of 2018, IA-32 protected mode versions of many modern operating systems are still maintained, e.g. Microsoft Windows (until Windows 10; Windows 11 requires x86-64-compatible processor for x86 versions) and the Debian Linux distribution. In spite of IA-32's name (and causing some potential confusion), the 64-bit evolution of x86 that originated out of AMD would not be known as "IA-64", that name instead belonging to Intel's Itanium architecture. Architectural features The primary defining characteristic of IA-32 is the availability of 32-bit general-purpose processor registers (for example, EAX and EBX), 32-bit integer arithmetic and logical operations, 32-bit offsets within a segment in protected mode, and the translation of segmented addresses to 32-bit linear addresses. The designers took the opportunity to make other improvements as well. Some of the most significant changes (relative to the 16-bit 286 instruction set) are described below. 32-bit integer capability All general-purpose registers (GPRs) are expanded from 16 bits to 32 bits, and all arithmetic and logical operations, memory-to-register and register-to-memory operations, etc., can operate directly on 32-bit integers. Pushes and pops on the stack default to 4-byte strides, and non-segmented pointers are 4 bytes wide. More general addressing modes Any GPR can be used as a base register, and any GPR other than ESP can be used as an index register, in a memory reference. The index register value can be multiplied by 1, 2, 4, or 8 before being added to the base register value and displacement. Additional segment registers Two additional segment registers, FS and GS, are provided. Larger virtual address space The IA-32 architecture
|
reason for action only if one has the relevant desire (that is, only internal reasons can be reasons for action). The reasons internalist claims the following: the moral facts are a reason for Sasha's action not to steal from the poor person next to him only if he currently wants to follow the moral law (or if not stealing from the poor person is a way to satisfy his other current goals—that is, part of what Williams calls his "subjective motivational set"). In short, the reasoning behind reasons internalism, according to Williams, is that reasons for action must be able to explain one's action; and only internal reasons can do this. Epistemology Justification Internalism Two main varieties of epistemic internalism about justification are access internalism and ontological internalism. Access internalists require that a believer must have internal access to the justifier(s) of her belief p in order to be justified in believing p. For the access internalist, justification amounts to something like the believer being aware (or capable of being aware) of certain facts that make her belief in p rational, or her being able to give reasons for her belief in p. At minimum, access internalism requires that the believer have some kind of reflective access or awareness to whatever justifies her belief. Ontological internalism is the view that justification for a belief is established by one's mental states. Ontological internalism can be distinct from access internalism, but the two are often thought to go together since we are generally considered to be capable of having reflective access to mental states. One popular argument for internalism is known as the 'new evil demon problem'. The new evil demon problem indirectly supports internalism by challenging externalist views of justification, particularly reliabilism. The argument asks us to imagine a subject with beliefs and experiences identical to ours, but the subject is being systematically deceived by a malicious Cartesian demon so that all their beliefs turn out false. In spite of the subject's unfortunate deception, the argument goes, we do not think this subject ceases to be rational in taking things to be as they appear as we do. After all, it is possible that we could be radically deceived in the same way, yet we are still justified in holding most of our beliefs in spite of this possibility. Since reliabilism maintains that one's beliefs are justified via reliable belief-forming processes (where reliable means yielding true beliefs), the subject in the evil demon scenario would not likely have any justified beliefs according to reliabilism because all of their beliefs would be false. Since this result is supposed to clash with our intuitions that the subject is justified in their beliefs in spite of being systematically deceived, some take the new evil demon problem as a reason for rejecting externalist views of justification. Externalism Externalist views of justification emerged in epistemology during the late 20th century. Externalist conceptions of justification assert that facts external to the believer can serve as the justification for a belief. According to the externalist, a believer need not have any internal access or cognitive grasp of any reasons or facts which make their belief justified. The externalist's assessment of justification can be contrasted with access internalism, which demands that the believer have internal reflective access to reasons or facts which corroborate their belief in order to be justified in holding it. Externalism, on the other hand, maintains that the justification for someone's belief can come from facts that are entirely external to the agent's subjective awareness. Alvin Goldman, one of the most well-known proponents of externalism in epistemology, is known for developing a popular form of externalism called reliabilism. In his paper, “What is Justified Belief?” Goldman characterizes the reliabilist conception of justification as such: "If S’s believing p at t results from a reliable cognitive belief-forming process (or set of processes), then S’s belief in p at t is justified.” Goldman notes that a reliable belief-forming process is one which generally produces true beliefs. A unique consequence of reliabilism (and other forms of externalism) is that one can have a justified belief without knowing one is justified (this is not possible under most forms of epistemic internalism). In addition, we do not yet know which cognitive processes are in fact reliable, so anyone who embraces reliabilism must concede that we do not always know whether some of our beliefs are justified (even though there is a fact of the matter). As a response to skepticism In responding to skepticism, Hilary Putnam (1982) claims that semantic externalism yields "an argument we can give that shows we are not brains in a vat (BIV). (See also DeRose, 1999.) If semantic externalism is true, then the meaning of a word or sentence is not wholly determined by what individuals think those words mean. For example, semantic externalists maintain that the word "water" referred to the substance whose chemical composition is H2O even before scientists had discovered that chemical composition. The fact that the substance out in the world we were calling "water" actually had that composition at least partially determined the meaning of the word. One way to use this in a response to skepticism is to apply the same strategy to the terms used in a skeptical argument in the following way (DeRose, 1999): To clarify how this argument is supposed to work: Imagine that there is brain in a vat, and a whole world is being simulated for it. Call the individual who is being deceived "Steve." When Steve is given an experience of walking through a park, semantic externalism allows for his thought, "I am walking through a park" to be true so long as the simulated reality is one in which he is walking through a park. Similarly, what it takes for his thought, "I am a brain in a vat," to be true is for the simulated reality to be one where he is a brain in a vat. But in the simulated reality, he is not a brain in a vat. Apart from disputes over the success of the argument or the plausibility of the specific type of semantic externalism required for it to work, there is question as to what is gained by defeating the skeptical worry with this strategy. Skeptics can give new skeptical cases that wouldn't be subject to the same response (e.g., one where the person was very recently turned into a brain in a vat, so that their words "brain" and "vat" still pick out real brains and vats, rather than simulated ones). Further, if even brains in vats can correctly believe "I am not a brain in a vat," then the skeptic can still press us on how we know we are not in that situation (though the externalist will point out that it may be difficult for the skeptic to describe that situation). Another attempt to use externalism to refute skepticism is done by Brueckner and Warfield. It involves the claim that our thoughts are about things, unlike a BIV's thoughts, which cannot be about things (DeRose, 1999). Semantics Semantic externalism comes in two varieties, depending on whether meaning is construed cognitively or linguistically. On a cognitive construal, externalism is the thesis that what concepts (or contents) are available to a thinker is determined by their environment, or their relation to their environment. On a linguistic construal, externalism is the thesis that the meaning of a word is environmentally determined. Likewise, one can construe semantic internalism in two ways, as a denial of either of these two theses. Externalism and internalism in semantics is closely tied to the distinction in philosophy of mind concerning mental content, since the contents of one's thoughts (specifically, intentional mental states) are usually taken to be semantic objects that are truth-evaluable. See also: Linguistic turn and cognitive turn for more about the two construals of meaning Swamp man thought experiment Twin Earth thought experiment Philosophy of mind Within the context of the philosophy of mind, externalism is the theory that the contents of at least some of one's mental states are dependent in part on their relationship to the external world or one's environment. The traditional discussion on externalism was centered around the semantic aspect of mental content. This is by no means the only meaning of externalism now. Externalism is now a broad collection of philosophical views considering all aspects of mental content and activity. There are various forms of externalism that consider either the content or the vehicles of the mind or both. Furthermore, externalism could be limited to cognition, or it could address broader issues of consciousness. As to the traditional discussion on semantic externalism (often dubbed content externalism), some mental states, such as believing that water is wet, and fearing that the Queen has been insulted, have contents we can capture using 'that' clauses. The content externalist often appeal to observations found as early as Hilary Putnam's seminal essay, "The Meaning of 'Meaning'," (1975). Putnam stated that we can easily imagine pairs of individuals that are microphysical duplicates embedded in different surroundings who use the same words but mean different things when using them. For example, suppose that Ike and Tina's mothers are identical twins and that Ike and Tina are raised in isolation from one another in indistinguishable environments. When Ike says, "I want my mommy," he expresses a want satisfied only if he is brought to his mommy. If we brought Tina's mommy, Ike might not notice the difference, but he doesn't get what he wants. It seems that what he wants and what he says when he says, "I want my mommy," will be different from what Tina wants and what
|
simulated ones). Further, if even brains in vats can correctly believe "I am not a brain in a vat," then the skeptic can still press us on how we know we are not in that situation (though the externalist will point out that it may be difficult for the skeptic to describe that situation). Another attempt to use externalism to refute skepticism is done by Brueckner and Warfield. It involves the claim that our thoughts are about things, unlike a BIV's thoughts, which cannot be about things (DeRose, 1999). Semantics Semantic externalism comes in two varieties, depending on whether meaning is construed cognitively or linguistically. On a cognitive construal, externalism is the thesis that what concepts (or contents) are available to a thinker is determined by their environment, or their relation to their environment. On a linguistic construal, externalism is the thesis that the meaning of a word is environmentally determined. Likewise, one can construe semantic internalism in two ways, as a denial of either of these two theses. Externalism and internalism in semantics is closely tied to the distinction in philosophy of mind concerning mental content, since the contents of one's thoughts (specifically, intentional mental states) are usually taken to be semantic objects that are truth-evaluable. See also: Linguistic turn and cognitive turn for more about the two construals of meaning Swamp man thought experiment Twin Earth thought experiment Philosophy of mind Within the context of the philosophy of mind, externalism is the theory that the contents of at least some of one's mental states are dependent in part on their relationship to the external world or one's environment. The traditional discussion on externalism was centered around the semantic aspect of mental content. This is by no means the only meaning of externalism now. Externalism is now a broad collection of philosophical views considering all aspects of mental content and activity. There are various forms of externalism that consider either the content or the vehicles of the mind or both. Furthermore, externalism could be limited to cognition, or it could address broader issues of consciousness. As to the traditional discussion on semantic externalism (often dubbed content externalism), some mental states, such as believing that water is wet, and fearing that the Queen has been insulted, have contents we can capture using 'that' clauses. The content externalist often appeal to observations found as early as Hilary Putnam's seminal essay, "The Meaning of 'Meaning'," (1975). Putnam stated that we can easily imagine pairs of individuals that are microphysical duplicates embedded in different surroundings who use the same words but mean different things when using them. For example, suppose that Ike and Tina's mothers are identical twins and that Ike and Tina are raised in isolation from one another in indistinguishable environments. When Ike says, "I want my mommy," he expresses a want satisfied only if he is brought to his mommy. If we brought Tina's mommy, Ike might not notice the difference, but he doesn't get what he wants. It seems that what he wants and what he says when he says, "I want my mommy," will be different from what Tina wants and what she says she wants when she says, "I want my mommy." Externalists say that if we assume competent speakers know what they think, and say what they think, the difference in what these two speakers mean corresponds to a difference in the thoughts of the two speakers that is not (necessarily) reflected by a difference in the internal make up of the speakers or thinkers. They urge us to move from externalism about meaning of the sort Putnam defended to externalism about contentful states of mind. The example pertains to singular terms, but has been extended to cover kind terms as well such as natural kinds (e.g., 'water') and for kinds of artifacts (e.g., 'espresso maker'). There is no general agreement amongst content externalists as to the scope of the thesis. Philosophers now tend to distinguish between wide content (externalist mental content) and narrow content (anti-externalist mental content). Some, then, align themselves as endorsing one view of content exclusively, or both. For example, Jerry Fodor (1980) argues for narrow content (although he comes to reject that view in his 1995), while David Chalmers (2002) argues for a two dimensional semantics according to which the contents of mental states can have both wide and narrow content. Critics of the view have questioned the original thought experiments saying that the lessons that Putnam and later writers such as Tyler Burge (1979, 1982) have urged us to draw can be resisted. Frank Jackson and John Searle, for example, have defended internalist accounts of thought content according to which the contents of our thoughts are fixed by descriptions that pick out the individuals and kinds that our thoughts intuitively pertain to the sorts of things that we take them to. In the Ike/Tina example, one might agree that Ike's thoughts pertain to Ike's mother and that Tina's thoughts pertain to Tina's but insist that this is because Ike thinks of that woman as his mother and we can capture this by saying that he thinks of her as 'the mother of the speaker'. This descriptive phrase will pick out one unique woman. Externalists claim this is implausible, as we would have to ascribe to Ike knowledge he wouldn't need to successfully think about or refer to his mother. Critics have also claimed that content externalists are committed to epistemological absurdities. Suppose that a speaker can have the concept of water we do only if the speaker lives in a world that contains H2O. It seems this speaker could know a priori that they think that water is wet. This is the thesis of privileged access. It also seems that they could know on the basis of simple thought experiments that they can only think that water is wet if they live in a world that contains water. What would prevent her from putting these together and coming to know a priori that the world contains water? If we should say that no one could possibly know whether water exists a priori, it seems either we cannot know content externalism to be true on the basis of thought experiments or we cannot know what we are thinking without first looking into the world to see what it is like. As mentioned, content externalism (limited to the semantic aspects) is only one among many other options offered by externalism by and large. See also: Twin Earth thought experiment Extended cognition Historiography of science Internalism in the historiography of science claims that science is completely distinct from social influences and pure natural science can exist in any society and at any time given the intellectual capacity. Imre Lakatos is a notable proponent of historiographical internalism. Externalism in the historiography of science is the view that the history of science is due to its social context – the socio-political climate and the surrounding economy determines scientific progress. Thomas Kuhn is a notable proponent of historiographical externalism. See also Anti-psychologism Dream argument Emic and etic Foundationalism Relativism Self-awareness Simulated reality References Further reading Brink, David (1989) "Moral Realism and the Foundations of Ethics", New York: Cambridge University Press, Ch. 3, pp. 37–80. Brown, Curtis (2007) "Narrow Mental Content", The Stanford Encyclopedia of Philosophy (Spring 2007 Edition), Edward N. Zalta (ed.). (link) Burge, Tyler (1979) "Individualism and the Mental", in French, Uehling, and Wettstein (eds.) Midwest Studies in Philosophy IV, Minneapolis: University of Minnesota Press, pp. 73–121. Burge, Tyler (1982) "Other Bodies", in Woodfield, Andrew, ed., Thought and Object. New York: Oxford. Chalmers, David (2002) "The Components of Content", in Chalmers (ed.) Philosophy of Mind: Classical and Contemporary Readings, Oxford: Oxford University Press. Preprint available online Cohen, Stewart (1984) "Justification and Truth", Philosophical Studies 46, pp. 279–296. DeRose, Keith (1999) "Responding to Skepticism", Skepticism: A Contemporary Reader. Falk, W. D. (1947) "'Ought' and Motivation", Proceedings of the Aristotelian Society, 48: 492–510 Finlay, Stephen & Schroeder, Mark (2008). "Reasons for Action: Internal vs. External". The Stanford Encyclopedia of Philosophy, Edward N. Zalta (ed.). (link) Fodor, Jerry (1980) "Methodological Solipsism Considered as a Research Strategy in Cognitive Psychology", Behavioral and Brain Sciences 3:1. Fodor, Jerry (1995) The Elm and the Expert: Mentalese and its
|
and the majority of the world's states, the ROC remains diplomatically isolated although 15 states recognize it as "China" with some countries maintain unofficial diplomatic relations through trade offices. Japan From 1641 to 1853, the Tokugawa shogunate of Japan enforced a policy called kaikin. The policy prohibited foreign contact with most outside countries. The commonly held idea that Japan was entirely closed, however, is misleading. In fact, Japan maintained limited-scale trade and diplomatic relations with China, Korea and Ryukyu Islands, as well as the Dutch Republic as the only Western trading partner of Japan for much of the period. The culture of Japan developed with limited influence from the outside world and had one of the longest stretches of peace in history. During this period, Japan developed thriving cities, castle towns, increasing commodification of agriculture and domestic trade, wage labor, increasing literacy and concomitant print culture, laying the groundwork for modernization even as the shogunate itself grew weak. Korea In 1863, Emperor Gojong took the throne of the Joseon Dynasty when he was a child. His father, Regent Heungseon Daewongun, ruled for him until Gojong reached adulthood. During the mid-1860s he was the main proponent of isolationism and the principal instrument of the persecution of both native and foreign Catholics. Following the division of the peninsula after independence from Japan in 1945–48, Kim Il-sung inaugurated an isolationist nationalist regime in the North, which has been continued by his son and grandson following his death in 1994. Paraguay In 1814, three years after it gained its independence on May 14, 1811, Paraguay was taken over by the dictator José Gaspar Rodríguez de Francia. During his rule which lasted from 1814 until his death in 1840, he closed Paraguay's borders and prohibited trade or any relationship between Paraguay and the outside world. The Spanish settlers who had arrived in Paraguay just before it gained its independence were required to marry old colonists or the native Guarani in order to create a single Paraguayan people. Francia had a particular dislike of foreigners, and those foreigners who came to Paraguay during his rule, which was very difficult, were not allowed to leave the country for the rest of their lives. An independent character, he hated European influences and the Catholic Church and in order to try to keep foreigners at bay, he turned church courtyards into artillery parks and turned confession boxes into border sentry posts. United States The cultural roots of isolationism, such as German and Irish ethnicity, have interested scholars. Some scholars, such as Robert J. Art, believe that the United States had an isolationist history, but other scholars dispute that claim by describing the United States as following a strategy of unilateralism or non-interventionism rather than a strategy of isolationism. Robert Art makes his argument in A Grand Strategy for America
|
countries. Thus, isolationism fundamentally advocates neutrality and opposes entanglement in military alliances and mutual defense pacts. In its purest form, isolationism opposes all commitments to foreign countries including treaties and trade agreements. This distinguishes isolationism from non-interventionism, which also advocates military neutrality but does not necessarily oppose international commitments and treaties in general. Introduction Isolationism has been defined as: By country Albania Bhutan Before 1999, Bhutan had banned television and the Internet in order to preserve its culture, environment, and identity. Eventually, Jigme Singye Wangchuck lifted the ban on television and the Internet. His son, Jigme Khesar Namgyel Wangchuck, was elected Druk Gyalpo of Bhutan, which helped forge the Bhutanese democracy. Bhutan has subsequently undergone a transition from an absolute monarchy to a constitutional monarchy multi-party democracy. The development of Bhutanese democracy has been marked by the active encouragement and participation of the reigning Bhutanese monarchs since the 1950s, beginning with legal reforms, and culminating in the enactment of Bhutan's Constitution. Cambodia From 1431 to 1863, the Kingdom of Cambodia enforced a isolationist policy. The policy prohibited foreign contact with most outside countries. China After Zheng He's voyages in the 15th century, the foreign policy of the Ming dynasty in China became increasingly isolationist. The Hongwu Emperor was not the first to propose the policy to ban all maritime shipping in 1390. The Qing dynasty that came after the Ming dynasty often continued the Ming dynasty's isolationist policies. Wokou, which literally translates to "Japanese pirates" or "dwarf pirates", were pirates who raided the coastlines of China, Japan, and Korea, and were one of the key primary concerns, although the maritime ban was not without some control. Since the division of the territory following the Chinese Civil War in 1949, China is divided into two regimes with the People's Republic of China solidified control on mainland China while the existing Republic of China was confined to the island of Taiwan as both governments lay claim to each other's sovereignty. While the PRC is recognized by the United Nations, European Union, and the majority of the world's states, the ROC remains diplomatically isolated although 15 states recognize it as "China" with some countries maintain unofficial diplomatic relations through trade offices. Japan From 1641 to 1853, the Tokugawa shogunate of Japan enforced a policy called kaikin. The policy prohibited foreign contact with most outside countries. The commonly held idea that Japan was entirely closed, however, is misleading. In fact, Japan maintained limited-scale trade and diplomatic relations with China, Korea and Ryukyu Islands, as well as the Dutch Republic as the only Western trading partner of Japan for much of the period. The culture of Japan developed with limited influence from the outside world and had one of the longest stretches of peace in history. During this period, Japan developed thriving cities, castle towns, increasing commodification of agriculture and domestic trade, wage labor, increasing literacy and concomitant print culture, laying the groundwork for modernization even as the shogunate itself grew weak. Korea In 1863, Emperor Gojong took the throne of the Joseon Dynasty when he was a child. His father, Regent Heungseon Daewongun, ruled for him until Gojong reached adulthood. During the mid-1860s he was the main proponent of isolationism and the principal instrument of the persecution of both native and foreign Catholics. Following the division of the peninsula after independence from Japan in 1945–48, Kim Il-sung inaugurated an isolationist nationalist regime in the North, which has been continued by his son and grandson following his death in 1994. Paraguay In 1814, three years after it gained its independence on May 14, 1811, Paraguay was taken over by the dictator José Gaspar Rodríguez de Francia. During his rule which lasted from 1814 until his death in 1840, he closed Paraguay's borders and prohibited trade or any relationship between Paraguay and the outside world. The Spanish settlers who had arrived in Paraguay just before it gained its independence were required to marry old colonists
|
Citing friction with the City of Baltimore and the local press, Rosenbloom traded the Colts franchise to Robert Irsay on July 13, 1972 and received the Los Angeles Rams in return. Under the new ownership, the Colts did not reach the postseason for three consecutive seasons after 1971, and after the 1972 season, starting quarterback and legend Johnny Unitas was traded to the San Diego Chargers. Following Unitas' departure, the Colts made the playoffs three consecutive seasons from 1975 to 1977, losing in the divisional round each time. The Colts' 1977 playoff loss in double overtime against the Oakland Raiders was famous for the fact that it was the last playoff game for the Colts in Baltimore and is also known for the Ghost to the Post play. These consecutive championship teams featured 1976 NFL Most Valuable Player Bert Jones at quarterback and an outstanding defensive line, nicknamed the "Sack Pack." Following the 1970s success, the team endured nine consecutive losing seasons beginning in 1978. In 1981, the Colts defense allowed an NFL-record 533 points, set an all-time record for fewest sacks (13), and also set a modern record for fewest punt returns (12). The following year, the offense collapsed, including a game against the Buffalo Bills where the Colts' offense did not cross mid-field the entire game. The Colts finished 0–8–1 in the strike-shortened 1982 season, thereby earning the right to select Stanford quarterback John Elway with the first overall pick. Elway, however, refused to play for Baltimore, and using leverage as a draftee of the New York Yankees baseball club, forced a trade to Denver. Behind an improved defense the team finished 7–9 in 1983, but that would be their last season in Baltimore. Relocation to Indianapolis The Baltimore Colts played their final home game in Baltimore on December 18, 1983, against the then Houston Oilers. Irsay continued to request upgrades to Memorial Stadium or construction of a new stadium. As a result of the poor performance on the field and the stadium issues, fan attendance and team revenue continued to dwindle. City officials were precluded from using tax-payer funds for the building of a new stadium, and the modest proposals that were offered by the city were not acceptable to either the Colts or the city's MLB franchise the Orioles. However, all sides continued to negotiate. Relations between Irsay and the city of Baltimore deteriorated. Although Irsay assured fans that his ultimate desire was to stay in Baltimore, he nevertheless began discussions with several other cities willing to build new football stadiums, eventually narrowing the list of cities to two: Phoenix and Indianapolis. Under the administration of mayors Richard Lugar and then William Hudnut, Indianapolis had undertaken an ambitious effort to reinvent itself into a 'Great American City'. The Hoosier Dome, which was later renamed the RCA Dome, had been built specifically for, and was ready to host, an NFL expansion team. Meanwhile, in Baltimore, the situation worsened. The Maryland General Assembly intervened when a bill was introduced to give the city of Baltimore the right to seize ownership of the team by eminent domain. As a result, Irsay began serious negotiations with Indianapolis Mayor William Hudnut in order to move the team before the Maryland legislature could pass the law. Indianapolis offered loans as well as the Hoosier Dome and a training complex. After the deal was reached, moving vans from Indianapolis-based Mayflower Transit were dispatched overnight to the team's Maryland training complex, arriving on the morning of March 29, 1984. Once in Maryland, workers loaded all of the team's belongings, and by midday the trucks departed for Indianapolis, leaving nothing of the Colts organization that could be seized by Baltimore. The Baltimore Colts' Marching Band had to scramble to retrieve their equipment and uniforms before they were shipped to Indianapolis as well. The move triggered a flurry of legal activity that ended when representatives of the city of Baltimore and the Colts organization reached a settlement in March 1986. Under the agreement, all lawsuits regarding the relocation were dismissed, and the Colts agreed to endorse a new NFL team for Baltimore. 1984–1997: Initial struggles in Indianapolis Upon the Colts' arrival in Indianapolis over 143,000 requests for season tickets were received in just two weeks. The move to Indianapolis, however, did not change the recent fortune of the Colts, with the team appearing in the postseason only once in the first 11 seasons in Indianapolis. During the 1984 season, the first in Indianapolis, the team went 4–12 and accounted for the lowest offensive yardage in the league that season. The 1985 and 1986 teams combined for only eight wins, including an 0–13 start in 1986 which prompted the firing of head coach Rod Dowhower, who was replaced by Ron Meyer. The Colts, however, did receive eventual Hall of Fame running back Eric Dickerson as a result of a trade during the 1987 season, and went on to compile a 9–6 record, thereby winning the AFC East and advancing to the postseason for the first time in Indianapolis; they lost that game to the Cleveland Browns. Following 1987, the Colts did not see any real success for quite some time, with the team missing the postseason for seven consecutive seasons. The struggles came to a climax in 1991 when the team went 1–15 and was just one point away from the first "imperfect" season in the history of a 16-game schedule. The season resulted in the firing of head coach Ron Meyer and the return of former head coach Ted Marchibroda to the organization in 1992; he had coached the team from 1975 to 1979. The team continued to struggle under Marchibroda and Jim Irsay, son of Robert Irsay and general manager at the time. It was in 1994 that Robert Irsay brought in Bill Tobin to become the general manager of the Indianapolis Colts. Under Tobin, the Colts drafted running back Marshall Faulk with the second overall pick in the 1994 and acquired quarterback Jim Harbaugh as well. These moves along with others saw the Colts begin to turn their fortunes around with playoff appearances in 1995 and 1996. The Colts won their first postseason game as the Indianapolis Colts in 1995 and advanced to the AFC Championship Game against the Pittsburgh Steelers, coming just a Hail Mary pass reception away from a trip to Super Bowl XXX. Marchibroda retired following the 1995 season and was replaced by Lindy Infante in 1996. After two consecutive playoff appearances, the Colts regressed and went 3–13 during the 1997 season. Along with the disappointing season, the principal owner and man who moved the team to Indianapolis, Robert Irsay, died in January 1997 after years of declining health. Jim Irsay, Robert Irsay's son, entered the role of principal owner following his father's death and quickly began to change the organization. Irsay replaced general manager Tobin with Bill Polian in 1997 as the team decided to build through their number one overall pick in the 1998 draft. 1998–2011: the Peyton Manning era Jim Irsay began to shape the Colts one year after assuming control from his father by firing head coach Lindy Infante and hiring Bill Polian as the general manager of the organization. Polian in turn hired Jim Mora to become the next head coach of the team and drafted Tennessee Volunteer quarterback Peyton Manning, the son of New Orleans Saints legend Archie Manning, with the first overall pick in the 1998 NFL Draft. The team and Manning struggled during the 1998 season, winning only three games; Manning threw a league high 28 interceptions. However, Manning did pass for 3,739 yards and threw 26 touchdown passes and was named to the NFL All-Rookie First Team. The Colts began to improve towards the end of the 1998 season and showed continued growth in 1999. Indianapolis drafted Edgerrin James in 1999 and continued to improve their roster heading into the upcoming season. The Colts went 13–3 in 1999 and finished first in the AFC East, their first division title since 1987. Indianapolis lost to the eventual AFC champion Tennessee Titans in the divisional playoffs. The 2000 and 2001 Colts teams were considerably less successful compared to the 1999 team, and pressure began to mount on team administration and the coaching staff following a 6–10 season in 2001. Head coach Jim Mora was fired at the end of the season and was replaced by former Tampa Bay Buccaneers head coach Tony Dungy. Dungy and the team quickly changed the atmosphere of the organization and returned to the playoffs in 2002 with a 10–6 record. The Colts also returned to the playoffs in 2003 and 2004 with 12–4 records and AFC South championships. The Colts lost to the New England Patriots and Tom Brady in the 2003 AFC Championship Game and in the 2004 divisional playoffs, thereby beginning a rivalry between the two teams, and between Manning and Brady. Following two consecutive playoff losses to the Patriots, the Colts began the 2005 season with a 13–0 record, including a regular season victory over the Patriots, the first in the Manning era. During the season Manning and Marvin Harrison broke the NFL record for touchdowns by a quarterback and receiver tandem. Indianapolis finished the 2005 season with a 14–2 record, the best record in the league that year and the best in a 16 games season for the franchise, but lost to the Pittsburgh Steelers in the divisional round, a disappointing end to the season. Indianapolis entered the 2006 season with a veteran quarterback, receivers, and defenders, and chose running back Joseph Addai in the 2006 draft. As in the previous season, the Colts began the season undefeated and went 9–0 before losing their first game against the Dallas Cowboys. Indianapolis finished the season with a 12–4 record and entered the playoffs for the fifth consecutive year, this time as the number three seed in the AFC. The Colts won their first two playoff games against the Kansas City Chiefs and the Baltimore Ravens to return to the AFC Championship Game for the first time since the 2003 playoffs, where they faced their rivals, the New England Patriots. In a classic game, the Colts overcame a 21–3 first-half deficit to win the game 38–34 and earned a trip to Super Bowl XLI, the franchise's first Super Bowl appearance since 1970 and for the first as Indianapolis. The Colts faced the Chicago Bears in the Super Bowl, winning the game 29–17 and giving Manning, Polian, Irsay, and Dungy, as well as the city of Indianapolis, their first Super Bowl title. Following their Super Bowl championship, the Colts compiled a 13–3 record during the 2007 season; they lost to the San Diego Chargers in the divisional playoffs, in what was the final game the Colts played at the RCA Dome before moving into Lucas Oil Stadium in 2008. The 2008 season began with Manning being sidelined for most of the pre-season due to surgery. Indianapolis began the season with a 3–4 record, but then won nine consecutive games to end the season at 12–4 and make in into the playoffs as a wild card team, eventually losing to the Chargers in the wild card round. Following the season, Tony Dungy announced his retirement after seven seasons as head coach, having compiled an overall record of 92–33 with the team. Jim Caldwell was hired as head coach of the team following Dungy, and led the team during the 2009 season. The Colts went 14–0 during the season to finish with an overall record of 14–2 after controversially benching their starters during the last two games. The Colts for the second time in the Manning era entered the playoffs with the best record in the AFC. The Colts managed victories over the Baltimore Ravens and New York Jets to advance to Super Bowl XLIV against the New Orleans Saints, but lost to the Saints 31–17 to end the season in disappointment. At the completion of the 2009 season, the Colts had finished the first decade of the 2000s (2000–2009) with the most regular-season wins (115) and highest winning percentage (.719) of any team in the NFL during that span. The 2010 team compiled a 10–6 record, the first time the Colts did not win 12 games since 2002, and lost to the New York Jets in the wild card round of the playoffs. The loss to the Jets was the last game for Peyton Manning as a Colt. After missing the preseason, Manning was ruled out for the Colts' opening game in Houston and eventually the entire 2011 season. Taking over as starter was veteran quarterback Kerry Collins, who had been signed to the team after dissatisfaction with backup quarterback Curtis Painter and Dan Orlovsky. However, even with a veteran quarterback, the Colts lost their first 13 games and finished the season with a 2–14 record, enough to receive the first overall pick in the 2012 draft. Immediately following the season, team president Bill Polian was fired, ending his 14-year tenure with the team. The change built the anticipation of the organization's decision regarding Manning's future with the team. The Peyton Manning era came to an end on March 8, 2012 when Jim Irsay announced that Manning was being released from the roster after 13 seasons. 2012–2019: the Andrew Luck era During the 2012 off-season owner Jim Irsay hired Ryan Grigson to be the General Manager. Grigson decided to let head coach Jim Caldwell go and Chuck Pagano was hired as the new head coach shortly thereafter. The Colts also began to release some higher paid and oft-injured veteran players, including Joseph Addai, Dallas Clark, and Gary Brackett. The Colts used their number one overall draft pick in 2012 to draft Stanford Cardinal quarterback Andrew Luck and also drafted his teammate Coby Fleener in the second round. The team also switched to a 3–4 defensive scheme. With productive seasons from both Luck and veteran receiver Reggie Wayne, the Colts rebounded from the 2–14 season of 2011 with a 2012 season record of 11–5. The franchise, team, and fan base rallied behind head coach Chuck Pagano during his fight with leukemia. Clinching an unexpected playoff spot in the 2012–13 NFL playoffs, the 14th playoff berth for the club since 1995. The season ended in a 24–9 playoff loss to the eventual Super Bowl Champion Baltimore Ravens. Two weeks into the 2013 season, the Colts traded their first-round selection in the 2014 NFL Draft to the Cleveland Browns for running back Trent Richardson. In Week 7, Luck led the Colts to a 39–33 win over his predecessor, Peyton Manning, and the undefeated Broncos. Luck went on to lead the Colts to a 15th division championship later that season. In the first round of the 2013 NFL playoffs, Andrew Luck led the Colts to a 45–44 victory over Kansas City, outscoring the Chiefs 35–13 in the second half in the 2nd biggest comeback in NFL playoff history. During the 2014 season, Luck led the Colts to the AFC Championship game for the first time in his career after breaking the Colts' single-season passing yardage record previously held by Manning. After the Colts finished 8–8 in both the 2015 and 2016 seasons and missed the playoffs in back-to-back seasons for the first time since 1997–98, Grigson was fired as general manager. Just three of his previous 18 draft picks remained on the team at the time of his firing. On January 30, 2017 the team hired Chris Ballard, who served as the Kansas City Chiefs Director of Football Operations, to replace Grigson. On December 31, 2017, after winning the final game of the season and a final record of 4-12, the Colts parted ways with Pagano. Luck, who had suffered multiple injuries and missed nine games during the 2015 season, sat out the entire 2017 season recovering from shoulder surgery. In the weeks following the end of the 2017 season, after two interviews, it was widely reported that the Colts would hire Josh McDaniels, offensive coordinator of the New England Patriots, to replace Pagano, after McDaniels fulfilled his obligations to the Patriots in Super Bowl LII. On February 8, 2018, the Colts announced McDaniels as their new head coach. Hours later, however, McDaniels rescinded his decision to be the head coach, and he returned to the Patriots. On February 11, 2018, the Colts announced Frank Reich, then offensive coordinator of the Philadelphia Eagles, as their new head coach. In Reich's first season as head coach, Andrew Luck's return to the field got off to a shaky start, as the Colts began the 2018 season 1–5. However, they would surge back to win nine of their last ten games to secure a 10–6 record and a playoff berth. They would win a Wild-Card game against their division rival Houston Texans before falling to the Kansas City Chiefs in the Divisional Round. Luck, benefiting from the Colts' best offensive line of his career, was named the 2018 Comeback Player of the Year. Colts General Manager Chris Ballard achieved a historic feat in 2018 when two players he had drafted that year, guard Quenton Nelson and linebacker Darius Leonard were both named First-Team All-Pro. This was the first time two rookies from the same team received that honor since Hall-of-Famers Dick Butkus and Gale Sayers achieved the feat in 1965. On August 24, 2019, Luck informed the Colts that he would be retiring from the NFL after not attending training camp. He cited an unfulfilling cycle of injury and rehab as his primary reason for leaving football. 2019–present: After Luck On November 17, 2019, the Colts defeated the Jacksonville Jaguars for the team's 300th win in the Indianapolis era, with a record of 300–267. Despite a promising 5–2 start and strong seasons from Leonard, Nelson, and newly acquired defensive end Justin Houston, the Colts struggled in the second half of the 2019 season with new starting quarterback Jacoby Brissett at the helm and finished the year with a 7–9 record. On March 17, 2020, the Colts signed longtime Los Angeles Chargers quarterback and eight-time Pro Bowler Philip Rivers to a one-year deal worth $25 million. Rivers led the Colts to an 11-5 record and a playoff berth, where they then lost to the Buffalo Bills in the NFL's first expanded playoffs. On March 17, 2021, the Colts traded a 2021 third-round pick and a 2022 second-round conditional pick for former Eagles QB Carson Wentz. Logos and uniforms The Colts' helmets in 1953 were white with a blue stripe. In 1954–55 they were blue with a white stripe and a pair of horseshoes at the rear of the helmet. For 1956, the colors were reversed, white helmet, blue stripe and horseshoes at the rear. In 1957 the horseshoes moved to their current location, one on each side of the helmet. The blue jerseys have white shoulder stripes and the white jerseys have blue stripes. The team also wears white pants with blue stripes down the sides. Both designs originally had sleeve stripes, but by 1957, the uniforms changed to its current form, which evolved as materials changed. For much of the team's history, the Colts wore blue socks, accenting them with two or three white stripes for much of their history in Baltimore and during the 2004 and 2005 seasons. From 1982 to 1987, the blue socks featured gray stripes. For a period lasting 1955 to 1958 and again from 1988 to 1992, the Colts wore white socks with either two or three blue stripes. From 1982 through 1986, the Colts wore gray pants with their blue jerseys. The gray pants featured a horseshoe on the top of the sides with the player's number inside the horseshoe. The Colts continued to wear white pants with their white jerseys throughout this period, and in 1987, the gray pants were retired. The Colts wore blue pants with their white jerseys for the first three games of the 1995 season (pairing them with white socks), but then returned to white pants with both the blue and white jerseys. The team made some minor uniform adjustments before the start of the 2004 season, including reverting from blue to the traditional gray face masks, darkening their blue colors from a royal blue to speed blue, as well as adding two white stripes to the socks. In 2006, the stripes
|
professional American football team based in Indianapolis. The Colts compete in the National Football League (NFL) as a member club of the league's American Football Conference (AFC) South division. Since the 2008 season, the Colts have played their games in Lucas Oil Stadium. Previously, the team had played for over two decades (1984–2007) at the RCA Dome. Since 1987, the Colts have served as the host team for the NFL Scouting Combine. The Colts have competed as a member club of the NFL since their founding in Baltimore in 1953 after then-owner Carroll Rosenbloom purchased the assets of the NFL's last founding Ohio League member Dayton Triangles-Dallas Texans franchise. They were one of three NFL teams to join those of the American Football League (AFL) to form the AFC following the 1970 merger. While in Baltimore, the team advanced to the playoffs 10 times and won three NFL Championship games in 1958, 1959, and 1968. The Colts played in two Super Bowl games while they were based in Baltimore, losing to the New York Jets in Super Bowl III and defeating the Dallas Cowboys in Super Bowl V. The Colts relocated to Indianapolis in 1984 and have since appeared in the playoffs 16 times, won two conference championships, and won one Super Bowl, in which they defeated the Chicago Bears in Super Bowl XLI. Franchise history 1953–1983: the Baltimore era Following World War II, a competing professional football league was organized known as the All America Football Conference which began to play in the 1946 season. In its second year, the franchise assigned to the Miami Seahawks was relocated to Maryland's major commercial and manufacturing city of Baltimore. After a fan contest, the team was renamed the Baltimore Colts and used the team colors of silver and green. The Colts played for the next three seasons in the old AAFC. until they agreed to merge with the old National Football League (of 1920–1922 to 1950) when the NFL was reorganized. The Baltimore Colts were one of the three former AAFC powerhouse teams to merge with the NFL at that time, the others being the San Francisco 49ers and the Cleveland Browns. This Colts team, now in the "big league" of professional American football for the first time, although with shaky financing and ownership, played only in the 1950 season of the NFL, and was later disbanded. In 1953, a new Baltimore-based group, heavily supported by the city's municipal government and with a large subscription-base of fan-purchased season tickets, led by local owner Carroll Rosenbloom won the rights to a new Baltimore NFL franchise. Rosenbloom was awarded the remains of the former Dallas Texans team, who themselves had a long and winding history, with a small part of the franchise starting as the Boston Yanks in 1944, merging later with the Brooklyn Tigers, a franchise that had a far more deep and rich history, being previously known as the Dayton Triangles, one of the original old NFL teams established even before the League itself, in 1913. That team later became the New York Yanks in 1950, and many of the players from the New York Yankees of the former competing All-America Football Conference (1946–49) were added to the team to begin playing in the newly merged League for the 1950 season. The Yanks then moved to Dallas in Texas after the 1951 season having competed for two seasons, but played their final two "home" games of the 1952 season as a so-called "road team" at the Rubber Bowl football stadium in Akron, Ohio. The NFL considers the Texans and Colts to be separate teams, although many of the earlier teams shared the same colors of blue and white. Thus, the Indianapolis Colts are legally considered to be a 1953 expansion team. The current version of the Colts football team played their first season in Baltimore in 1953, where the team compiled a 3–9 record under first-year head coach Keith Molesworth. The franchise struggled during the first few years in Baltimore, with the team not achieving their first winning record until the 1957 season. However, under head coach Weeb Ewbank and the leadership of quarterback Johnny Unitas, the Colts went on to a 9–3 record during the 1958 season and reached the NFL Championship Game for the first time in their history by winning the NFL Western Conference. The Colts faced the New York Giants in the 1958 NFL Championship Game, which is considered to be among the greatest contests in professional football history. The Colts defeated the Giants 23–17 in the first game ever to utilize the overtime rule, a game seen by 45 million people. Following the Colts first NFL championship, the team posted a 9–3 record during the 1959 season and once again defeated the Giants in the NFL Championship Game to claim their second title in back to back fashion. Following the two championships in 1958 and 1959, the Colts did not return to the NFL Championship for four seasons and replaced the head coach Ewbank with the young Don Shula in 1963. In Shula's second season the Colts compiled a 12–2 record, but lost to the Cleveland Browns in the NFL Championship. However, in 1968 the Colts returned with the continued leadership of Unitas and Shula and went on to win the Colts' third NFL Championship and made an appearance in Super Bowl III. Leading up to the Super Bowl and following the 34–0 trouncing of the Cleveland Browns in the NFL Championship, many were calling the 1968 Colts team one of the "greatest pro football teams of all time" and were favored by 18 points against their counterparts from the American Football League, the New York Jets. The Colts, however, were stunned by the Jets, who won the game 16–7 in the first Super Bowl victory for the young AFL. The result of the game surprised many in the sports media as Joe Namath and Matt Snell led the Jets to the Super Bowl victory under head coach Weeb Ewbank, who had previously won two NFL Championships with the Colts. Rosenbloom of the Colts, Art Modell of the Browns, and Art Rooney of the Pittsburgh Steelers agreed to have their teams join the ten AFL teams in the American Football Conference as part of the AFL–NFL merger in 1970. The Colts immediately went on a rampage in the new league, as new head coach Don McCafferty led the 1970 team to an 11–2–1 regular-season record, winning the AFC East title. In the first round of the NFL Playoffs, the Colts beat the Cincinnati Bengals 17–0; one week later in the first-ever AFC Championship Game, they beat the Oakland Raiders 27–17. Baltimore went on to win the first post-merger Super Bowl (Super Bowl V), defeating the National Football Conference's Dallas Cowboys 16–13 on a Jim O'Brien field goal with five seconds left to play. The victory gave the Colts their fourth NFL championship and first Super Bowl victory. Following the championship, the Colts returned to the playoffs in 1971 and defeated the Cleveland Browns in the first round, but lost to the Miami Dolphins in the AFC Championship. Citing friction with the City of Baltimore and the local press, Rosenbloom traded the Colts franchise to Robert Irsay on July 13, 1972 and received the Los Angeles Rams in return. Under the new ownership, the Colts did not reach the postseason for three consecutive seasons after 1971, and after the 1972 season, starting quarterback and legend Johnny Unitas was traded to the San Diego Chargers. Following Unitas' departure, the Colts made the playoffs three consecutive seasons from 1975 to 1977, losing in the divisional round each time. The Colts' 1977 playoff loss in double overtime against the Oakland Raiders was famous for the fact that it was the last playoff game for the Colts in Baltimore and is also known for the Ghost to the Post play. These consecutive championship teams featured 1976 NFL Most Valuable Player Bert Jones at quarterback and an outstanding defensive line, nicknamed the "Sack Pack." Following the 1970s success, the team endured nine consecutive losing seasons beginning in 1978. In 1981, the Colts defense allowed an NFL-record 533 points, set an all-time record for fewest sacks (13), and also set a modern record for fewest punt returns (12). The following year, the offense collapsed, including a game against the Buffalo Bills where the Colts' offense did not cross mid-field the entire game. The Colts finished 0–8–1 in the strike-shortened 1982 season, thereby earning the right to select Stanford quarterback John Elway with the first overall pick. Elway, however, refused to play for Baltimore, and using leverage as a draftee of the New York Yankees baseball club, forced a trade to Denver. Behind an improved defense the team finished 7–9 in 1983, but that would be their last season in Baltimore. Relocation to Indianapolis The Baltimore Colts played their final home game in Baltimore on December 18, 1983, against the then Houston Oilers. Irsay continued to request upgrades to Memorial Stadium or construction of a new stadium. As a result of the poor performance on the field and the stadium issues, fan attendance and team revenue continued to dwindle. City officials were precluded from using tax-payer funds for the building of a new stadium, and the modest proposals that were offered by the city were not acceptable to either the Colts or the city's MLB franchise the Orioles. However, all sides continued to negotiate. Relations between Irsay and the city of Baltimore deteriorated. Although Irsay assured fans that his ultimate desire was to stay in Baltimore, he nevertheless began discussions with several other cities willing to build new football stadiums, eventually narrowing the list of cities to two: Phoenix and Indianapolis. Under the administration of mayors Richard Lugar and then William Hudnut, Indianapolis had undertaken an ambitious effort to reinvent itself into a 'Great American City'. The Hoosier Dome, which was later renamed the RCA Dome, had been built specifically for, and was ready to host, an NFL expansion team. Meanwhile, in Baltimore, the situation worsened. The Maryland General Assembly intervened when a bill was introduced to give the city of Baltimore the right to seize ownership of the team by eminent domain. As a result, Irsay began serious negotiations with Indianapolis Mayor William Hudnut in order to move the team before the Maryland legislature could pass the law. Indianapolis offered loans as well as the Hoosier Dome and a training complex. After the deal was reached, moving vans from Indianapolis-based Mayflower Transit were dispatched overnight to the team's Maryland training complex, arriving on the morning of March 29, 1984. Once in Maryland, workers loaded all of the team's belongings, and by midday the trucks departed for Indianapolis, leaving nothing of the Colts organization that could be seized by Baltimore. The Baltimore Colts' Marching Band had to scramble to retrieve their equipment and uniforms before they were shipped to Indianapolis as well. The move triggered a flurry of legal activity that ended when representatives of the city of Baltimore and the Colts organization reached a settlement in March 1986. Under the agreement, all lawsuits regarding the relocation were dismissed, and the Colts agreed to endorse a new NFL team for Baltimore. 1984–1997: Initial struggles in Indianapolis Upon the Colts' arrival in Indianapolis over 143,000 requests for season tickets were received in just two weeks. The move to Indianapolis, however, did not change the recent fortune of the Colts, with the team appearing in the postseason only once in the first 11 seasons in Indianapolis. During the 1984 season, the first in Indianapolis, the team went 4–12 and accounted for the lowest offensive yardage in the league that season. The 1985 and 1986 teams combined for only eight wins, including an 0–13 start in 1986 which prompted the firing of head coach Rod Dowhower, who was replaced by Ron Meyer. The Colts, however, did receive eventual Hall of Fame running back Eric Dickerson as a result of a trade during the 1987 season, and went on to compile a 9–6 record, thereby winning the AFC East and advancing to the postseason for the first time in Indianapolis; they lost that game to the Cleveland Browns. Following 1987, the Colts did not see any real success for quite some time, with the team missing the postseason for seven consecutive seasons. The struggles came to a climax in 1991 when the team went 1–15 and was just one point away from the first "imperfect" season in the history of a 16-game schedule. The season resulted in the firing of head coach Ron Meyer and the return of former head coach Ted Marchibroda to the organization in 1992; he had coached the team from 1975 to 1979. The team continued to struggle under Marchibroda and Jim Irsay, son of Robert Irsay and general manager at the time. It was in 1994 that Robert Irsay brought in Bill Tobin to become the general manager of the Indianapolis Colts. Under Tobin, the Colts drafted running back Marshall Faulk with the second overall pick in the 1994 and acquired quarterback Jim Harbaugh as well. These moves along with others saw the Colts begin to turn their fortunes around with playoff appearances in 1995 and 1996. The Colts won their first postseason game as the Indianapolis Colts in 1995 and advanced to the AFC Championship Game against the Pittsburgh Steelers, coming just a Hail Mary pass reception away from a trip to Super Bowl XXX. Marchibroda retired following the 1995 season and was replaced by Lindy Infante in 1996. After two consecutive playoff appearances, the Colts regressed and went 3–13 during the 1997 season. Along with the disappointing season, the principal owner and man who moved the team to Indianapolis, Robert Irsay, died in January 1997 after years of declining health. Jim Irsay, Robert Irsay's son, entered the role of principal owner following his father's death and quickly began to change the organization. Irsay replaced general manager Tobin with Bill Polian in 1997 as the team decided to build through their number one overall pick in the 1998 draft. 1998–2011: the Peyton Manning era Jim Irsay began to shape the Colts one year after assuming control from his father by firing head coach Lindy Infante and hiring Bill Polian as the general manager of the organization. Polian in turn hired Jim Mora to become the next head coach of the team and drafted Tennessee Volunteer quarterback Peyton Manning, the son of New Orleans Saints legend Archie Manning, with the first overall pick in the 1998 NFL Draft. The team and Manning struggled during the 1998 season, winning only three games; Manning threw a league high 28 interceptions. However, Manning did pass for 3,739 yards and threw 26 touchdown passes and was named to the NFL All-Rookie First Team. The Colts began to improve towards the end of the 1998 season and showed continued growth in 1999. Indianapolis drafted Edgerrin James in 1999 and continued to improve their roster heading into the upcoming season. The Colts went 13–3 in 1999 and finished first in the AFC East, their first division title since 1987. Indianapolis lost to the eventual AFC champion Tennessee Titans in the divisional playoffs. The 2000 and 2001 Colts teams were considerably less successful compared to the 1999 team, and pressure began to mount on team administration and the coaching staff following a 6–10 season in 2001. Head coach Jim Mora was fired at the end of the season and was replaced by former Tampa Bay Buccaneers head coach Tony Dungy. Dungy and the team quickly changed the atmosphere of the organization and returned to the playoffs in 2002 with a 10–6 record. The Colts also returned to the playoffs in 2003 and 2004 with 12–4 records and AFC South championships. The Colts lost to the New England Patriots and Tom Brady in the 2003 AFC Championship Game and in the 2004 divisional playoffs, thereby beginning a rivalry between the two teams, and between Manning and Brady. Following two consecutive playoff losses to the Patriots, the Colts began the 2005 season with a 13–0 record, including a regular season victory over the Patriots, the first in the Manning era. During the season Manning and Marvin Harrison broke the NFL record for touchdowns by a quarterback and receiver tandem. Indianapolis finished the 2005 season with a 14–2 record, the best record in the league that year and the best in a 16 games season for the franchise, but lost to the Pittsburgh Steelers in the divisional round, a disappointing end to the season. Indianapolis entered the 2006 season with a veteran quarterback, receivers, and defenders, and chose running back Joseph Addai in the 2006 draft. As in the previous season, the Colts began the season undefeated and went 9–0 before losing their first game against the Dallas Cowboys. Indianapolis finished the season with a 12–4 record and entered the playoffs for the fifth consecutive year, this time as the number three seed in the AFC. The Colts won their first two playoff games against the Kansas City Chiefs and the Baltimore Ravens to return to the AFC Championship Game for the first time since the 2003 playoffs, where they faced their rivals, the New England Patriots. In a classic game, the Colts overcame a 21–3 first-half deficit to win the game 38–34 and earned a trip to Super Bowl XLI, the franchise's first Super Bowl appearance since 1970 and for the first as Indianapolis. The Colts faced the Chicago Bears in the Super Bowl, winning the game 29–17 and giving Manning, Polian, Irsay, and Dungy, as well as the city of Indianapolis, their first Super Bowl title. Following their Super Bowl championship, the Colts compiled a 13–3 record during the 2007 season; they lost to the San Diego Chargers in the divisional playoffs, in what was the final game the Colts played at the RCA Dome before moving into Lucas Oil Stadium in 2008. The 2008 season began with Manning being sidelined for most of the pre-season due to surgery. Indianapolis began the season with a 3–4 record, but then won nine consecutive games to end the season at 12–4 and make in into the playoffs as a wild card team, eventually losing to the Chargers in the wild card round. Following the season, Tony Dungy announced his retirement after seven seasons as head coach, having compiled an overall record of 92–33 with the team. Jim Caldwell was hired as head coach of the team following Dungy,
|
The European populations of the Middle Colonies of New York, New Jersey, Pennsylvania, and Delaware were ethnically very mixed, the English constituting only 30% in Pennsylvania, 40–45% in New Jersey, to 18% in New York. Historians estimate that fewer than one million immigrants moved to the United States from Europe between 1600 and 1799. By comparison, in the first federal census, in 1790, the population of the United States was enumerated to be 3,929,214. Early United States era The Naturalization Act of 1790 limited naturalization to "free white persons"; it was expanded to include black people in the 1860s and Asian people in the 1950s. This made the United States an outlier, since laws that made racial distinctions were uncommon in the world in the 18th century. In the early years of the United States, immigration (not counting the enslaved, who were treated as merchandise rather than people) was fewer than 8,000 people a year, including French refugees from the slave revolt in Haiti. Legal importation of enslaved African was prohibited after 1808, though many were smuggled in to sell. After 1820, immigration gradually increased. From 1836 to 1914, over 30 million Europeans migrated to the United States. The death rate on these transatlantic voyages was high, during which one in seven travelers died. In 1875, the nation passed its first immigration law, the Page Act of 1875. After an initial wave of immigration from China following the California Gold Rush, Congress passed a series of laws culminating in the Chinese Exclusion Act of 1882, banning virtually all immigration from China until the law's repeal in 1943. In the late 1800s, immigration from other Asian countries, especially to the West Coast, became more common. 20th century The peak year of European immigration was in 1907, when 1,285,349 persons entered the country. By 1910, 13.5 million immigrants were living in the United States. While the Chinese Exclusion Act of 1882 had already excluded immigrants from China, the immigration of people from Asian countries in addition to China was banned by the Immigration Act of 1917, also known as the Asiatic Barred Zone Act, which also banned homosexuals, people with intellectual disability, and people with an anarchist worldview. The Emergency Quota Act was enacted in 1921, followed by the Immigration Act of 1924. The 1924 Act was aimed at further restricting immigrants from Southern and Eastern Europe, particularly Jewish, Italian, and Slavic people, who had begun to enter the country in large numbers beginning in the 1890s, and consolidated the prohibition of Asian immigration. Immigration patterns of the 1930s were affected by the Great Depression. In the final prosperous year, 1929, there were 279,678 immigrants recorded, but in 1933, only 23,068 moved to the U.S. In the early 1930s, more people emigrated from the United States than to it. The U.S. government sponsored a Mexican Repatriation program which was intended to encourage people to voluntarily move to Mexico, but thousands were deported against their will. Altogether, approximately 400,000 Mexicans were repatriated; half of them were US citizens. Most of the Jewish refugees fleeing the Nazis and World War II were barred from coming to the United States. In the post-war era, the Justice Department launched Operation Wetback, under which 1,075,168 Mexicans were deported in 1954. Since 1965 The Immigration and Nationality Act of 1965, also known as the Hart-Cellar Act, abolished the system of national-origin quotas. By equalizing immigration policies, the act resulted in new immigration from non-European nations, which changed the ethnic demographics of the United States. In 1970, 60% of immigrants were from Europe; this decreased to 15% by 2000. In 1990, George H. W. Bush signed the Immigration Act of 1990, which increased legal immigration to the United States by 40%. In 1991, Bush signed the Armed Forces Immigration Adjustment Act 1991, allowing foreign service members who had served 12 or more years in the US Armed Forces to qualify for permanent residency and, in some cases, citizenship. In November 1994, California voters passed Proposition 187 amending the state constitution, denying state financial aid to illegal immigrants. The federal courts voided this change, ruling that it violated the federal constitution. Appointed by Bill Clinton, the U.S. Commission on Immigration Reform recommended reducing legal immigration from about 800,000 people per year to approximately 550,000. While an influx of new residents from different cultures presents some challenges, "the United States has always been energized by its immigrant populations", said President Bill Clinton in 1998. "America has constantly drawn strength and spirit from wave after wave of immigrants... They have proved to be the most restless, the most adventurous, the most innovative, the most industrious of people." In 2001, President George W. Bush discussed an accord with Mexican President Vincente Fox. Due to the September 11 attacks, the possible accord did not occur. From 2005 to 2013, the US Congress discussed various ways of controlling immigration. The Senate and House were unable to reach an agreement. Nearly 14 million immigrants entered the United States from 2000 to 2010, and over one million persons were naturalized as U.S. citizens in 2008. The per-country limit applies the same maximum on the number of visas to all countries regardless of their population and has therefore had the effect of significantly restricting immigration of persons born in populous nations such as Mexico, China, India, and the Philippines—the leading countries of origin for legally admitted immigrants to the United States in 2013; nevertheless, China, India, and Mexico were the leading countries of origin for immigrants overall to the United States in 2013, regardless of legal status, according to a U.S. Census Bureau study. Nearly 8 million people immigrated to the United States from 2000 to 2005; 3.7 million of them entered without papers. In 1986 president Ronald Reagan signed immigration reform that gave amnesty to 3 million undocumented immigrants in the country. Hispanic immigrants suffered job losses during the late-2000s recession, but since the recession's end in June 2009, immigrants posted a net gain of 656,000 jobs. Over 1 million immigrants were granted legal residence in 2011. For those who enter the US illegally across the Mexico–United States border and elsewhere, migration is difficult, expensive and dangerous. Virtually all undocumented immigrants have no avenues for legal entry to the United States due to the restrictive legal limits on green cards, and lack of immigrant visas for low-skilled workers. Participants in debates on immigration in the early twenty-first century called for increasing enforcement of existing laws governing illegal immigration to the United States, building a barrier along some or all of the Mexico-U.S. border, or creating a new guest worker program. Through much of 2006 the country and Congress was engaged in a debate about these proposals. few of these proposals had become law, though a partial border fence had been approved and subsequently canceled. Modern reform attempts Beginning with Ronald Reagan in the 1980s, presidents from both political parties have steadily increased the number of border patrol agents and instituted harsher punitive measures for immigration violations. Examples of these policies include Ronald Reagan’s Immigration Reform and Control Act of 1986 and the Clinton-era Prevention Through Deterrence strategy. The sociologist Douglas Massey has argued that these policies have succeeded at producing a perception of border enforcement but have largely failed at preventing emigration from Latin America. Notably, rather than curtailing illegal immigration, the increase in border patrol agents decreased circular migration across the U.S.–Mexico border, thus increasing the population of Hispanics in the U.S. Presidents from both parties have employed anti-immigrant rhetoric to appeal to their political base or to garner bi-partisan support for their policies. While Republicans like Reagan and Donald Trump have led the way in framing Hispanic immigrants as criminals, Douglas Massey points out that "the current moment of open racism and xenophobia could not have happened with Democratic acquiescence". For example, while lobbying for his 1986 immigration bill, Reagan framed unauthorized immigration as a "national security" issue and warned that "terrorists and subversives are just two days' driving time" from the border. Later presidents, including Democrats Bill Clinton and Barack Obama, used similar "security" rhetoric in their efforts to court Republican support for comprehensive immigration reform. In his 2013 State of the Union Address, Obama said "real reform means strong border security, and we can build on the progress my administration has already madeputting more boots on the southern border than at any time in our history". Trump administration policies ICE reports that it removed 240,255 immigrants in fiscal year 2016, as well as 226,119 in FY2017 and 256,085 in FY2018. Citizens of Central American countries (including Mexico) made up over 90% of removals in FY2017 and over 80% in FY2018. In January 2017, U.S. President Donald Trump signed an executive order temporarily suspending entry to the United States by nationals of seven Muslim-majority countries. It was replaced by another executive order in March 2017 and by a presidential proclamation in September 2017, with various changes to the list of countries and exemptions. The orders were temporarily suspended by federal courts but later allowed to proceed by the Supreme Court, pending a definite ruling on their legality. Another executive order called for the immediate construction of a wall across the U.S.–Mexico border, the hiring of 5,000 new border patrol agents and 10,000 new immigration officers, and federal funding penalties for sanctuary cities. The "zero-tolerance" policy was put in place in 2018, which legally allows children to be separated from adults unlawfully entering the United States. This is justified by labeling all adults that enter unlawfully as criminals, thus subjecting them to criminal prosecution. The Trump Administration also argued that its policy had precedent under the Obama Administration, which had opened family detention centers in response to migrants increasingly using children as a way to get adults into the country. However, the Obama Administration detained families together in administrative, rather than criminal, detention. Other policies focused on what it means for an asylum seeker to claim credible fear. To further decrease the amount of asylum seekers into the United States, Attorney Jeff Sessions released a decision that restricts those fleeing gang violence and domestic abuse as "private crime", therefore making their claims ineligible for asylum. These new policies that have been put in place are putting many lives at risk, to the point that the ACLU has officially sued Jeff Sessions along with other members of the Trump Administration. The ACLU claims that the policies that are currently being put in place by this Presidential Administration is undermining the fundamental human rights of those immigrating into the United States, specifically women. They also claim that these policies violate decades of settle asylum law. In April 2020, President Trump said he will sign an executive order to temporarily suspend immigration to the United States because of the COVID-19 pandemic in the United States. Origins of the U.S. immigrant population, 1960–2016 Note: "Other Latin America" includes Central America, South America and the Caribbean. Refugee numbers According to the Department of State, in the 2016 fiscal year 84,988 refugees were accepted into the US from around the world. In the fiscal year of 2017, 53,691 refugees were accepted to the US. There was a significant decrease after Trump took office; it continued in the fiscal year of 2018 when only 22,405 refugees were accepted into the US. This displays a massive drop in acceptance of refugees since the Trump Administration has been in place. On September 26, 2019, The Trump administration announced it plans to allow only 18,000 refugees to resettle in the United States in the 2020 fiscal year, its lowest level since the modern program began in 1980. In 2020 The Trump administration announces that it plans to slash refugee admissions to U.S. for 2021 to a record low, 15,000 refugees down from a cap of 18,000 for 2020. This is the fourth consecutive year of declining refugee admissions under the Trump term. Contemporary immigration , approximately half of immigrants living in the United States are from Mexico and other Latin American countries. Many Central Americans are fleeing because of desperate social and economic circumstances in their countries. Some believe that the large number of Central American refugees arriving in the United States can be explained as a "blowback" to policies such as United States military interventions and covert operations that installed or maintained in power authoritarian leaders allied with wealthy land owners and multinational corporations who stop family farming and democratic efforts, which have caused drastically sharp social inequality, wide-scale poverty and rampant crime. Economic austerity dictated by neoliberal policies imposed by the International Monetary Fund and its ally, the U.S., has also been cited as a driver of the dire social and economic conditions, as has the U.S. "War on Drugs", which has been understood as fueling murderous gang violence in the region. Another major migration driver from Central America (Guatemala, Honduras, and El Salvador) are crop failures, which are (partly) caused by climate change. "The current debate… is almost totally about what to do about immigrants when they get here. But the 800-pound gorilla that’s missing from the table is what we have been doing there that brings them here, that drives them here", according to Jeff Faux, an economist who is a distinguished fellow at the Economic Policy Institute. Until the 1930s most legal immigrants were male. By the 1990s women accounted for just over half of all legal immigrants. Contemporary immigrants tend to be younger than the native population of the United States, with people between the ages of 15 and 34 substantially overrepresented. Immigrants are also more likely to be married and less likely to be divorced than native-born Americans of the same age. Immigrants are likely to move to and live in areas populated by people with similar backgrounds. This phenomenon has remained true throughout the history of immigration to the United States. Seven out of ten immigrants surveyed by Public Agenda in 2009 said they intended to make the U.S. their permanent home, and 71% said if they could do it over again they would still come to the US. In the same study, 76% of immigrants say the government has become stricter on enforcing immigration laws since the September 11, 2001 attacks ("9/11"), and 24% report that they personally have experienced some or a great deal of discrimination. Public attitudes about immigration in the U.S. were heavily influenced in the aftermath of the 9/11 attacks. After the attacks, 52% of Americans believed that immigration was a good thing overall for the U.S., down from 62% the year before, according to a 2009 Gallup poll. A 2008 Public Agenda survey found that half of Americans said tighter controls on immigration would do "a great deal" to enhance U.S. national security. Harvard political scientist and historian Samuel P. Huntington argued in his 2004 book Who Are We? The Challenges to America's National Identity that a potential future consequence of continuing massive immigration from Latin America, especially Mexico, could lead to the bifurcation of the United States. The estimated population of illegal Mexican immigrants in the US decreased from approximately 7 million in 2007 to 6.1 million in 2011 Commentators link the reversal of the immigration trend to the economic downturn that started in 2008 and which meant fewer available jobs, and to the introduction of tough immigration laws in many states. According to the Pew Hispanic Center, the net immigration of Mexican born persons had stagnated in 2010, and tended toward going into negative figures. More than 80 cities in the United States, including Washington D.C., New York City, Los Angeles, Chicago, San Francisco, San Diego, San Jose, Salt Lake City, Phoenix, Dallas, Fort Worth, Houston, Detroit, Jersey City, Minneapolis, Denver, Baltimore, Seattle, Portland, Oregon and Portland, Maine, have sanctuary policies, which vary locally. Origin countries Source: US Department of Homeland Security, Office of Immigration Statistics Charts Demography Extent and destinations 2010, 2017, 2018 The United States admitted more legal immigrants from 1991 to 2000, between ten and eleven million, than in any previous decade. In the most recent decade, the 10 million legal immigrants that settled in the U.S. represent roughly one third of the annual growth, as the U.S. population increased by 32 million (from 249 million to 281 million). By comparison, the highest previous decade was the 1900s, when 8.8 million people arrived, increasing the total U.S. population by one percent every year. Specifically, "nearly 15% of Americans were foreign-born in 1910, while in 1999, only about 10% were foreign-born". By 1970, immigrants accounted for 4.7 percent of the US population and rising to 6.2 percent in 1980, with an estimated 12.5 percent in 2009. , 25% of US residents under age 18 were first- or second-generation immigrants. Eight percent of all babies born in the U.S. in 2008 belonged to illegal immigrant parents, according to a recent analysis of U.S. Census Bureau data by the Pew Hispanic Center. Legal immigration to the U.S. increased from 250,000 in the 1930s, to 2.5 million in the 1950s, to 4.5 million in the 1970s, and to 7.3 million in the 1980s, before becoming stable at about 10 million in the 1990s. Since 2000, legal immigrants to the United States number approximately 1,000,000 per year, of whom about 600,000 are Change of Status who already are in the U.S. Legal immigrants to the United States now are at their highest level ever, at just over 37,000,000 legal immigrants. In reports in 2005–2006, estimates of illegal immigration ranged from 700,000 to 1,500,000 per year. Immigration led to a 57.4% increase in foreign-born population from 1990 to 2000. Foreign-born immigration has caused the U.S. population to continue its rapid increase with the foreign-born population doubling from almost 20 million in 1990 to over 47 million in 2015. In 2018, there were almost 90 million immigrants and U.S.-born children of immigrants (second-generation Americans) in the United States, accounting for 28% of the overall U.S. population. While immigration has increased drastically over the 20th century, the foreign-born share of the population is, at 13.4, only somewhat below what it was at its peak in 1910 at 14.7%. A number of factors may be attributed to the decrease in the representation of foreign-born residents in the United States. Most significant has been the change in the composition of immigrants; prior to 1890, 82% of immigrants came from North and Western Europe. From 1891 to 1920, that number decreased to 25%, with a rise in immigrants from East, Central, and South Europe, summing up to 64%. Animosity towards these different and foreign immigrants increased in the United States, resulting in much legislation to limit immigration. Contemporary immigrants settle predominantly in seven states, California, New York, Florida, Texas, Pennsylvania, New Jersey and Illinois, comprising about 44% of the U.S. population as a whole. The combined total immigrant population of these seven states was 70% of the total foreign-born population in 2000. Origin Foreign-born population in the United States in 2019 by country of birth Effects of immigration Demographics The Census Bureau estimates the US population will increase from 317 million in 2014 to 417 million in 2060 with immigration, when nearly 20% will be foreign-born. A 2015 report from the Pew Research Center projects that by 2065, non-Hispanic white people will account for 46% of the population, down from the 2005 figure of 67%. Non-Hispanic white people made up 85% of the population in 1960. It also foresees the population of Hispanic people increasing from 17% in 2014 to 29% by 2060. The population of Asian people is expected to nearly double in 2060. Overall, the Pew Report predicts the population of the United States will rise from 296 million in 2005 to 441 million in 2065, but only to 338 million with no immigration. In 35 of the country's 50 largest cities, non-Hispanic white people were predicted to be in the minority at the last census, or are already. In California, non-Hispanic white people decreased from 80% of the state's population in 1970 to 42% in 2001 and 39% in 2013. Immigrant segregation declined in the first half of the 20th century, but has been increasing over the past few decades. This has caused questioning of the correctness of describing the United States as a melting pot. One explanation is that groups with lower socioeconomic status concentrate in more densely-populated areas that have access to public transit while groups with higher socioeconomic status move to suburban areas. Another is that some recent immigrant groups are more culturally and linguistically different from earlier groups and prefer to live together due to factors such as communication costs. Another explanation for increased segregation is white flight. Country of birth for the foreign-born population in the United States Source: 1990, 2000 and 2010 decennial Censuses and 2019 American Community Survey Economic A survey of leading economists shows a consensus for the view that high-skilled immigration makes the average American better off. A survey of the same economists also shows strong support for the notion that low-skilled immigration makes the average American better off. According to David Card, Christian Dustmann, and Ian Preston, "most existing studies of the economic impacts of immigration suggest these impacts are small, and on average benefit the native population". In a survey of the existing literature, Örn B Bodvarsson and Hendrik Van den Berg wrote, "a comparison of the evidence from all the studies ... makes it clear that, with very few exceptions, there is no strong statistical support for the view held by many members of the public, namely that immigration has an adverse effect on native-born workers in the destination country". Overall economic prosperity Whereas the impact on the average native tends to be small and positive, studies show more mixed results for low-skilled natives, but whether the effects are positive or negative, they tend to be small either way. Immigrants may often do types of work that natives are largely unwilling to do, contributing to greater economic prosperity for the economy as a whole: for instance, Mexican migrant workers taking up manual farm work in the United States has close to zero effect on native employment in that occupation, which means that the effect of Mexican workers on U.S. employment outside farm work was therefore most likely positive, since they raised overall economic productivity. Research indicates that immigrants are more likely to work in risky jobs than U.S.-born workers, partly due to differences in average characteristics, such as immigrants' lower English language ability and educational attainment. Further, some studies indicate that higher ethnic concentration in metropolitan areas is positively related to the probability of self-employment of immigrants. Research also suggests that diversity has a net positive effect on productivity and economic prosperity. A study by Nathan Nunn, Nancy Qian and Sandra Sequeira found that the Age of Mass Migration (1850–1920) has had substantially beneficial long-term effects on U.S. economic prosperity: "locations with more historical immigration today have higher incomes, less poverty, less unemployment, higher rates of urbanization, and greater educational attainment. The long-run effects appear to arise from the persistence of sizeable short-run benefits, including earlier and more intensive industrialization, increased agricultural productivity, and more innovation." The authors also found that the immigration had short-term benefits: "that there is no evidence that these long-run benefits come at short-run costs. In fact, immigration immediately led to economic benefits that took the form of higher incomes, higher productivity, more innovation, and more industrialization". Research has also found that migration leads to greater trade in goods and services. Using 130 years of data on historical migrations to the United States, one study found "that a doubling of the number of residents with ancestry from a given foreign country relative to the mean increases by 4.2 percentage points the probability that at least one local firm invests in that country, and increases by 31% the number of employees at domestic recipients of FDI from that country. The size of these effects increases with the ethnic diversity of the local population, the geographic distance to the origin country, and the ethno-linguistic fractionalization of the origin country." Some research suggests that immigration can offset some of the adverse effects of automation on native labor outcomes in the United States. By increasing overall demand, immigrants could push natives out of low-skilled manual labor into better-paying occupations. A 2018 study in the American Economic Review found that the Bracero program (which allowed almost half a million Mexican workers to do seasonal farm labor in the United States) did not have any adverse impact on the labor market outcomes of American-born farm workers. Fiscal effects A 2011 literature review of the economic impacts of immigration found that the net fiscal impact of migrants varies across studies but that the most credible analyses typically find small and positive fiscal effects on average. According to the authors, "the net social impact of an immigrant over his or her lifetime depends substantially and in predictable ways on the immigrant's age at arrival, education, reason for migration, and similar". A 2016 report by the National Academies of Sciences, Engineering, and Medicine concluded that over a 75-year time horizon, "the fiscal impacts of immigrants are generally positive at the federal level and generally negative at the state and local level". The reason for the costs to state and local governments is that the cost of
|
one in seven travelers died. In 1875, the nation passed its first immigration law, the Page Act of 1875. After an initial wave of immigration from China following the California Gold Rush, Congress passed a series of laws culminating in the Chinese Exclusion Act of 1882, banning virtually all immigration from China until the law's repeal in 1943. In the late 1800s, immigration from other Asian countries, especially to the West Coast, became more common. 20th century The peak year of European immigration was in 1907, when 1,285,349 persons entered the country. By 1910, 13.5 million immigrants were living in the United States. While the Chinese Exclusion Act of 1882 had already excluded immigrants from China, the immigration of people from Asian countries in addition to China was banned by the Immigration Act of 1917, also known as the Asiatic Barred Zone Act, which also banned homosexuals, people with intellectual disability, and people with an anarchist worldview. The Emergency Quota Act was enacted in 1921, followed by the Immigration Act of 1924. The 1924 Act was aimed at further restricting immigrants from Southern and Eastern Europe, particularly Jewish, Italian, and Slavic people, who had begun to enter the country in large numbers beginning in the 1890s, and consolidated the prohibition of Asian immigration. Immigration patterns of the 1930s were affected by the Great Depression. In the final prosperous year, 1929, there were 279,678 immigrants recorded, but in 1933, only 23,068 moved to the U.S. In the early 1930s, more people emigrated from the United States than to it. The U.S. government sponsored a Mexican Repatriation program which was intended to encourage people to voluntarily move to Mexico, but thousands were deported against their will. Altogether, approximately 400,000 Mexicans were repatriated; half of them were US citizens. Most of the Jewish refugees fleeing the Nazis and World War II were barred from coming to the United States. In the post-war era, the Justice Department launched Operation Wetback, under which 1,075,168 Mexicans were deported in 1954. Since 1965 The Immigration and Nationality Act of 1965, also known as the Hart-Cellar Act, abolished the system of national-origin quotas. By equalizing immigration policies, the act resulted in new immigration from non-European nations, which changed the ethnic demographics of the United States. In 1970, 60% of immigrants were from Europe; this decreased to 15% by 2000. In 1990, George H. W. Bush signed the Immigration Act of 1990, which increased legal immigration to the United States by 40%. In 1991, Bush signed the Armed Forces Immigration Adjustment Act 1991, allowing foreign service members who had served 12 or more years in the US Armed Forces to qualify for permanent residency and, in some cases, citizenship. In November 1994, California voters passed Proposition 187 amending the state constitution, denying state financial aid to illegal immigrants. The federal courts voided this change, ruling that it violated the federal constitution. Appointed by Bill Clinton, the U.S. Commission on Immigration Reform recommended reducing legal immigration from about 800,000 people per year to approximately 550,000. While an influx of new residents from different cultures presents some challenges, "the United States has always been energized by its immigrant populations", said President Bill Clinton in 1998. "America has constantly drawn strength and spirit from wave after wave of immigrants... They have proved to be the most restless, the most adventurous, the most innovative, the most industrious of people." In 2001, President George W. Bush discussed an accord with Mexican President Vincente Fox. Due to the September 11 attacks, the possible accord did not occur. From 2005 to 2013, the US Congress discussed various ways of controlling immigration. The Senate and House were unable to reach an agreement. Nearly 14 million immigrants entered the United States from 2000 to 2010, and over one million persons were naturalized as U.S. citizens in 2008. The per-country limit applies the same maximum on the number of visas to all countries regardless of their population and has therefore had the effect of significantly restricting immigration of persons born in populous nations such as Mexico, China, India, and the Philippines—the leading countries of origin for legally admitted immigrants to the United States in 2013; nevertheless, China, India, and Mexico were the leading countries of origin for immigrants overall to the United States in 2013, regardless of legal status, according to a U.S. Census Bureau study. Nearly 8 million people immigrated to the United States from 2000 to 2005; 3.7 million of them entered without papers. In 1986 president Ronald Reagan signed immigration reform that gave amnesty to 3 million undocumented immigrants in the country. Hispanic immigrants suffered job losses during the late-2000s recession, but since the recession's end in June 2009, immigrants posted a net gain of 656,000 jobs. Over 1 million immigrants were granted legal residence in 2011. For those who enter the US illegally across the Mexico–United States border and elsewhere, migration is difficult, expensive and dangerous. Virtually all undocumented immigrants have no avenues for legal entry to the United States due to the restrictive legal limits on green cards, and lack of immigrant visas for low-skilled workers. Participants in debates on immigration in the early twenty-first century called for increasing enforcement of existing laws governing illegal immigration to the United States, building a barrier along some or all of the Mexico-U.S. border, or creating a new guest worker program. Through much of 2006 the country and Congress was engaged in a debate about these proposals. few of these proposals had become law, though a partial border fence had been approved and subsequently canceled. Modern reform attempts Beginning with Ronald Reagan in the 1980s, presidents from both political parties have steadily increased the number of border patrol agents and instituted harsher punitive measures for immigration violations. Examples of these policies include Ronald Reagan’s Immigration Reform and Control Act of 1986 and the Clinton-era Prevention Through Deterrence strategy. The sociologist Douglas Massey has argued that these policies have succeeded at producing a perception of border enforcement but have largely failed at preventing emigration from Latin America. Notably, rather than curtailing illegal immigration, the increase in border patrol agents decreased circular migration across the U.S.–Mexico border, thus increasing the population of Hispanics in the U.S. Presidents from both parties have employed anti-immigrant rhetoric to appeal to their political base or to garner bi-partisan support for their policies. While Republicans like Reagan and Donald Trump have led the way in framing Hispanic immigrants as criminals, Douglas Massey points out that "the current moment of open racism and xenophobia could not have happened with Democratic acquiescence". For example, while lobbying for his 1986 immigration bill, Reagan framed unauthorized immigration as a "national security" issue and warned that "terrorists and subversives are just two days' driving time" from the border. Later presidents, including Democrats Bill Clinton and Barack Obama, used similar "security" rhetoric in their efforts to court Republican support for comprehensive immigration reform. In his 2013 State of the Union Address, Obama said "real reform means strong border security, and we can build on the progress my administration has already madeputting more boots on the southern border than at any time in our history". Trump administration policies ICE reports that it removed 240,255 immigrants in fiscal year 2016, as well as 226,119 in FY2017 and 256,085 in FY2018. Citizens of Central American countries (including Mexico) made up over 90% of removals in FY2017 and over 80% in FY2018. In January 2017, U.S. President Donald Trump signed an executive order temporarily suspending entry to the United States by nationals of seven Muslim-majority countries. It was replaced by another executive order in March 2017 and by a presidential proclamation in September 2017, with various changes to the list of countries and exemptions. The orders were temporarily suspended by federal courts but later allowed to proceed by the Supreme Court, pending a definite ruling on their legality. Another executive order called for the immediate construction of a wall across the U.S.–Mexico border, the hiring of 5,000 new border patrol agents and 10,000 new immigration officers, and federal funding penalties for sanctuary cities. The "zero-tolerance" policy was put in place in 2018, which legally allows children to be separated from adults unlawfully entering the United States. This is justified by labeling all adults that enter unlawfully as criminals, thus subjecting them to criminal prosecution. The Trump Administration also argued that its policy had precedent under the Obama Administration, which had opened family detention centers in response to migrants increasingly using children as a way to get adults into the country. However, the Obama Administration detained families together in administrative, rather than criminal, detention. Other policies focused on what it means for an asylum seeker to claim credible fear. To further decrease the amount of asylum seekers into the United States, Attorney Jeff Sessions released a decision that restricts those fleeing gang violence and domestic abuse as "private crime", therefore making their claims ineligible for asylum. These new policies that have been put in place are putting many lives at risk, to the point that the ACLU has officially sued Jeff Sessions along with other members of the Trump Administration. The ACLU claims that the policies that are currently being put in place by this Presidential Administration is undermining the fundamental human rights of those immigrating into the United States, specifically women. They also claim that these policies violate decades of settle asylum law. In April 2020, President Trump said he will sign an executive order to temporarily suspend immigration to the United States because of the COVID-19 pandemic in the United States. Origins of the U.S. immigrant population, 1960–2016 Note: "Other Latin America" includes Central America, South America and the Caribbean. Refugee numbers According to the Department of State, in the 2016 fiscal year 84,988 refugees were accepted into the US from around the world. In the fiscal year of 2017, 53,691 refugees were accepted to the US. There was a significant decrease after Trump took office; it continued in the fiscal year of 2018 when only 22,405 refugees were accepted into the US. This displays a massive drop in acceptance of refugees since the Trump Administration has been in place. On September 26, 2019, The Trump administration announced it plans to allow only 18,000 refugees to resettle in the United States in the 2020 fiscal year, its lowest level since the modern program began in 1980. In 2020 The Trump administration announces that it plans to slash refugee admissions to U.S. for 2021 to a record low, 15,000 refugees down from a cap of 18,000 for 2020. This is the fourth consecutive year of declining refugee admissions under the Trump term. Contemporary immigration , approximately half of immigrants living in the United States are from Mexico and other Latin American countries. Many Central Americans are fleeing because of desperate social and economic circumstances in their countries. Some believe that the large number of Central American refugees arriving in the United States can be explained as a "blowback" to policies such as United States military interventions and covert operations that installed or maintained in power authoritarian leaders allied with wealthy land owners and multinational corporations who stop family farming and democratic efforts, which have caused drastically sharp social inequality, wide-scale poverty and rampant crime. Economic austerity dictated by neoliberal policies imposed by the International Monetary Fund and its ally, the U.S., has also been cited as a driver of the dire social and economic conditions, as has the U.S. "War on Drugs", which has been understood as fueling murderous gang violence in the region. Another major migration driver from Central America (Guatemala, Honduras, and El Salvador) are crop failures, which are (partly) caused by climate change. "The current debate… is almost totally about what to do about immigrants when they get here. But the 800-pound gorilla that’s missing from the table is what we have been doing there that brings them here, that drives them here", according to Jeff Faux, an economist who is a distinguished fellow at the Economic Policy Institute. Until the 1930s most legal immigrants were male. By the 1990s women accounted for just over half of all legal immigrants. Contemporary immigrants tend to be younger than the native population of the United States, with people between the ages of 15 and 34 substantially overrepresented. Immigrants are also more likely to be married and less likely to be divorced than native-born Americans of the same age. Immigrants are likely to move to and live in areas populated by people with similar backgrounds. This phenomenon has remained true throughout the history of immigration to the United States. Seven out of ten immigrants surveyed by Public Agenda in 2009 said they intended to make the U.S. their permanent home, and 71% said if they could do it over again they would still come to the US. In the same study, 76% of immigrants say the government has become stricter on enforcing immigration laws since the September 11, 2001 attacks ("9/11"), and 24% report that they personally have experienced some or a great deal of discrimination. Public attitudes about immigration in the U.S. were heavily influenced in the aftermath of the 9/11 attacks. After the attacks, 52% of Americans believed that immigration was a good thing overall for the U.S., down from 62% the year before, according to a 2009 Gallup poll. A 2008 Public Agenda survey found that half of Americans said tighter controls on immigration would do "a great deal" to enhance U.S. national security. Harvard political scientist and historian Samuel P. Huntington argued in his 2004 book Who Are We? The Challenges to America's National Identity that a potential future consequence of continuing massive immigration from Latin America, especially Mexico, could lead to the bifurcation of the United States. The estimated population of illegal Mexican immigrants in the US decreased from approximately 7 million in 2007 to 6.1 million in 2011 Commentators link the reversal of the immigration trend to the economic downturn that started in 2008 and which meant fewer available jobs, and to the introduction of tough immigration laws in many states. According to the Pew Hispanic Center, the net immigration of Mexican born persons had stagnated in 2010, and tended toward going into negative figures. More than 80 cities in the United States, including Washington D.C., New York City, Los Angeles, Chicago, San Francisco, San Diego, San Jose, Salt Lake City, Phoenix, Dallas, Fort Worth, Houston, Detroit, Jersey City, Minneapolis, Denver, Baltimore, Seattle, Portland, Oregon and Portland, Maine, have sanctuary policies, which vary locally. Origin countries Source: US Department of Homeland Security, Office of Immigration Statistics Charts Demography Extent and destinations 2010, 2017, 2018 The United States admitted more legal immigrants from 1991 to 2000, between ten and eleven million, than in any previous decade. In the most recent decade, the 10 million legal immigrants that settled in the U.S. represent roughly one third of the annual growth, as the U.S. population increased by 32 million (from 249 million to 281 million). By comparison, the highest previous decade was the 1900s, when 8.8 million people arrived, increasing the total U.S. population by one percent every year. Specifically, "nearly 15% of Americans were foreign-born in 1910, while in 1999, only about 10% were foreign-born". By 1970, immigrants accounted for 4.7 percent of the US population and rising to 6.2 percent in 1980, with an estimated 12.5 percent in 2009. , 25% of US residents under age 18 were first- or second-generation immigrants. Eight percent of all babies born in the U.S. in 2008 belonged to illegal immigrant parents, according to a recent analysis of U.S. Census Bureau data by the Pew Hispanic Center. Legal immigration to the U.S. increased from 250,000 in the 1930s, to 2.5 million in the 1950s, to 4.5 million in the 1970s, and to 7.3 million in the 1980s, before becoming stable at about 10 million in the 1990s. Since 2000, legal immigrants to the United States number approximately 1,000,000 per year, of whom about 600,000 are Change of Status who already are in the U.S. Legal immigrants to the United States now are at their highest level ever, at just over 37,000,000 legal immigrants. In reports in 2005–2006, estimates of illegal immigration ranged from 700,000 to 1,500,000 per year. Immigration led to a 57.4% increase in foreign-born population from 1990 to 2000. Foreign-born immigration has caused the U.S. population to continue its rapid increase with the foreign-born population doubling from almost 20 million in 1990 to over 47 million in 2015. In 2018, there were almost 90 million immigrants and U.S.-born children of immigrants (second-generation Americans) in the United States, accounting for 28% of the overall U.S. population. While immigration has increased drastically over the 20th century, the foreign-born share of the population is, at 13.4, only somewhat below what it was at its peak in 1910 at 14.7%. A number of factors may be attributed to the decrease in the representation of foreign-born residents in the United States. Most significant has been the change in the composition of immigrants; prior to 1890, 82% of immigrants came from North and Western Europe. From 1891 to 1920, that number decreased to 25%, with a rise in immigrants from East, Central, and South Europe, summing up to 64%. Animosity towards these different and foreign immigrants increased in the United States, resulting in much legislation to limit immigration. Contemporary immigrants settle predominantly in seven states, California, New York, Florida, Texas, Pennsylvania, New Jersey and Illinois, comprising about 44% of the U.S. population as a whole. The combined total immigrant population of these seven states was 70% of the total foreign-born population in 2000. Origin Foreign-born population in the United States in 2019 by country of birth Effects of immigration Demographics The Census Bureau estimates the US population will increase from 317 million in 2014 to 417 million in 2060 with immigration, when nearly 20% will be foreign-born. A 2015 report from the Pew Research Center projects that by 2065, non-Hispanic white people will account for 46% of the population, down from the 2005 figure of 67%. Non-Hispanic white people made up 85% of the population in 1960. It also foresees the population of Hispanic people increasing from 17% in 2014 to 29% by 2060. The population of Asian people is expected to nearly double in 2060. Overall, the Pew Report predicts the population of the United States will rise from 296 million in 2005 to 441 million in 2065, but only to 338 million with no immigration. In 35 of the country's 50 largest cities, non-Hispanic white people were predicted to be in the minority at the last census, or are already. In California, non-Hispanic white people decreased from 80% of the state's population in 1970 to 42% in 2001 and 39% in 2013. Immigrant segregation declined in the first half of the 20th century, but has been increasing over the past few decades. This has caused questioning of the correctness of describing the United States as a melting pot. One explanation is that groups with lower socioeconomic status concentrate in more densely-populated areas that have access to public transit while groups with higher socioeconomic status move to suburban areas. Another is that some recent immigrant groups are more culturally and linguistically different from earlier groups and prefer to live together due to factors such as communication costs. Another explanation for increased segregation is white flight. Country of birth for the foreign-born population in the United States Source: 1990, 2000 and 2010 decennial Censuses and 2019 American Community Survey Economic A survey of leading economists shows a consensus for the view that high-skilled immigration makes the average American better off. A survey of the same economists also shows strong support for the notion that low-skilled immigration makes the average American better off. According to David Card, Christian Dustmann, and Ian Preston, "most existing studies of the economic impacts of immigration suggest these impacts are small, and on average benefit the native population". In a survey of the existing literature, Örn B Bodvarsson and Hendrik Van den Berg wrote, "a comparison of the evidence from all the studies ... makes it clear that, with very few exceptions, there is no strong statistical support for the view held by many members of the public, namely that immigration has an adverse effect on native-born workers in the destination country". Overall economic prosperity Whereas the impact on the average native tends to be small and positive, studies show more mixed results for low-skilled natives, but whether the effects are positive or negative, they tend to be small either way. Immigrants may often do types of work that natives are largely unwilling to do, contributing to greater economic prosperity for the economy as a whole: for instance, Mexican migrant workers taking up manual farm work in the United States has close to zero effect on native employment in that occupation, which means that the effect of Mexican workers on U.S. employment outside farm work was therefore most likely positive, since they raised overall economic productivity. Research indicates that immigrants are more likely to work in risky jobs than U.S.-born workers, partly due to differences in average characteristics, such as immigrants' lower English language ability and educational attainment. Further, some studies indicate that higher ethnic concentration in metropolitan areas is positively related to the probability of self-employment of immigrants. Research also suggests that diversity has a net positive effect on productivity and economic prosperity. A study by Nathan Nunn, Nancy Qian and Sandra Sequeira found that the Age of Mass Migration (1850–1920) has had substantially beneficial long-term effects on U.S. economic prosperity: "locations with more historical immigration today have higher incomes, less poverty, less unemployment, higher rates of urbanization, and greater educational attainment. The long-run effects appear to arise from the persistence of sizeable short-run benefits, including earlier and more intensive industrialization, increased agricultural productivity, and more innovation." The authors also found that the immigration had short-term benefits: "that there is no evidence that these long-run benefits come at short-run costs. In fact, immigration immediately led to economic benefits that took the form of higher incomes, higher productivity, more innovation, and more industrialization". Research has also found that migration leads to greater trade in goods and services. Using 130 years of data on historical migrations to the United States, one study found "that a doubling of the number of residents with ancestry from a given foreign country relative to the mean increases by 4.2 percentage points the probability that at least one local firm invests in that country, and increases by 31% the number of employees at domestic recipients of FDI from that country. The size of these effects increases with the ethnic diversity of the local population, the geographic distance to the origin country, and the ethno-linguistic fractionalization of the origin country." Some research suggests that immigration can offset some of the adverse effects of automation on native labor outcomes in the United States. By increasing overall demand, immigrants could push natives out of low-skilled manual labor into better-paying occupations. A 2018 study in the American Economic Review found that the Bracero program (which allowed almost half a million Mexican workers to do seasonal farm labor in the United States) did not have any adverse impact on the labor market outcomes of American-born farm workers. Fiscal effects A 2011 literature review of the economic impacts of immigration found that the net fiscal impact of migrants varies across studies but that the most credible analyses typically find small and positive fiscal effects on average. According to the authors, "the net social impact of an immigrant over his or her lifetime depends substantially and in predictable ways on the immigrant's age at arrival, education, reason for migration, and similar". A 2016 report by the National Academies of Sciences, Engineering, and Medicine concluded that over a 75-year time horizon, "the fiscal impacts of immigrants are generally positive at the federal level and generally negative at the state and local level". The reason for the costs to state and local governments is that the cost of educating the immigrants' children is paid by state and local governments. According to a 2007 literature review by the Congressional Budget Office, "Over the past two decades, most efforts to estimate the fiscal impact of immigration in the United States have concluded that, in aggregate and over the long-term, tax revenues of all types generated by immigrants—both legal and unauthorized—exceed the cost of the services they use." According to James Smith, a senior economist at Santa Monica-based RAND Corporation and lead author of the United States National Research Council's study "The New Americans: Economic, Demographic, and Fiscal Effects of Immigration", immigrants contribute as much as $10 billion to the U.S. economy each year. The NRC report found that although immigrants, especially those from Latin America, caused a net loss in terms of taxes paid versus social services received, immigration can provide an overall gain to the domestic economy due to an increase in pay for higher-skilled workers, lower prices for goods and services produced by immigrant labor, and more efficiency and lower wages for some owners of capital. The report also notes that although immigrant workers compete with domestic workers for low-skilled jobs, some immigrants specialize in activities that otherwise would not exist in an area, and thus can be beneficial for all domestic residents. Immigration and foreign labor documentation fees increased over 80% in 2007, with over 90% of funding for USCIS derived from immigration application fees, creating many USCIS jobs involving immigration to the US, such as immigration interview officials, fingerprint processors, Department of Homeland Security, etc. Inequality Overall immigration has not had much effect on native wage inequality but low-skill immigration has been linked to greater income inequality in the native population. Impact of undocumented immigrants Research on the economic effects of undocumented immigrants is scant but existing peer-reviewed studies suggest that the effects are positive for the native population and public coffers. A 2015 study shows that "increasing deportation rates and tightening border control weakens low-skilled labor markets, increasing unemployment of native low-skilled workers. Legalization, instead, decreases the unemployment rate of low-skilled natives and increases income per native." Studies show that legalization of undocumented immigrants would boost the U.S. economy; a 2013 study found that granting legal status to undocumented immigrants would raise their incomes by a quarter (increasing U.S. GDP by approximately $1.4 trillion over a ten-year period), and 2016 study found that "legalization would increase the economic contribution of the unauthorized population by about 20%, to 3.6% of private-sector GDP." A 2007 literature by the Congressional Budget Office found that estimating the fiscal effects of undocumented immigrants has proven difficult: "currently available estimates have significant limitations; therefore, using them to determine an aggregate effect across all states would be difficult and prone to considerable error". The impact of undocumented immigrants differs on federal levels than state and local levels, with research suggesting modest fiscal costs at the state and local levels but with substantial fiscal gains at the federal level. In 2009, a study by the Cato Institute, a free market think tank, found that legalization of low-skilled illegal resident workers in the US would result in a net increase in US GDP of $180 billion over ten years. The Cato Institute study did not examine the impact on per capita income for most Americans. Jason Riley notes that because of progressive income taxation, in which the top 1% of earners pay 37% of federal income taxes (even though they actually pay a lower tax percentage based on their income), 60% of Americans collect more in government services than they pay in, which also reflects on immigrants. In any event, the typical immigrant and their children will pay a net $80,000 more in their lifetime than they collect in government services according to the NAS. Legal immigration policy is set to maximize net taxation. Illegal immigrants even after an amnesty tend to be recipients of more services than they pay in taxes. In 2010, an econometrics study by a Rutgers economist found that immigration helped increase bilateral trade when the incoming people were connected via networks to their country of origin, particularly boosting trade of final goods as opposed to intermediate goods, but that the trade benefit weakened when the immigrants became assimilated into American culture. According to NPR in 2005, about 3% of illegal immigrants were working in agriculture. The H-2A visa allows U.S. employers to bring foreign nationals to the United States to fill temporary agricultural jobs. The passing of tough immigration laws in several states from around 2009 provides a number of practical case studies. The state of Georgia passed immigration law HB 87 in 2011; this led, according to the coalition of top Kansas businesses, to 50% of its agricultural produce being left to rot in the fields, at a cost to the state of more than $400 million. Overall losses caused by the act were $1 billion; it was estimated that the figure would become over $20 billion if all the estimated 325,000 unauthorized workers left Georgia. The cost to Alabama of its crackdown in June 2011 has been estimated at almost $11 billion, with up to 80,000 unauthorized immigrant workers leaving the state. Impact of refugees Studies of refugees' impact on native welfare are scant but the existing literature shows a positive fiscal impact and mixed results (negative, positive and no significant effects) on native welfare. A 2017 paper by Evans and Fitzgerald found that refugees to the United States pay "$21,000 more in taxes than they receive in benefits over their first 20 years in the U.S." An internal study by the Department of Health and Human Services under the Trump administration, which was suppressed and not shown to the public, found that refugees to the United States brought in $63 billion more in government revenues than they cost the government. According to labor economist Giovanni Peri, the existing literature suggests that there are no economic reasons why the American labor market could not easily absorb 100,000 Syrian refugees in a year. Refugees integrate more slowly into host countries' labor markets than labor migrants, in part due to the loss and depreciation of human capital and credentials during the asylum procedure. Innovation and entrepreneurship According to one survey of the existing economic literature, "much of the existing research points towards positive net contributions by immigrant entrepreneurs". Areas where immigrants are more prevalent in the United States have substantially more innovation (as measured by patenting and citations). Immigrants to the United States start businesses at higher rates than natives. According to a 2018 paper, "first-generation immigrants create about 25% of new firms in the United States, but this share exceeds 40% in some states". Another 2018 paper links H-1B visa holders to innovation. Immigrants have been linked to greater invention and innovation in the US. According to one report, "immigrants have started more than half (44 of 87) of America's startup companies valued at $1 billion or more and are key members of management or product development teams in over 70 percent (62 of 87) of these companies". Foreign doctoral students are a major source of innovation in the American economy. In the United States, immigrant workers hold a disproportionate share of jobs in science, technology, engineering, and math (STEM): "In 2013, foreign-born workers accounted for 19.2 percent of STEM workers with a bachelor's degree, 40.7 percent of those with a master's degree, and more than half—54.5 percent—of those with a Ph.D." The Kauffman Foundation's index of entrepreneurial activity is nearly 40% higher for immigrants than for natives. Immigrants were involved in the founding of many prominent American high-tech companies, such as Google, Yahoo, YouTube, Sun Microsystems, and eBay. Social Discrimination Irish immigration was opposed in the 1850s by the nativist Know Nothing movement, originating in New York in 1843. It was engendered by popular fears that the country was being overwhelmed by Irish Catholic immigrants. On March 14, 1891, a lynch mob stormed a local jail and lynched several Italians following the acquittal of several Sicilian immigrants alleged to be involved in the murder of New Orleans police chief David Hennessy. The Congress passed the Emergency Quota Act in 1921, followed by the Immigration Act of 1924. The Immigration Act of 1924 was aimed at limiting immigration overall, and making sure that the nationalities of new arrivals matched the overall national profile. Business A 2014 meta-analysis of racial discrimination in product markets found extensive evidence of minority applicants being quoted higher prices for products. A 1995 study found that car dealers "quoted significantly lower prices to white males than to black or female test buyers using identical, scripted bargaining strategies". A 2013 study found that eBay sellers of iPods received 21 percent more offers if a white hand held the iPod in the photo than a black hand. Criminal justice system Research suggests that police practices, such as racial profiling, over-policing in areas populated by minorities and in-group bias may result in disproportionately high numbers of racial minorities among crime suspects. Research also suggests that there may be possible discrimination by the judicial system, which contributes to a higher number of convictions for racial minorities. A 2012 study found that "(i) juries formed from all-white jury pools convict black defendants significantly (16 percentage points) more often than white defendants, and (ii) this gap in conviction rates is entirely eliminated when the jury pool includes at least one black member." Research has found evidence of in-group bias, where "black (white) juveniles who are randomly assigned to black (white) judges are more likely to get incarcerated (as opposed to being placed on probation), and they receive longer sentences". In-group bias has also been observed when it comes to traffic citations, as black and white police officers are more likely to cite out-groups. Education A 2015 study using correspondence tests "found that when considering requests from prospective students seeking mentoring in the future, faculty were significantly more responsive to white males than to all other categories of students, collectively, particularly in higher-paying disciplines and private institutions". Through affirmative action, there is reason to believe that elite colleges favor minority applicants. Housing A 2014 meta-analysis found extensive evidence of racial discrimination in the American housing market. Minority applicants for housing needed to make many more enquiries to view properties. Geographical steering of African-Americans in US housing remained significant. A 2003 study finds "evidence that agents interpret an initial housing request as an indication of a customer's preferences, but also are more likely to withhold a house from all customers when it is in an integrated suburban neighborhood (redlining). Moreover, agents' marketing efforts increase with asking price for white, but not for black, customers; blacks are more likely than whites to see houses in suburban, integrated areas (steering); and the houses agents show are more likely to deviate from the initial request when the customer is black than when the customer is white. These three findings are consistent with the possibility that agents act upon the belief that some types of transactions are relatively unlikely for black customers (statistical discrimination)." A report by the federal Department of Housing and Urban Development where the department sent African-American people and white people to look at apartments found that African-American people were shown fewer apartments to rent and houses for sale. Labor market Several meta-analyses find extensive evidence of ethnic and racial discrimination in hiring in the American labor market. A 2016 meta-analysis of 738 correspondence tests—tests where identical CVs for stereotypically black and white names were sent to employers—in 43 separate studies conducted in OECD countries between 1990 and 2015 found that there is extensive racial discrimination in hiring decisions in Europe and North-America. These correspondence tests showed that equivalent minority candidates need to send around 50% more applications to be invited for an interview than majority candidates. A study that examined the job applications of actual people provided with identical résumés and similar interview training showed that African-American applicants with no criminal record were offered jobs at a rate as low as white applicants who had criminal records. Discrimination between minority groups Racist thinking among and between minority groups does occur; examples of this are conflicts between black people and Korean immigrants, notably in the 1992 Los Angeles Riots, and between African Americans and non-white Latino immigrants. There has been a long running racial tension between African American and Mexican prison gangs, as well as significant riots in California prisons where they have targeted each other, for ethnic reasons. There have been reports of racially-motivated attacks against African Americans who have moved into neighborhoods occupied mostly by people of Mexican origin, and vice versa. There has also been an increase in violence between non-Hispanic white people and Latino immigrants, and between African immigrants and African Americans. Assimilation A 2018 study in the American Sociological Review found that within racial groups, most immigrants to the United States had fully assimilated within a span of 20 years. Immigrants arriving in the United States after 1994 assimilate more rapidly than immigrants who arrived in previous periods. Measuring assimilation can be difficult due to "ethnic attrition", which refers to when descendants of migrants cease to self-identify with the nationality or ethnicity of their ancestors. This means that successful cases of assimilation will be underestimated. Research shows that ethnic attrition is sizable in Hispanic and Asian immigrant groups in the United States. By taking ethnic attrition into account, the assimilation rate of Hispanics in the United States improves significantly. A 2016 paper challenges the view that cultural differences are necessarily an obstacle to long-run economic performance of migrants. It finds that "first generation migrants seem to be less likely to success the more culturally distant they are, but this effect vanishes as time spent in the US increases". A 2020 study found that recent immigrants to the United States assimilated at a similar pace as historical immigrants. Religious diversity Immigration from South Asia and elsewhere has contributed to enlarging the religious composition of the United States. Islam in the United States is growing mainly due to immigration. Hinduism in the United States, Buddhism in the United States, and Sikhism in the United States are other examples. Whereas non-Christians together constitute only 4% of the U.S. population, they made up 20% of the 2003 cohort of new immigrants. Since 1992, an estimated 1.7 million Muslims, approximately 1 million Hindus, and approximately 1 million Buddhists have immigrated legally to the United States. Conversely, non-religious people are underrepresented in the immigrant populations. Although "other" non-Christian religions are also slightly more common among immigrants than among U.S. adults—1.9% compared with 1.0%—those professing no religion are slightly under-represented among new immigrants. Whereas 12% of immigrants said they had no religion, the figure was 15% for adult Americans. This lack of representation for non-religious people could be related to stigmas around atheists and agnostics or could relate to the need for identity when entering a new country. Labor unions The American Federation of Labor (AFL), a coalition of labor unions formed in the 1880s, vigorously opposed unrestricted immigration from Europe for moral, cultural, and racial reasons. The issue unified the workers who feared that an influx of new workers would flood the labor market and lower wages. Nativism was not a factor because upwards of half the union members were themselves immigrants or the sons of immigrants from Ireland, Germany and Britain. However, nativism was a factor when the AFL even
|
setting scanner-specific parameters; scanning, reading and writing files, and fast image scaling, rotating, displaying, and printing. Drivers have been written to dynamically process data for operations such as converting grayscale to binary image data. An ISIS interface can run scanners at or above their rated speed by linking drivers together in a pipe so that data flows from a scanner driver to compression driver, to packaging driver, to a file, viewer, or printer in a continuous stream, usually without the need to buffer more than a small portion of the full image. As a result of using the piping method, each driver can be optimised to perform one function well. Drivers are typically small and modular in order to make
|
desired without waiting for a new version of the specification. The standard addresses all of the issues that an application using a scanner needs to be concerned with. Functions include but are not limited to selecting, installing, and configuring a new scanner; setting scanner-specific parameters; scanning, reading and writing files, and fast image scaling, rotating, displaying, and printing. Drivers have been written to dynamically process data for operations such as converting grayscale to binary image data. An ISIS interface can run scanners at or above their rated speed by linking drivers together in a pipe so that data flows from a scanner driver to compression driver, to packaging driver, to a file, viewer, or printer in a continuous stream, usually without the need to buffer more than a small
|
the puppets for these films as well. Work with Ingse Caprino Following the success of Tim og Tøffe, Gude was involved in all of her son's films until 1963. Gude made some puppets for a production by Frithjof Tidemand-Johannessen. Caprino had set up a film studio in the manor house, and Gude started working full-time on new puppets, which often had luscious proportions. The film, Veslefrikk med Fela, was awarded the best children's film at the 13th Venice International Film Festival in 1952. The commissioned production, Den steadhaftige tinnsoldat (The Steadfast Tin Soldier), won several international awards. Gude filled the role of cinematographer on the last film collaboration with her son. The puppet's voice role being played by Liv Strømsted. Gude died 9 December 1963 at Snarøya. The production of puppets was afterwards taken over by her granddaughter Ivonne Caprino. Innovations When making Tim og Tøffe, Caprino invented a method for controlling the puppet's movements in real time. The technique can be described as a primitive, mechanical version of animatronics. Caprino's films received good reviews, and he quickly became a celebrity in Norway. When he switched to traditional stop motion film-making, Caprino tried to maintain the impression that he was still using some kind of "magic" technology to make the puppets move, even though all his later films were made with traditional stop motion techniques. Another innovative method used by the team, was the use of condoms for the creation of the puppets' facial skin. In addition to the short films, Caprino produced dozens of advertising films with puppets. In 1959, he directed a live action feature film, Ugler i Mosen, which also contained stop motion sequences. He then made a feature film about Peter Christen Asbjørnsen, who had travelled around Norway in the 19th century collecting traditional folk tales. The plan was to use live action for the sequences showing Asbjørnsen, and then to realise the folk tales using stop motion. Unfortunately, Caprino was unable to secure funding for the project, so he ended up making the planned folk tale sequences as separate 16-minute puppet films, book-ended by live action sequences showing Asbjørnsen. The Pinchcliffe Grand Prix In 1970, Caprino and his small team of collaborators, started work on a 25-minute
|
Flåklypa Grand Prix ("Pinchcliffe Grand Prix"), was made in 1975. Early life Caprino was born 17 February 1920 in Oslo, the son of Italian furniture designer Mario Caprino and the artist, Ingeborg "Ingse" Caprino nee Gude, who was a granddaughter of the painter Hans Gude. Ingse Gude was a watercolorist, illustrator, puppet maker, and author, born in Oybin, Saxony. The Caprinos divorced around 1927, and Ingse married the painter Bernhard Folkestad. After his death, she lived with the painter and art critic, Pola Gauguin. Early career In the mid-1940s, Caprino helped his mother design puppets for a puppet theatre, which inspired him to try making a film using his mother's designs. Ivo used the surplus puppets as inspiration for his first animated film, Tim and Tøffe (1948), the result of their collaboration. The eight minute film, however, was not released until 1949. Several other films followed, including two 15-minute shorts that are still shown regularly in Norway, Veslefrikk med Fela (Little Freddy and his Fiddle), based on a Norwegian folk tale; and Karius og Baktus, a story by Thorbjørn Egner of two little trolls—representing caries and bacterium—living in a boy's teeth. Gude made the puppets for these films as well. Work with Ingse Caprino Following the success of Tim og Tøffe, Gude was involved in all of her son's films until 1963. Gude made some puppets for a production by Frithjof Tidemand-Johannessen. Caprino had set up a film studio in the manor house, and Gude started working full-time on new puppets, which often had luscious proportions. The film, Veslefrikk med Fela, was awarded the best children's film at the 13th Venice International Film Festival in 1952. The commissioned production, Den steadhaftige tinnsoldat (The Steadfast Tin Soldier), won several international awards. Gude filled the role of cinematographer on the last film collaboration with her son. The puppet's voice role being played by Liv Strømsted. Gude died 9 December 1963 at Snarøya. The production of puppets was afterwards taken over by her granddaughter Ivonne Caprino. Innovations When making Tim og Tøffe, Caprino invented a method for controlling the puppet's movements in real time. The technique can be described as a primitive, mechanical version of animatronics. Caprino's films received good reviews, and he quickly became a celebrity in Norway. When he switched to traditional stop motion film-making, Caprino tried to maintain the impression that he was still using some
|
effective address computation using its general ALU, consuming several extra clock cycles in many cases. Also, the 80286 was more efficient in the prefetch of instructions, buffering, execution of jumps, and in complex microcoded numerical operations such as MUL/DIV than its predecessor. The 80286 included, in addition to all of the 8086 instructions, all of the new instructions of the 80186: ENTER, LEAVE, BOUND, INS, OUTS, PUSHA, POPA, PUSH immediate, IMUL immediate, and immediate shifts and rotates. The 80286 also added new instructions for protected mode: ARPL, CLTS, LAR, LGDT, LIDT, LLDT, LMSW, LSL, LTR, SGDT, SIDT, SLDT, SMSW, STR, VERR, and VERW. Some of the instructions for protected mode can (or must) be used in real mode to set up and switch to protected mode, and a few (such as SMSW and LMSW) are useful for real mode itself. The Intel 80286 had a 24-bit address bus and was able to address up to 16 MB of RAM, compared to the 1 MB addressability of its predecessor. However, memory cost and the initial rarity of software using the memory above 1 MB meant that 80286 computers were rarely shipped with more than one megabyte of RAM. Additionally, there was a performance penalty involved in accessing extended memory from real mode (in which DOS, the dominant PC operating system until the mid-1990s, ran), as noted below. Features Protected mode The 286 was the first of the x86 CPU family to support protected virtual-address mode, commonly called "protected mode". In addition, it was the first commercially available microprocessor with on-chip MMU capabilities (systems using the contemporaneous Motorola 68010 and NS320xx could be equipped with an optional MMU controller). This would allow IBM compatibles to have advanced multitasking OSes for the first time and compete in the Unix-dominated server/workstation market. Several additional instructions were introduced in the protected mode of 80286, which are helpful for multitasking operating systems. Another important feature of 80286 is the prevention of unauthorized access. This is achieved by: Forming different segments for data, code, and stack, and preventing their overlapping. Assigning privilege levels to each segment. Segments with lower privilege levels cannot access segments with higher privilege levels. In 80286 (and in its co-processor Intel 80287), arithmetic operations can be performed on the following different types of numbers: unsigned packed decimal, unsigned binary, unsigned unpacked decimal, signed binary, floating-point numbers (only with an 80287). By design, the 286 could not revert from protected mode to the basic 8086-compatible real address mode ("real mode") without a hardware-initiated reset. In the PC/AT introduced in 1984, IBM added external circuitry, as well as specialized code in the ROM BIOS and the 8042 peripheral microcontroller to enable software to cause the reset, allowing real-mode reentry while retaining active memory and returning control to the program that initiated the reset. (The BIOS is necessarily involved because it obtains control directly whenever the CPU resets.) Though it worked correctly, the method imposed a huge performance penalty. In theory, real-mode applications could be directly executed in 16-bit protected mode if certain rules (newly proposed with the introduction of the 80286) were followed; however, as many DOS programs did not conform to those rules, protected mode was not widely used until the appearance of its successor, the 32-bit Intel 80386, which was designed to go back and forth between modes easily and to provide an emulation of real mode within protected mode. When Intel designed the 286, it was not designed to be able to multitask real-mode applications; real mode was intended to be a simple way for a bootstrap loader to prepare the system and then switch to protected mode; essentially, in protected mode the 80286 was designed to be a new processor with many similarities to its predecessors, while real mode on the 80286 was offered for smaller-scale systems that could benefit from a more advanced version of the 80186 CPU core, with advantages such as higher clock rates, faster instruction execution (measured in clock cycles), and unmultiplexed buses, but not the 24-bit (16 MB) memory space. To support protected mode, new instructions have been added: ARPL, VERR, VERW, LAR, LSL, SMSW, SGDT, SIDT, SLDT, STR, LMSW, LGDT, LIDT, LLDT, LTR, CLTS. There are also new exceptions (internal interrupts): invalid opcode, coprocessor not available, double fault, coprocessor segment overrun, stack fault, segment overrun/general protection fault, and others only for protected mode. OS support The protected mode of the 80286 was not routinely utilized in PC applications until many years after its release, in part because of the high cost of adding extended memory to a PC, but also because of the need for software to support the large user base of 8086 PCs. For example, in 1986 the only program that made use of it was VDISK, a RAM disk driver included with PC DOS 3.0 and 3.1. A DOS could utilize the additional RAM available in protected mode (extended memory) either via a BIOS call (INT 15h, AH=87h), as a RAM disk, or as emulation of expanded memory. The difficulty lay in the incompatibility of older real-mode DOS programs with protected mode. They simply could not natively run in this new mode without significant modification. In protected mode, memory management and interrupt handling were done differently than in real mode. In addition, DOS programs typically would directly access data and code segments that did not belong to them, as real mode allowed them to do without restriction; in contrast, the design intent of protected mode was to prevent programs from accessing any segments other than their own unless special access was explicitly allowed. While it was possible to set up a protected-mode environment that allowed all programs access to all segments (by putting all segment descriptors into the GDT and assigning them all the same privilege level), this undermined nearly all of the advantages of protected mode except the extended (24-bit) address space. The choice that OS developers faced was either to start from scratch and create an OS that would not run the vast majority of the old programs, or to come up with a version of DOS that was slow and ugly (i.e., ugly from an internal technical viewpoint) but would still run a majority of the old programs. Protected mode also did not provide a significant enough performance advantage over the 8086-compatible real mode to justify supporting its capabilities; actually, except for
|
applications until many years after its release, in part because of the high cost of adding extended memory to a PC, but also because of the need for software to support the large user base of 8086 PCs. For example, in 1986 the only program that made use of it was VDISK, a RAM disk driver included with PC DOS 3.0 and 3.1. A DOS could utilize the additional RAM available in protected mode (extended memory) either via a BIOS call (INT 15h, AH=87h), as a RAM disk, or as emulation of expanded memory. The difficulty lay in the incompatibility of older real-mode DOS programs with protected mode. They simply could not natively run in this new mode without significant modification. In protected mode, memory management and interrupt handling were done differently than in real mode. In addition, DOS programs typically would directly access data and code segments that did not belong to them, as real mode allowed them to do without restriction; in contrast, the design intent of protected mode was to prevent programs from accessing any segments other than their own unless special access was explicitly allowed. While it was possible to set up a protected-mode environment that allowed all programs access to all segments (by putting all segment descriptors into the GDT and assigning them all the same privilege level), this undermined nearly all of the advantages of protected mode except the extended (24-bit) address space. The choice that OS developers faced was either to start from scratch and create an OS that would not run the vast majority of the old programs, or to come up with a version of DOS that was slow and ugly (i.e., ugly from an internal technical viewpoint) but would still run a majority of the old programs. Protected mode also did not provide a significant enough performance advantage over the 8086-compatible real mode to justify supporting its capabilities; actually, except for task switches when multitasking, it actually yielded only a performance disadvantage, by slowing down many instructions through a litany of added privilege checks. In protected mode, registers were still 16-bit, and the programmer was still forced to use a memory map composed of 64 kB segments, just like in real mode. In January 1985, Digital Research previewed the Concurrent DOS 286 1.0 operating system developed in cooperation with Intel. The product would function strictly as an 80286 native-mode (i.e. protected-mode) operating system, allowing users to take full advantage of the protected mode to perform multi-user, multitasking operations while running 8086 emulation. This worked on the B-1 prototype step of the chip, but Digital Research discovered problems with the emulation on the production level C-1 step in May, which would not allow Concurrent DOS 286 to run 8086 software in protected mode. The release of Concurrent DOS 286 was delayed until Intel would develop a new version of the chip. In August, after extensive testing on E-1 step samples of the 80286, Digital Research acknowledged that Intel corrected all documented 286 errata, but said that there were still undocumented chip performance problems with the prerelease version of Concurrent DOS 286 running on the E-1 step. Intel said that the approach Digital Research wished to take in emulating 8086 software in protected mode differed from the original specifications. Nevertheless, in the E-2 step, they implemented minor changes in the microcode that would allow Digital Research to run emulation mode much faster. Named IBM 4680 OS, IBM originally chose DR Concurrent DOS 286 as the basis of their IBM 4680 computer for IBM Plant System products and point-of-sale terminals in 1986. Digital Research's FlexOS 286 version 1.3, a derivation of Concurrent DOS 286, was developed in 1986, introduced in January 1987, and later adopted by IBM for their IBM 4690 OS, but the same limitations affected it. The problems led to Bill Gates famously
|
the Crown of England by his descent from the last Saxon King, Harold Godwinson. Ivanhoe accompanies King Richard on the Third Crusade, where he is said to have played a notable role in the Siege of Acre; and tends to Louis of Thuringia, who suffers from malaria. The book opens with a scene of Norman knights and prelates seeking the hospitality of Cedric. They are guided there by a pilgrim, known at that time as a palmer. Also returning from the Holy Land that same night, Isaac of York, a Jewish moneylender, seeks refuge at Rotherwood. Following the night's meal, the palmer observes one of the Normans, the Templar Brian de Bois-Guilbert, issue orders to his Saracen soldiers to capture Isaac. The palmer then assists in Isaac's escape from Rotherwood, with the additional aid of the swineherd Gurth. Isaac of York offers to repay his debt to the palmer with a suit of armour and a war horse to participate in the tournament at Ashby-de-la-Zouch Castle, on his inference that the palmer was secretly a knight. The palmer is taken by surprise, but accepts the offer. The tournament The tournament is presided over by Prince John. Also in attendance are Cedric, Athelstane, Lady Rowena, Isaac of York, his daughter Rebecca, Robin of Locksley and his men, Prince John's advisor Waldemar Fitzurse, and numerous Norman knights. On the first day of the tournament, in a bout of individual jousting, a mysterious knight, identifying himself only as "Desdichado" (described in the book as Spanish, taken by the Saxons to mean Disinherited), defeats Bois-Guilbert. The masked knight declines to reveal himself despite Prince John's request, but is nevertheless declared the champion of the day and is permitted to choose the Queen of the Tournament. He bestows this honour upon Lady Rowena. On the second day, at a melee, Desdichado is the leader of one party, opposed by his former adversaries. Desdichado's side is soon hard-pressed and he himself beset by multiple foes until rescued by a knight nicknamed Le Noir Faineant ('the Black Sluggard'), who thereafter departs in secret. When forced to unmask himself to receive his coronet (the sign of championship), Desdichado is identified as Wilfred of Ivanhoe, returned from the Crusades. This causes much consternation to Prince John and his court who now fear the imminent return of King Richard. Ivanhoe is severely wounded in the competition yet his father does not move quickly to tend to him. Instead, Rebecca, a skilled healer, tends to him while they are lodged near the tournament and then convinces her father to take Ivanhoe with them to their home in York when he is fit for that trip. The conclusion of the tournament includes feats of archery by Locksley, such as splitting a willow reed with his arrow. Prince John's dinner for the local Saxons ends in insults. Capture and rescue In the forests between Ashby and York, Isaac, Rebecca and the wounded Ivanhoe are abandoned by their guards, who fear bandits and take all of Isaac's horses. Cedric, Athelstane and the Lady Rowena meet them and agree to travel together. The party is captured by de Bracy and his companions and taken to Torquilstone, the castle of Front-de-Boeuf. The swineherd Gurth and Wamba the jester manage to escape, and then encounter Locksley, who plans a rescue. The Black Knight, having taken refuge for the night in the hut of local friar, the Holy Clerk of Copmanhurst, volunteers his assistance on learning about the captives from Robin of Locksley. They then besiege the Castle of Torquilstone with Robin's own men, including the friar and assorted Saxon yeomen. Inside Torquilstone, de Bracy expresses his love for the Lady Rowena but is refused. Brian de Bois-Guilbert tries to seduce Rebecca and is rebuffed. Front-de-Boeuf tries to wring a hefty ransom from Isaac of York, but Isaac refuses to pay unless his daughter is freed. When the besiegers deliver a note to yield up the captives, their Norman captors demand a priest to administer the Final Sacrament to Cedric; whereupon Cedric's jester Wamba slips in disguised as a priest, and takes the place of Cedric, who escapes and brings important information to the besiegers on the strength of the garrison and its layout. The besiegers storm the castle. The castle is set aflame during the assault by Ulrica, the daughter of the original lord of the castle, Lord Torquilstone, as revenge for her father's death. Front-de-Boeuf is killed in the fire while de Bracy surrenders to the Black Knight, who identifies himself as King Richard and releases de Bracy. Bois-Guilbert escapes with Rebecca while Isaac is rescued by the Clerk of Copmanhurst. The Lady Rowena is saved by Cedric, while the still-wounded Ivanhoe is rescued from the burning castle by King Richard. In the fighting, Athelstane is wounded and presumed dead while attempting to rescue Rebecca, whom he mistakes for Rowena. Rebecca's trial and Ivanhoe's reconciliation Following the battle, Locksley plays host to King Richard. Word is conveyed by de Bracy to Prince John of the King's return and the fall of Torquilstone. In the meantime, Bois-Guilbert rushes with his captive to the nearest Templar Preceptory, where Lucas de Beaumanoir, the Grand Master of the Templars, takes umbrage at Bois-Guilbert's infatuation and subjects Rebecca to a trial for witchcraft. At Bois-Guilbert's secret request, she claims the right to trial by combat; and Bois-Guilbert, who had hoped for the position, is devastated when the Grand-Master orders him to fight against Rebecca's champion. Rebecca then writes to her father to procure a champion for her. Cedric organises Athelstane's funeral at Coningsburgh, in the midst of which the Black Knight arrives with a companion. Cedric, who had not been present at Locksley's carousal, is ill-disposed towards the knight upon learning his true identity; but Richard calms Cedric and reconciles him with his son. During this conversation, Athelstane emerges – not dead, but laid in his coffin alive by monks desirous of the funeral money. Over Cedric's renewed protests, Athelstane pledges his homage to the Norman King Richard and urges Cedric to marry Rowena to Ivanhoe, to which Cedric finally agrees. Soon after this reconciliation, Ivanhoe receives word from Isaac beseeching him to fight on Rebecca's behalf. Ivanhoe, riding day and night, arrives in time for the trial by combat; however, both horse and man are exhausted, with little chance of victory. The two knights make one charge at each other with lances, Bois-Guilbert appearing to have the advantage. However, Bois-Guilbert, a man trying to have it all without offering to marry Rebecca, dies of natural causes in the saddle before the combat can continue. Ivanhoe and Rowena marry and live a long and happy life together. Fearing further persecution, Rebecca and her father plan to quit England for Granada. Before leaving, Rebecca comes to Rowena shortly after the wedding to bid her a solemn farewell. Ivanhoe's military service ends with the death of King Richard five years later. Characters (principal characters in bold) Cedric the Saxon, of Rotherwood Wilfred of Ivanhoe, his son Rowena, his ward Athelstane, his kinsman Gurth, his swineherd Wamba, his jester Oswald, his cup-bearer Elgitha, Rowena's waiting-woman Albert Malvoisin, Preceptor of Templestowe Philip Malvoisin, his brother Hubert, Philip's forester The Prior of Aymer, Abbot of Jorvaulx Ambrose, a monk attending him Brian de Bois-Guilbert, a Templar Baldwin, his squire Isaac of York, a Jewish money-lender Rebecca, his daughter Nathan, a rabbi and physician King Richard ('the Black Knight') Prince John, his brother Locksley, alias Robin Hood, an outlaw Reginald Front-de-Bœuf Maurice de Bracy, a Free Companion (mercenary) Waldemar Fitzurse, Prince John's advisor - a fictional son of Reginald Fitzurse, a murderer of Archbishop Becket. Hugh de Grantmesnil Ralph de Vipont, a Hospitaller Friar Tuck, of Copmanhurst Ulrica, of Torquilstone, alias Urfried Lucas de Beaumanoir, grand-master of the Templars Conrade Mountfitchet, his attendant knight Higg, a peasant Kirjath Jairam of Leicester, a rich Jew Alan-a-Dale, a minstrel Chapter summary Dedicatory Epistle: An imaginary letter to the Rev. Dr Dryasdust from Laurence Templeton who has found the materials for the following tale mostly in the Anglo-Norman Wardour Manuscript. He wishes to provide an English counterpart to the preceding Waverley novels, in spite of various difficulties arising from the chronologically remote setting made necessary by the earlier progress of civilisation south of the Border. Volume One Ch. 1: Historical sketch. Gurth the swineherd and Wamba the jester discuss life under Norman rule. Ch. 2: Wamba and Gurth wilfully misdirect a group of horsemen headed by Prior Aymer and Brian de Bois-Guilbert seeking shelter at Cedric's Rotherwood. Aymer and Bois-Guilbert discuss the beauty of Cedric's ward Rowena and are redirected, this time correctly, by a palmer [Ivanhoe in disguise]. Ch. 3: Cedric anxiously awaits the return of Gurth and the pigs. Aymer and Bois-Guilbert arrive. Ch. 4: Bois-Guilbert admires Rowena as she enters for the evening feast. Ch. 5: During the feast: Isaac enters and is befriended by the palmer; Cedric laments the decay of the Saxon language; the palmer refutes Bois-Guilbert's assertion of Templar supremacy with an account of a tournament in Palestine, where Ivanhoe defeated him; the palmer and Rowena give a pledge for a return match; and Isaac is thunderstruck by Bois-Guilbert's denial of his assertion of poverty. Ch. 6: Next day the palmer tells Rowena that Ivanhoe will soon be home. He offers to protect Isaac from Bois-Guilbert, whom he has overheard giving instructions for his capture. On the road to Sheffield Isaac mentions a source of horse and armour of which he guesses the palmer has need. Ch. 7: As the audience for a tournament at Ashby assembles, Prince John amuses himself by making fun of Athelstane and Isaac. Ch. 8: After a series of Saxon defeats in the tournament the 'Disinherited Knight' [Ivanhoe] triumphs over Bois-Guilbert and the other Norman challengers. Ch. 9: The Disinherited Knight nominates Rowena as Queen of the Tournament. Ch. 10: The Disinherited Knight refuses to ransom Bois-Guilbert's armour, declaring that their business is not concluded. He instructs his attendant, Gurth in disguise, to convey money to Isaac to repay him for arranging the provision of his horse and armour. Gurth does so, but Rebecca secretly refunds the money. Ch. 11: Gurth is assailed by a band of outlaws, but they spare him on hearing his story and after he has defeated one of their number, a miller, at quarter-staves. Ch. 12: The Disinherited Knight's party triumph at the tournament, with the aid of a knight in black [Richard in disguise]; he is revealed as Ivanhoe and faints as a result of the wounds he has incurred. Ch. 13: John encourages De Bracy to court Rowena and receives a warning from France that Richard has escaped. Locksley [Robin Hood] triumphs in an archery contest. Ch. 14: At the tournament banquet Cedric continues to disown his son (who has been associating with the Normans) but drinks to the health of Richard, rather than John, as the noblest of that race. Volume Two Ch. 1 (15): De Bracy (disguised as a forester) tells Fitzurse of his plan to capture Rowena and then 'rescue' her in his own person. Ch. 2 (16): The Black Knight is entertained by a hermit [Friar Tuck] at Copmanhurst. Ch. 3 (17): The Black Knight and the hermit exchange songs. Ch. 4 (18): (Retrospect: Before going to the banquet Cedric learned that Ivanhoe had been removed by unknown carers; Gurth was recognised and captured by Cedric's cupbearer Oswald.) Cedric finds Athelstane unresponsive to his attempts to interest him in Rowena, who is herself only attracted by Ivanhoe. Ch. 5 (19): Rowena persuades Cedric to escort Isaac and Rebecca, who have been abandoned (along with a sick man [Ivanhoe] in their care) by their hired protectors. Wamba helps Gurth to escape again. De Bracy mounts his attack, during which Wamba escapes. He meets up with Gurth and they encounter Locksley who, after investigation, advises against a counter-attack, the captives not being in immediate danger. Ch. 6 (20): Locksley sends two of his men to watch De Bracy. At Copmanhurst he meets the Black Knight who agrees to join in the rescue. Ch. 7 (21): De Bracy tells Bois-Guilbert he has decided to abandon his 'rescue' plan, mistrusting his companion though the Templar says it is Rebecca he is interested in. On arrival at Torquilstone castle Cedric laments its decline. Ch. 8 (22): Under threat of torture Isaac agrees to pay Front-de-Bœuf a thousand pounds, but only if Rebecca is released. Ch. 9 (23): De Bracy uses Ivanhoe's danger from Front-de-Bœuf to put pressure on Rowena, but he is moved by her resulting distress. The narrator refers the reader to historical instances of baronial oppression in medieval England. Ch. 10 (24): A hag Urfried [Ulrica] warns Rebecca of her forthcoming fate. Rebecca impresses Bois-Guilbert by her spirited resistance to his advances. Ch. 11 (25): Front-de-Bœuf rejects a written challenge from Gurth and Wamba. Wamba offers to spy out the castle posing as a confessor. Ch. 12 (26): Entering the castle, Wamba exchanges clothes with Cedric who encounters Rebecca and Urfried. Ch. 13 (27): Urfried recognises Cedric as a Saxon and, revealing herself as Ulrica, tells her story which involves Front-de-Bœuf murdering his father, who had killed her father and seven brothers when taking the castle, and had become her detested lover. She says she will give a signal when the time is ripe for storming the castle. Front-de-Bœuf sends the presumed friar with a message to summon reinforcements. Athelstane defies him, claiming that Rowena is his fiancée. The monk Ambrose arrives seeking help for Aymer who has been captured by Locksley's men. Ch. 14 (28): (Retrospective chapter detailing Rebecca's care for Ivanhoe from the tournament to the assault on Torquilstone.) Ch. 15 (29): Rebecca describes the assault on Torquilstone to the wounded Ivanhoe, disagreeing with his exalted view of chivalry. Ch. 16 (30): Front-de-Bœuf being mortally wounded, Bois-Guilbert and De Bracy discuss how best to repel the besiegers. Ulrica sets fire to the castle and exults over Front-de-Bœuf who perishes in the flames. Volume Three Ch. 1 (31): (The chapter opens with a retrospective account of the attackers' plans and the taking of the barbican.) The Black Knight defeats De Bracy, making himself known to him as Richard, and rescues Ivanhoe. Bois-Guilbert rescues Rebecca, striking down Athelstane who thinks she is Rowena. Ulrica perishes in the flames after singing a wild pagan hymn. Ch. 2 (32): Locksley supervises the orderly division of the spoil. Friar Tuck brings Isaac whom he has made captive, and engages in good-natured buffeting with the Black Knight. Ch. 3 (33): Locksley arranges ransom terms for Isaac and Aymer. Ch. 4 (34): De Bracy informs John that Richard is in England. Together with Fitzurse he threatens to desert John, but the prince responds cunningly. Ch. 5 (35): At York, Nathan is horrified by Isaac's determination to seek Rebecca at Templestowe. At the priory the Grand-Master Beaumanoir tells Conrade Mountfitchet that he intends to take a hard line with Templar irregularities. Arriving, Isaac shows him a letter from Aymer to Bois-Guilbert referring to Rebecca whom Beaumanoir regards as a witch. Ch. 6 (36): Beaumanoir tells Preceptor Albert Malvoisin of his outrage at Rebecca's presence in the preceptory. Albert insists to Bois-Guilbert that her trial for sorcery must proceed. Mountfichet says he will seek evidence against her. Ch. 7 (37): Rebecca is tried and found guilty. At Bois-Guilbert's secret prompting she demands that a champion defend her in trial by combat. Ch. 8 (38): Rebecca's demand is accepted, Bois-Guilbert being appointed champion for the prosecution. Bearing a message to her father, the peasant Higg meets him and Nathan on their way to the preceptory, and Isaac goes in search of Ivanhoe. Ch. 9 (39): Rebecca rejects Bois-Guilbert's offer to fail to appear for the combat in return for her love. Albert persuades him that it is in his interest to appear. Ch. 10 (40): The Black Knight leaves Ivanhoe to travel to Coningsburgh castle for Athelstane's funeral, and Ivanhoe follows him the next day. The Black Knight is rescued by Locksley from an attack carried out by Fitzurse on John's orders, and reveals his identity as Richard to his companions, prompting Locksley to identify himself as Robin Hood. Ch. 11 (41): Richard talks to Ivanhoe and dines with the outlaws before Robin arranges a false alarm to put an end to the delay. The party arrive at Coningsburgh. Ch. 12 (42): Richard procures Ivanhoe's pardon from his father. Athelstane appears, not dead, giving his allegiance to Richard and surrendering Rowena to Ivanhoe. Ch. 13 (43): Ivanhoe appears as Rebecca's champion, and as they charge Bois-Guilbert dies the victim of his contending passions. Ch. 14 (44): Beaumanoir and his Templars leave Richard defiantly. Cedric agrees to the marriage of Ivanhoe and Rowena. Rebecca takes her leave of Rowena before her father and she quit England to make a new life under the tolerant King of Grenada. Style Critics of the novel have
|
the chronologically remote setting made necessary by the earlier progress of civilisation south of the Border. Volume One Ch. 1: Historical sketch. Gurth the swineherd and Wamba the jester discuss life under Norman rule. Ch. 2: Wamba and Gurth wilfully misdirect a group of horsemen headed by Prior Aymer and Brian de Bois-Guilbert seeking shelter at Cedric's Rotherwood. Aymer and Bois-Guilbert discuss the beauty of Cedric's ward Rowena and are redirected, this time correctly, by a palmer [Ivanhoe in disguise]. Ch. 3: Cedric anxiously awaits the return of Gurth and the pigs. Aymer and Bois-Guilbert arrive. Ch. 4: Bois-Guilbert admires Rowena as she enters for the evening feast. Ch. 5: During the feast: Isaac enters and is befriended by the palmer; Cedric laments the decay of the Saxon language; the palmer refutes Bois-Guilbert's assertion of Templar supremacy with an account of a tournament in Palestine, where Ivanhoe defeated him; the palmer and Rowena give a pledge for a return match; and Isaac is thunderstruck by Bois-Guilbert's denial of his assertion of poverty. Ch. 6: Next day the palmer tells Rowena that Ivanhoe will soon be home. He offers to protect Isaac from Bois-Guilbert, whom he has overheard giving instructions for his capture. On the road to Sheffield Isaac mentions a source of horse and armour of which he guesses the palmer has need. Ch. 7: As the audience for a tournament at Ashby assembles, Prince John amuses himself by making fun of Athelstane and Isaac. Ch. 8: After a series of Saxon defeats in the tournament the 'Disinherited Knight' [Ivanhoe] triumphs over Bois-Guilbert and the other Norman challengers. Ch. 9: The Disinherited Knight nominates Rowena as Queen of the Tournament. Ch. 10: The Disinherited Knight refuses to ransom Bois-Guilbert's armour, declaring that their business is not concluded. He instructs his attendant, Gurth in disguise, to convey money to Isaac to repay him for arranging the provision of his horse and armour. Gurth does so, but Rebecca secretly refunds the money. Ch. 11: Gurth is assailed by a band of outlaws, but they spare him on hearing his story and after he has defeated one of their number, a miller, at quarter-staves. Ch. 12: The Disinherited Knight's party triumph at the tournament, with the aid of a knight in black [Richard in disguise]; he is revealed as Ivanhoe and faints as a result of the wounds he has incurred. Ch. 13: John encourages De Bracy to court Rowena and receives a warning from France that Richard has escaped. Locksley [Robin Hood] triumphs in an archery contest. Ch. 14: At the tournament banquet Cedric continues to disown his son (who has been associating with the Normans) but drinks to the health of Richard, rather than John, as the noblest of that race. Volume Two Ch. 1 (15): De Bracy (disguised as a forester) tells Fitzurse of his plan to capture Rowena and then 'rescue' her in his own person. Ch. 2 (16): The Black Knight is entertained by a hermit [Friar Tuck] at Copmanhurst. Ch. 3 (17): The Black Knight and the hermit exchange songs. Ch. 4 (18): (Retrospect: Before going to the banquet Cedric learned that Ivanhoe had been removed by unknown carers; Gurth was recognised and captured by Cedric's cupbearer Oswald.) Cedric finds Athelstane unresponsive to his attempts to interest him in Rowena, who is herself only attracted by Ivanhoe. Ch. 5 (19): Rowena persuades Cedric to escort Isaac and Rebecca, who have been abandoned (along with a sick man [Ivanhoe] in their care) by their hired protectors. Wamba helps Gurth to escape again. De Bracy mounts his attack, during which Wamba escapes. He meets up with Gurth and they encounter Locksley who, after investigation, advises against a counter-attack, the captives not being in immediate danger. Ch. 6 (20): Locksley sends two of his men to watch De Bracy. At Copmanhurst he meets the Black Knight who agrees to join in the rescue. Ch. 7 (21): De Bracy tells Bois-Guilbert he has decided to abandon his 'rescue' plan, mistrusting his companion though the Templar says it is Rebecca he is interested in. On arrival at Torquilstone castle Cedric laments its decline. Ch. 8 (22): Under threat of torture Isaac agrees to pay Front-de-Bœuf a thousand pounds, but only if Rebecca is released. Ch. 9 (23): De Bracy uses Ivanhoe's danger from Front-de-Bœuf to put pressure on Rowena, but he is moved by her resulting distress. The narrator refers the reader to historical instances of baronial oppression in medieval England. Ch. 10 (24): A hag Urfried [Ulrica] warns Rebecca of her forthcoming fate. Rebecca impresses Bois-Guilbert by her spirited resistance to his advances. Ch. 11 (25): Front-de-Bœuf rejects a written challenge from Gurth and Wamba. Wamba offers to spy out the castle posing as a confessor. Ch. 12 (26): Entering the castle, Wamba exchanges clothes with Cedric who encounters Rebecca and Urfried. Ch. 13 (27): Urfried recognises Cedric as a Saxon and, revealing herself as Ulrica, tells her story which involves Front-de-Bœuf murdering his father, who had killed her father and seven brothers when taking the castle, and had become her detested lover. She says she will give a signal when the time is ripe for storming the castle. Front-de-Bœuf sends the presumed friar with a message to summon reinforcements. Athelstane defies him, claiming that Rowena is his fiancée. The monk Ambrose arrives seeking help for Aymer who has been captured by Locksley's men. Ch. 14 (28): (Retrospective chapter detailing Rebecca's care for Ivanhoe from the tournament to the assault on Torquilstone.) Ch. 15 (29): Rebecca describes the assault on Torquilstone to the wounded Ivanhoe, disagreeing with his exalted view of chivalry. Ch. 16 (30): Front-de-Bœuf being mortally wounded, Bois-Guilbert and De Bracy discuss how best to repel the besiegers. Ulrica sets fire to the castle and exults over Front-de-Bœuf who perishes in the flames. Volume Three Ch. 1 (31): (The chapter opens with a retrospective account of the attackers' plans and the taking of the barbican.) The Black Knight defeats De Bracy, making himself known to him as Richard, and rescues Ivanhoe. Bois-Guilbert rescues Rebecca, striking down Athelstane who thinks she is Rowena. Ulrica perishes in the flames after singing a wild pagan hymn. Ch. 2 (32): Locksley supervises the orderly division of the spoil. Friar Tuck brings Isaac whom he has made captive, and engages in good-natured buffeting with the Black Knight. Ch. 3 (33): Locksley arranges ransom terms for Isaac and Aymer. Ch. 4 (34): De Bracy informs John that Richard is in England. Together with Fitzurse he threatens to desert John, but the prince responds cunningly. Ch. 5 (35): At York, Nathan is horrified by Isaac's determination to seek Rebecca at Templestowe. At the priory the Grand-Master Beaumanoir tells Conrade Mountfitchet that he intends to take a hard line with Templar irregularities. Arriving, Isaac shows him a letter from Aymer to Bois-Guilbert referring to Rebecca whom Beaumanoir regards as a witch. Ch. 6 (36): Beaumanoir tells Preceptor Albert Malvoisin of his outrage at Rebecca's presence in the preceptory. Albert insists to Bois-Guilbert that her trial for sorcery must proceed. Mountfichet says he will seek evidence against her. Ch. 7 (37): Rebecca is tried and found guilty. At Bois-Guilbert's secret prompting she demands that a champion defend her in trial by combat. Ch. 8 (38): Rebecca's demand is accepted, Bois-Guilbert being appointed champion for the prosecution. Bearing a message to her father, the peasant Higg meets him and Nathan on their way to the preceptory, and Isaac goes in search of Ivanhoe. Ch. 9 (39): Rebecca rejects Bois-Guilbert's offer to fail to appear for the combat in return for her love. Albert persuades him that it is in his interest to appear. Ch. 10 (40): The Black Knight leaves Ivanhoe to travel to Coningsburgh castle for Athelstane's funeral, and Ivanhoe follows him the next day. The Black Knight is rescued by Locksley from an attack carried out by Fitzurse on John's orders, and reveals his identity as Richard to his companions, prompting Locksley to identify himself as Robin Hood. Ch. 11 (41): Richard talks to Ivanhoe and dines with the outlaws before Robin arranges a false alarm to put an end to the delay. The party arrive at Coningsburgh. Ch. 12 (42): Richard procures Ivanhoe's pardon from his father. Athelstane appears, not dead, giving his allegiance to Richard and surrendering Rowena to Ivanhoe. Ch. 13 (43): Ivanhoe appears as Rebecca's champion, and as they charge Bois-Guilbert dies the victim of his contending passions. Ch. 14 (44): Beaumanoir and his Templars leave Richard defiantly. Cedric agrees to the marriage of Ivanhoe and Rowena. Rebecca takes her leave of Rowena before her father and she quit England to make a new life under the tolerant King of Grenada. Style Critics of the novel have treated it as a romance intended mainly to entertain boys. Ivanhoe maintains many of the elements of the Romance genre, including the quest, a chivalric setting, and the overthrowing of a corrupt social order to bring on a time of happiness. Other critics assert that the novel creates a realistic and vibrant story, idealising neither the past nor its main character. Themes Scott treats themes similar to those of some of his earlier novels, like Rob Roy and The Heart of Midlothian, examining the conflict between heroic ideals and modern society. In the latter novels, industrial society becomes the centre of this conflict as the backward Scottish nationalists and the "advanced" English have to arise from chaos to create unity. Similarly, the Normans in Ivanhoe, who represent a more sophisticated culture, and the Saxons, who are poor, disenfranchised, and resentful of Norman rule, band together and begin to mould themselves into one people. The conflict between the Saxons and Normans focuses on the losses both groups must experience before they can be reconciled and thus forge a united England. The particular loss is in the extremes of their own cultural values, which must be disavowed in order for the society to function. For the Saxons, this value is the final admission of the hopelessness of the Saxon cause. The Normans must learn to overcome the materialism and violence in their own codes of chivalry. Ivanhoe and Richard represent the hope of reconciliation for a unified future. Ivanhoe, though of a more noble lineage than some of the other characters, represents a middling individual in the medieval class system who is not exceptionally outstanding in his abilities, as is expected of other quasi-historical fictional characters, such as the Greek heroes. Critic György Lukács points to middling main characters like Ivanhoe in Walter Scott's other novels as one of the primary reasons Scott's historical novels depart from previous historical works, and better explore social and cultural history. Allusions to real history and geography The location of the novel is centred upon southern Yorkshire, north-west Leicestershire and northern Nottinghamshire in England. Castles mentioned within the story include Ashby de la Zouch Castle (now a ruin in the care of English Heritage), York (though the mention of Clifford's Tower, likewise an extant English Heritage property, is anachronistic, it not having been called that until later after various rebuilds) and 'Coningsburgh', which is based upon Conisbrough Castle, in the ancient town of Conisbrough near Doncaster (the castle also being a popular English Heritage site). Reference is made within the story to York Minster, where the climactic wedding takes place, and to the Bishop of Sheffield, although the Diocese of Sheffield did not exist at either the time of the novel or the time Scott wrote the novel and was not founded until 1914. Such references suggest that Robin Hood lived or travelled in the region. Conisbrough is so dedicated to the story of Ivanhoe that many of its streets, schools, and public buildings are named after characters from the book. Sir Walter Scott took the title of his novel, the name of its hero, from the village of Ivinghoe. "The name of Ivanhoe," he says in his 1830 Introduction to the Magnum edition, "was suggested by an old rhyme. Tring, Wing, and Ivanhoe, For striking of a blow, Hampden did forego, And glad he could escape so." Ivanhoe is an alternate name for Ivinghoe first recorded in 1665. Older rural people in the Ivinghoe area most probably pronounced the name the same as Ivanhoe, according to Prof. Paul Kerswill of the University of York, a Fellow of the British Academy (FBA). It is most probable Scott had direct knowledge of Ivinghoe and did some research before using it as the title for his novel, as he did for the other places mentioned in the novel. The presence of Sir Walter Scott was recorded in Berkhamsted that is just 8 miles away from Ivinghoe. In the novel he speaks also of "the rich fief of Ivanhoe". The Manor of Ivanhoe is listed in the largest 20% of settlements recorded in Domesday. Lasting influence on the Robin Hood legend The modern conception of Robin Hood as a cheerful, decent, patriotic rebel owes much to Ivanhoe. "Locksley" becomes Robin Hood's title in the Scott novel, and it has been used ever since to refer to the legendary outlaw. Scott appears to have taken the name from an anonymous manuscript – written in 1600 – that employs "Locksley" as an epithet for Robin Hood. Owing to Scott's decision to make use of the manuscript, Robin Hood from Locksley has been transformed for all time into "Robin of Locksley", alias Robin Hood. (There is, incidentally, a village called Loxley in Yorkshire.) Scott makes the 12th-century's Saxon-Norman conflict a major theme in his novel. The original medieval stories about Robin Hood did not mention any conflict between Saxons and Normans; it was Scott who introduced this theme into the legend. The characters in Ivanhoe refer to Prince John and King Richard I as "Normans"; contemporary medieval documents from this period do not refer to either of these two rulers as Normans. Recent re-tellings of the story retain Scott's emphasis on the Norman-Saxon conflict. Scott also shunned the late 16th-century depiction of Robin as a dispossessed nobleman (the Earl of Huntingdon). This, however, has not prevented Scott from making an important contribution to the noble-hero strand of the legend, too, because some subsequent motion picture treatments of Robin Hood's adventures give Robin traits that are characteristic of Ivanhoe as well. The most notable Robin Hood films are the lavish Douglas Fairbanks 1922 silent film, the 1938 triple Academy Award-winning Adventures of Robin Hood with Errol Flynn as Robin (which contemporary reviewer Frank Nugent links specifically with Ivanhoe), and the 1991 box-office success Robin Hood: Prince of Thieves with Kevin Costner). There is also the Mel Brooks spoof Robin Hood: Men in Tights. In most versions of Robin Hood, both Ivanhoe and Robin, for instance, are returning Crusaders. They have quarrelled with their respective fathers, they are proud to be Saxons, they display a highly evolved sense of justice, they support the rightful king even though he is of Norman-French ancestry, they are adept with weapons, and they each fall in love with a "fair maid" (Rowena and Marian, respectively). This particular time-frame was popularised by Scott. He borrowed it from the writings of the 16th-century chronicler John Mair or a 17th-century ballad presumably to make the plot of his novel more gripping. Medieval balladeers had generally placed Robin about two centuries later in the reign of Edward I, II or III. Robin's familiar feat of splitting his competitor's arrow in an archery contest appears for the first time in Ivanhoe. Historical accuracy The general political events depicted in the novel are relatively accurate; the novel tells of the period just after King Richard's imprisonment in Austria following the Crusade and of his return to England after a ransom is paid. Yet the story is also heavily fictionalised. Scott himself acknowledged that he had taken liberties with history in his "Dedicatory Epistle" to Ivanhoe. Modern readers are cautioned to understand that Scott's aim was to create a compelling novel set in a historical period, not to provide a book of history. There has been criticism of Scott's portrayal of the bitter extent of the "enmity of Saxon and Norman, represented as persisting in the days of
|
represent the isoelectric point is pH(I). However, pI is also used. For brevity, this article uses pI. The net charge on the molecule is affected by pH of its surrounding environment and can become more positively or negatively charged due to the gain or loss, respectively, of protons (H+). Surfaces naturally charge to form a double layer. In the common case when the surface charge-determining ions are H+/HO−, the net surface charge is affected by the pH of the liquid in which the solid is submerged. The pI value can affect the solubility of a molecule at a given pH. Such molecules have minimum solubility in water or salt solutions at the pH that corresponds to their pI and often precipitate out of solution. Biological amphoteric molecules such as proteins contain both acidic and basic functional groups. Amino acids that make up proteins may be positive, negative, neutral, or polar in nature, and together give a protein its overall charge. At a pH below their pI, proteins carry a net positive charge; above their pI they carry a net negative charge. Proteins can, thus, be separated by net charge in a polyacrylamide gel using either preparative gel electrophoresis, which uses a constant pH to separate proteins or isoelectric focusing, which uses a pH gradient to separate proteins. Isoelectric focusing is also the first step in 2-D gel polyacrylamide gel electrophoresis. In biomolecules, proteins can be separated by ion exchange chromatography. Biological proteins are made up of zwitterionic amino acid compounds; the net charge of these proteins can be positive or negative depending on the pH of the environment. The specific pI of the target protein can be used to model the process around and the compound can then be purified from the rest of the mixture. Buffers of various pH can be used for this purification process to change the pH of the environment. When a mixture containing a target protein is loaded into an ion exchanger, the stationary matrix can be either positively-charged (for mobile anions) or negatively-charged (for mobile cations). At low pH values, the net charge of most proteins in the mixture is positive - in cation exchangers, these positively-charged proteins bind to the negatively-charged matrix. At high pH values, the net charge of most proteins is negative, where they bind to the positively-charged matrix in anion exchangers. When the environment is at a pH value equal to the protein's pI, the net charge is zero, and the protein is not bound to any exchanger, and therefore, can be eluted out. Calculating pI values For an amino acid with only one amine and one carboxyl group, the pI can be calculated from the mean of the pKas of this molecule. The pH of an electrophoretic gel is determined by the buffer used for that gel. If the pH of the buffer is above the pI of the protein being run, the protein will migrate to the positive pole (negative charge is attracted to a positive pole). If the pH of the buffer is below the pI of the protein being run, the protein will migrate to the negative pole of the gel (positive charge is attracted to the negative pole). If the protein is run with a buffer pH that is equal to the pI, it will not migrate at all. This is also true for individual amino acids. Examples In the two examples (on the right) the isoelectric point is shown by the green vertical line. In
|
is also used. For brevity, this article uses pI. The net charge on the molecule is affected by pH of its surrounding environment and can become more positively or negatively charged due to the gain or loss, respectively, of protons (H+). Surfaces naturally charge to form a double layer. In the common case when the surface charge-determining ions are H+/HO−, the net surface charge is affected by the pH of the liquid in which the solid is submerged. The pI value can affect the solubility of a molecule at a given pH. Such molecules have minimum solubility in water or salt solutions at the pH that corresponds to their pI and often precipitate out of solution. Biological amphoteric molecules such as proteins contain both acidic and basic functional groups. Amino acids that make up proteins may be positive, negative, neutral, or polar in nature, and together give a protein its overall charge. At a pH below their pI, proteins carry a net positive charge; above their pI they carry a net negative charge. Proteins can, thus, be separated by net charge in a polyacrylamide gel using either preparative gel electrophoresis, which uses a constant pH to separate proteins or isoelectric focusing, which uses a pH gradient to separate proteins. Isoelectric focusing is also the first step in 2-D gel polyacrylamide gel electrophoresis. In biomolecules, proteins can be separated by ion exchange chromatography. Biological proteins are made up of zwitterionic amino acid compounds; the net charge of these proteins can be positive or negative depending on the pH of the environment. The specific pI of the target protein can be used to model the process around and the compound can then be purified from the rest of the mixture. Buffers of various pH can be used for this purification process to change the pH of the environment. When a mixture containing a target protein is loaded into an ion exchanger, the stationary matrix can be either positively-charged (for mobile anions) or negatively-charged (for mobile cations). At low pH values, the net charge of most proteins in the mixture is positive - in cation exchangers, these positively-charged proteins bind to the negatively-charged matrix. At high pH values, the net charge of most proteins is negative, where they bind to the positively-charged matrix in anion exchangers. When the environment is at a pH value equal to the protein's pI, the net charge is zero, and the protein is not bound to any exchanger, and therefore, can be eluted out. Calculating pI values For an amino acid with only one amine and one carboxyl group, the pI can be calculated from the mean of the pKas of this molecule. The pH of an electrophoretic gel is determined by the buffer used for that gel. If the pH of the buffer is above the pI of the protein being run, the protein will migrate to the positive pole (negative charge is attracted to a positive pole). If the pH of the buffer is below the pI of the protein being run, the protein will migrate to the negative pole of the gel (positive charge is attracted to the negative pole). If the protein is run
|
member postal services are obliged to exchange an IRC for postage, but are not obliged to sell them. The purpose of the IRC is to allow a person to send someone in another country a letter, along with the cost of postage for a reply. If the addressee is within the same country, there is no need for an IRC because a self-addressed stamped envelope (SASE) or return postcard will suffice; but if the addressee is in another country an IRC removes the necessity of acquiring foreign postage or sending appropriate currency. Description International reply coupons (in French, Coupons-Reponse Internationaux) are printed in blue ink on paper that has the letters "UPU" in large characters in the watermark. The front of each coupon is printed in French. The reverse side of the coupon, which has text relating to its use, is printed in German, English, Arabic, Chinese, Spanish, and Russian. Under Universal Postal Union regulations, participating member countries are not required to place a control stamp or postmark on the international reply coupons that they sell. Therefore, some foreign issue reply coupons that are tendered for redemption may bear the name of the issuing country (generally in French) rather than the optional control stamp or postmark. The Nairobi Model was an international reply coupon printed by the Universal Postal Union which is approximately 3.75 inches by 6 inches and had an expiration date of 31 December 2013. This model was designed by Rob Van Goor, a graphic artist from the Luxembourg Post. It was selected from among 10 designs presented by Universal Postal Union member countries. Van Goor interpreted the theme of the contest – "The Postage Stamp: A Vehicle for Exchange" – by depicting the world being cradled by a hand and the perforated outline of a postage stamp. The Doha Model is named for the 25th UPU congress held in Doha, Qatar, in 2012. The Doha model, designed by Czech artist and graphic designer Michal Sindelar, shows cupped hands catching a stream of water, to celebrate the theme of Water for Life. It expires after 31 December 2017. The Istanbul Model was designed by graphic artist Nguyen Du (Viet Nam)and features a pair of hands and a dove against an Arctic backdrop representing sustainable development in the postal sector. Ten countries participated in the competition which was held 7 October 2016, during the UPU congress in Istanbul, Turkey. It expires after 31 December 2021. The Abidjan Model was designed by graphic artist Valeryia Tsimakhavets (Belarus)and features a Tree with New Leaves and Birds which represent the Eco-System and Climate Protection. Congress held in Abidjan, (Cote d'Ivorie) - Ivory Coast on 9th to 27th August 2021. It expires after 31 December 2025. History The IRC was introduced in 1906 at a Universal Postal Union congress in Rome. At the time an IRC could be exchanged for a single-rate, ordinary postage stamp for surface delivery to a foreign country, as this was before the introduction of airmail services. An IRC is exchangeable in a UPU member country for the minimum postage of a priority or unregistered airmail letter to a foreign country. The current IRC, which features the theme "the Post and sustainable development", was designed by Vietnamese artist Nguyen Du for 2017-2021 and was adopted in Istanbul in 2016, it is known also as the "Istanbul model" for this reason. The previous design, "Water for Life" by Czech artist and graphic designer Michal Sindelar, was issued in 2013 and was valid until 31 December 2017.
|
for postage, but are not obliged to sell them. The purpose of the IRC is to allow a person to send someone in another country a letter, along with the cost of postage for a reply. If the addressee is within the same country, there is no need for an IRC because a self-addressed stamped envelope (SASE) or return postcard will suffice; but if the addressee is in another country an IRC removes the necessity of acquiring foreign postage or sending appropriate currency. Description International reply coupons (in French, Coupons-Reponse Internationaux) are printed in blue ink on paper that has the letters "UPU" in large characters in the watermark. The front of each coupon is printed in French. The reverse side of the coupon, which has text relating to its use, is printed in German, English, Arabic, Chinese, Spanish, and Russian. Under Universal Postal Union regulations, participating member countries are not required to place a control stamp or postmark on the international reply coupons that they sell. Therefore, some foreign issue reply coupons that are tendered for redemption may bear the name of the issuing country (generally in French) rather than the optional control stamp or postmark. The Nairobi Model was an international reply coupon printed by the Universal Postal Union which is approximately 3.75 inches by 6 inches and had an expiration date of 31 December 2013. This model was designed by Rob Van Goor, a graphic artist from the Luxembourg Post. It was selected from among 10 designs presented by Universal Postal Union member countries. Van Goor interpreted the theme of the contest – "The Postage Stamp: A Vehicle for Exchange" – by depicting the world being cradled by a hand and the perforated outline of a postage stamp. The Doha Model is named for the 25th UPU congress held in Doha, Qatar, in 2012. The Doha model, designed by Czech artist and graphic designer Michal Sindelar, shows cupped hands catching a stream of water, to celebrate the theme of Water for Life. It expires after 31 December 2017. The Istanbul Model was designed by graphic artist Nguyen Du (Viet Nam)and features a pair of hands and a dove against an Arctic backdrop representing sustainable development in the postal sector. Ten countries participated in the competition which was held 7 October 2016, during the UPU congress in Istanbul, Turkey. It expires after 31 December 2021. The Abidjan Model was designed by graphic artist Valeryia Tsimakhavets (Belarus)and features a Tree with New Leaves and Birds which represent the Eco-System
|
1969. During this period, the 18-year-old Bonewits was also recruited by the Church of Satan, but left due to political and philosophical conflicts with Anton LaVey. During his stint in the Church of Satan, Bonewits appeared in some scenes of the 1970 documentary Satanis: The Devil's Mass. Bonewits, in his article "My Satanic Adventure", asserts that the rituals in Satanis were staged for the movie at the behest of the filmmakers and were not authentic ceremonies. 1970s: author and editor His first book, Real Magic, was published in 1972. Between 1973 and 1975 Bonewits was employed as the editor of Gnostica magazine in Minnesota (published by Llewellyn Publications). He established an offshoot group of the Reformed Druids of North America (RDNA) called the Schismatic Druids of North America, and helped create a group called the Hasidic Druids of North America (despite, in his words, his "lifelong status as a gentile"). He also founded the short-lived Aquarian Anti-Defamation League (AADL), an early Pagan civil rights group. In 1976, Bonewits moved back to Berkeley and rejoined his original grove there, now part of the New Reformed Druids of North America (NRDNA). He was later elected Archdruid of the Berkeley Grove. 1980s: founding of Ár nDraíocht Féin Throughout his life Bonewits had varying degrees of involvement with occult groups including Gardnerian Wicca and the New Reformed Orthodox Order of the Golden Dawn (a Wiccan organization not to be confused with the Hermetic Order of the Golden Dawn). Bonewits was a regular presenter at Neopagan conferences and festivals all over the US, as well as attending gaming conventions in the Bay Area. He promoted his book Authentic Thaumaturgy to gamers as a way of organizing Dungeons and Dragons games and to give a background to games of Magic: the Gathering. In 1983, Bonewits founded Ár nDraíocht Féin (also known as "A Druid Fellowship" or ADF), which was incorporated in 1990 in the state of Delaware as a U.S. 501(c)3 non-profit organization. Although illness curtailed many of his activities and travels for a time, he remained Archdruid of ADF until 1996. In that year, he resigned from the position of Archdruid but retained the lifelong title of ADF Archdruid Emeritus. Musician and activist A songwriter, singer, and recording artist, he produced two CDs of pagan music and numerous recorded lectures and panel discussions, produced and distributed by the Association for Consciousness Exploration. He lived in Rockland County, New York, and was a member of the Covenant of Unitarian Universalist Pagans (CUUPS). Bonewits encouraged charity programs to help Neopagan seniors, and in January 2006 was the keynote speaker at the Conference On Current Pagan Studies at the Claremont Graduate University in Claremont, CA. Personal life Bonewits was married five times. He was married to Rusty Elliot from 1973 to 1976. His second
|
of his publishing project Library of the Occult. Bonewits also coined much of the modern terminology used to articulate the themes and issues that affect the North American Neopagan community. Pioneered the modern usage of the terms "thealogy", "Paleo-Paganism", "Meso-Paganism", and numerous other retronyms. Possibly coined the term "Pagan Reconstructionism", though the communities in question would later diverge from his initial meaning. Founded Ar nDraiocht Fein, which was incorporated in 1990 in the state of Delaware as a U.S. 501(c)3 non-profit organization. Developed the Advanced Bonewits Cult Danger Evaluation Frame (ABCDEF). Coined the phrase "Never Again the Burning". Critiqued the Burning Times / Old Religion Murray thesis (in Bonewits's Essential Guide to Witchcraft and Wicca). In his book Real Magic (1971), Bonewits proposed his hypothesis on the Laws of Magic, which were then elaborated in his RPG supplement Authentic Thaumaturgy. The book makes it clear it is an adaptation of the ideas from Real Magic to gaming with the Laws presented being abbreviated from those in Real Magic. Bibliography Real Magic: An Introductory Treatise on the Basic Principles of Yellow Magic. (1972, 1979, 1989) Weiser Books The Druid Chronicles (Evolved). (1976 Drunemeton Press, 2005 Drynemetum Press) (With Selene Kumin Vega, Rusty Elliot, and Arlynde d'Loughlan) Authentic Thaumaturgy. (With others) (1978 Chaosium, 1998 Steve Jackson Games) Rites of Worship: A Neopagan Approach. (2003) Earth Religions Press OP Witchcraft: A Concise Guide or Which Witch Is Which?. (2003) Earth Religions Press The Pagan Man: Priests, Warriors, Hunters, and Drummers. (2005) Citadel , Bonewits's Essential Guide to Witchcraft and Wicca. (2006) Citadel , Bonewits's Essential Guide to Druidism. (2006) Citadel , Real Energy: Systems, Spirits, And Substances to Heal, Change, And Grow. (2007) New Leaf , . Co-authored with Phaedra Bonewits. Neopagan Rites: A Guide to Creating Public Rituals that Work. (2007) Llewellyn , Discography Music Be Pagan Once Again! – Isaac Bonewits & Friends (including Ian Corrigan, Victoria Ganger, and Todd Alan) (CD) (ACE/ADF) Avalon is Rising! – Real Magic (CD)(ACE/ADF) Spoken word The Structure of Craft Ritual (ACE) A Magician Prepares (ACE) Programming Magical Ritual: Top-Down Liturgical Design (ACE) Druidism: Ancient & Modern (ACE) How Does Magic Work? (ACE) Rituals That Work (ACE) Sexual Magic & Magical Sex (with Deborah Lipp) (ACE) Making Fun of Religion (with Deborah Lipp) (ACE) Panel discussions The Magickal Movement: Present & Future (with Margot Adler, Selena Fox, and Robert Anton Wilson) (ACE) Magick Changing the World, the World Changing Magick (with AmyLee, Selena Fox, Jeff Rosenbaum and Robert Anton Wilson) (ACE) References Further reading External links Neopagan Net (formerly "Isaac Bonewits' Homepage") The laws A Reformed Druid Anthology includes The Druid Chronicles (Evolved) "An Open Letter to Selena Fox" Advanced Bonewits Cult Danger Evaluation Frame 1949 births 2010 deaths American occult writers American Wiccans Writers from California Writers from Michigan Neo-druids Founders of Modern Pagan movements Writers from New York (state) Cultural anthropologists Deaths from colorectal cancer Former Roman Catholics Deaths from cancer in New York (state) People from
|
to be supplied by external hardware in order to invoke a corresponding interrupt service routine, but are also often employed as fast system calls. The instruction that executes slowest is , which is used for exchanging the register pair HL with the value stored at the address indicated by the stack pointer. 8-bit instructions All 8-bit operations with two operands can only be performed on the 8-bit accumulator (the A register). The other operand can be either an immediate value, another 8-bit register, or a memory byte addressed by the 16-bit register pair HL. Increments and decrements can be performed on any 8 bit register or an HL-addressed memory byte. Direct copying is supported between any two 8-bit registers and between any 8-bit register and an HL-addressed memory byte. Due to the regular encoding of the instruction (using a quarter of available opcode space), there are redundant codes to copy a register into itself (, for instance), which are of little use, except for delays. However, the systematic opcode for is instead used to encode the halt () instruction, halting execution until an external reset or interrupt occurs. 16-bit operations Although the 8080 is generally an 8-bit processor, it has limited abilities to perform 16-bit operations. Any of the three 16-bit register pairs (BC, DE, or HL, referred to as B, D, H in Intel documents) or SP can be loaded with an immediate 16-bit value (using ), incremented or decremented (using and ), or added to HL (using ). By adding HL to itself, it is possible to achieve the same result as a 16-bit arithmetical left shift with one instruction. The only 16-bit instructions that affect any flag is , which sets the CY (carry) flag in order to allow for programmed 24-bit or 32-bit arithmetic (or larger), needed to implement floating-point arithmetic. A stack frame can be allocated using and . A branch to a computed pointer can be executed with . loads HL from directly addressed memory and stores HL likewise. The instruction exchanges the values of the HL and DE register pairs. exchanges last item pushed on stack with HL. Input/output scheme Input output port space The 8080 supports up to 256 input/output (I/O) ports, accessed via dedicated I/O instructions taking port addresses as operands. This I/O mapping scheme is regarded as an advantage, as it frees up the processor's limited address space. Many CPU architectures instead use so-called memory-mapped I/O (MMIO), in which a common address space is used for both RAM and peripheral chips. This removes the need for dedicated I/O instructions, although a drawback in such designs may be that special hardware must be used to insert wait states, as peripherals are often slower than memory. However, in some simple 8080 computers, I/O is indeed addressed as if they were memory cells, "memory-mapped", leaving the I/O commands unused. I/O addressing can also sometimes employ the fact that the processor outputs the same 8-bit port address to both the lower and the higher address byte (i.e., would put the address 0505h on the 16-bit address bus). Similar I/O-port schemes are used in the backward-compatible Zilog Z80 and Intel 8085, and the closely related x86 microprocessor families. Separate stack space One of the bits in the processor state word (see below) indicates that the processor is accessing data from the stack. Using this signal, it is possible to implement a separate stack memory space. This feature is seldom used. The internal state word For more advanced systems, during one phase of its working loop, the processor set its "internal state byte" on the data bus. This byte contains flags that determine whether the memory or I/O port is accessed and whether it is necessary to handle an interrupt. The interrupt system state (enabled or disabled) is also output on a separate pin. For simple systems, where the interrupts are not used, it is possible to find cases where this pin is used as an additional single-bit output port (the popular Radio-86RK computer made in the Soviet Union, for instance). Example code The following 8080/8085 assembler source code is for a subroutine named that copies a block of data bytes of a given size from one location to another. The data block is copied one byte at a time, and the data movement and looping logic utilizes 16-bit operations. Pin use The address bus has its own 16 pins, and the data bus has 8 pins that are usable without any multiplexing. Using the two additional pins (read and write signals), it is possible to assemble simple microprocessor devices very easily. Only the separate IO space, interrupts, and DMA need added chips to decode the processor pin signals. However, the pin load capacity is limited; even simple computers often require bus amplifiers. The processor needs three power sources (−5, +5, and +12 V) and two non-overlapping high-amplitude synchronizing signals. However, at least the late Soviet version КР580ВМ80А was able to work with a single +5 V power source, the +12 V pin being connected to +5 V and the −5 V pin to ground. The pin-out table, from the chip's accompanying documentation, describes the pins as follows: Support chips A key factor in the success of the 8080 was the broad range of support chips available, providing serial communications, counter/timing, input/output, direct memory access, and programmable interrupt control amongst other functions: 8238 – System controller and bus driver 8251 – Communication controller 8253 – Programmable interval timer 8255 – Programmable peripheral interface 8257 – DMA controller 8259 – Programmable interrupt controller Physical implementation The 8080 integrated circuit uses non-saturated enhancement-load nMOS gates, demanding extra voltages (for the load-gate bias). It was manufactured in a silicon gate process using a minimal feature size of 6 µm. A single layer of metal is used to interconnect the approximately 4,500 transistors in the design, but the higher resistance polysilicon layer, which required higher voltage for some interconnects, is implemented with transistor gates. The die size is approximately 20 mm2. The industrial impact Applications and successors The 8080 is used in many early microcomputers, such as the MITS Altair 8800 Computer, Processor Technology SOL-20 Terminal Computer and IMSAI 8080 Microcomputer, forming the basis for machines running the CP/M operating system (the later, almost fully compatible and more able, Zilog Z80 processor would capitalize on this, with Z80 & CP/M becoming the dominant CPU and OS combination of the period circa 1976 to 1983 much as did the x86 & DOS for the PC a decade later). In 1979, even after the introduction of the Z80 and 8085 processors, five manufacturers of the 8080 were selling an estimated 500,000 units per month at a price around $3 to $4 each. The first single-board microcomputers, such as MYCRO-1 and the dyna-micro / MMD-1 (see: Single-board computer) were based on the Intel 8080. One of the early uses of the 8080 was made in the late 1970s by Cubic-Western Data of San Diego, CA in its Automated Fare Collection Systems custom designed for mass transit systems around the world. An early industrial use of the 8080 is as the "brain" of the DatagraphiX Auto-COM (Computer Output Microfiche) line of products which takes large amounts of user data from reel-to-reel tape and images it onto microfiche. The Auto-COM instruments also include an entire automated film cutting, processing, washing, and drying sub-system. Several early video arcade games were built around the 8080 microprocessor, including Space Invaders, one of the most popular arcade games ever made. Zilog introduced the Z80, which has a compatible machine language instruction set and initially used the same assembly language as the 8080, but for legal reasons, Zilog developed a syntactically-different (but code compatible) alternative assembly language for the Z80. At Intel, the 8080 was followed by the compatible and electrically more elegant 8085. Later, Intel issued the assembly-language compatible (but not binary-compatible) 16-bit 8086 and then the 8/16-bit 8088,
|
as either individual 8-bit registers or in three 16-bit register pairs (BC, DE, and HL, referred to as B, D and H in Intel documents) depending on the particular instruction. Some instructions also enable the HL register pair to be used as a (limited) 16-bit accumulator. A pseudo-register M, which refers to the dereferenced memory location pointed to by HL, can be used almost anywhere other registers can be used. The 8080 has a 16-bit stack pointer to memory, replacing the 8008's internal stack, and a 16-bit program counter. Flags The processor maintains internal flag bits (a status register), which indicate the results of arithmetic and logical instructions. Only certain instructions affect the flags. The flags are: Sign (S), set if the result is negative. Zero (Z), set if the result is zero. Parity (P), set if the number of 1 bits in the result is even. Carry (C), set if the last addition operation resulted in a carry or if the last subtraction operation required a borrow Auxiliary carry (AC or H), used for binary-coded decimal arithmetic (BCD). The carry bit can be set or complemented by specific instructions. Conditional-branch instructions test the various flag status bits. The flags can be copied as a group to the accumulator. The A accumulator and the flags together are called the PSW register, or program status word. Commands, instructions As with many other 8-bit processors, all instructions are encoded in one byte (including register numbers, but excluding immediate data), for simplicity. Some can be followed by one or two bytes of data, which can be an immediate operand, a memory address, or a port number. Like more advanced processors, it has automatic CALL and RET instructions for multi-level procedure calls and returns (which can even be conditionally executed, like jumps) and instructions to save and restore any 16-bit register pair on the machine stack. Eight one-byte call instructions () for subroutines exist at the fixed addresses 00h, 08h, 10h, ..., 38h. These are intended to be supplied by external hardware in order to invoke a corresponding interrupt service routine, but are also often employed as fast system calls. The instruction that executes slowest is , which is used for exchanging the register pair HL with the value stored at the address indicated by the stack pointer. 8-bit instructions All 8-bit operations with two operands can only be performed on the 8-bit accumulator (the A register). The other operand can be either an immediate value, another 8-bit register, or a memory byte addressed by the 16-bit register pair HL. Increments and decrements can be performed on any 8 bit register or an HL-addressed memory byte. Direct copying is supported between any two 8-bit registers and between any 8-bit register and an HL-addressed memory byte. Due to the regular encoding of the instruction (using a quarter of available opcode space), there are redundant codes to copy a register into itself (, for instance), which are of little use, except for delays. However, the systematic opcode for is instead used to encode the halt () instruction, halting execution until an external reset or interrupt occurs. 16-bit operations Although the 8080 is generally an 8-bit processor, it has limited abilities to perform 16-bit operations. Any of the three 16-bit register pairs (BC, DE, or HL, referred to as B, D, H in Intel documents) or SP can be loaded with an immediate 16-bit value (using ), incremented or decremented (using and ), or added to HL (using ). By adding HL to itself, it is possible to achieve the same result as a 16-bit arithmetical left shift with one instruction. The only 16-bit instructions that affect any flag is , which sets the CY (carry) flag in order to allow for programmed 24-bit or 32-bit arithmetic (or larger), needed to implement floating-point arithmetic. A stack frame can be allocated using and . A branch to a computed pointer can be executed with . loads HL from directly addressed memory and stores HL likewise. The instruction exchanges the values of the HL and DE register pairs. exchanges last item pushed on stack with HL. Input/output scheme Input output port space The 8080 supports up to 256 input/output (I/O) ports, accessed via dedicated I/O instructions taking port addresses as operands. This I/O mapping scheme is regarded as an advantage, as it frees up the processor's limited address space. Many CPU architectures instead use so-called memory-mapped I/O (MMIO), in which a common address space is used for both RAM and peripheral chips. This removes the need for dedicated I/O instructions, although a drawback in such designs may be that special hardware must be used to insert wait states, as peripherals are often slower than memory. However, in some simple 8080 computers, I/O is indeed addressed as if they were memory cells, "memory-mapped", leaving the I/O commands unused. I/O addressing can also sometimes employ the fact that the processor outputs the same 8-bit port address to both the lower and the higher address byte (i.e., would put the address 0505h on the 16-bit address bus). Similar I/O-port schemes are used in the backward-compatible Zilog Z80 and Intel 8085, and the closely related x86 microprocessor families. Separate stack space One of the bits in the processor state word (see below) indicates that the processor is accessing data from the stack. Using this signal, it is possible to implement a separate stack memory space. This feature is seldom used. The internal state word For more advanced systems, during one phase of its working loop, the processor set its "internal state byte" on the data bus. This byte contains flags that determine whether the memory or I/O port is accessed and whether it is necessary to handle an interrupt. The interrupt system state (enabled or disabled) is also output on a separate pin. For simple systems, where the interrupts are not used, it is possible to find cases where this pin is used as an additional single-bit output port (the popular Radio-86RK computer made in the Soviet Union, for instance). Example code The following 8080/8085 assembler source code is for a subroutine named that copies a block of data bytes of a given size from one location to another. The data block is copied one byte at a time, and the data movement and looping logic utilizes 16-bit operations. Pin use The address bus has its own 16 pins, and the data bus has 8 pins that are usable without any multiplexing. Using the two additional pins (read and write signals), it is possible to assemble simple microprocessor devices very easily. Only the separate IO space, interrupts, and DMA need added chips to decode the processor pin signals. However, the pin load capacity is limited; even simple computers often require bus amplifiers. The processor needs three power sources (−5, +5, and +12 V) and two non-overlapping high-amplitude synchronizing signals. However, at least the late Soviet version КР580ВМ80А was able to work with a single +5 V power source, the +12 V pin being connected to +5 V and the −5 V pin to ground. The pin-out table, from the chip's accompanying documentation, describes the pins as follows: Support chips A key factor in the success of the 8080 was the broad range of support chips available, providing serial communications, counter/timing, input/output, direct memory access, and programmable interrupt control amongst other functions: 8238 – System controller and bus driver 8251 – Communication controller 8253 – Programmable interval timer 8255 – Programmable peripheral interface 8257 – DMA controller 8259 – Programmable interrupt controller Physical implementation The 8080 integrated circuit uses non-saturated enhancement-load nMOS gates, demanding extra voltages (for the load-gate bias). It was manufactured in a silicon gate process using a minimal feature size of 6 µm. A single layer of metal is used to interconnect the approximately 4,500 transistors in the design, but the higher resistance polysilicon layer, which required higher voltage for some interconnects, is implemented with transistor gates. The die size is approximately 20 mm2. The industrial impact Applications and successors The 8080 is used in many early microcomputers, such as the MITS
|
which have to do with how the CPU handles the (local) bus. The mode is usually hardwired into the circuit and therefore cannot be changed by software. The workings of these modes are described in terms of timing diagrams in Intel datasheets and manuals. In minimum mode, all control signals are generated by the 8086 itself. Registers and instructions The 8086 has eight more or less general 16-bit registers (including the stack pointer but excluding the instruction pointer, flag register and segment registers). Four of them, AX, BX, CX, DX, can also be accessed as twice as many 8-bit registers (see figure) while the other four, SI, DI, BP, SP, are 16-bit only. Due to a compact encoding inspired by 8-bit processors, most instructions are one-address or two-address operations, which means that the result is stored in one of the operands. At most one of the operands can be in memory, but this memory operand can also be the destination, while the other operand, the source, can be either register or immediate. A single memory location can also often be used as both source and destination which, among other factors, further contributes to a code density comparable to (and often better than) most eight-bit machines at the time. The degree of generality of most registers is much greater than in the 8080 or 8085. However, 8086 registers were more specialized than in most contemporary minicomputers and are also used implicitly by some instructions. While perfectly sensible for the assembly programmer, this makes register allocation for compilers more complicated compared to more orthogonal 16-bit and 32-bit processors of the time such as the PDP-11, VAX, 68000, 32016, etc. On the other hand, being more regular than the rather minimalistic but ubiquitous 8-bit microprocessors such as the 6502, 6800, 6809, 8085, MCS-48, 8051, and other contemporary accumulator-based machines, it is significantly easier to construct an efficient code generator for the 8086 architecture. Another factor for this is that the 8086 also introduced some new instructions (not present in the 8080 and 8085) to better support stack-based high-level programming languages such as Pascal and PL/M; some of the more useful instructions are push mem-op, and ret size, supporting the "Pascal calling convention" directly. (Several others, such as push immed and enter, were added in the subsequent 80186, 80286, and 80386 processors.) A 64 KB (one segment) stack growing towards lower addresses is supported in hardware; 16-bit words are pushed onto the stack, and the top of the stack is pointed to by SS:SP. There are 256 interrupts, which can be invoked by both hardware and software. The interrupts can cascade, using the stack to store the return addresses. The 8086 has 64 K of 8-bit (or alternatively 32 K of 16-bit word) I/O port space. Flags The 8086 has a 16-bit flags register. Nine of these condition code flags are active, and indicate the current state of the processor: Carry flag (CF), Parity flag (PF), Auxiliary carry flag (AF), Zero flag (ZF), Sign flag (SF), Trap flag (TF), Interrupt flag (IF), Direction flag (DF), and Overflow flag (OF). Also referred to as the status word, the layout of the flags register is as follows: Segmentation There are also four 16-bit segment registers (see figure) that allow the 8086 CPU to access one megabyte of memory in an unusual way. Rather than concatenating the segment register with the address register, as in most processors whose address space exceeds their register size, the 8086 shifts the 16-bit segment only four bits left before adding it to the 16-bit offset (16×segment + offset), therefore producing a 20-bit external (or effective or physical) address from the 32-bit segment:offset pair. As a result, each external address can be referred to by 212 = 4096 different segment:offset pairs. Although considered complicated and cumbersome by many programmers, this scheme also has advantages; a small program (less than 64 KB) can be loaded starting at a fixed offset (such as 0000) in its own segment, avoiding the need for relocation, with at most 15 bytes of alignment waste. Compilers for the 8086 family commonly support two types of pointer, near and far. Near pointers are 16-bit offsets implicitly associated with the program's code or data segment and so can be used only within parts of a program small enough to fit in one segment. Far pointers are 32-bit segment:offset pairs resolving to 20-bit external addresses. Some compilers also support huge pointers, which are like far pointers except that pointer arithmetic on a huge pointer treats it as a linear 20-bit pointer, while pointer arithmetic on a far pointer wraps around within its 16-bit offset without touching the segment part of the address. To avoid the need to specify near and far on numerous pointers, data structures, and functions, compilers also support "memory models" which specify default pointer sizes. The tiny (max 64K), small (max 128K), compact (data > 64K), medium (code > 64K), large (code,data > 64K), and huge (individual arrays > 64K) models cover practical combinations of near, far, and huge pointers for code and data. The tiny model means that code and data are shared in a single segment, just as in most 8-bit based processors, and can be used to build .com files for instance. Precompiled libraries often come in several versions compiled for different memory models. According to Morse et al.,. the designers actually contemplated using an 8-bit shift (instead of 4-bit), in order to create a 16 MB physical address space. However, as this would have forced segments to begin on 256-byte boundaries, and 1 MB was considered very large for a microprocessor around 1976, the idea was dismissed. Also, there were not enough pins available on a low cost 40-pin package for the additional four address bus pins. In principle, the address space of the x86 series could have been extended in later processors by increasing the shift value, as long as applications obtained their segments from the operating system and did not make assumptions about the equivalence of different segment:offset pairs. In practice the use of "huge" pointers and similar mechanisms was widespread and the flat 32-bit addressing made possible with the 32-bit offset registers in the 80386 eventually extended the limited addressing range in a more general way. The instruction stream is fetched from memory as words and is addressed internally by the processor to the byte level as necessary. An instruction stream queuing mechanism allows up to 6 bytes of the instruction stream to be queued while waiting for decoding and execution. The queue acts as a First-In-First-Out (FIFO) buffer, from which the Execution Unit (EU) extracts instruction bytes as required. Whenever there is space for at least two bytes in the queue, the BIU will attempt a word fetch memory cycle. If the queue is empty (following a branch instruction, for example), the first byte into the queue immediately becomes available to the EU. Porting older software Small programs could ignore the segmentation and just use plain 16-bit addressing. This allows 8-bit software to be quite easily ported to the 8086. The authors of most DOS implementations took advantage of this by providing an Application Programming Interface very similar to CP/M as well as including the simple .com executable file format, identical to CP/M. This was important when the 8086 and MS-DOS were new, because it allowed many existing CP/M (and other) applications to be quickly made available, greatly easing acceptance of the new platform. Example code The following 8086/8088 assembler source code is for a subroutine named _memcpy that copies a block of data bytes of a given size from one location to another. The data block is copied one byte at a time, and the data movement and looping logic utilizes 16-bit operations. The code above uses the BP (base pointer) register to establish a call frame, an area on the stack that contains all of the parameters and local variables for the execution of the subroutine. This kind of calling convention supports reentrant and recursive code, and has been used by most ALGOL-like languages since the late 1950s. The above routine is a rather cumbersome way to copy blocks of data. The 8086 provides dedicated instructions for copying strings of bytes. These instructions assume that the source data is stored at DS:SI, the destination data is stored at ES:DI, and that the number of elements to copy is stored in CX. The above routine requires the source and the destination block to be in the same segment, therefore DS is copied to ES. The loop section of the above can be replaced by: This copies the block of data one byte at a time. The REP instruction causes the following MOVSB to repeat until CX is zero, automatically incrementing SI and DI and decrementing CX as it repeats. Alternatively the MOVSW instruction can be used to copy 16-bit words (double bytes) at a time (in which case CX counts the number of words copied instead of the number of bytes). Most assemblers will properly recognize the REP instruction if used as an in-line prefix to the MOVSB instruction, as in REP MOVSB. This routine will operate correctly if interrupted, because the program counter will continue to point to the REP instruction until the block copy is completed. The copy will therefore continue from where it left off when the interrupt service routine returns control. Performance Although partly shadowed by other design choices in this particular chip, the multiplexed address and data buses limit performance slightly; transfers of 16-bit or 8-bit quantities are done in a four-clock memory access cycle, which is faster on 16-bit, although slower on 8-bit quantities, compared to many contemporary 8-bit based CPUs. As instructions vary from one to six bytes, fetch and execution are made concurrent and decoupled into separate units (as it remains in today's x86 processors): The bus interface unit feeds the instruction stream to the execution unit through a 6-byte prefetch queue (a form of loosely coupled pipelining), speeding up operations on registers and immediates, while memory operations became slower (four years later, this performance problem was fixed with the 80186 and 80286). However, the full (instead of partial) 16-bit architecture with a full width ALU meant that 16-bit arithmetic instructions could now be performed with a single ALU cycle (instead of two, via internal carry, as in the 8080 and 8085), speeding up such instructions considerably. Combined with orthogonalizations of operations versus operand types and addressing modes, as well as other enhancements, this made the performance gain over the 8080 or 8085 fairly significant, despite cases where the older chips may be faster (see below). EA = time to compute effective address, ranging from 5 to 12 cycles. Timings are best case, depending on prefetch status, instruction alignment, and other factors. As can be seen from these tables, operations on registers and immediates were fast (between 2 and 4 cycles), while memory-operand instructions and jumps were quite slow; jumps took more cycles than on the simple 8080 and 8085, and the 8088 (used in the IBM PC) was additionally hampered by its narrower bus. The reasons why most memory related
|
DI and decrementing CX as it repeats. Alternatively the MOVSW instruction can be used to copy 16-bit words (double bytes) at a time (in which case CX counts the number of words copied instead of the number of bytes). Most assemblers will properly recognize the REP instruction if used as an in-line prefix to the MOVSB instruction, as in REP MOVSB. This routine will operate correctly if interrupted, because the program counter will continue to point to the REP instruction until the block copy is completed. The copy will therefore continue from where it left off when the interrupt service routine returns control. Performance Although partly shadowed by other design choices in this particular chip, the multiplexed address and data buses limit performance slightly; transfers of 16-bit or 8-bit quantities are done in a four-clock memory access cycle, which is faster on 16-bit, although slower on 8-bit quantities, compared to many contemporary 8-bit based CPUs. As instructions vary from one to six bytes, fetch and execution are made concurrent and decoupled into separate units (as it remains in today's x86 processors): The bus interface unit feeds the instruction stream to the execution unit through a 6-byte prefetch queue (a form of loosely coupled pipelining), speeding up operations on registers and immediates, while memory operations became slower (four years later, this performance problem was fixed with the 80186 and 80286). However, the full (instead of partial) 16-bit architecture with a full width ALU meant that 16-bit arithmetic instructions could now be performed with a single ALU cycle (instead of two, via internal carry, as in the 8080 and 8085), speeding up such instructions considerably. Combined with orthogonalizations of operations versus operand types and addressing modes, as well as other enhancements, this made the performance gain over the 8080 or 8085 fairly significant, despite cases where the older chips may be faster (see below). EA = time to compute effective address, ranging from 5 to 12 cycles. Timings are best case, depending on prefetch status, instruction alignment, and other factors. As can be seen from these tables, operations on registers and immediates were fast (between 2 and 4 cycles), while memory-operand instructions and jumps were quite slow; jumps took more cycles than on the simple 8080 and 8085, and the 8088 (used in the IBM PC) was additionally hampered by its narrower bus. The reasons why most memory related instructions were slow were threefold: Loosely coupled fetch and execution units are efficient for instruction prefetch, but not for jumps and random data access (without special measures). No dedicated address calculation adder was afforded; the microcode routines had to use the main ALU for this (although there was a dedicated segment + offset adder). The address and data buses were multiplexed, forcing a slightly longer (33~50%) bus cycle than in typical contemporary 8-bit processors. However, memory access performance was drastically enhanced with Intel's next generation of 8086 family CPUs. The 80186 and 80286 both had dedicated address calculation hardware, saving many cycles, and the 80286 also had separate (non-multiplexed) address and data buses. Floating point The 8086/8088 could be connected to a mathematical coprocessor to add hardware/microcode-based floating-point performance. The Intel 8087 was the standard math coprocessor for the 8086 and 8088, operating on 80-bit numbers. Manufacturers like Cyrix (8087-compatible) and Weitek (not 8087-compatible) eventually came up with high-performance floating-point coprocessors that competed with the 8087. Chip versions The clock frequency was originally limited to 5 MHz, but the last versions in HMOS were specified for 10 MHz. HMOS-III and CMOS versions were manufactured for a long time (at least a while into the 1990s) for embedded systems, although its successor, the 80186/80188 (which includes some on-chip peripherals), has been more popular for embedded use. The 80C86, the CMOS version of the 8086, was used in the GRiDPad, Toshiba T1200, HP 110, and finally the 1998–1999 Lunar Prospector. For the packaging, the Intel 8086 was available both in ceramic and plastic DIP packages. List of Intel 8086 Derivatives and clones Compatible—and, in many cases, enhanced—versions were manufactured by Fujitsu, Harris/Intersil, OKI, Siemens, Texas Instruments, NEC, Mitsubishi, and AMD. For example, the NEC V20 and NEC V30 pair were hardware-compatible with the 8088 and 8086 even though NEC made original Intel clones μPD8088D and μPD8086D respectively, but incorporated the instruction set of the 80186 along with some (but not all) of the 80186 speed enhancements, providing a drop-in capability to upgrade both instruction set and processing speed without manufacturers having to modify their designs. Such relatively simple and low-power 8086-compatible processors in CMOS are still used in embedded systems. The electronics industry of the Soviet Union was able to replicate the 8086 through . The resulting chip, K1810VM86, was binary and pin-compatible with the 8086. i8086 and i8088 were respectively the cores of the Soviet-made PC-compatible EC1831 and EC1832 desktops. (EC1831 is the EC identification of IZOT 1036C and EC1832 is the EC identification of IZOT 1037C, developed and manufactured in Bulgaria. EC stands for Единая Система.) However, the EC1831 computer (IZOT 1036C) had significant hardware differences from the IBM PC prototype. The EC1831 was the first PC-compatible computer with dynamic bus sizing (US Pat. No 4,831,514). Later some of the EC1831 principles were adopted in PS/2 (US Pat. No 5,548,786) and some other machines (UK Patent Application, Publication No. GB-A-2211325, Published June 28, 1989). Support chips Intel 8237: direct memory access (DMA) controller Intel 8251: universal synchronous/asynchronous receiver/transmitter at 19.2 kbit/s Intel 8253: programmable interval timer, 3x 16-bit max 10 MHz Intel 8255: programmable peripheral interface, 3x 8-bit I/O pins used for printer connection etc. Intel 8259: programmable interrupt controller Intel 8279: keyboard/display controller, scans a keyboard matrix and display matrix like 7-seg Intel 8282/8283: 8-bit latch Intel 8284: clock generator Intel 8286/8287: bidirectional 8-bit driver. In 1980 both Intel I8286/I8287 (industrial grade) version were available for US$16.25 in quantities of 100. Intel 8288: bus controller Intel 8289: bus arbiter NEC µPD765 or Intel 8272A: floppy controller Microcomputers using the 8086 The Intel Multibus-compatible single-board computer ISBC 86/12 was announced in 1978. The Xerox NoteTaker was one of the earliest portable computer designs in 1978 and used three 8086 chips (as CPU, graphics processor, and I/O processor), but never entered commercial production. Seattle Computer Products shipped S-100 bus based 8086 systems (SCP200B) as early as November 1979. The Norwegian Mycron 2000, introduced in 1980. One of the most influential microcomputers of all, the IBM PC, used the Intel 8088, a version of the 8086 with an 8-bit data bus (as mentioned above). The first Compaq Deskpro used an 8086 running at 7.16 MHz, but was compatible with add-in cards designed for the 4.77 MHz IBM PC XT and could switch the CPU down to the lower speed (which also switched in a memory bus buffer to simulate the 8088's slower access) to avoid software timing issues. An 8 MHz 8086-2 was used in the AT&T 6300 PC (built by Olivetti, and known globally under several brands and model numbers), an IBM PC-compatible desktop microcomputer. The M24 / PC 6300 has IBM PC/XT compatible 8-bit expansion slots, but some of them have a proprietary extension providing the full 16-bit data bus of the 8086 CPU (similar in concept to the 16-bit slots of the IBM PC AT, but different in the design details, and physically incompatible), and all system peripherals including the onboard video system also enjoy 16-bit data transfers. The later Olivetti M24SP featured an 8086-2 running at the full maximum 10 MHz. The IBM PS/2 models 25 and 30 were built with an 8 MHz 8086. The Amstrad PC1512, PC1640, PC2086, PC3086 and PC5086 all used 8086 CPUs at 8 MHz. The NEC PC-9801. The Tandy 1000 SL-series and RL machines used 9.47 MHz 8086 CPUs. The IBM Displaywriter word processing machine and the Wang Professional Computer, manufactured by Wang Laboratories, also used the 8086. NASA used original 8086 CPUs on equipment for ground-based maintenance of the Space Shuttle Discovery until the end of the space shuttle program in 2011. This decision was made to prevent software regression that might result from upgrading or from switching to imperfect
|
original IBM PC is based on the 8088, as are its clones. History and description The 8088 was designed at Intel's laboratory in Haifa, Israel, as were a large number of Intel's processors. The 8088 was targeted at economical systems by allowing the use of an eight-bit data path and eight-bit support and peripheral chips; complex circuit boards were still fairly cumbersome and expensive when it was released. The prefetch queue of the 8088 was shortened to four bytes, from the 8086's six bytes, and the prefetch algorithm was slightly modified to adapt to the narrower bus. These modifications of the basic 8086 design were one of the first jobs assigned to Intel's new design office and laboratory in Haifa. Variants of the 8088 with more than 5 MHz maximal clock frequency include the 8088–2, which was fabricated using Intel's new enhanced nMOS process called HMOS and specified for a maximal frequency of 8 MHz. Later followed the 80C88, a fully static CHMOS design, which could operate with clock speeds from 0 to 8 MHz. There were also several other, more or less similar, variants from other manufacturers. For instance, the NEC V20 was a pin-compatible and slightly faster (at the same clock frequency) variant of the 8088, designed and manufactured by NEC. Successive NEC 8088 compatible processors would run at up to 16 MHz. In 1984, Commodore International signed a deal to manufacture the 8088 for use in a licensed Dynalogic Hyperion clone, in a move that was regarded as signaling a major new direction for the company. The available CMOS version was outsourced to Oki Electronic Industry Co., Ltd. When announced, the list price of the 8088 was US$124.80. The plastic package version was introduced on July 1981 for USD $14.10 per 100 in quantities. Intel second sourced this microprocessor to Fujitsu Limited. Differences from the 8086 The 8088 is architecturally very similar to the 8086. The main difference is that there are only eight data lines instead of the 8086's 16 lines. All of the other pins of the device perform the same function as they do with the 8086 with two exceptions. First, pin 34 is no longer (this is the high-order byte select on the 8086—the 8088 does not have a high-order byte on its eight-bit data bus). Instead it outputs a maximum mode status, . Combined with the IO/ and DT/ signals, the bus cycles can be decoded (it generally indicates when a write operation or an interrupt is in progress). The second change is the pin that signals whether a memory access or input/output access is being made has had it sense reversed. The pin on the 8088 is IO/. On the 8086 part it is /M. The reason for the reversal is that it makes the 8088 compatible with the 8085. Performance Depending on the clock frequency, the number of memory wait states, as well as on the characteristics of the particular application program, the average performance for the Intel 8088 ranged approximately from 0.33 to 1 million instructions per second. Meanwhile, the mov reg,reg and ALU reg,reg instructions, taking two and three cycles respectively, yielded an absolute peak performance of between and MIPS per MHz, that is, somewhere in the range 3–5 MIPS at 10 MHz. The speed of the execution unit (EU) and the bus of the 8086 CPU was well balanced; with a typical instruction mix, an 8086 could execute instructions out of the prefetch queue a good bit of the time. Cutting down the bus to eight bits made it a serious bottleneck in the 8088. With the speed of instruction fetch reduced by 50% in the 8088 as compared to the 8086, a sequence of fast instructions can quickly drain the four-byte prefetch queue. When the queue is empty, instructions take as long to complete as they take to fetch. Both the 8086 and 8088 take four clock cycles to complete a bus cycle; whereas for the 8086 this means four clocks to transfer two bytes, on the 8088 it is four clocks per byte. Therefore, for example, a two-byte shift or rotate instruction, which takes the EU only two clock cycles to execute, actually takes eight clock cycles to complete if it is not in the prefetch queue. A sequence of such fast instructions prevents the queue from being filled as fast as it is drained, and in general, because so many basic instructions execute in fewer than four clocks per instruction byte—including almost all the ALU and data-movement instructions on register operands and some of these on memory operands—it is practically impossible to avoid idling the EU in the 8088
|
the small prefetch queue, is that the speed of code execution can be very dependent on instruction order. When programming the 8088, for CPU efficiency, it is vital to interleave long-running instructions with short ones whenever possible. For example, a repeated string operation or a shift by three or more will take long enough to allow time for the 4-byte prefetch queue to completely fill. If short instructions (i.e. ones totaling few bytes) are placed between slower instructions like these, the short ones can execute at full speed out of the queue. If, on the other hand, the slow instructions are executed sequentially, back to back, then after the first of them the bus unit will be forced to idle because the queue will already be full, with the consequence that later more of the faster instructions will suffer fetch delays that might have been avoidable. As some instructions, such as single-bit-position shifts and rotates, take literally 4 times as long to fetch as to execute, the overall effect can be a slowdown by a factor of two or more. If those code segments are the bodies of loops, the difference in execution time may be very noticeable on the human timescale. The 8088 is also (like the 8086) slow at accessing memory. The same ALU that is used to execute arithmetic and logic instructions is also used to calculate effective addresses. There is a separate adder for adding a shifted segment register to the offset address, but the offset EA itself is always calculated entirely in the main ALU. Furthermore, the loose coupling of the EU and BIU (bus unit) inserts communication overhead between the units, and the four-clock period bus transfer cycle is not particularly streamlined. Contrast this with the two-clock period bus cycle of the 6502 CPU and the 80286's three-clock period bus cycle with pipelining down to two cycles for most transfers. Most 8088 instructions that can operate on either registers or memory, including common ALU and data-movement operations, are at least four times slower for memory operands than for only register operands. Therefore, efficient 8088 (and 8086) programs avoid repeated access of memory operands when possible, loading operands from memory into registers to work with them there and storing back only the finished results. The relatively large general register set of the 8088 compared to its contemporaries assists this strategy. When there are not enough registers for all variables that are needed at once, saving registers by pushing them onto the stack and popping them back to restore them is the fastest way to use memory to augment the registers, as the stack PUSH and POP instructions are the fastest memory operations. The same is probably not true on the 80286 and later; they have dedicated address ALUs and perform memory accesses much faster than the 8088 and 8086. Finally, because calls, jumps, and interrupts reset the prefetch queue, and because loading the IP register requires communication between the EU and the BIU (since the IP register is in the BIU, not in the EU, where the general registers are), these operations are costly. All jumps and calls take at least 15 clock cycles. Any conditional jump requires four clock cycles if not taken, but if taken, it requires 16 cycles in addition to resetting the prefetch queue; therefore, conditional jumps should be arranged to be not taken most of the time, especially inside loops. In some cases, a sequence of logic and movement operations is faster than a conditional jump that skips over one or two instructions to achieve the same result. Intel datasheets for the 8086 and 8088 advertised the dedicated multiply and divide instructions (MUL, IMUL, DIV, and IDIV), but they are very slow, on the order of 100–200 clock cycles each. Many simple multiplications by small constants (besides powers of 2, for which shifts can be used) can be done much faster using dedicated short subroutines. The 80286 and 80386 each greatly increase the execution speed of these multiply and divide instructions. Selection for use in the IBM PC The original IBM PC is the most influential microcomputer to use the 8088. It has a clock frequency of 4.77 MHz (4/3 the NTSC colorburst frequency). Some of IBM's engineers and other employees wanted to use the IBM 801 processor, some preferred the new Motorola 68000, and others argued for a small and simple microprocessor, such as the MOS Technology 6502 or Zilog Z80, which are in earlier personal computers. However, IBM already had a history of using Intel chips in its products and had also acquired the rights to manufacture the 8086 family. IBM chose the 8088 over the 8086 because Intel offered a better price for the former and could supply more units. Another factor was that the 8088 allowed the computer to be based on a modified 8085 design, as it could
|
solids Electrical insulation is the absence of electrical conduction. Electronic band theory (a branch of physics) dictates that a charge flows if states are available into which electrons can be excited. This allows electrons to gain energy and thereby move through a conductor such as a metal. If no such states are available, the material is an insulator. Most (though not all, see Mott insulator) insulators have a large band gap. This occurs because the "valence" band containing the highest energy electrons is full, and a large energy gap separates this band from the next band above it. There is always some voltage (called the breakdown voltage) that gives electrons enough energy to be excited into this band. Once this voltage is exceeded the material ceases being an insulator, and charge begins to pass through it. However, it is usually accompanied by physical or chemical changes that permanently degrade the material's insulating properties. Materials that lack electron conduction are insulators if they lack other mobile charges as well. For example, if a liquid or gas contains ions, then the ions can be made to flow as an electric current, and the material is a conductor. Electrolytes and plasmas contain ions and act as conductors whether or not electron flow is involved. Breakdown When subjected to a high enough voltage, insulators suffer from the phenomenon of electrical breakdown. When the electric field applied across an insulating substance exceeds in any location the threshold breakdown field for that substance, the insulator suddenly becomes a conductor, causing a large increase in current, an electric arc through the substance. Electrical breakdown occurs when the electric field in the material is strong enough to accelerate free charge carriers (electrons and ions, which are always present at low concentrations) to a high enough velocity to knock electrons from atoms when they strike them, ionizing the atoms. These freed electrons and ions are in turn accelerated and strike other atoms, creating more charge carriers, in a chain reaction. Rapidly the insulator becomes filled with mobile charge carriers, and its resistance drops to a low level. In a solid, the breakdown voltage is proportional to the band gap energy. When corona discharge occurs, the air in a region around a high-voltage conductor can break down and ionise without a catastrophic increase in current. However, if the region of air breakdown extends to another conductor at a different voltage it creates a conductive path between them, and a large current flows through the air, creating an electric arc. Even a vacuum can suffer a sort of breakdown, but in this case the breakdown or vacuum arc involves charges ejected from the surface of metal electrodes rather than produced by the vacuum itself. In addition, all insulators become conductors at very high temperatures as the thermal energy of the valence electrons is sufficient to put them in the conduction band. In certain capacitors, shorts between electrodes formed due to dielectric breakdown can disappear when the applied electric field is reduced. Uses A very flexible coating of an insulator is often applied to electric wire and cable; this assembly is called insulated wire. Wires sometimes don't use an insulating coating, just air, since a solid (e.g. plastic) coating may be impractical. However, wires that touch each other produce cross connections, short circuits, and fire hazards. In coaxial cable the center conductor must be supported precisely in the middle of the hollow shield to prevent EM wave reflections. Finally, wires that expose voltages higher than 60 V can cause human shock and electrocution hazards. Insulating coatings help to prevent all of these problems. Some wires have a mechanical covering with no voltage rating—e.g.: service-drop, welding, doorbell, thermostat wire. An insulated wire or cable has a voltage rating and a maximum conductor temperature rating. It may not have an ampacity (current-carrying capacity) rating, since this is dependent upon the surrounding environment (e.g. ambient temperature). In electronic systems, printed circuit boards are made from epoxy plastic and fibreglass. The nonconductive boards support layers of copper foil conductors. In electronic devices, the tiny and delicate active components are embedded within nonconductive epoxy or phenolic plastics, or within baked glass or ceramic coatings. In microelectronic components such as transistors and ICs, the silicon material is normally a conductor because of doping, but it can easily be selectively transformed into a good insulator by the application of heat and oxygen. Oxidised silicon is quartz, i.e. silicon dioxide, the primary component of glass. In high voltage systems containing transformers and capacitors, liquid insulator oil is the typical method used for preventing arcs. The oil replaces air in spaces that must support significant voltage without electrical breakdown. Other high voltage system insulation materials include ceramic or glass wire holders, gas, vacuum, and simply placing wires far enough apart to use air as insulation. Insulation in electrical apparatus The most important insulation material is air. A variety of solid, liquid, and gaseous insulators are also used in electrical apparatus. In smaller transformers, generators, and electric motors, insulation on the wire coils consists of up to four thin layers of polymer varnish film. Film-insulated magnet wire permits a manufacturer to obtain the maximum number of turns within the available space. Windings that use thicker conductors are often wrapped with supplemental fiberglass insulating tape. Windings may also be impregnated with insulating varnishes to prevent electrical corona and reduce magnetically induced wire vibration. Large power transformer windings are still mostly insulated with paper, wood, varnish, and mineral oil; although these materials have been used for more than 100 years, they still provide a good balance of economy and adequate performance. Busbars and circuit breakers in switchgear may be insulated with glass-reinforced plastic insulation, treated to have low flame spread and to prevent tracking of current across the material. In older apparatus made up to the early 1970s, boards made of compressed asbestos may be found; while this is an adequate insulator at power frequencies, handling or repairs to asbestos material can release dangerous fibers into the air and must be carried out cautiously. Wire insulated with felted asbestos was used in high-temperature and rugged applications from the 1920s. Wire of this type was sold by General Electric under the trade name "Deltabeston." Live-front switchboards up to the early part of the 20th century were made of slate or marble. Some high voltage equipment is designed to operate within a high pressure insulating gas such as sulfur hexafluoride. Insulation materials that perform well at power and low frequencies may be unsatisfactory at radio frequency, due to heating from excessive dielectric dissipation. Electrical wires may be insulated with polyethylene, crosslinked polyethylene (either through electron beam processing or chemical crosslinking), PVC, Kapton, rubber-like polymers, oil impregnated paper, Teflon, silicone, or modified ethylene tetrafluoroethylene (ETFE). Larger power cables may use compressed inorganic powder, depending on the application. Flexible insulating materials such as PVC (polyvinyl chloride) are used to insulate the circuit and prevent human contact with a 'live' wire – one having voltage of 600 volts or less. Alternative materials are likely to become increasingly used due to EU safety and environmental legislation making PVC less economic. In electrical apparatus such as motors, generators, and transformers, various insulation systems are used, classified by their maximum recommended working temperature to achieve acceptable operating life. Materials range from upgraded types of paper to inorganic compounds. Class I and Class II insulation All portable or hand-held electrical devices are insulated to protect their user from harmful shock. Class I insulation requires that the metal body and other exposed metal parts of the device be connected to earth via a grounding wire that is earthed at the main service panel—but only needs basic insulation on the conductors. This equipment needs an extra pin on the power plug for the grounding connection. Class II insulation means that the device is double insulated. This is used on some appliances such as electric shavers, hair dryers and portable power tools. Double insulation requires that the devices have both basic and supplementary insulation, each of which is sufficient to prevent electric shock. All internal electrically energized components are totally enclosed within an insulated body that prevents any contact with "live" parts. In the EU, double insulated appliances all are marked with a symbol of two squares, one inside the other. Telegraph and power transmission insulators Overhead conductors for high-voltage electric power transmission are bare, and are insulated by the surrounding air. Conductors for lower voltages in distribution may have some insulation but are often bare as well. Insulating supports called insulators are required at the points where they are supported by utility poles or transmission towers. Insulators are also required where the wire enters buildings or electrical devices, such as transformers or circuit breakers, to insulate the wire from the case. These hollow insulators with a conductor inside
|
nonconductive epoxy or phenolic plastics, or within baked glass or ceramic coatings. In microelectronic components such as transistors and ICs, the silicon material is normally a conductor because of doping, but it can easily be selectively transformed into a good insulator by the application of heat and oxygen. Oxidised silicon is quartz, i.e. silicon dioxide, the primary component of glass. In high voltage systems containing transformers and capacitors, liquid insulator oil is the typical method used for preventing arcs. The oil replaces air in spaces that must support significant voltage without electrical breakdown. Other high voltage system insulation materials include ceramic or glass wire holders, gas, vacuum, and simply placing wires far enough apart to use air as insulation. Insulation in electrical apparatus The most important insulation material is air. A variety of solid, liquid, and gaseous insulators are also used in electrical apparatus. In smaller transformers, generators, and electric motors, insulation on the wire coils consists of up to four thin layers of polymer varnish film. Film-insulated magnet wire permits a manufacturer to obtain the maximum number of turns within the available space. Windings that use thicker conductors are often wrapped with supplemental fiberglass insulating tape. Windings may also be impregnated with insulating varnishes to prevent electrical corona and reduce magnetically induced wire vibration. Large power transformer windings are still mostly insulated with paper, wood, varnish, and mineral oil; although these materials have been used for more than 100 years, they still provide a good balance of economy and adequate performance. Busbars and circuit breakers in switchgear may be insulated with glass-reinforced plastic insulation, treated to have low flame spread and to prevent tracking of current across the material. In older apparatus made up to the early 1970s, boards made of compressed asbestos may be found; while this is an adequate insulator at power frequencies, handling or repairs to asbestos material can release dangerous fibers into the air and must be carried out cautiously. Wire insulated with felted asbestos was used in high-temperature and rugged applications from the 1920s. Wire of this type was sold by General Electric under the trade name "Deltabeston." Live-front switchboards up to the early part of the 20th century were made of slate or marble. Some high voltage equipment is designed to operate within a high pressure insulating gas such as sulfur hexafluoride. Insulation materials that perform well at power and low frequencies may be unsatisfactory at radio frequency, due to heating from excessive dielectric dissipation. Electrical wires may be insulated with polyethylene, crosslinked polyethylene (either through electron beam processing or chemical crosslinking), PVC, Kapton, rubber-like polymers, oil impregnated paper, Teflon, silicone, or modified ethylene tetrafluoroethylene (ETFE). Larger power cables may use compressed inorganic powder, depending on the application. Flexible insulating materials such as PVC (polyvinyl chloride) are used to insulate the circuit and prevent human contact with a 'live' wire – one having voltage of 600 volts or less. Alternative materials are likely to become increasingly used due to EU safety and environmental legislation making PVC less economic. In electrical apparatus such as motors, generators, and transformers, various insulation systems are used, classified by their maximum recommended working temperature to achieve acceptable operating life. Materials range from upgraded types of paper to inorganic compounds. Class I and Class II insulation All portable or hand-held electrical devices are insulated to protect their user from harmful shock. Class I insulation requires that the metal body and other exposed metal parts of the device be connected to earth via a grounding wire that is earthed at the main service panel—but only needs basic insulation on the conductors. This equipment needs an extra pin on the power plug for the grounding connection. Class II insulation means that the device is double insulated. This is used on some appliances such as electric shavers, hair dryers and portable power tools. Double insulation requires that the devices have both basic and supplementary insulation, each of which is sufficient to prevent electric shock. All internal electrically energized components are totally enclosed within an insulated body that prevents any contact with "live" parts. In the EU, double insulated appliances all are marked with a symbol of two squares, one inside the other. Telegraph and power transmission insulators Overhead conductors for high-voltage electric power transmission are bare, and are insulated by the surrounding air. Conductors for lower voltages in distribution may have some insulation but are often bare as well. Insulating supports called insulators are required at the points where they are supported by utility poles or transmission towers. Insulators are also required where the wire enters buildings or electrical devices, such as transformers or circuit breakers, to insulate the wire from the case. These hollow insulators with a conductor inside them are called bushings. Material Insulators used for high-voltage power transmission are made from glass, porcelain or composite polymer materials. Porcelain insulators are made from clay, quartz or alumina and feldspar, and are covered with a smooth glaze to shed water. Insulators made from porcelain rich in alumina are used where high mechanical strength is a criterion. Porcelain has a dielectric strength of about 4–10 kV/mm. Glass has a higher dielectric strength, but it attracts condensation and the thick irregular shapes needed for insulators are difficult to cast without internal strains. Some insulator manufacturers stopped making glass insulators in the late 1960s, switching to ceramic materials. Recently, some electric utilities have begun converting to polymer composite materials for some types of insulators. These are typically composed of a central rod made of fibre reinforced plastic and an outer weathershed made of silicone rubber or ethylene propylene diene monomer rubber (EPDM). Composite insulators are less costly, lighter in weight, and have excellent hydrophobic capability. This combination makes them ideal for service in polluted areas. However, these materials do not yet have the long-term proven service life of glass and porcelain. Design The electrical breakdown of an insulator due to excessive voltage can occur in one of two ways: A puncture arc is a breakdown and conduction of the material of the insulator, causing an electric arc through the interior of the insulator. The heat resulting from the arc usually damages the insulator irreparably. Puncture voltage is the voltage across the insulator (when installed in its normal manner) that causes a puncture arc. A flashover arc is a breakdown and conduction of the air around or along the surface of the insulator, causing an arc along the outside of the insulator. Insulators are usually designed to withstand flashover without damage. Flashover voltage is the voltage that causes a flash-over arc. Most high voltage insulators are designed with a lower flashover voltage than puncture voltage, so they flash over before they puncture, to avoid damage. Dirt, pollution, salt, and particularly water on the surface of a high voltage insulator can create a conductive path across it, causing leakage currents and flashovers. The flashover voltage can be reduced by more than 50% when the insulator is wet. High voltage insulators for outdoor use are shaped to maximise the length of the leakage path along the surface from one end to the other, called the creepage length, to minimise these leakage currents. To accomplish this the surface is moulded into a series of corrugations or concentric disc shapes. These usually include one or more sheds; downward facing cup-shaped surfaces that act as umbrellas to ensure that the part of the surface leakage path under the 'cup' stays dry in wet weather. Minimum creepage distances are 20–25 mm/kV, but must be increased in high pollution or airborne sea-salt areas. Types of insulators These are the common classes of insulators: Pin insulator - As the name suggests, the pin type insulator is mounted on a pin on the cross-arm on the pole. There is a groove on the upper end of the insulator. The conductor passes through this groove and is tied to the insulator with annealed wire of the same material as the conductor. Pin type insulators are used for transmission and distribution of communications, and electric power at voltages up to 33 kV. Insulators made for operating voltages between 33 kV and 69 kV tend to be very bulky and have become uneconomical in recent years. Post insulator - A type of insulator in the 1930s that is more compact than traditional pin-type insulators and which has rapidly replaced many pin-type insulators on lines up to 69 kV and in some configurations, can be made for operation at up to 115 kV. Suspension insulator - For voltages greater than 33 kV, it is a usual practice to use suspension type insulators, consisting of a number of glass or porcelain discs connected in series by metal links in the form of a string. The conductor is suspended at the bottom end of this string while the top end is secured to the cross-arm of the tower. The number of disc units used depends on the voltage. Strain insulator - A dead end or anchor pole or tower is used where a straight section of line ends, or angles off in another direction. These poles must withstand the lateral (horizontal) tension of the long straight section of wire. To support this lateral load, strain insulators are used. For low voltage lines (less than 11 kV), shackle insulators are used as strain insulators. However, for high voltage transmission lines, strings of cap-and-pin (suspension) insulators are used, attached to the crossarm in a horizontal direction. When the tension load in lines is exceedingly high, such as at long river spans, two or more strings are used in parallel. Shackle insulator - In early days, the shackle insulators were used as strain insulators. But nowaday, they are frequently used for low voltage distribution lines. Such insulators can be used either in a horizontal position or in a vertical position. They can be directly fixed to the pole with a bolt or to the cross arm.
|
the predecessor of the Internet, were originally called gateways, but the term has been deprecated in this context, because of possible confusion with functionally different devices. By 1973-4, researchers in the United States, the United Kingdom and France had worked out an approach to internetworking where the differences between network protocols were hidden by using a common internetwork protocol, and instead of the network being responsible for reliability, as in the ARPANET, the hosts became responsible, as demonstrated in the CYCLADES network. Research by Donald Davies' team at NPL confirmed establishing a common host protocol would be more reliable and efficient. Today the interconnecting gateways are called routers. The definition of an internetwork today includes the connection of other types of computer networks such as personal area networks. To build an internetwork, the following are needed: A standardized scheme to address packets to any host on any participating network; a standardized protocol defining format and handling of transmitted packets; components interconnecting the participating networks by routing packets to their destinations based on standardized addresses. Another type of interconnection of networks often occurs within enterprises at the link layer of the networking model, i.e. at the hardware-centric layer below the level of the TCP/IP logical interfaces. Such interconnection is accomplished with network bridges and network switches. This is sometimes incorrectly termed internetworking, but the resulting system is simply a larger, single subnetwork, and no internetworking protocol, such as Internet Protocol, is required to traverse these devices. However, a single computer network may be converted into an internetwork by dividing the network into segments and logically dividing the segment traffic with routers and having an internetworking software layer that applications employ. The Internet Protocol is designed to provide an unreliable (not guaranteed) packet service across the network. The architecture avoids intermediate network elements maintaining any state of the network. Instead, this function is assigned to the endpoints of each communication session. To transfer data reliably, applications must utilize an appropriate transport layer protocol, such as Transmission Control Protocol (TCP), which provides a reliable stream. Some applications use a simpler, connection-less transport protocol, User Datagram Protocol (UDP), for tasks which do not require reliable delivery of data or that require real-time service, such as video streaming or voice chat. Catenet Catenet is an obsolete term
|
or that require real-time service, such as video streaming or voice chat. Catenet Catenet is an obsolete term for a system of packet-switched communication networks interconnected via gateways. The term was coined by Louis Pouzin in October 1973 in a note circulated to the International Networking Working Group, later published in a 1974 paper "A Proposal for Interconnecting Packet Switching Networks". Pouzin was a pioneer in packet-switching technology and founder of the CYCLADES network, at a time when network meant what is now called a local area network. Catenet was the concept of linking these networks into a network of networks with specifications for compatibility of addressing and routing. The term catenet was gradually displaced by the short-form of the term internetwork, internet (lower-case i), when the Internet Protocol replaced earlier protocols on the ARPANET. Networking models Two architectural models are commonly used to describe the protocols and methods used in internetworking. The Open System Interconnection (OSI) reference model was developed under the auspices of the International Organization for Standardization (ISO) and provides a rigorous description for layering protocol functions from the underlying hardware to the software interface concepts in user applications. Internetworking is implemented in the Network Layer (Layer 3) of the model. The Internet Protocol Suite, also known as the TCP/IP model, was not designed to conform to the OSI model and does not refer to it in any of the normative specifications in Request for Comments and Internet standards. Despite similar appearance as a layered model, it has a much less rigorous, loosely defined architecture that concerns itself only with the aspects of the style of networking in its own historical provenance. It assumes the availability of any suitable hardware infrastructure, without discussing hardware-specific low-level interfaces, and that a host has access to this local network to which it is connected via a link layer interface. For a period in the late 1980s and early 1990s, the network engineering community was polarized over the
|
the Hundred Years' War. By the start of the Renaissance, the infantry began to return to dominance, with Swiss pikemen and German Landsknechts filling the role of heavy infantry again, using dense formations of pikes to drive off any cavalry. Dense formations are vulnerable to ranged weapons. Technological developments allowed the raising of large numbers of light infantry units armed with ranged weapons, without the years of training expected for traditional high-skilled archers and slingers. This started slowly, first with crossbowmen, then hand cannoneers and arquebusiers, each with increasing effectiveness, marking the beginning of early modern warfare, when firearms rendered the use of heavy infantry obsolete. The introduction of musketeers using bayonets in the mid 17th century began replacement of the pike with the infantry square replacing the pike square. To maximise their firepower, musketeer infantry were trained to fight in wide lines facing the enemy, creating line infantry. These fulfilled the central battlefield role of earlier heavy infantry, using ranged weapons instead of melee weapons. To support these lines, smaller infantry formations using dispersed skirmish lines were created, called light infantry, fulfilling the same multiple roles as earlier light infantry. Their arms were no lighter than line infantry; they were distinguished by their skirmish formation and flexible tactics. The modern rifleman infantry became the primary force for taking and holding ground on battlefields worldwide, a vital element of combined arms combat. As firepower continued to increase, use of infantry lines diminished, until all infantry became light infantry in practice. Modern classifications of infantry have expanded to reflect modern equipment and tactics, such as motorised infantry, mechanised or armoured infantry, mountain infantry, marine infantry, and airborne infantry. Equipment An infantryman's equipment is of vital concern both for the man and the military. The needs of the infantryman to maintain fitness and effectiveness must be constantly balanced against being overburdened. While soldiers in other military branches can use their mount or vehicle for carrying equipment, and tend to operate together as crews serving their vehicle or ordnance, infantrymen must operate more independently; each infantryman usually having much more personal equipment to use and carry. This encourages searching for ingenious combinations of effective, rugged, serviceable and adaptable, yet light, compact, and handy infantry equipment. Beyond their main arms and armour, each infantryman's "military kit" includes combat boots, battledress or combat uniform, camping gear, heavy weather gear, survival gear, secondary weapons and ammunition, weapon service and repair kits, health and hygiene items, mess kit, rations, filled water canteen, and all other consumables each infantryman needs for the expected duration of time operating away from their unit's base, plus any special mission-specific equipment. One of the most valuable pieces of gear is the entrenching tool—basically a folding spade—which can be employed not only to dig important defences, but also in a variety of other daily tasks, and even sometimes as a weapon. Infantry typically have shared equipment on top of this, like tents or heavy weapons, where the carrying burden is spread across several infantrymen. In all, this can reach for each soldier on the march. Such heavy infantry burdens have changed little over centuries of warfare; in the late Roman Republic, legionaries were nicknamed Marius' mules as their main activity seemed to be carrying the weight of their legion around on their backs. When combat is expected, infantry typically switch to "packing light", meaning reducing their equipment to weapons, ammo, and bare essentials, and leaving the rest with their transport or baggage train, at camp or rally point, in temporary hidden caches, or even (in emergencies) discarding whatever may slow them down. Additional specialised equipment may be required, depending on the mission or to the particular terrain or environment, including satchel charges, demolition tools, mines, barbed wire, carried by the infantry or attached specialists. Historically, infantry have suffered high casualty rates from disease, exposure, exhaustion and privation — often in excess of the casualties suffered from enemy attacks. Better infantry equipment to support their health, energy, and protect from environmental factors greatly reduces these rates of loss, and increase their level of effective action. Health, energy, and morale are greatly influenced by how the soldier is fed, so militaries often standardised field rations, starting from hardtack, to US K-rations, to modern MREs. Communications gear has become a necessity, as it allows effective command of infantry units over greater distances, and communication with artillery and other support units. Modern infantry can have GPS, encrypted individual communications equipment, surveillance and night vision equipment, advanced intelligence and other high-tech mission-unique aids. Armies have sought to improve and standardise infantry gear to reduce fatigue for extended carrying, increase freedom of movement, accessibility, and compatibility with other carried gear, such as the US All-purpose Lightweight Individual Carrying Equipment (ALICE). Weapons Infantrymen are defined by their primary arms – the personal weapons and body armour for their own individual use. The available technology, resources, history, and society can produce quite different weapons for each military and era, but common infantry weapons can be distinguished in a few basic categories. Ranged combat weapons: javelins, slings, blowguns, bows, crossbows, hand cannons, arquebuses, muskets, grenades, flamethrowers. Close combat weapons: bludgeoning weapons like clubs, flails and maces; bladed weapons like swords, daggers, and axes; pole weapons like spears, halberds, naginata, and pikes. Both ranged and close weapons: the bayonet fixed to a firearm allows infantrymen to use the same weapon for both ranged combat and close combat. This started with muskets and continued with rifles to automatic firearms. Use of the bayonet has declined with modern automatic firearms, but still generally kept as a weapon of last resort. Infantrymen often carry secondary or back-up weapons, sometimes called a sidearm or ancillary weapons in modern terminology, either issued officially as an addition to the soldier's standard arms, or acquired unofficially by any other means as an individual preference. Such weapons are used when the primary weapon is no longer effective, such it becoming damaged, running out of ammunition, malfunction, or in a change of tactical situation where another weapon is preferred, such as going from ranged to close combat. Infantry with ranged or pole weapons often carried a sword or dagger for possible hand-to-hand combat. The pilum was a javelin the Roman legionaries threw just before drawing their primary weapon, the gladius (short sword), and closing with the enemy line. Modern infantrymen now treat the bayonet as a backup weapon, but may also have handguns or pistols. They may also deploy anti-personnel mines, booby traps, incendiary or explosive devices defensively before combat. Some non-weapon equipment are designed for close combat shock effects, to get and psychological edge before melee, such as battle flags, war drums, brilliant uniforms, fierce body paint or tattoos, and even battle cries. These have become mostly only ceremonial since the decline of close combat military tactics. Protection Infantry have employed many different methods of protection from enemy attacks, including various kinds of armour and other gear, and tactical procedures. The most basic is personal armour. This includes shields, helmets and many types of armour – padded linen, leather, lamellar, mail, plate, and kevlar. Initially, armour was used to defend both from ranged and close combat; even a fairly light shield could help defend against most slings and javelins, though high-strength bows and crossbows might penetrate common armour at very close range. Infantry armour had to compromise between protection and coverage, as a full suit of attack-proof armour would be too heavy to wear in combat. As firearms improved, armour for ranged defence had to be thicker and stronger. With the introduction of the heavy arquebus designed to pierce standard steel armour, it was proven easier to make heavier firearms than heavier armour; armour transitioned to be only for close combat purposes. Pikemen armour tended to be just steel helmets and breastplates, and gunners little or no armour. By the time of the musket, the dominance of firepower shifted militaries away from any close combat, and use of armour decreased, until infantry typically went without any armour. Helmets were added back during World War I as artillery began to dominate the battlefield, to protect against their fragmentation and other blast effects beyond a direct hit. Modern developments in bullet-proof composite materials like kevlar have started a return to body armour for infantry, though the extra weight is a notable burden. In modern times, infantrymen must also often carry protective measures against chemical and biological attack, including military gas masks, counter-agents, and protective suits. All of these protective measures add to the weight an infantryman must carry, and may decrease combat efficiency. Modern militaries are struggling to balance the value of personal body protection versus the weight burden and ability to function under such weight. Infantry-served weapons Early crew-served weapons were siege weapons, like the ballista, trebuchet, and battering ram. Modern versions include machine guns, anti-tank missiles, and infantry mortars. Formations Beginning with the development the first regular military forces, close-combat regular infantry fought less as unorganised groups of individuals and more in coordinated units, maintaining a defined tactical formation during combat, for increased battlefield effectiveness; such infantry formations and the arms they used developed together, starting with the spear and the shield. A spear has decent attack abilities with the additional advantage keeping opponents at distance; this advantage can be increased by using longer spears, but this could allow the opponent to side-step the point of the spear and close for hand-to-hand combat where the longer spear is near useless. This can be avoided when each spearman stays side by side with the others in close formation, each covering the ones next to him, presenting a solid wall of spears to the enemy that they cannot get around. Similarly, a shield has decent defence abilities, but is literally hit-or-miss; an attack from an unexpected angle can bypass it completely. Larger shields can cover more, but are also heavier and less manoeuvrable, making unexpected attacks even more of a problem. This can be avoided by having shield-armed soldiers stand close together, side-by-side, each protecting both themselves and their immediate comrades, presenting a solid shield wall to the enemy. The opponents for these first formations, the close-combat infantry of more tribal societies, or any military without regular infantry (so called "barbarians") used arms that focused on the individual – weapons using personal strength and force, such as larger swinging swords, axes, and clubs. These take more room and individual freedom to swing and wield, necessitating a more loose organisation. While this may allow for a fierce running attack (an initial shock advantage) the tighter formation of the heavy spear and shield infantry gave them a local manpower advantage where several might be able to fight each opponent. Thus tight formations heightened advantages of heavy arms, and gave greater local numbers in melee. To also increase their staying power, multiple rows of heavy infantrymen were added. This also increased their shock combat effect; individual opponents saw themselves literally lined-up against several heavy infantryman each, with seemingly no chance of defeating all of them. Heavy infantry developed into huge solid block formations, up to a hundred meters wide and a dozen rows deep. Maintaining the advantages of heavy infantry meant maintaining formation; this became even more important when two forces with heavy infantry met in battle; the solidity of the formation became the deciding factor. Intense discipline and training became paramount. Empires formed around their military. Organization The organization of military forces into regular military units is first noted in Egyptian records of the Battle of Kadesh (). Soldiers were grouped into units of 50, which were in turn grouped into larger units of 250, then 1,000, and finally into units of up to 5,000 – the largest independent command. Several of these Egyptian "divisions" made up an army, but operated independently, both on the march and tactically, demonstrating sufficient military command and control organisation for basic battlefield manoeuvres. Similar hierarchical organizations have been noted in other ancient armies, typically with approximately 10 to 100 to 1,000 ratios (even where base 10 was not common), similar to modern sections (squads), companies, and regiments. Training The training of the infantry has differed drastically over time and from place to place. The cost of maintaining an army in fighting order and the seasonal nature of warfare precluded large permanent armies. The antiquity saw everything from the well-trained and motivated citizen armies of Greek and Rome, the tribal host assembled from farmers and hunters with only passing acquaintance with warfare and masses of lightly armed and ill-trained militia put up as a last ditch effort. Kushite king Taharqa enjoyed military success in the Near East as a result of his efforts to strengthen the army through daily training in long distance running. In medieval times the foot soldiers varied from peasant levies to semi-permanent companies of mercenaries, foremost among them the Swiss, English, Aragonese and German, to men-at-arms who went into battle as well-armoured as knights, the latter of which at times also fought on foot. The creation of standing armies—permanently assembled for war or defence—saw increase in training and experience. The increased use of firearms and the need for drill to handle them efficiently. The introduction of national and mass armies saw an establishment of minimum requirements and the introduction of special troops (first of them the engineers going back to medieval times, but also different kinds of infantry adopted to specific terrain, bicycle, motorcycle, motorised and mechanised troops) culminating with the introduction
|
dismounted in combat due to the ever-increasing effectiveness of enemy infantry firearms. Thus most cavalry transitioned to mounted infantry. As with grenadiers, the dragoon and cavalry designations can be retained long after their horses, such as in the Royal Dragoon Guards, Royal Lancers, and King's Royal Hussars. Similarly, motorised infantry have trucks and other unarmed vehicles for non-combat movement, but are still infantry since they leave their vehicles for any combat. Most modern infantry have vehicle transport, to the point where infantry being motorised is generally assumed, and the few exceptions might be identified as modern light infantry, or "leg infantry" colloquially. Mechanised infantry go beyond motorised, having transport vehicles with combat abilities, armoured personnel carriers (APCs), providing at least some options for combat without leaving their vehicles. In modern infantry, some APCs have evolved to be infantry fighting vehicles (IFVs), which are transport vehicles with more substantial combat abilities, approaching those of light tanks. Some well-equipped mechanised infantry can be designated as armoured infantry. Given that infantry forces typically also have some tanks, and given that most armoured forces have more mechanised infantry units than tank units in their organisation, the distinction between mechanised infantry and armour forces has blurred. The terms infantry, armour, and cavalry used in the official names for military units like divisions, brigades, or regiments might be better understood as a description of their expected balance of defensive, offensive, and mobility roles, rather than just use of vehicles. Some modern mechanised infantry units are termed cavalry or armoured cavalry, even though they never had horses, to emphasise their combat mobility. In the modern US Army, about 15% of soldiers are officially Infantry. The basic training for all new US Army soldiers includes basic use of infantry used weapons and basic tactics, even for tank crews, artillery crews, and base and logistical personnel. However, no other MOS receives the same detailed rigorous training and standards in which every infantry soldier endures on a regular basis. History The first military forces in history were infantry. In antiquity, infantry were armed with early melee weapons such as a spear, axe, or sword, or an early ranged weapon like a javelin, sling, or bow, with a few infantrymen being expected to use both a melee and a ranged weapon. With the development of gunpowder, infantry began converting to primarily firearms. By the time of Napoleonic warfare, infantry, cavalry and artillery formed a basic triad of ground forces, though infantry usually remained the most numerous. With armoured warfare, armoured fighting vehicles have replaced the horses of cavalry, and airpower has added a new dimension to ground combat, but infantry remains pivotal to all modern combined arms operations. The first warriors, adopting hunting weapons or improvised melee weapons, before the existence of any organised military, likely started essentially as loose groups without any organisation or formation. But this changed sometime before recorded history; the first ancient empires (2500–1500 BC) are shown to have some soldiers with standardised military equipment, and the training and discipline required for battlefield formations and manoeuvres: regular infantry. Though the main force of the army, these forces were usually kept small due to their cost of training and upkeep, and might be supplemented by local short-term mass-conscript forces using the older irregular infantry weapons and tactics; this remained a common practice almost up to modern times. Before the adoption of the chariot to create the first mobile fighting forces , all armies were pure infantry. Even after, with a few exceptions like the Mongol Empire, infantry has been the largest component of most armies in history. In the Western world, from Classical Antiquity through the Middle Ages ( 8th century BC to 15th century AD), infantry are categorised as either heavy infantry or light infantry. Heavy infantry, such as Greek hoplites, Macedonian phalangites, and Roman legionaries, specialised in dense, solid formations driving into the main enemy lines, using weight of numbers to achieve a decisive victory, and were usually equipped with heavier weapons and armour to fit their role. Light infantry, such as Greek peltasts, Balearic slingers, and Roman velites, using open formations and greater manoeuvrability, took on most other combat roles: scouting, screening the army on the march, skirmishing to delay, disrupt, or weaken the enemy to prepare for the main forces' battlefield attack, protecting them from flanking manoeuvers, and then afterwards either pursuing the fleeing enemy or covering their army's retreat. After the fall of Rome, the quality of heavy infantry declined, and warfare was dominated by heavy cavalry, such as knights, forming small elite units for decisive shock combat, supported by peasant infantry militias and assorted light infantry from the lower classes. Towards the end of Middle Ages, this began to change, where more professional and better trained light infantry could be effective against knights, such as the English longbowmen in the Hundred Years' War. By the start of the Renaissance, the infantry began to return to dominance, with Swiss pikemen and German Landsknechts filling the role of heavy infantry again, using dense formations of pikes to drive off any cavalry. Dense formations are vulnerable to ranged weapons. Technological developments allowed the raising of large numbers of light infantry units armed with ranged weapons, without the years of training expected for traditional high-skilled archers and slingers. This started slowly, first with crossbowmen, then hand cannoneers and arquebusiers, each with increasing effectiveness, marking the beginning of early modern warfare, when firearms rendered the use of heavy infantry obsolete. The introduction of musketeers using bayonets in the mid 17th century began replacement of the pike with the infantry square replacing the pike square. To maximise their firepower, musketeer infantry were trained to fight in wide lines facing the enemy, creating line infantry. These fulfilled the central battlefield role of earlier heavy infantry, using ranged weapons instead of melee weapons. To support these lines, smaller infantry formations using dispersed skirmish lines were created, called light infantry, fulfilling the same multiple roles as earlier light infantry. Their arms were no lighter than line infantry; they were distinguished by their skirmish formation and flexible tactics. The modern rifleman infantry became the primary force for taking and holding ground on battlefields worldwide, a vital element of combined arms combat. As firepower continued to increase, use of infantry lines diminished, until all infantry became light infantry in practice. Modern classifications of infantry have expanded to reflect modern equipment and tactics, such as motorised infantry, mechanised or armoured infantry, mountain infantry, marine infantry, and airborne infantry. Equipment An infantryman's equipment is of vital concern both for the man and the military. The needs of the infantryman to maintain fitness and effectiveness must be constantly balanced against being overburdened. While soldiers in other military branches can use their mount or vehicle for carrying equipment, and tend to operate together as crews serving their vehicle or ordnance, infantrymen must operate more independently; each infantryman usually having much more personal equipment to use and carry. This encourages searching for ingenious combinations of effective, rugged, serviceable and adaptable, yet light, compact, and handy infantry equipment. Beyond their main arms and armour, each infantryman's "military kit" includes combat boots, battledress or combat uniform, camping gear, heavy weather gear, survival gear, secondary weapons and ammunition, weapon service and repair kits, health and hygiene items, mess kit, rations, filled water canteen, and all other consumables each infantryman needs for the expected duration of time operating away from their unit's base, plus any special mission-specific equipment. One of the most valuable pieces of gear is the entrenching tool—basically a folding spade—which can be employed not only to dig important defences, but also in a variety of other daily tasks, and even sometimes as a weapon. Infantry typically have shared equipment on top of this, like tents or heavy weapons, where the carrying burden is spread across several infantrymen. In all, this can reach for each soldier on the march. Such heavy infantry burdens have changed little over centuries of warfare; in the late Roman Republic, legionaries were nicknamed Marius' mules as their main activity seemed to be carrying the weight of their legion around on their backs. When combat is expected, infantry typically switch to "packing light", meaning reducing their equipment to weapons, ammo, and bare essentials, and leaving the rest with their transport or baggage train, at camp or rally point, in temporary hidden caches, or even (in emergencies) discarding whatever may slow them down. Additional specialised equipment may be required, depending on the mission or to the particular terrain or environment, including satchel charges, demolition tools, mines, barbed wire, carried by the infantry or attached specialists. Historically, infantry have suffered high casualty rates from disease, exposure, exhaustion and privation — often in excess of the casualties suffered from enemy attacks. Better infantry equipment to support their health, energy, and protect from environmental factors greatly reduces these rates of loss, and increase their level of effective action. Health, energy, and morale are greatly influenced by how the soldier is fed, so militaries often standardised field rations, starting from hardtack, to US K-rations, to modern MREs. Communications gear has become a necessity, as it allows effective command of infantry units over greater distances, and communication with artillery and other support units. Modern infantry can have GPS, encrypted individual communications equipment, surveillance and night vision equipment, advanced intelligence and other high-tech mission-unique aids. Armies have sought to improve and standardise infantry gear to reduce fatigue for extended carrying, increase freedom of movement, accessibility, and compatibility with other carried gear, such as the US All-purpose Lightweight Individual Carrying Equipment (ALICE). Weapons Infantrymen are defined by their primary arms – the personal weapons and body armour for their own individual use. The available technology, resources, history, and society can produce quite different weapons for each military and era, but common infantry weapons can be distinguished in a few basic categories. Ranged combat weapons: javelins, slings, blowguns, bows, crossbows, hand cannons,
|
for all elements in . In other words, the function value in (that is, the codomain) is always the same input element of (now considered as the domain). The identity function on is clearly an injective function as well as a surjective function, so it is bijective. The identity function on is often denoted by . In set theory, where a function is defined as a particular kind of binary relation, the identity function is given by the identity relation, or diagonal of . Algebraic properties If is any function, then we have (where "∘" denotes function composition). In particular, is the identity element of the monoid of all functions from to (under function composition). Since the identity element of a monoid is unique, one can alternately define the identity function on to be this identity element. Such a definition generalizes to the concept of an identity morphism in category theory, where
|
defined as a particular kind of binary relation, the identity function is given by the identity relation, or diagonal of . Algebraic properties If is any function, then we have (where "∘" denotes function composition). In particular, is the identity element of the monoid of all functions from to (under function composition). Since the identity element of a monoid is unique, one can alternately define the identity function on to be this identity element. Such a definition generalizes to the concept of an identity morphism in category theory, where the endomorphisms of need not be functions. Properties The identity function is a linear operator when applied to vector spaces. In an -dimensional vector space the identity function is represented by the identity matrix , regardless of the basis chosen for the space. The identity
|
a call frame, an area on the stack that contains all of the parameters and local variables for the execution of the subroutine. This kind of calling convention supports reentrant and recursive code and has been used by Algol-like languages since the late 1950s. A flat memory model is assumed, specifically, that the DS and ES segments address the same region of memory. Chip variants 80386SX In 1988, Intel introduced the 80386SX, most often referred to as the 386SX, a cut-down version of the 80386 with a 16-bit data bus, mainly intended for lower-cost PCs aimed at the home, educational, and small-business markets, while the 386DX remained the high-end variant used in workstations, servers, and other demanding tasks. The CPU remained fully 32-bit internally, but the 16-bit bus was intended to simplify circuit-board layout and reduce total cost. The 16-bit bus simplified designs but hampered performance. Only 24 pins were connected to the address bus, therefore limiting addressing to 16 MB, but this was not a critical constraint at the time. Performance differences were due not only to differing data-bus widths, but also due to performance-enhancing cache memories often employed on boards using the original chip. The original 80386 was subsequently renamed i386DX to avoid confusion. However, Intel subsequently used the "DX" suffix to refer to the floating-point capability of the i486DX. The 387SX was an 80387 part that was compatible with the 386SX (i.e. with a 16-bit databus). The 386SX was packaged in a surface-mount QFP and sometimes offered in a socket to allow for an upgrade. 80386SL The 80386SL was introduced as a power-efficient version for laptop computers. The processor offered several power-management options (e.g. SMM), as well as different "sleep" modes to conserve battery power. It also contained support for an external cache of 16 to 64 kB. The extra functions and circuit implementation techniques caused this variant to have over 3 times as many transistors as the i386DX. The i386SL was first available at 20 MHz clock speed, with the 25 MHz model later added. Business importance The first PC based on the Intel 80386 was Compaq Deskpro. By extending the 16/24-bit IBM PC/AT standard into a natively 32-bit computing environment, Compaq became the first company to design and manufacture such a major technical hardware advance on the PC platform. IBM was offered use of the 80386, but had manufacturing rights for the earlier 80286. IBM therefore chose to rely on that processor for a couple more years. The early success of the Compaq Deskpro 386 played an important role in legitimizing the PC "clone" industry and in de-emphasizing IBM's role within it. Prior to the 386, the difficulty of manufacturing microchips and the uncertainty of reliable supply made it desirable that any mass-market semiconductor be multi-sourced, that is, made by two or more manufacturers, the second and subsequent companies manufacturing under license from the originating company. The 386 was for a time (4.7 years) only available from Intel, since Andy Grove, Intel's CEO at the time, made the decision not to encourage other manufacturers to produce the processor as second sources. This decision was ultimately crucial to Intel's success in the market. The 386 was the first significant microprocessor to be single-sourced. Single-sourcing the 386 allowed Intel greater control over its development and substantially greater profits in later years. AMD introduced its compatible Am386 processor in March 1991 after overcoming legal obstacles, thus ending Intel's 4.7-year monopoly on 386-compatible processors. From 1991 IBM also manufactured 386 chips under license for use only in IBM PCs and boards. Compatibles The AMD Am386SX and Am386DX were almost exact clones of the i386SX and i386DX. Legal disputes caused production delays for several years, but AMD's 40 MHz part eventually became very popular with computer enthusiasts as a low-cost and low-power alternative to the 25 MHz 486SX. The power draw was further reduced in the "notebook models" (Am386 DXL/SXL/DXLV/SXLV), which could operate with 3.3 V and were implemented in fully static CMOS circuitry. Chips and Technologies Super386 38600SX and 38600DX were developed using reverse engineering. They sold poorly, due to some technical errors and incompatibilities, as well as their late appearance on the market. They were therefore short-lived products. Cyrix Cx486SLC/Cx486DLC could be (simplistically) described as a kind of 386/486 hybrid chip that included a small
|
80286 that were ubiquitous in early PCs. (Following the same tradition, modern 64-bit x86 processors are able to run most programs written for older x86 CPUs, all the way back to the original 16-bit 8086 of 1978.) Over the years, successively newer implementations of the same architecture have become several hundreds of times faster than the original 80386 (and thousands of times faster than the 8086). A 33 MHz 80386 was reportedly measured to operate at about 11.4 MIPS. This was under development on this process technology in 1982 under internal name of P3. The tape-out of the 80386 development was finalized on July 1985. The 80386 was introduced as pre-production samples for software development workstations in October 1985. Manufacturing of the chips in significant quantities commenced in June 1986, along with the first plug-in device that allowed existing 80286-based computers to be upgraded to the 386, the Translator 386 by American Computer and Peripheral. Mainboards for 80386-based computer systems were cumbersome and expensive at first, but manufacturing was justified upon the 80386's mainstream adoption. The first personal computer to make use of the 80386 was designed and manufactured by Compaq and marked the first time a fundamental component in the IBM PC compatible de facto standard was updated by a company other than IBM. In May 2006, Intel announced that i386 production would stop at the end of September 2007. Although it had long been obsolete as a personal computer CPU, Intel and others had continued making the chip for embedded systems. Such systems using an i386 or one of many derivatives are common in aerospace technology and electronic musical instruments, among others. Some mobile phones also used (later fully static CMOS variants of) the i386 processor, such as BlackBerry 950 and Nokia 9000 Communicator. Linux continued to support i386 processors until December 11, 2012; when the kernel cut 386-specific instructions in version 3.8. Architecture The processor was a significant evolution in the x86 architecture, and extended a long line of processors that stretched back to the Intel 8008. The predecessor of the 80386 was the Intel 80286, a 16-bit processor with a segment-based memory management and protection system. The 80386 added a three-stage instruction pipeline which it brings up to total of 6-stage instruction pipeline, extended the architecture from 16-bits to 32-bits, and added an on-chip memory management unit. This paging translation unit made it much easier to implement operating systems that used virtual memory. It also offered support for register debugging. The 80386 featured three operating modes: real mode, protected mode and virtual mode. The protected mode, which debuted in the 286, was extended to allow the 386 to address up to 4 GB of memory. With the addition of segmented addressing system, it can expand up to 64 terabytes of virtual memory. The all new virtual 8086 mode (or VM86) made it possible to run one or more real mode programs in a protected environment, although some programs were not compatible. It features scaled indexing and 64-bit barrel shifter. The ability for a 386 to be set up to act like it had a flat memory model in protected mode despite the fact that it uses a segmented memory model in all modes was arguably the most important feature change for the x86 processor family until AMD released x86-64 in 2003. Several new instructions have been added to 386: BSF, BSR, BT, BTS, BTR, BTC, CDQ, CWDE, LFS, LGS, LSS, MOVSX, MOVZX, SETcc, SHLD, SHRD. Two new segment registers have been added (FS and GS) for general-purpose programs, single Machine Status Word of 286 grew into eight control registers CR0–CR7. Debug registers DR0–DR7 were added for hardware breakpoints. New forms of MOV instruction are used to access them. Chief architect in the development of the 80386 was John H. Crawford. He was responsible for extending the 80286 architecture and instruction set to 32-bit, and then led the microprogram development for the 80386 chip. The i486 and P5 Pentium line of processors were descendants of the i386 design. Data types The following data types are directly supported and thus implemented by one or more i386 machine instructions; these data types are briefly described here.: Bit (boolean value), bit field (group of up to 32 bits) and bit string (up to 4 Gbit in length). 8-bit integer (byte), either signed (range −128..127) or unsigned (range 0..255). 16-bit integer, either signed (range −32,768..32,767) or unsigned (range 0..65,535). 32-bit integer, either signed (range −231..231−1) or unsigned (range 0..232−1). Offset, a 16- or 32-bit displacement referring to a memory location (using any addressing mode). Pointer, a 16-bit selector together with a 16- or 32-bit offset. Character (8-bit character code). String, a sequence of 8-, 16- or 32-bit words (up to 4 Gbit in length). BCD, decimal digits (0..9) represented by unpacked bytes. Packed BCD,
|
that holds the instruction currently being executed or decoded. In simple processors, each instruction to be executed is loaded into the instruction register, which holds it while it is decoded, prepared and ultimately executed, which can take several steps. Some of the complicated processors use a pipeline of instruction registers where each stage of the pipeline does part of the decoding, preparation or execution and then passes it to the next stage for its step. Modern processors can even do some of
|
order as decoding on several instructions is done in parallel. Decoding the op-code in the instruction register includes determining the instruction, determining where its operands are in memory, retrieving the operands from memory, allocating processor resources to execute the command (in super scalar processors), etc. The output of the IR is available to control circuits, which generate the timing signals that control the various processing elements involved in executing the instruction. In the instruction cycle, the instruction is loaded into the instruction register after the processor fetches it from the memory location pointed to by the program counter. References M.
|
islands by country Africa Antarctica Asia Europe North America Oceania South America Lists of islands by continent Lists of islands by body of
|
world grouped by country, by continent, by body of water, and by other classifications. For rank-order lists, see the other lists of islands below.
|
reasons for the program's rejection by the compiler: if "PLEASE" does not appear often enough, the program is considered insufficiently polite, and the error message says this; if it appears too often, the program could be rejected as excessively polite. Although this feature existed in the original INTERCAL compiler, it was undocumented. Despite the language's intentionally obtuse and wordy syntax, INTERCAL is nevertheless Turing-complete: given enough memory, INTERCAL can solve any problem that a Universal Turing machine can solve. Most implementations of INTERCAL do this very slowly, however. A Sieve of Eratosthenes benchmark, computing all prime numbers less than 65536, was tested on a Sun SPARCstation 1 in 1992. In C, it took less than half a second; the same program in INTERCAL took over seventeen hours. Documentation The INTERCAL Reference Manual contains many paradoxical, nonsensical, or otherwise humorous instructions: The manual also contains a "tonsil", as explained in this footnote: "4) Since all other reference manuals have appendices, it was decided that the INTERCAL manual should contain some other type of removable organ." The INTERCAL manual gives unusual names to all non-alphanumeric ASCII characters: single and double quotes are "sparks" and "rabbit ears" respectively. (The exception is the ampersand: as the Jargon File states, "what could be sillier?") The assignment operator, represented as an equals sign (INTERCAL's "half mesh") in many other programming languages, is in INTERCAL a left-arrow, <-, made up of an "angle" and a "worm", obviously read as "gets". Syntax Input (using the WRITE IN instruction) and output (using the READ OUT instruction) do not use the usual formats; in INTERCAL-72, WRITE IN inputs a number written out as digits in English (such as SIX FIVE FIVE THREE FIVE), and READ OUT outputs it in "butchered" Roman numerals. More recent versions have their own I/O systems. Comments can be achieved by using the inverted statement identifiers involving NOT or N'T; these cause lines to be initially ABSTAINed so that they have no effect. (A line can be ABSTAINed from even if it doesn't have valid syntax; syntax errors happen at runtime, and only then when the line is un-ABSTAINed.) Data structures INTERCAL-72 (the original version of INTERCAL) had only four data types: the 16-bit integer (represented with a ., called a "spot"), the 32-bit integer (:, a "twospot"), the array of 16-bit integers (,, a "tail"), and the array of 32-bit integers (;, a "hybrid"). There are 65535 available variables of each type, numbered from .1 to .65535 for 16-bit integers, for instance. However, each of these variables has its own stack on which it can be pushed and popped (STASHed and RETRIEVEd, in INTERCAL terminology), increasing the possible complexity of data structures. More modern versions of INTERCAL have by and large kept the same data structures, with appropriate modifications; TriINTERCAL, which modifies the radix with which numbers are represented, can use a 10-trit type rather than a 16-bit type, and CLC-INTERCAL implements many of its own data structures, such as "classes and lectures", by making the basic data types store more information rather than adding new types. Arrays are dimensioned by assigning to them as if they were a scalar variable. Constants can also be used, and are represented by a # ("mesh") followed by the constant itself, written as a decimal number; only integer constants from 0 to 65535 are supported. Operators There are only five operators in INTERCAL-72. Implementations vary in which characters represent which operation, and many accept more than one character, so more than one possibility is given for many of the operators. Contrary to most other languages, AND, OR, and XOR are unary operators, which work on consecutive bits of their argument; the most significant bit of the result is the operator applied to the least significant and most significant bits of the input, the second-most-significant bit of the result is the operator applied to the most and second-most significant bits, the third-most-significant bit of the result is the operator applied to the second-most and third-most bits, and so on. The operator is placed between the punctuation mark specifying a variable name or constant and the number that specifies which variable it is, or just inside grouping marks (i.e. one character later than it would be in programming languages like C.) SELECT and INTERLEAVE (which is also known as MINGLE) are infix binary operators; SELECT takes the bits of its first operand that correspond to "1" bits of its second operand and removes the bits that correspond to "0" bits, shifting towards the least significant bit and padding with zeroes (so 51 (110011 in binary) SELECT 21 (10101 in binary) is 5 (101 in binary)); MINGLE alternates bits from its first and second operands (in such a way that the least significant bit of its second operand is the least significant bit of the result). There is no operator precedence; grouping marks must be used to disambiguate the precedence where it would otherwise be ambiguous (the grouping marks available are ' ("spark"), which matches another spark, and " ("rabbit ears"), which matches another rabbit ears; the programmer is responsible for using these in such a way that they make the expression unambiguous). Control structures INTERCAL statements all start with a "statement identifier"; in INTERCAL-72, this can be DO, PLEASE, or PLEASE DO, all of which mean the same to the program (but using one of these too heavily causes the program to be rejected, an undocumented feature in
|
INTERCAL a left-arrow, <-, made up of an "angle" and a "worm", obviously read as "gets". Syntax Input (using the WRITE IN instruction) and output (using the READ OUT instruction) do not use the usual formats; in INTERCAL-72, WRITE IN inputs a number written out as digits in English (such as SIX FIVE FIVE THREE FIVE), and READ OUT outputs it in "butchered" Roman numerals. More recent versions have their own I/O systems. Comments can be achieved by using the inverted statement identifiers involving NOT or N'T; these cause lines to be initially ABSTAINed so that they have no effect. (A line can be ABSTAINed from even if it doesn't have valid syntax; syntax errors happen at runtime, and only then when the line is un-ABSTAINed.) Data structures INTERCAL-72 (the original version of INTERCAL) had only four data types: the 16-bit integer (represented with a ., called a "spot"), the 32-bit integer (:, a "twospot"), the array of 16-bit integers (,, a "tail"), and the array of 32-bit integers (;, a "hybrid"). There are 65535 available variables of each type, numbered from .1 to .65535 for 16-bit integers, for instance. However, each of these variables has its own stack on which it can be pushed and popped (STASHed and RETRIEVEd, in INTERCAL terminology), increasing the possible complexity of data structures. More modern versions of INTERCAL have by and large kept the same data structures, with appropriate modifications; TriINTERCAL, which modifies the radix with which numbers are represented, can use a 10-trit type rather than a 16-bit type, and CLC-INTERCAL implements many of its own data structures, such as "classes and lectures", by making the basic data types store more information rather than adding new types. Arrays are dimensioned by assigning to them as if they were a scalar variable. Constants can also be used, and are represented by a # ("mesh") followed by the constant itself, written as a decimal number; only integer constants from 0 to 65535 are supported. Operators There are only five operators in INTERCAL-72. Implementations vary in which characters represent which operation, and many accept more than one character, so more than one possibility is given for many of the operators. Contrary to most other languages, AND, OR, and XOR are unary operators, which work on consecutive bits of their argument; the most significant bit of the result is the operator applied to the least significant and most significant bits of the input, the second-most-significant bit of the result is the operator applied to the most and second-most significant bits, the third-most-significant bit of the result is the operator applied to the second-most and third-most bits, and so on. The operator is placed between the punctuation mark specifying a variable name or constant and the number that specifies which variable it is, or just inside grouping marks (i.e. one character later than it would be in programming languages like C.) SELECT and INTERLEAVE (which is also known as MINGLE) are infix binary operators; SELECT takes the bits of its first operand that correspond to "1" bits of its second operand and removes the bits that correspond to "0" bits, shifting towards the least significant bit and padding with zeroes (so 51 (110011 in binary) SELECT 21 (10101 in binary) is 5 (101 in binary)); MINGLE alternates bits from its first and second operands (in such a way that the least significant bit of its second operand is the least significant bit of the result). There is no operator precedence; grouping marks must be used to disambiguate the precedence where it would otherwise be ambiguous (the grouping marks available are ' ("spark"), which matches another spark, and " ("rabbit ears"), which matches another rabbit ears; the programmer is responsible for using these in such a way that they make the expression unambiguous). Control structures INTERCAL statements all start with a "statement identifier"; in INTERCAL-72, this can be DO, PLEASE, or PLEASE DO, all of which mean the same to the program (but using one of these too heavily causes the program to be rejected, an undocumented feature in INTERCAL-72 that was mentioned in the C-INTERCAL manual), or an inverted form (with NOT or N'T appended to the identifier). Backtracking INTERCAL, a modern variant, also allows variants using MAYBE (possibly combined with PLEASE or DO) as a statement identifier, which introduces a choice-point. Before the identifier, an optional line number (an integer enclosed in parentheses) can be given; after the identifier,
|
After the 8 rounds comes a final “half-round”, the output transformation illustrated below (the swap of the middle two values cancels out the swap at the end of the last round, so that there is no net swap): Structure The overall structure of IDEA follows the Lai–Massey scheme. XOR is used for both subtraction and addition. IDEA uses a key-dependent half-round function. To work with 16-bit words (meaning 4 inputs instead of 2 for the 64-bit block size), IDEA uses the Lai–Massey scheme twice in parallel, with the two parallel round functions being interwoven with each other. To ensure sufficient diffusion, two of the sub-blocks are swapped after each round. Key schedule Each round uses 6 16-bit sub-keys, while the half-round uses 4, a total of 52 for 8.5 rounds. The first 8 sub-keys are extracted directly from the key, with K1 from the first round being the lower 16 bits; further groups of 8 keys are created by rotating the main key left 25 bits between each group of 8. This means that it is rotated less than once per round, on average, for a total of 6 rotations. Decryption Decryption works like encryption, but the order of the round keys is inverted, and the subkeys for the odd rounds are inversed. For instance, the values of subkeys K1–K4 are replaced by the inverse of K49–K52 for the respective group operation, K5 and K6 of each group should be replaced by K47 and K48 for decryption. Security The designers analysed IDEA to measure its strength against differential cryptanalysis and concluded that it is immune under certain assumptions. No successful linear or algebraic weaknesses have been reported. , the best attack applied to all keys could break IDEA reduced to 6 rounds (the full IDEA cipher uses 8.5 rounds). Note that a "break" is any attack that requires less than 2128 operations; the 6-round attack requires 264 known plaintexts and 2126.8 operations. Bruce Schneier thought highly of IDEA in 1996, writing: "In my opinion, it is the best and most secure block algorithm available to the public at this time."
|
some sense. In more detail, these operators, which all deal with 16-bit quantities, are: Bitwise XOR (exclusive OR) (denoted with a blue circled plus ). Addition modulo 216 (denoted with a green boxed plus ). Multiplication modulo 216 + 1, where the all-zero word (0x0000) in inputs is interpreted as 216, and 216 in output is interpreted as the all-zero word (0x0000) (denoted by a red circled dot ). After the 8 rounds comes a final “half-round”, the output transformation illustrated below (the swap of the middle two values cancels out the swap at the end of the last round, so that there is no net swap): Structure The overall structure of IDEA follows the Lai–Massey scheme. XOR is used for both subtraction and addition. IDEA uses a key-dependent half-round function. To work with 16-bit words (meaning 4 inputs instead of 2 for the 64-bit block size), IDEA uses the Lai–Massey scheme twice in parallel, with the two parallel round functions being interwoven with each other. To ensure sufficient diffusion, two of the sub-blocks are swapped after each round. Key schedule Each round uses 6 16-bit sub-keys, while the half-round uses 4, a total of 52 for 8.5 rounds. The first 8 sub-keys are extracted directly from the key, with K1 from the first round being the lower 16 bits; further groups of 8 keys are created by rotating the main key left 25 bits between each group of 8. This means that it is rotated less than once per round, on average, for a total of 6 rotations. Decryption Decryption works like encryption, but the order of the round keys is inverted, and the subkeys for the odd rounds are inversed. For instance, the values of subkeys K1–K4 are replaced by the inverse of K49–K52 for the respective group operation, K5 and K6 of each group should be replaced by K47 and K48 for decryption. Security The designers analysed IDEA to measure its strength against differential cryptanalysis and concluded that it is immune under certain assumptions. No successful linear or algebraic weaknesses have been reported. , the best attack applied to all keys could break IDEA reduced to 6 rounds (the full IDEA cipher uses 8.5 rounds). Note that a "break" is any attack that requires less than 2128 operations; the 6-round attack requires 264 known plaintexts and 2126.8 operations. Bruce Schneier thought highly of IDEA in 1996, writing: "In my opinion, it is the best and most secure block algorithm available to the public at this time." (Applied Cryptography, 2nd ed.) However, by 1999 he was no longer recommending IDEA due to the availability of faster algorithms, some progress in its cryptanalysis, and the issue of patents. In 2011 full 8.5-round IDEA was broken using a meet-in-the-middle attack. Independently in 2012, full 8.5-round IDEA was broken using a narrow-bicliques attack, with a reduction of cryptographic strength of about 2 bits, similar to the effect of the
|
indoor rowers have their resistance provided by a flywheel. Indoor rowers that utilise flywheel resistance can be categorised into two motion types. In both types, the rowing movement of the user causes the footrests and the seat to move further and closer apart in co-ordination with the user's stroke. The difference between the two types is in the movement, or absence of movement, of the footrests relative to ground. The first type is characterised by the Dreissigacker/Williams device. With this type the flywheel and footrests are fixed to a stationary frame, and the seat is free to slide fore and aft on a rail or rails integral to the stationary frame. Therefore, during use, the seat moves relative to the footrests and also relative to ground, while the flywheel and footrests remain stationary relative to ground. The second type is characterised by the Rekers device. With this type, both the seat and the footrests are free to slide fore and aft on a rail or rails integral to a stationary frame. Therefore, during use, the seat and the footrests move relative to each other, and both also move relative to ground. Damper type Piston resistance comes from hydraulic cylinders that are attached to the handles of the rowing machine. Braked flywheel resistance models comprise magnetic, air, and water resistance rowers. Magnetic resistance models control resistance by means of permanent magnets or electromagnets. Air resistance models use vanes on the flywheel to provide the flywheel braking needed to generate resistance. Water resistance models consist of a paddle revolving in an enclosed tank of water. Slides Sometimes, slides are placed underneath the machine, which allows the machine to move back and forth smoothly as if there were water beneath the rower. The slides can be connected in rows or columns so that rowers are forced to move together on the ergometer, similarly to the way they would match up their rhythm in a boat. Indoor rowers usually also display estimates of rowing boat speed and energy used by the athlete. Use Exercise Rowing is an efficient method of exercise which uses 86% of muscles when done with correct form. Indoor rowing primarily works the cardiovascular systems with typical workouts consisting of steady pieces of 20–40 minutes. The standard measurement of speed on an ergometer is generally known as the "split", or the amount of time in minutes and seconds required to travel at the current pace. Other standard measurements units on the indoor rowing machine include calories and watts. Testing Although ergometer tests are used by rowing coaches to evaluate rowers and are part of athlete selection for many senior and junior national rowing teams, data suggests that: "physiological and performance tests performed on a rowing ergometer are not good indicators
|
rowers. Magnetic resistance models control resistance by means of permanent magnets or electromagnets. Air resistance models use vanes on the flywheel to provide the flywheel braking needed to generate resistance. Water resistance models consist of a paddle revolving in an enclosed tank of water. Slides Sometimes, slides are placed underneath the machine, which allows the machine to move back and forth smoothly as if there were water beneath the rower. The slides can be connected in rows or columns so that rowers are forced to move together on the ergometer, similarly to the way they would match up their rhythm in a boat. Indoor rowers usually also display estimates of rowing boat speed and energy used by the athlete. Use Exercise Rowing is an efficient method of exercise which uses 86% of muscles when done with correct form. Indoor rowing primarily works the cardiovascular systems with typical workouts consisting of steady pieces of 20–40 minutes. The standard measurement of speed on an ergometer is generally known as the "split", or the amount of time in minutes and seconds required to travel at the current pace. Other standard measurements units on the indoor rowing machine include calories and watts. Testing Although ergometer tests are used by rowing coaches to evaluate rowers and are part of athlete selection for many senior and junior national rowing teams, data suggests that: "physiological and performance tests performed on a rowing ergometer are not good indicators of on water performance". Some standard indoor rower ergometer tests include: 250-m ergometer test, 2000-m ergometer test, 5km ergometer test, 16000-m ergometer test and the 30 minute ergometer test. Technique Rowing on an ergometer requires four basic phases to complete one stroke; the catch, the drive, the finish and the recovery. The catch is the initial part of the stroke. The drive is where the power from the rower is generated while the finish is the final part of the stroke. Then, the recovery is the initial phase to begin taking a new stroke. The phases repeat until a time duration or a distance is completed. At each stage of the stroke the back should remain in a neutral, flat position, pivoting at the hips to avoid injury. Catch Knees are bent with
|
very popular through the late 1980s and mid-1990s because it was used by Novell NetWare, a network operating system. Due to Novell NetWare's popularity, IPX became a prominent protocol for internetworking. A big advantage of IPX was a small memory footprint of the IPX driver, which was vital for DOS and Windows up to Windows 95 due to the limited size at that time of conventional memory. Another IPX advantage is easy configuration of its client computers. However, IPX does not scale well for large networks such as the Internet. As such, IPX usage decreased as the boom of the Internet made TCP/IP nearly universal. Computers and networks can run multiple network protocols, so almost all IPX sites also run TCP/IP, to allow Internet connectivity. It is also possible to run later Novell products without IPX, with the beginning of full support for both IPX and TCP/IP by NetWare version 5 in late 1998. Description A big advantage of IPX protocol is its little or no need for configuration. In the time when protocols for dynamic host configuration did not exist and the BOOTP protocol for centralized assigning of addresses was not common, the IPX network could be configured almost automatically. A client computer uses the MAC address of its network card as the node address and learns what it needs to know about the network topology from the servers or routers – routes are propagated by Routing Information Protocol, services by Service Advertising Protocol. A small IPX network administrator had to care only to assign all servers in the same network the same network number, to assign different network numbers to different frame formats in the same network, to assign different network numbers to different interfaces of servers with multiple network cards (Novell NetWare server with multiple network cards worked automatically as a router), to assign different network numbers to servers in different interconnected networks, to start router process on nodes with multiple network cards in more complex networks. IPX packet structure Each IPX packet begins with a header with the following structure: The Packet Type values are: IPX addressing An IPX address has the following structure: Network number The network
|
such as the Internet. As such, IPX usage decreased as the boom of the Internet made TCP/IP nearly universal. Computers and networks can run multiple network protocols, so almost all IPX sites also run TCP/IP, to allow Internet connectivity. It is also possible to run later Novell products without IPX, with the beginning of full support for both IPX and TCP/IP by NetWare version 5 in late 1998. Description A big advantage of IPX protocol is its little or no need for configuration. In the time when protocols for dynamic host configuration did not exist and the BOOTP protocol for centralized assigning of addresses was not common, the IPX network could be configured almost automatically. A client computer uses the MAC address of its network card as the node address and learns what it needs to know about the network topology from the servers or routers – routes are propagated by Routing Information Protocol, services by Service Advertising Protocol. A small IPX network administrator had to care only to assign all servers in the same network the same network number, to assign different network numbers to different frame formats in the same network, to assign different network numbers to different interfaces of servers with multiple network cards (Novell NetWare server with multiple network cards worked automatically as a router), to assign different network numbers to servers in different interconnected networks, to start router process on nodes with multiple network cards in more complex networks. IPX packet structure Each IPX packet begins with a header with the following structure: The Packet Type values are: IPX addressing An IPX address has the following structure: Network number The network number allows to address (and communicate with) the IPX nodes which do not belong to the same network or cabling system. The cabling system is a network in which a data link layer protocol can be used for communication. To allow communication between different networks, they must be connected with IPX routers. A set of interconnected networks is called an internetwork. Any Novell NetWare server may serve as an IPX router. Novell also supplied stand-alone routers. Multiprotocol routers of other vendors often support IPX routing. Using different frame formats in one cabling system is possible, but it works similarly as if separate cabling systems were used (i.e. different network numbers must be used for different frame formats even in the same cabling system and a router must be used to allow communication between nodes using different frame formats in the same cabling system). Logical
|
multi-party treaties that are designed to become legally binding, usually include prescriptive and very specific language, and usually are concluded by a long procedure that frequently requires ratification by each states' legislature. Lesser known are some "recommendations" which are similar to conventions in being multilaterally agreed, yet cannot be ratified, and serve to set common standards. There may also be administrative guidelines that are agreed multilaterally by states, as well as the statutes of tribunals or other institutions. A specific prescription or principle from any of these various international instruments can, over time, attain the status of customary international law whether it is specifically accepted by a state or not, just because it is well-recognized and followed over a sufficiently long time. International human rights instruments can be divided further into global instruments, to which any state in the world can be a party, and regional instruments, which are restricted to states in a particular region of the world. Most conventions and recommendations (but few declarations) establish mechanisms for monitoring and establish bodies to oversee their implementation. In some cases these bodies that may have relatively little political authority or legal means, and may be ignored by member states; in other cases these mechanisms have bodies with great political authority and their decisions are almost always implemented. A good example of the latter is the European Court of Human Rights. Monitoring mechanisms also vary as to the degree of individual access to expose cases of abuse and plea for remedies. Under some conventions or recommendations – e.g. the European Convention on Human Rights – individuals or states are permitted, subject to certain conditions, to take individual cases to a full-fledged tribunal at international level. Sometimes, this can be done in national courts because of universal jurisdiction. The Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and the International Covenant on Economic, Social and Cultural Rights together with other international human rights instruments are sometimes referred to as the international bill of rights. International human rights instruments are identified by the OHCHR and most are referenced on the OHCHR website. Declarations Global Declaration of the Rights of the Child 1923 Universal Declaration of Human Rights (UN, 1948) Declaration on the Rights of Disabled Persons (UN, 1975) Declaration on the Right to Development (UN, 1986) (UN, 1979) Vienna Declaration and Programme of Action (World Conference on Human Rights, 1993) Beijing Declaration and Platform for Action (The Fourth World Conference on Women, 1995) Declaration of Human Duties and Responsibilities (UNESCO, 1998)
|
Rights. Monitoring mechanisms also vary as to the degree of individual access to expose cases of abuse and plea for remedies. Under some conventions or recommendations – e.g. the European Convention on Human Rights – individuals or states are permitted, subject to certain conditions, to take individual cases to a full-fledged tribunal at international level. Sometimes, this can be done in national courts because of universal jurisdiction. The Universal Declaration of Human Rights, the International Covenant on Civil and Political Rights, and the International Covenant on Economic, Social and Cultural Rights together with other international human rights instruments are sometimes referred to as the international bill of rights. International human rights instruments are identified by the OHCHR and most are referenced on the OHCHR website. Declarations Global Declaration of the Rights of the Child 1923 Universal Declaration of Human Rights (UN, 1948) Declaration on the Rights of Disabled Persons (UN, 1975) Declaration on the Right to Development (UN, 1986) (UN, 1979) Vienna Declaration and Programme of Action (World Conference on Human Rights, 1993) Beijing Declaration and Platform for Action (The Fourth World Conference on Women, 1995) Declaration of Human Duties and Responsibilities (UNESCO, 1998) Universal Declaration on Cultural Diversity (UNESCO, 2001) Declaration on the Rights of Indigenous Peoples (UN, 2007) UN declaration on sexual orientation and gender identity (UN, 2008) Regional: Americas American Declaration of the Rights and Duties of Man (OAS, 1948) American Declaration on the Rights of Indigenous Peoples (OAS, 2016) Regional: Asia Declaration of the Basic Duties of ASEAN Peoples and Governments (Regional Council of Human Rights in Asia, 1983) ASEAN Human Rights Declaration (ASEAN, 2009) Regional: Middle East Cairo Declaration of Human Rights in Islam (OIC,1990) Conventions Global According to OHCHR, there are 9 or more core international human
|
Jesup when Osceola came under a flag of truce to negotiate peace near Fort Peyton. Osceola died in prison of illness; the war resulted in over 1,500 U.S. deaths, and cost the government $20 million. Some Seminole traveled deeper into the Everglades, and others moved west. The removal continued, and a number of wars broke out over land. Muskogee (Creek) In the aftermath of the Treaties of Fort Jackson and the Washington, the Muscogee were confined to a small strip of land in present-day east central Alabama. The Creek national council signed the Treaty of Cusseta in 1832, ceding their remaining lands east of the Mississippi to the U.S. and accepting relocation to the Indian Territory. Most Muscogee were removed to the territory during the Trail of Tears in 1834, although some remained behind. Although the Creek War of 1836 ended government attempts to convince the Creek population to leave voluntarily, Creeks who had not participated in the war were not forced west (as others were). The Creek population was placed into camps and told that they would be relocated soon. Many Creek leaders were surprised by the quick departure, but could do little to challenge it. The 16,000 Creeks were organized into five detachments who were to be sent to Fort Gibson. The Creek leaders did their best to negotiate better conditions, and succeeded in obtaining wagons and medicine. To prepare for the relocation, Creeks began to deconstruct their spiritual lives; they burned piles of lightwood over their ancestors' graves to honor their memories, and polished the sacred plates which would travel at the front of each group. They also prepared financially, selling what they could not bring. Many were swindled by local merchants out of valuable possessions (including land), and the military had to intervene. The detachments began moving west in September 1836, facing harsh conditions. Despite their preparations, the detachments faced bad roads, worse weather, and a lack of drinkable water. When all five detachments reached their destination, they recorded their death toll. The first detachment, with 2,318 Creeks, had 78 deaths; the second had 3,095 Creeks, with 37 deaths. The third had 2,818 Creeks, and 12 deaths; the fourth, 2,330 Creeks and 36 deaths. The fifth detachment, with 2,087 Creeks, had 25 deaths. Chickasaw Unlike other tribes, who exchanged lands, the Chickasaw were to receive financial compensation of $3 million from the United States for their lands east of the Mississippi River. They reached an agreement to purchase of land from the previously-removed Choctaw in 1836 after a bitter five-year debate, paying the Chocktaw $530,000 for the westernmost Choctaw land. Most of the Chickasaw moved in 1837 and 1838. The $3 million owed to the Chickasaw by the U.S. went unpaid for nearly 30 years. Aftermath The Five Civilized Tribes were resettled in the new Indian Territory. The Cherokee occupied the northeast corner of the territory and a strip of land in Kansas on its border with the territory. Some indigenous nations resisted the forced migration more strongly. The few who stayed behind eventually formed tribal groups, including the Eastern Band of Cherokee (based in North Carolina), the Mississippi Band of Choctaw Indians, the Seminole Tribe of Florida, and the Creeks in Alabama (including the Poarch Band). Removals North Tribes in the Old Northwest were smaller and more fragmented than the Five Civilized Tribes, so the treaty and emigration process was more piecemeal. Following the Northwest Indian War, most of the modern state of Ohio was taken from native nations in the 1795 Treaty of Greenville. Tribes such as the already-displaced Lenape (Delaware tribe), Kickapoo and Shawnee, were removed from Indiana, Michigan, and Ohio during the 1820s. The Potawatomi were forced out of Wisconsin and Michigan in late 1838, and were resettled in Kansas Territory. Communities remaining in present-day Ohio were forced to move to Louisiana, which was then controlled by Spain. Bands of Shawnee, Ottawa, Potawatomi, Sauk, and Meskwaki (Fox) signed treaties and relocated to the Indian Territory. In 1832, the Sauk leader Black Hawk led a band of Sauk and Fox back to their lands in Illinois; the U.S. Army and Illinois militia defeated Black Hawk and his warriors in the Black Hawk War, and the Sauk and Fox were relocated to present-day Iowa. The Miami were split, with many of the tribe resettled west of the Mississippi River during the 1840s. In the Second Treaty of Buffalo Creek (1838), the Senecas transferred all their land in New York (except for one small reservation) in exchange for of land in Indian Territory. The federal government would be responsible for the removal of the Senecas who opted to go west, and the Ogden Land Company would acquire their New York lands. The lands were sold by government officials, however, and the proceeds were deposited in the U.S. Treasury. Maris Bryant Pierce, a "young chief" served as a lawyer representing four territories of the Seneca tribe, starting in 1838. The Senecas asserted that they had been defrauded, and sued for redress in the Court of Claims. The case was not resolved until 1898, when the United States awarded $1,998,714.46 in compensation to "the New York Indians". The U.S. signed treaties with the Senecas and the Tonawanda Senecas in 1842 and 1857, respectively. Under the treaty of 1857, the Tonawandas renounced all claim to lands west of the Mississippi in exchange for the right to buy back the Tonawanda Reservation from the Ogden Land Company. Over a century later, the Senecas purchased a plot (part of their original reservation) in downtown Buffalo to build the Seneca Buffalo Creek Casino. South Changed perspective Historical views of Indian removal have been reevaluated since that time. Widespread contemporary acceptance of the policy, due in part to the popular embrace of the concept of manifest destiny, has given way to a more-somber perspective. The removals have been described by historians to paternalism, ethnic cleansing, or genocide. Historian David Stannard has called it genocide. Jackson's reputation Andrew Jackson's reputation has been negatively impacted by his treatment of the Indians. Historians who admire Jackson's strong presidential leadership, such as Arthur M. Schlesinger, Jr., would gloss over the Indian Removal in a footnote. In 1969, Francis Paul Prucha wrote that Jackson's removal of the Five Civilized Tribes from the hostile white environment of the Old South to Oklahoma probably saved them. Jackson was
|
Rabbit Creek and became the first Native American tribe to be removed. The agreement was one of the largest transfers of land between the U.S. government and Native Americans which was not the result of war. The Choctaw signed away their remaining traditional homelands, opening them up for European-American settlement in Mississippi Territory. When the tribe reached Little Rock, a chief called its trek a "trail of tears and death". In 1831, French historian and political scientist Alexis de Tocqueville witnessed an exhausted group of Choctaw men, women and children emerging from the forest during an exceptionally cold winter near Memphis, Tennessee, on their way to the Mississippi to be loaded onto a steamboat. He wrote, Cherokee While the Indian Removal Act made the move of the tribes voluntary, it was often abused by government officials. The best-known example is the Treaty of New Echota, which was signed by a small faction of twenty Cherokee tribal members (not the tribal leadership) on December 29, 1835. Most of the Cherokee later blamed the faction and the treaty for the tribe's forced relocation in 1838. An estimated 4,000 Cherokee died in the march, which is known as the Trail of Tears. Missionary organizer Jeremiah Evarts urged the Cherokee Nation to take its case to the U.S. Supreme Court. The Marshall court heard the case in Cherokee Nation v. Georgia (1831), but declined to rule on its merits; the court declaring that the Native American tribes were not sovereign nations, and could not "maintain an action" in U.S. courts. In an opinion written by Chief Justice Marshall in Worcester v. Georgia (1832), individual states had no authority in American Indian affairs. The state of Georgia defied the Supreme Court ruling, and the desire of white settlers and land speculators for Indian lands continued unabated; some whites claimed that Indians threatened peace and security. The Georgia legislature passed a law forbidding whites from living on Indian territory after March 31, 1831, without a license from the state; this excluded white missionaries who opposed Indian removal. Seminole The Seminole refused to leave their Florida lands in 1835, leading to the Second Seminole War. Osceola was a Seminole leader of the people's fight against removal. Based in the Everglades, Osceola and his band used surprise attacks to defeat the U.S. Army in a number of battles. In 1837, Osceola was duplicitously captured by order of U.S. General Thomas Jesup when Osceola came under a flag of truce to negotiate peace near Fort Peyton. Osceola died in prison of illness; the war resulted in over 1,500 U.S. deaths, and cost the government $20 million. Some Seminole traveled deeper into the Everglades, and others moved west. The removal continued, and a number of wars broke out over land. Muskogee (Creek) In the aftermath of the Treaties of Fort Jackson and the Washington, the Muscogee were confined to a small strip of land in present-day east central Alabama. The Creek national council signed the Treaty of Cusseta in 1832, ceding their remaining lands east of the Mississippi to the U.S. and accepting relocation to the Indian Territory. Most Muscogee were removed to the territory during the Trail of Tears in 1834, although some remained behind. Although the Creek War of 1836 ended government attempts to convince the Creek population to leave voluntarily, Creeks who had not participated in the war were not forced west (as others were). The Creek population was placed into camps and told that they would be relocated soon. Many Creek leaders were surprised by the quick departure, but could do little to challenge it. The 16,000 Creeks were organized into five detachments who were to be sent to Fort Gibson. The Creek leaders did their best to negotiate better conditions, and succeeded in obtaining wagons and medicine. To prepare for the relocation, Creeks began to deconstruct their spiritual lives; they burned piles of lightwood over their ancestors' graves to honor their memories, and polished the sacred plates which would travel at the front of each group. They also prepared financially, selling what they could not bring. Many were swindled by local merchants out of valuable possessions (including land), and the military had to intervene. The detachments began moving west in September 1836, facing harsh conditions. Despite their preparations, the detachments faced bad roads, worse weather, and a lack of drinkable water. When all five detachments reached their destination, they recorded their death toll. The first detachment, with 2,318 Creeks, had 78 deaths; the second had 3,095 Creeks, with 37 deaths. The third had 2,818 Creeks, and 12 deaths; the fourth, 2,330 Creeks and 36 deaths. The fifth detachment, with 2,087 Creeks, had 25 deaths. Chickasaw Unlike other tribes, who exchanged lands, the Chickasaw were to receive financial compensation of $3 million from the United States for their lands east of the Mississippi River. They reached an agreement to purchase of land from the previously-removed Choctaw in 1836 after a bitter five-year debate, paying the Chocktaw $530,000 for the westernmost Choctaw land. Most of the Chickasaw moved in 1837 and 1838. The $3 million owed to the Chickasaw by the U.S. went unpaid for nearly 30 years. Aftermath The Five Civilized Tribes were resettled in the new Indian Territory. The Cherokee occupied the northeast corner of the territory and a strip of land in Kansas on its border with the territory. Some indigenous nations resisted the forced migration more strongly. The few who stayed behind eventually formed tribal groups, including the Eastern Band of Cherokee (based in North Carolina), the Mississippi Band of Choctaw Indians, the Seminole Tribe of Florida, and the Creeks in Alabama (including the Poarch Band). Removals North Tribes in the Old Northwest were smaller and more fragmented than the Five Civilized Tribes, so the treaty and emigration process was more piecemeal. Following the Northwest Indian War, most of the modern state of Ohio was taken from native nations in the 1795 Treaty of Greenville. Tribes such as the already-displaced Lenape (Delaware tribe), Kickapoo and Shawnee, were removed from Indiana, Michigan, and Ohio during the 1820s. The Potawatomi were forced out of Wisconsin and Michigan in late 1838, and were resettled in Kansas Territory. Communities remaining in present-day Ohio were forced to move to Louisiana, which was then controlled by Spain. Bands of Shawnee, Ottawa, Potawatomi, Sauk, and Meskwaki (Fox) signed treaties and relocated to the Indian Territory. In 1832, the Sauk leader Black Hawk led a band of Sauk and Fox back to their lands in Illinois; the U.S. Army and Illinois militia defeated Black Hawk and his warriors in the Black Hawk War, and the Sauk and Fox were relocated to present-day Iowa. The Miami were split, with many of the tribe resettled west of the Mississippi River during the 1840s. In the Second Treaty of Buffalo Creek (1838), the Senecas transferred all their land in New York (except for one small reservation) in exchange for of land in Indian Territory. The federal government would be responsible for the removal of the Senecas who opted to go west, and the Ogden Land Company would acquire their New York lands. The lands were sold by government officials, however, and the proceeds were deposited in the U.S. Treasury. Maris Bryant Pierce, a "young chief" served as a lawyer representing four territories of the Seneca tribe, starting in 1838. The Senecas asserted that they had been defrauded, and sued for redress in the Court of Claims. The case was not resolved until 1898, when the United States awarded $1,998,714.46 in compensation to "the New York Indians". The U.S. signed treaties with the Senecas and the Tonawanda Senecas in 1842 and 1857, respectively. Under the treaty of 1857, the Tonawandas renounced all claim to lands west of the Mississippi in exchange for the right to buy back the Tonawanda Reservation from the Ogden Land Company. Over a century later, the Senecas purchased a plot (part of their original reservation) in downtown Buffalo to build the Seneca Buffalo Creek Casino. South Changed perspective Historical views of Indian removal have been reevaluated since that time. Widespread contemporary acceptance of the policy, due in part to the popular embrace of the concept of manifest destiny, has given way to a more-somber perspective. The removals have been described by historians to paternalism, ethnic cleansing, or genocide. Historian David Stannard has called it genocide. Jackson's reputation Andrew Jackson's reputation has been negatively impacted by his treatment of the Indians. Historians who admire Jackson's strong presidential leadership, such as Arthur M. Schlesinger, Jr., would gloss over the Indian Removal in a footnote. In 1969, Francis Paul Prucha wrote that Jackson's removal of the Five Civilized Tribes from the hostile white environment of the Old South to Oklahoma probably saved them. Jackson was sharply attacked by political scientist Michael Rogin and historian Howard Zinn during the 1970s, primarily on this issue; Zinn called him an "exterminator of Indians". According to historians Paul R. Bartrop and Steven L. Jacobs, however, Jackson's policies do not meet the criteria for physical or cultural genocide. See also Act for the Protection of the People of Indian Territory (Curtis Act), 1898 Forced Fee Patenting Act (Burke Act), 1906 Wheeler–Howard Act Nelson Act of 1889, Minnesota's version of the Dawes Act Cultural assimilation of Native Americans Aboriginal title in the United States Competency Commission Land run Diminishment Great Māhele Land Buy-Back Program for Tribal Nations Checkerboarding (land) Dawes Act Citations and notes Further reading Black, Jason Edward (2006). US Governmental and Native Voices in the Nineteenth Century: Rhetoric in the Removal and Allotment of American Indians. (PhD dissertation), College Park, MD: University of Maryland. See, for instance, the bibliography on pp. 571–615. Ehle, John (1988). Trail of Tears: The Rise and Fall of the Cherokee Nation. New York: Doubleday. . Jahoda, Gloria (1975). The Trail of Tears: The Story of the American Indian Removals 1813–1855. New York: Holt, Rinehart and Winston. . Strickland, William M. "The rhetoric of removal and the trail of tears: Cherokee speaking against Jackson's Indian removal policy, 1828–1832" Southern Speech Communication Journal (1982). 47#3: 292–309. Young, Mary E. "Indian removal and land allotment: The civilized tribes and Jacksonian justice." American Historical Review 64.1 (1958): 31–45. online
|
incandescent bulbs from January 2009, a tax scheme incentivising commuters' purchases of bicycles and a new scale of vehicle registration tax based on carbon emissions. At a special convention on whether to support the Treaty of Lisbon on 19 January 2008, the party voted 63.5% in favour of supporting the Treaty; this fell short of the party's two-thirds majority requirement for policy issues. As a result, the Green Party did not have an official campaign in the first Lisbon Treaty referendum, although individual members were involved on different sides. The referendum did not pass in 2008, and following the Irish government's negotiation with EU member states of additional legal guarantees and assurances, the Green Party held another special convention meeting in Dublin on 18 July 2009 to decide its position on the second Lisbon referendum. Precisely two-thirds of party members present voted to campaign for a 'Yes' in the referendum. This was the first time in the party's history that it had campaigned in favour of a European treaty. The government's response to the post-2008 banking crisis significantly affected the party's support, and it suffered at the 2009 local elections, returning with only three County Council seats in total and losing its entire traditional Dublin base, with the exception of a Town Council seat in Balbriggan. Déirdre de Búrca, one of two Green Senators nominated by Taoiseach Bertie Ahern in 2007, resigned from the party and her seat in 2010, in part owing to the party's inability to secure her a job in the European Commission. On 23 February 2010, Trevor Sargent resigned as Minister of State for Food and Horticulture owing to allegations over contacting Gardaí about a criminal case involving a constituent, with Ciarán Cuffe being appointed as his replacement the following March. The Green Party supported the passage of legislation for EC–ECB–IMF financial support for Ireland's bank bailout. On 19 January, the party derailed Taoiseach Brian Cowen's plans to reshuffle his cabinet when it refused to endorse Cowen's intended replacement ministers, forcing Cowen to redistribute the vacant portfolios among incumbent ministers. The Greens were angered at not having been consulted about this effort, and went as far as to threaten to pull out of the coalition unless Cowen set a firm date for an election due that spring. He ultimately set the date for 11 March. On 23 January 2011, the Green Party met with Cowen following his resignation as leader of senior coalition partner Fianna Fáil the previous afternoon. The Green Party then announced it was breaking off the coalition and going into opposition with immediate effect. Ministers Gormley and Ryan resigned as cabinet ministers, and Cuffe and White resigned as Ministers of State. Green Party leader John Gormley said at a press conference announcing the withdrawal: In almost four years in Government, from 2007 to 2011, the Green Party contributed to the passage of civil partnership for same-sex couples, the introduction of major planning reform, a major increase in renewable energy output, progressive budgets, and a nationwide scheme of home insulation retrofitting. Wipeout, recovery, and second government term The party suffered a wipeout at the 2011 general election, with all of its six TDs losing their seats, including those of former Ministers John Gormley and Eamon Ryan. Three of their six incumbent TDs lost their deposits. The party's share of the vote fell below 2%, meaning that they could not reclaim election expenses, and their lack of parliamentary representation led to the ending of state funding for the party. The party candidates in the 2011 election to the Seanad were Dan Boyle and Niall Ó Brolcháin; neither was elected, and as a result, for the first time since 1989 the Green Party had no representatives in the Oireachtas. In the aftermath of the wipeout Eamon Ryan was elected as party leader on 27 May 2011, succeeding John Gormley, while Catherine Martin was later appointed the deputy leader of the party. At the 2016 general election Ryan and Martin gained two seats in the Dáil while Grace O'Sullivan picked up a seat in the Seanad. In doing so the Green party became the first Irish political party to lose all their seats in a general election but come back and win seats in a subsequent election. The Greens continued to pick up momentum in 2019, performing quite well in May during the concurrent 2019 local elections and 2019 European Parliament election while in November that same year the party saw Pippa Hackett capture a seat in the Seanad and Joe O'Brien bring home the party's first ever by-election win as a result of the 2019 Dublin Fingal by-election. In the 2020 general election, the party had its best result ever, winning 7.1% of the first-preference votes and returning 12 TDs, an increase of ten from the last election. It became the fourth-largest party in the Dáil and entered government in coalition with Fianna Fáil and Fine Gael. Ryan, Martin and Roderic O'Gorman were appointed as cabinet ministers, with four Green Ministers of State. Clare Bailey, the leader of the Green Party in Northern Ireland, was amongst a number of Green members who stood against the coalition. She said it proposed the "most fiscally conservative arrangements in a generation" and that "the economic and finances behind this deal will really lead to some of the most vulnerable being hit the hardest", as well as it not doing enough on climate and social justice. She also said the deal "fails to deliver on our promise to tackle homelessness and provide better healthcare", "represents an unjust recovery" and "sets out an inadequate and vague pathway towards climate action". In the 2020 Seanad election the party returned two senators. A further two senators were nominated by Taoiseach, Micheál Martin bringing the total party representation in the Oireachtas to 16. In July 2020, Eamon Ryan retained his leadership of the party with a narrow leadership election victory over Catherine Martin in the 2020 Green Party leadership election by 994 votes to 946, a margin of 48 votes. Despite the success at the general election, the party found itself dogged by infighting and resignations afterwards. Prominent member Saoirse McMugh, a candidate in the 2019 European elections, 2020 general election and the 2020 Seanad election, resigned from the party upon the Greens entering government with Fine Gael and Fianna Fáil, parties she believed would damage public enthusiasm for environmentalist policies by pairing them with "socially regressive" policies. Over the course of 2020, 4 councillors as well as both the leader of the Young Greens and the leader of the Queer Greens would also depart from the party, all citing either bullying within the party or dissatisfaction with the coalition and it's policies as the cause. Amongst the resignations were councillors Lorna Bogue and Liam Sinclair, who subsequently formed a new left-wing green party called An Rabharta Glas – Green Left in June 2021. Ideology and policies The Green Party has seven "founding principles". Broadly, these founding principles reflect the "four pillars" of green politics observed by the majority of Green Parties internationally: ecological wisdom, social justice, grassroots democracy, and nonviolence. They also reflect the six guiding principles of the Global Greens, which also includes a respect for diversity as a principle. While strongly associated with environmentalist policies, the party also has policies covering all other key areas. These include protection of the Irish language, lowering the voting age in Ireland to 16, a directly elected Seanad, support for universal healthcare, and a constitutional amendment which guarantees that the water of Ireland will never be privatised. The party also advocates that terminally ill people should have the right to legally choose assisted dying, stating "provisions should apply only to those with a terminal illness which is likely to result in death within six months". It also states that "such a right would only apply where the person has a clear and settled intention to end their own life which is proved by making, and signing, a written declaration to that effect. Such a declaration must be countersigned by two qualified doctors". Internal factions In parallel to other Green Parties in Europe, the 1980s and 1990s saw a division within the Irish Green Party between two factions; the "Realists" (nicknamed the "Realos") and the "Fundamentalists (nicknamed the "Fundies"). The Realists advocated taking a pragmatic approach to politics, which would mean having to accept some compromises on policy in order to get party members elected and into government in order to enact change. The Fundamentalists advocated more radical policies and rejected appeals for pragmatism, citing that the looming effects of Climate Change would leave no time for compromise. Following a national convention in 1998 which saw a realist majority of members defeat a minority of fundamentalist members on a number of votes, and the party subsequently enter government for the first time in 2007, the factionalism of the Realists vs the Fundamentalists was seen to have wilted away with the Realists becoming the ascendent faction. However, in some respects, the division only laid dormant. With the end of the Greens' first term in government and subsequent wipeout in terms of elected representatives, a long rebuilding process left no room for factionalism. However, upon the second rise of the party in the late 2010s, what some would see as a second generation of the Realist vs Fundamentalist division emerged. Following the 2019 local elections and the 2020 general election, the party had more elected representatives than ever before as well as its highest ever membership. This surge in members brought with it a more diverse political outlook of the membership than the party had seen in two decades. Many of the new members of the party were more radical in outlook than their more longstanding peers. On 22 July 2020, several prominent members of the party formed the "Just Transition Greens", an affiliate group within the party with a green left/eco-socialist outlook, who have the objective of moving the party towards policies based
|
Taoiseach. New party leader John Gormley was appointed as Minister for the Environment, Heritage and Local Government and Eamon Ryan was appointed as Minister for Communications, Energy and Natural Resources. Trevor Sargent was appointed as Minister of State at the Department of Agriculture, Fisheries and Food with responsibility for Food and Horticulture. Before its entry into government, the Green Party had been a vocal supporter of the Shell to Sea movement, the campaign to reroute the M3 motorway away from Tara and (to a lesser extent) the campaign to end United States military use of Shannon Airport. After the party entered government there were no substantive changes in government policy on these issues, which meant that Eamon Ryan oversaw the Corrib gas project while he was in office. The Green Party had, at its last annual conference, made an inquiry into the irregularities surrounding the project (see Corrib gas controversy) a precondition of entering government but changed its stance during post-election negotiations with Fianna Fáil. The 2008 budget did not include a carbon levy on fuels such as petrol, diesel and home heating oil, which the Green Party had sought before the election. A carbon levy was, however, introduced in the 2010 Budget. The 2008 budget did include a separate carbon budget announced by Gormley, which introduced new energy efficiency tax credit, a ban on incandescent bulbs from January 2009, a tax scheme incentivising commuters' purchases of bicycles and a new scale of vehicle registration tax based on carbon emissions. At a special convention on whether to support the Treaty of Lisbon on 19 January 2008, the party voted 63.5% in favour of supporting the Treaty; this fell short of the party's two-thirds majority requirement for policy issues. As a result, the Green Party did not have an official campaign in the first Lisbon Treaty referendum, although individual members were involved on different sides. The referendum did not pass in 2008, and following the Irish government's negotiation with EU member states of additional legal guarantees and assurances, the Green Party held another special convention meeting in Dublin on 18 July 2009 to decide its position on the second Lisbon referendum. Precisely two-thirds of party members present voted to campaign for a 'Yes' in the referendum. This was the first time in the party's history that it had campaigned in favour of a European treaty. The government's response to the post-2008 banking crisis significantly affected the party's support, and it suffered at the 2009 local elections, returning with only three County Council seats in total and losing its entire traditional Dublin base, with the exception of a Town Council seat in Balbriggan. Déirdre de Búrca, one of two Green Senators nominated by Taoiseach Bertie Ahern in 2007, resigned from the party and her seat in 2010, in part owing to the party's inability to secure her a job in the European Commission. On 23 February 2010, Trevor Sargent resigned as Minister of State for Food and Horticulture owing to allegations over contacting Gardaí about a criminal case involving a constituent, with Ciarán Cuffe being appointed as his replacement the following March. The Green Party supported the passage of legislation for EC–ECB–IMF financial support for Ireland's bank bailout. On 19 January, the party derailed Taoiseach Brian Cowen's plans to reshuffle his cabinet when it refused to endorse Cowen's intended replacement ministers, forcing Cowen to redistribute the vacant portfolios among incumbent ministers. The Greens were angered at not having been consulted about this effort, and went as far as to threaten to pull out of the coalition unless Cowen set a firm date for an election due that spring. He ultimately set the date for 11 March. On 23 January 2011, the Green Party met with Cowen following his resignation as leader of senior coalition partner Fianna Fáil the previous afternoon. The Green Party then announced it was breaking off the coalition and going into opposition with immediate effect. Ministers Gormley and Ryan resigned as cabinet ministers, and Cuffe and White resigned as Ministers of State. Green Party leader John Gormley said at a press conference announcing the withdrawal: In almost four years in Government, from 2007 to 2011, the Green Party contributed to the passage of civil partnership for same-sex couples, the introduction of major planning reform, a major increase in renewable energy output, progressive budgets, and a nationwide scheme of home insulation retrofitting. Wipeout, recovery, and second government term The party suffered a wipeout at the 2011 general election, with all of its six TDs losing their seats, including those of former Ministers John Gormley and Eamon Ryan. Three of their six incumbent TDs lost their deposits. The party's share of the vote fell below 2%, meaning that they could not reclaim election expenses, and their lack of parliamentary representation led to the ending of state funding for the party. The party candidates in the 2011 election to the Seanad were Dan Boyle and Niall Ó Brolcháin; neither was elected, and as a result, for the first time since 1989 the Green Party had no representatives in the Oireachtas. In the aftermath of the wipeout Eamon Ryan was elected as party leader on 27 May 2011, succeeding John Gormley, while Catherine Martin was later appointed the deputy leader of the party. At the 2016 general election Ryan and Martin gained two seats in the Dáil while Grace O'Sullivan picked up a seat in the Seanad. In doing so the Green party became the first Irish political party to lose all their seats in a general election but come back and win seats in a subsequent election. The Greens continued to pick up momentum in 2019, performing quite well in May during the concurrent 2019 local elections and 2019 European Parliament election while in November that same year the party saw Pippa Hackett capture a seat in the Seanad and Joe O'Brien bring home the party's first ever by-election win as a result of the 2019 Dublin Fingal by-election. In the 2020 general election, the party had its best result ever, winning 7.1% of the first-preference votes and returning 12 TDs, an increase of ten from the last election. It became the fourth-largest party in the Dáil and entered government in coalition with Fianna Fáil and Fine Gael. Ryan, Martin and Roderic O'Gorman were appointed as cabinet ministers, with four Green Ministers of State. Clare Bailey, the leader of the Green Party in Northern Ireland, was amongst a number of Green members who stood against the coalition. She said it proposed the "most fiscally conservative arrangements in a generation" and that "the economic and finances behind this deal will really lead to some of the most vulnerable being hit the hardest", as well as it not doing enough on climate and social justice. She also said the deal "fails to deliver on our promise to tackle homelessness and provide better healthcare", "represents an unjust recovery" and "sets out an inadequate and vague pathway towards climate action". In the 2020 Seanad election the party returned two senators. A further two senators were nominated by Taoiseach, Micheál Martin bringing the total party representation in the Oireachtas to 16. In July 2020, Eamon Ryan retained his leadership of the party with a narrow leadership election victory over Catherine Martin in the 2020 Green Party leadership election by 994 votes to 946, a margin of 48 votes. Despite the success at the general election, the party found itself dogged by infighting and resignations afterwards. Prominent member Saoirse McMugh, a candidate in the 2019 European elections, 2020 general election and the 2020 Seanad election, resigned from the party upon the Greens entering government with Fine Gael and Fianna Fáil, parties she believed would damage public enthusiasm for environmentalist policies by pairing them with "socially regressive" policies. Over the course of 2020, 4 councillors as well as both the leader of the Young Greens and the leader of the Queer Greens would also depart from the party, all citing either bullying within the party or dissatisfaction with the coalition and it's policies as the cause. Amongst the resignations were councillors Lorna Bogue and Liam Sinclair, who subsequently formed a new left-wing green party called An Rabharta Glas – Green Left in June 2021. Ideology and policies The Green Party has seven "founding principles". Broadly, these founding principles reflect the "four pillars" of green politics observed by the majority of Green Parties internationally: ecological wisdom, social justice, grassroots democracy, and nonviolence. They also reflect the six guiding principles of the Global Greens, which also includes a respect for diversity as a principle. While strongly associated with environmentalist policies, the party also has policies covering all other key areas. These include protection of the Irish language, lowering the voting age in Ireland to 16, a directly elected Seanad, support for universal healthcare, and a constitutional amendment which guarantees that the water of Ireland will never be privatised. The party also advocates that terminally ill people should have the right to legally choose assisted dying, stating "provisions should apply only to those with a terminal illness which is likely to result in death within six months". It also
|
Protestant Christianity was not uniformly hostile to the use of religious images. Martin Luther taught the "importance of images as tools for instruction and aids to devotion," stating: "If it is not a sin but good to have the image of Christ in my heart, why should it be a sin to have it in my eyes?" Lutheran churches retained ornate church interiors with a prominent crucifix, reflecting their high view of the real presence of Christ in Eucharist. As such, "Lutheran worship became a complex ritual choreography set in a richly furnished church interior." For Lutherans, "the Reformation renewed rather than removed the religious image." Lutheran scholar Jeremiah Ohl writes:Zwingli and others for the sake of saving the Word rejected all plastic art; Luther, with an equal concern for the Word, but far more conservative, would have all the arts to be the servants of the Gospel. "I am not of the opinion" said [Luther], "that through the Gospel all the arts should be banished and driven away, as some zealots want to make us believe; but I wish to see them all, especially music, in the service of Him Who gave and created them." Again he says: "I have myself heard those who oppose pictures, read from my German Bible.… But this contains many pictures of God, of the angels, of men, and of animals, especially in the Revelation of St. John, in the books of Moses, and in the book of Joshua. We therefore kindly beg these fanatics to permit us also to paint these pictures on the wall that they may be remembered and better understood, inasmuch as they can harm as little on the walls as in books. Would to God that I could persuade those who can afford it to paint the whole Bible on their houses, inside and outside, so that all might see; this would indeed be a Christian work. For I am convinced that it is God's will that we should hear and learn what He has done, especially what Christ suffered. But when I hear these things and meditate upon them, I find it impossible not to picture them in my heart. Whether I want to or not, when I hear, of Christ, a human form hanging upon a cross rises up in my heart: just as I see my natural face reflected when I look into water. Now if it is not sinful for me to have Christ's picture in my heart, why should it be sinful to have it before my eyes?The Ottoman Sultan Suleiman the Magnificent, who had pragmatic reasons to support the Dutch Revolt (the rebels, like himself, were fighting against Spain) also completely approved of their act of "destroying idols," which accorded well with Muslim teachings. A bit later in Dutch history, in 1627 the artist Johannes van der Beeck was arrested and tortured, charged with being a religious non-conformist and a blasphemer, heretic, atheist, and Satanist. The 25 January 1628 judgment from five noted advocates of The Hague pronounced him guilty of "blasphemy against God and avowed atheism, at the same time as leading a frightful and pernicious lifestyle. At the court's order his paintings were burned, and only a few of them survive." Other instances From the 16th through the 19th centuries, many of the polytheistic religious deities and texts of pre-colonial Americas, Oceania, and Africa were destroyed by Christian missionaries and their converts, such as during the Spanish conquest of the Aztec Empire and the Spanish conquest of the Inca Empire. Many of the moai of Easter Island were toppled during the 18th century in the iconoclasm of civil wars before any European encounter. Other instances of iconoclasm may have occurred throughout Eastern Polynesia during its conversion to Christianity in the 19th century. After the Second Vatican Council in the late 20th century, some Roman Catholic parish churches discarded much of their traditional imagery, art, and architecture. Muslim iconoclasm Islam has a much stronger tradition of opposing the depictions of figures, especially religious figures, with Sunni Islam being more opposed than Shia Islam. In the history of Islam, the act of removing idols from the Ka'ba in Mecca has great symbolic and historic importance for all believers. In general, Muslim societies have avoided the depiction of living beings (animals and humans) within such sacred spaces as mosques and madrasahs. This opposition to figural representation is based not on the Qur'an, but on traditions contained within the Hadith. The prohibition of figuration has not always been extended to the secular sphere, and a robust tradition of figural representation exists within Muslim art. However, Western authors have tended to perceive "a long, culturally determined, and unchanging tradition of violent iconoclastic acts" within Islamic society. Early Islam in Arabia The first act of Muslim iconoclasm dates to the beginning of Islam, in 630, when the various statues of Arabian deities housed in the Kaaba in Mecca were destroyed. There is a tradition that Muhammad spared a fresco of Mary and Jesus. This act was intended to bring an end to the idolatry which, in the Muslim view, characterized Jahiliyyah. The destruction of the idols of Mecca did not, however, determine the treatment of other religious communities living under Muslim rule after the expansion of the caliphate. Most Christians under Muslim rule, for example, continued to produce icons and to decorate their churches as they wished. A major exception to this pattern of tolerance in early Islamic history was the "Edict of Yazīd", issued by the Umayyad caliph Yazīd II in 722–723. This edict ordered the destruction of crosses and Christian images within the territory of the caliphate. Researchers have discovered evidence that the order was followed, particularly in present-day Jordan, where archaeological evidence shows the removal of images from the mosaic floors of some, although not all, of the churches that stood at this time. But Yazīd's iconoclastic policies were not continued by his successors, and Christian communities of the Levant continued to make icons without significant interruption from the sixth century to the ninth. Egypt Al-Maqrīzī, writing in the 15th century, attributes the missing nose on the Great Sphinx of Giza to iconoclasm by Muhammad Sa'im al-Dahr, a Sufi Muslim in the mid-1300s. He was reportedly outraged by local Muslims making offerings to the Great Sphinx in the hope of controlling the flood cycle, and he was later executed for vandalism. However, whether this was actually the cause of the missing nose has been debated by historians. Mark Lehner, having performed an archaeological study, concluded that it was broken with instruments at an earlier unknown time between the 3rd and 10th centuries. Ottoman conquests Certain conquering Muslim armies have used local temples or houses of worship as mosques. An example is Hagia Sophia in Istanbul (formerly Constantinople), which was converted into a mosque in 1453. Most icons were desecrated and the rest were covered with plaster. In the 1934 the government of Turkey decided to convert the Hagia Sophia into a museum and the restoration of the mosaics was undertaken by the American Byzantine Institute beginning in 1932. Contemporary events Certain Muslim denominations continue to pursue iconoclastic agendas. There has been much controversy within Islam over the recent and apparently on-going destruction of historic sites by Saudi Arabian authorities, prompted by the fear they could become the subject of "idolatry." A recent act of iconoclasm was the 2001 destruction of the giant Buddhas of Bamyan by the then-Taliban government of Afghanistan. The act generated worldwide protests and was not supported by other Muslim governments and organizations. It was widely perceived in the Western media as a result of the Muslim prohibition against figural decoration. Such an account overlooks "the coexistence between the Buddhas and the Muslim population that marveled at them for over a millennium" before their destruction. The Buddhas had twice in the past been attacked by Nadir Shah and Aurengzeb. According to art historian F. B. Flood, analysis of the Taliban's statements regarding the Buddhas suggest that their destruction was motivated more by political than by theological concerns. Taliban spokespeople have given many different explanations of the motives for the destruction. During the Tuareg rebellion of 2012, the radical Islamist militia Ansar Dine destroyed various Sufi shrines from the 15th and 16th centuries in the city of Timbuktu, Mali. In 2016, the International Criminal Court (ICC) sentenced Ahmad al-Faqi al-Mahdi, a former member of Ansar Dine, to nine years in prison for this destruction of cultural world heritage. This was the first time that the ICC convicted a person for such a crime. The short-lived Islamic State of Iraq and the Levant carried out iconoclastic attacks such as the destruction of Shia mosques and shrines. Notable incidents include blowing up the Mosque of the Prophet Yunus (Jonah) and destroying the Shrine to Seth in Mosul. Iconoclasm in India In early Medieval India, there were numerous recorded instances of temple desecration by Indian kings against rival Indian kingdoms, which involved conflicts between devotees of different Hindu deities, as well as conflicts between Hindus, Buddhists, and Jains. In 642, the Pallava king Narasimhavarman I looted a Ganesha temple in the Chalukyan capital of Vatapi. In c. 692, Chalukya armies invaded northern India where they looted temples of Ganga and Yamuna. In the 8th century, Bengali troops from the Buddhist Pala Empire desecrated temples of Vishnu Vaikuṇṭha, the state deity of Lalitaditya's kingdom in Kashmir. In the early 9th century, Indian Hindu kings from Kanchipuram and the Pandyan king Srimara Srivallabha looted Buddhist temples in Sri Lanka. In the early 10th century, the Pratihara king Herambapala looted an image from a temple in the Sahi kingdom of Kangra, which was later looted by the Pratihara king Yasovarman. During the Muslim conquest of Sindh Records from the campaign recorded in the Chach Nama record the destruction of temples during the early 8th century when the Umayyad governor of Damascus, al-Hajjaj ibn Yusuf, mobilized an expedition of 6000 cavalry under Muhammad bin Qasim in 712. Historian Upendra Thakur records the persecution of Hindus and Buddhists: Chola to Paramara dynasty In the early 11th century, the Chola king Rajendra I looted temples in a number of neighbouring kingdoms, including: Durga and Ganesha temples in the Chalukya Kingdom; Bhairava, Bhairavi, and Kali temples in the Kalinga kingdom; a Nandi temple in the Eastern Chalukya kingdom; and a Siva temple in Pala Bengal. In the mid-11th century, the Chola king Rajadhiraja plundered a temple in Kalyani. In the late 11th century, the Hindu king Harsha of Kashmir plundered temples as an institutionalised activity. In the late 12th to early 13th centuries, the Paramara dynasty attacked and plundered Jain temples in Gujarat. The Somnath temple and Mahmud of Ghazni Perhaps the most notorious episode of iconoclasm in India was Mahmud of Ghazni's attack on the Somnath temple from across the Thar Desert. The temple was first raided in 725, when Junayad, the governor of Sind, sent his armies to destroy it. In 1024, during the reign of Bhima I, the prominent Turkic-Muslim ruler Mahmud of Ghazni raided Gujarat, plundering the Somnath temple and breaking its jyotirlinga despite pleas by Brahmins not to break it. He took away a booty of 20 million dinars. The attack may have been inspired by the belief that an idol of the goddess Manat had been secretly transferred to the temple. According to the Ghaznavid court-poet Farrukhi Sistani, who claimed to have accompanied Mahmud on his raid, Somnat (as rendered in Persian) was a garbled version of su-manat referring to the goddess Manat. According to him, as well as a later Ghaznavid historian Abu Sa'id Gardezi, the images of the other goddesses were destroyed in Arabia but the one of Manat was secretly sent away to Kathiawar (in modern Gujarat) for safekeeping. Since the idol of Manat was an aniconic image of black stone, it could have been easily confused with a lingam at Somnath. Mahmud is said to have broken the idol and taken away parts of it as loot and placed so that people would walk on it. In his letters to the Caliphate, Mahmud exaggerated the size, wealth and religious significance of the Somnath temple, receiving grandiose titles from the Caliph in return. The wooden structure was replaced by Kumarapala (r. 1143–72), who rebuilt the temple out of stone. Mamluk dynasty onward Historical records compiled by Muslim historian Maulana Hakim Saiyid Abdul Hai attest to the religious violence during the Mamluk dynasty under Qutb-ud-din Aybak. The first mosque built in Delhi, the "Quwwat al-Islam" was built with demolished parts of 20 Hindu and Jain temples. This pattern of iconoclasm was common during his reign. During the Delhi Sultanate, a Muslim army led by Malik Kafur, a general of Alauddin Khalji, pursued four violent campaigns into south India, between 1309 and 1311, against the Hindu kingdoms of Devgiri (Maharashtra), Warangal (Telangana), Dwarasamudra (Karnataka) and Madurai (Tamil Nadu). Many Temples were plundered; Hoysaleswara Temple and others were ruthlessly destroyed. In Kashmir, Sikandar Shah Miri (1389–1413) began expanding, and unleashed religious violence that earned him the name but-shikan, or 'idol-breaker'. He earned this sobriquet because of the sheer scale of desecration and destruction of Hindu and Buddhist temples, shrines, ashrams, hermitages, and other holy places in what is now known as Kashmir and its neighboring territories. Firishta states, "After the emigration of the Bramins, Sikundur ordered all the temples in Kashmeer to be thrown down." He destroyed vast majority of Hindu and Buddhist temples in his reach in Kashmir region (north and northwest India). In the 1460s, Kapilendra, founder of the Suryavamsi Gajapati dynasty, sacked the Saiva and Vaishnava temples in the Cauvery delta in the course of wars of conquest in the Tamil country. Vijayanagara king Krishnadevaraya looted a Bala Krishna temple in Udayagiri in 1514, and looted a Vittala temple in Pandharpur in 1520. A regional tradition, along with the Hindu text Madala Panji, states that Kalapahad attacked and damaged the Konark Sun Temple in 1568, as well as many others in Orissa. Some of the most dramatic cases of iconoclasm by Muslims are found in parts of India where Hindu and Buddhist temples were razed and mosques erected in their place. Aurangzeb, the 6th Mughal Emperor, destroyed the famous Hindu temples at Varanasi and Mathura, turning back on his ancestor Akbar's policy of religious freedom and establishing Sharia across his empire. In modern India, the most high-profile case of iconoclasm was from 1992. Hindus, led by the Vishva Hindu Parishad and Bajrang Dal, destroyed the 430-year-old Islamic Babri Masjid in Ayodhya. Iconoclasm in East Asia China There have been a number of anti-Buddhist campaigns in Chinese history that led to the destruction of Buddhist temples and images. One of the most notable of these campaigns was the Great Anti-Buddhist Persecution of the Tang dynasty. During and after the 1911 Xinhai Revolution, there was widespread destruction of religious and secular images in China. During the Northern Expedition in Guangxi in 1926, Kuomintang General Bai Chongxi led his troops in destroying Buddhist temples and smashing Buddhist images, turning the temples into schools and Kuomintang party headquarters. It was reported that almost all of the viharas in Guangxi were destroyed and the monks were removed. Bai also led a wave of anti-foreignism in Guangxi, attacking Americans, Europeans, and other foreigners, and generally making the province unsafe for foreigners and missionaries. Westerners fled from the province and some Chinese Christians were also attacked as imperialist agents. The three goals of the movement were anti-foreignism, anti-imperialism and anti-religion. Bai led the anti-religious movement against superstition. Huang Shaohong, also a Kuomintang member of the New Guangxi clique, supported Bai's campaign. The anti-religious campaign was agreed upon by all Guangxi Kuomintang members. There was extensive destruction of religious and secular imagery in Tibet after it was invaded and occupied by China. Many religious and secular images were destroyed during the Cultural Revolution of 1966–1976, ostensibly because they were a holdover from China's traditional past (which the Communist regime led by Mao Zedong reviled). The Cultural Revolution included widespread destruction of historic artworks in public places and private collections, whether religious or secular. Objects in state museums were mostly left intact. South Korea According to an article in Buddhist-Christian Studies:Over the course of the last decade [1990s] a fairly large number of Buddhist temples in South Korea have been destroyed or damaged by fire by Christian fundamentalists. More recently, Buddhist statues have been identified as idols, and attacked and decapitated in the name of Jesus. Arrests are hard to effect, as the arsonists and vandals work by stealth of night. Angkor Beginning around 1243 AD with the death of Indravarman II, the Khmer Empire went through a period of iconoclasm. At the beginning of the reign of the next king, Jayavarman VIII, the Kingdom went back to Hinduism and the worship of Shiva. Many of the Buddhist images were destroyed by Jayavarman VIII, who reestablished previously Hindu shrines that had been converted to Buddhism by his predecessor. Carvings of the Buddha at temples such as Preah Khan were destroyed, and during this period the Bayon Temple was made a temple to Shiva, with
|
the Monastery of Saint Lawrence in Steenvoorde after a "Hagenpreek," or field sermon, by Sebastiaan Matte on 10 August 1566; by October the wave of furor had gone all through the Spanish Netherlands up to Groningen. Hundreds of other attacks included the sacking of the Monastery of Saint Anthony after a sermon by Jacob de Buysere. The Beeldenstorm marked the start of the revolution against the Spanish forces and the Catholic Church. During the Reformation in England, which started during the reign of Anglican monarch Henry VIII, and was urged on by reformers such as Hugh Latimer and Thomas Cranmer, limited official action was taken against religious images in churches in the late 1530s. Henry's young son, Edward VI, came to the throne in 1547 and, under Cranmer's guidance, issued injunctions for Religious Reforms in the same year and in 1550, an Act of Parliament "for the abolition and putting away of divers books and images." During the English Civil War, Bishop Joseph Hall of Norwich described the events of 1643 when troops and citizens, encouraged by a Parliamentary ordinance against superstition and idolatry, behaved thus: Lord what work was here! What clattering of glasses! What beating down of walls! What tearing up of monuments! What pulling down of seats! What wresting out of irons and brass from the windows! What defacing of arms! What demolishing of curious stonework! What tooting and piping upon organ pipes! And what a hideous triumph in the market-place before all the country, when all the mangled organ pipes, vestments, both copes and surplices, together with the leaden cross which had newly been sawn down from the Green-yard pulpit and the service-books and singing books that could be carried to the fire in the public market-place were heaped together. Protestant Christianity was not uniformly hostile to the use of religious images. Martin Luther taught the "importance of images as tools for instruction and aids to devotion," stating: "If it is not a sin but good to have the image of Christ in my heart, why should it be a sin to have it in my eyes?" Lutheran churches retained ornate church interiors with a prominent crucifix, reflecting their high view of the real presence of Christ in Eucharist. As such, "Lutheran worship became a complex ritual choreography set in a richly furnished church interior." For Lutherans, "the Reformation renewed rather than removed the religious image." Lutheran scholar Jeremiah Ohl writes:Zwingli and others for the sake of saving the Word rejected all plastic art; Luther, with an equal concern for the Word, but far more conservative, would have all the arts to be the servants of the Gospel. "I am not of the opinion" said [Luther], "that through the Gospel all the arts should be banished and driven away, as some zealots want to make us believe; but I wish to see them all, especially music, in the service of Him Who gave and created them." Again he says: "I have myself heard those who oppose pictures, read from my German Bible.… But this contains many pictures of God, of the angels, of men, and of animals, especially in the Revelation of St. John, in the books of Moses, and in the book of Joshua. We therefore kindly beg these fanatics to permit us also to paint these pictures on the wall that they may be remembered and better understood, inasmuch as they can harm as little on the walls as in books. Would to God that I could persuade those who can afford it to paint the whole Bible on their houses, inside and outside, so that all might see; this would indeed be a Christian work. For I am convinced that it is God's will that we should hear and learn what He has done, especially what Christ suffered. But when I hear these things and meditate upon them, I find it impossible not to picture them in my heart. Whether I want to or not, when I hear, of Christ, a human form hanging upon a cross rises up in my heart: just as I see my natural face reflected when I look into water. Now if it is not sinful for me to have Christ's picture in my heart, why should it be sinful to have it before my eyes?The Ottoman Sultan Suleiman the Magnificent, who had pragmatic reasons to support the Dutch Revolt (the rebels, like himself, were fighting against Spain) also completely approved of their act of "destroying idols," which accorded well with Muslim teachings. A bit later in Dutch history, in 1627 the artist Johannes van der Beeck was arrested and tortured, charged with being a religious non-conformist and a blasphemer, heretic, atheist, and Satanist. The 25 January 1628 judgment from five noted advocates of The Hague pronounced him guilty of "blasphemy against God and avowed atheism, at the same time as leading a frightful and pernicious lifestyle. At the court's order his paintings were burned, and only a few of them survive." Other instances From the 16th through the 19th centuries, many of the polytheistic religious deities and texts of pre-colonial Americas, Oceania, and Africa were destroyed by Christian missionaries and their converts, such as during the Spanish conquest of the Aztec Empire and the Spanish conquest of the Inca Empire. Many of the moai of Easter Island were toppled during the 18th century in the iconoclasm of civil wars before any European encounter. Other instances of iconoclasm may have occurred throughout Eastern Polynesia during its conversion to Christianity in the 19th century. After the Second Vatican Council in the late 20th century, some Roman Catholic parish churches discarded much of their traditional imagery, art, and architecture. Muslim iconoclasm Islam has a much stronger tradition of opposing the depictions of figures, especially religious figures, with Sunni Islam being more opposed than Shia Islam. In the history of Islam, the act of removing idols from the Ka'ba in Mecca has great symbolic and historic importance for all believers. In general, Muslim societies have avoided the depiction of living beings (animals and humans) within such sacred spaces as mosques and madrasahs. This opposition to figural representation is based not on the Qur'an, but on traditions contained within the Hadith. The prohibition of figuration has not always been extended to the secular sphere, and a robust tradition of figural representation exists within Muslim art. However, Western authors have tended to perceive "a long, culturally determined, and unchanging tradition of violent iconoclastic acts" within Islamic society. Early Islam in Arabia The first act of Muslim iconoclasm dates to the beginning of Islam, in 630, when the various statues of Arabian deities housed in the Kaaba in Mecca were destroyed. There is a tradition that Muhammad spared a fresco of Mary and Jesus. This act was intended to bring an end to the idolatry which, in the Muslim view, characterized Jahiliyyah. The destruction of the idols of Mecca did not, however, determine the treatment of other religious communities living under Muslim rule after the expansion of the caliphate. Most Christians under Muslim rule, for example, continued to produce icons and to decorate their churches as they wished. A major exception to this pattern of tolerance in early Islamic history was the "Edict of Yazīd", issued by the Umayyad caliph Yazīd II in 722–723. This edict ordered the destruction of crosses and Christian images within the territory of the caliphate. Researchers have discovered evidence that the order was followed, particularly in present-day Jordan, where archaeological evidence shows the removal of images from the mosaic floors of some, although not all, of the churches that stood at this time. But Yazīd's iconoclastic policies were not continued by his successors, and Christian communities of the Levant continued to make icons without significant interruption from the sixth century to the ninth. Egypt Al-Maqrīzī, writing in the 15th century, attributes the missing nose on the Great Sphinx of Giza to iconoclasm by Muhammad Sa'im al-Dahr, a Sufi Muslim in the mid-1300s. He was reportedly outraged by local Muslims making offerings to the Great Sphinx in the hope of controlling the flood cycle, and he was later executed for vandalism. However, whether this was actually the cause of the missing nose has been debated by historians. Mark Lehner, having performed an archaeological study, concluded that it was broken with instruments at an earlier unknown time between the 3rd and 10th centuries. Ottoman conquests Certain conquering Muslim armies have used local temples or houses of worship as mosques. An example is Hagia Sophia in Istanbul (formerly Constantinople), which was converted into a mosque in 1453. Most icons were desecrated and the rest were covered with plaster. In the 1934 the government of Turkey decided to convert the Hagia Sophia into a museum and the restoration of the mosaics was undertaken by the American Byzantine Institute beginning in 1932. Contemporary events Certain Muslim denominations continue to pursue iconoclastic agendas. There has been much controversy within Islam over the recent and apparently on-going destruction of historic sites by Saudi Arabian authorities, prompted by the fear they could become the subject of "idolatry." A recent act of iconoclasm was the 2001 destruction of the giant Buddhas of Bamyan by the then-Taliban government of Afghanistan. The act generated worldwide protests and was not supported by other Muslim governments and organizations. It was widely perceived in the Western media as a result of the Muslim prohibition against figural decoration. Such an account overlooks "the coexistence between the Buddhas and the Muslim population that marveled at them for over a millennium" before their destruction. The Buddhas had twice in the past been attacked by Nadir Shah and Aurengzeb. According to art historian F. B. Flood, analysis of the Taliban's statements regarding the Buddhas suggest that their destruction was motivated more by political than by theological concerns. Taliban spokespeople have given many different explanations of the motives for the destruction. During the Tuareg rebellion of 2012, the radical Islamist militia Ansar Dine destroyed various Sufi shrines from the 15th and 16th centuries in the city of Timbuktu, Mali. In 2016, the International Criminal Court (ICC) sentenced Ahmad al-Faqi al-Mahdi, a former member of Ansar Dine, to nine years in prison for this destruction of cultural world heritage. This was the first time that the ICC convicted a person for such a crime. The short-lived Islamic State of Iraq and the Levant carried out iconoclastic attacks such as the destruction of Shia mosques and shrines. Notable incidents include blowing up the Mosque of the Prophet Yunus (Jonah) and destroying the Shrine to Seth in Mosul. Iconoclasm in India In early Medieval India, there were numerous recorded instances of temple desecration by Indian kings against rival Indian kingdoms, which involved conflicts between devotees of different Hindu deities, as well as conflicts between Hindus, Buddhists, and Jains. In 642, the Pallava king Narasimhavarman I looted a Ganesha temple in the Chalukyan capital of Vatapi. In c. 692, Chalukya armies invaded northern India where they looted temples of Ganga and Yamuna. In the 8th century, Bengali troops from the Buddhist Pala Empire desecrated temples of Vishnu Vaikuṇṭha, the state deity of Lalitaditya's kingdom in Kashmir. In the early 9th century, Indian Hindu kings from Kanchipuram and the Pandyan king Srimara Srivallabha looted Buddhist temples in Sri Lanka. In the early 10th century, the Pratihara king Herambapala looted an image from a temple in the Sahi kingdom of Kangra, which was later looted by the Pratihara king Yasovarman. During the Muslim conquest of Sindh Records from the campaign recorded in the Chach Nama record the destruction of temples during the early 8th century when the Umayyad governor of Damascus, al-Hajjaj ibn Yusuf, mobilized an expedition of 6000 cavalry under Muhammad bin Qasim in 712. Historian Upendra Thakur records the persecution of Hindus and Buddhists: Chola to Paramara dynasty In the early 11th century, the Chola king Rajendra I looted temples in a number of neighbouring kingdoms, including: Durga and Ganesha temples in the Chalukya Kingdom; Bhairava, Bhairavi, and Kali temples in the Kalinga kingdom; a Nandi temple in the Eastern Chalukya kingdom; and a Siva temple in Pala Bengal. In the mid-11th century, the Chola king Rajadhiraja plundered a temple in Kalyani. In the late 11th century, the Hindu king Harsha of Kashmir plundered temples as an institutionalised activity. In the late 12th to early 13th centuries, the Paramara dynasty attacked and plundered Jain temples in Gujarat. The Somnath temple and Mahmud of Ghazni Perhaps the most notorious episode of iconoclasm in India was Mahmud of Ghazni's attack on the Somnath temple from across the Thar Desert. The temple was first raided in 725, when Junayad, the governor of Sind, sent his armies to destroy it. In 1024, during the reign of Bhima I, the prominent Turkic-Muslim ruler Mahmud of Ghazni raided Gujarat, plundering the Somnath temple and breaking its jyotirlinga despite pleas by Brahmins not to break it. He took away a booty of 20 million dinars. The attack may have been inspired by the belief that an idol of the goddess Manat had been secretly transferred to the temple. According to the Ghaznavid court-poet Farrukhi Sistani, who claimed to have accompanied Mahmud on his raid, Somnat (as rendered in Persian) was a garbled version of su-manat referring to the goddess Manat. According to him, as well as a later Ghaznavid historian Abu Sa'id Gardezi, the images of the other goddesses were destroyed in Arabia but the one of Manat was secretly sent away to Kathiawar (in modern Gujarat) for safekeeping. Since the idol of Manat was an aniconic image of black stone, it could have been easily confused with a lingam at Somnath. Mahmud is said to have broken the idol and taken away parts of it as loot and placed so that people would walk on it. In his letters to the Caliphate, Mahmud exaggerated the size, wealth and religious significance of the Somnath temple, receiving grandiose titles from the Caliph in return. The wooden structure was replaced by Kumarapala (r. 1143–72), who rebuilt the temple out of stone. Mamluk dynasty onward Historical records compiled by Muslim historian Maulana Hakim Saiyid Abdul Hai attest to the religious violence during the Mamluk dynasty under Qutb-ud-din Aybak. The first mosque built in Delhi, the "Quwwat al-Islam" was built with demolished parts of 20 Hindu and Jain temples. This pattern of iconoclasm was common during his reign. During the Delhi Sultanate, a Muslim army led by Malik Kafur, a general of Alauddin Khalji, pursued four violent campaigns into south India, between 1309 and 1311, against the Hindu kingdoms of Devgiri (Maharashtra), Warangal (Telangana), Dwarasamudra (Karnataka) and Madurai (Tamil Nadu). Many Temples were plundered; Hoysaleswara Temple and others were ruthlessly destroyed. In Kashmir, Sikandar Shah Miri (1389–1413) began expanding, and unleashed religious violence that earned him the name but-shikan, or 'idol-breaker'. He earned this sobriquet because of the sheer scale of desecration and destruction of Hindu and Buddhist temples, shrines, ashrams, hermitages, and other holy places in what is now known as Kashmir and its neighboring territories. Firishta states, "After the emigration of the Bramins, Sikundur ordered all the temples in Kashmeer to be thrown down." He destroyed vast majority of Hindu and Buddhist temples in his reach in Kashmir region (north and northwest India). In the 1460s, Kapilendra, founder of the Suryavamsi Gajapati dynasty, sacked the Saiva and Vaishnava temples in the Cauvery delta in the course of wars of conquest in the Tamil country. Vijayanagara king Krishnadevaraya looted a Bala Krishna temple in Udayagiri in 1514, and looted a Vittala temple in Pandharpur in 1520. A regional tradition, along with the Hindu text Madala Panji, states that Kalapahad attacked and damaged the Konark Sun Temple in 1568, as well as many others in Orissa. Some of the most dramatic cases of iconoclasm by Muslims are found in parts of India where Hindu and Buddhist temples were razed and mosques erected in their place. Aurangzeb, the 6th Mughal Emperor, destroyed the famous Hindu temples at Varanasi and Mathura, turning back on his ancestor Akbar's policy of religious freedom and establishing Sharia across his empire. In modern India, the most high-profile case of iconoclasm was from 1992. Hindus, led by the Vishva Hindu Parishad and Bajrang Dal, destroyed the 430-year-old Islamic Babri Masjid in Ayodhya. Iconoclasm in East Asia China There have been a number of anti-Buddhist campaigns in Chinese history that led to the destruction of Buddhist temples and images. One of the most notable of these campaigns was the Great Anti-Buddhist Persecution of the Tang dynasty. During and after the 1911 Xinhai Revolution, there was widespread destruction of religious and secular images in China. During the Northern Expedition in Guangxi in 1926, Kuomintang General Bai Chongxi led his troops in destroying Buddhist temples and smashing Buddhist images, turning the temples into schools and Kuomintang party headquarters. It was reported that almost all of the viharas in Guangxi were destroyed and the monks were removed. Bai also led a wave of anti-foreignism in Guangxi, attacking Americans, Europeans, and other foreigners, and generally making the province unsafe for foreigners and missionaries. Westerners fled from the province and some Chinese Christians were also attacked as imperialist agents. The three goals of the movement were anti-foreignism, anti-imperialism and anti-religion. Bai led the anti-religious movement against superstition. Huang Shaohong, also a Kuomintang member of the New Guangxi clique, supported Bai's campaign. The anti-religious campaign was agreed upon by all Guangxi Kuomintang members. There was extensive destruction of religious and secular imagery in Tibet after it was invaded and occupied by China. Many religious and secular images were destroyed during the Cultural Revolution of 1966–1976, ostensibly because they were a holdover from China's traditional past (which the Communist regime led by Mao Zedong reviled). The Cultural Revolution included widespread destruction of historic artworks in public places and private collections, whether religious or secular. Objects in state museums were mostly left intact. South Korea According to an article in Buddhist-Christian Studies:Over the course of the last decade [1990s] a fairly large number of Buddhist temples in South Korea have been destroyed or damaged by fire by Christian fundamentalists. More recently, Buddhist statues have been identified as idols, and attacked and decapitated in the name of Jesus. Arrests are hard to effect, as the arsonists and vandals work by stealth of night. Angkor Beginning around 1243 AD with the death of Indravarman II, the Khmer Empire went through a period of iconoclasm. At the beginning of the reign of the next king, Jayavarman VIII, the Kingdom went back to Hinduism and the worship of Shiva. Many of the Buddhist images were destroyed by Jayavarman VIII, who
|
may also refer to: Inland waterway, a navigable river, canal, or sound Irish Whip Wrestling, an Irish-owned independent professional wrestling promotion established in 2002 Music
|
independent professional wrestling promotion established in 2002 Music It Was Written, the second studio album by American rapper Nas
|
or bannocks. Often, some of the food and drink would be set aside for Brigid. In County Kilkenny graves were decorated on Imbolc with box and laurel flowers (or any other flowers that could be obtained at that time). Additionally a Branch of Virginity was decorated with white ribbons and placed on the grave of a recently deceased maiden on Imbolc. Brigid's bed Brigid would be symbolically invited into the house and a bed would often be made for her. In the north of Ireland, a family member, representing Brigid, would circle the home three times carrying rushes. They would then knock on the door three times, asking to be let in. On the third attempt they are welcomed in, the meal is had, and the rushes are then made into crosses or a bed for Brigid. In 18th century Mann, the custom was to stand at the door with a bundle of rushes and say "Brede, Brede, come to my house tonight. Open the door for Brede and let Brede come in". Similarly, in Donegal, the householder who was sent to fetch the drying russhes knelt on the front step and repeated the following chant three times, "Go on your knees, open your eyes, and let in St. Brigid." Those inside the house answered three times "She's welcome." The rushes were then strewn on the floor as a carpet or bed for Brigid. In the 19th century, some old Manx women would make a bed for Brigid in the barn with food, ale, and a candle on a table. The custom of making Brigid's bed was particularly common in the Hebrides of Scotland, where it was recorded as far back as the 17th century. A bed of hay or a basket-like cradle would be made for Brigid and someone would then call out three times: "" (", come in; thy bed is ready"). A corn dolly called the dealbh Bríde (icon of Brigid) would be laid in the bed and a white wand, usually made of birch, would be laid beside it. It represented the wand that Brigid was said to use to make the vegetation start growing again. Ashes from the fire would be raked smooth and, in the morning, they would look for some kind of mark on the ashes as a sign that Brigid had visited. If there was no mark, they believed bad fortune would come unless they buried a cockerel at the meeting of three streams as an offering and burned incense on their fire that night. Women in some parts of the Hebrides would also dance while holding a large cloth and calling out "" (", come over and make your bed"). Brigid's procession In Ireland and Scotland, a representation of Brigid would be paraded around the community by girls and young women. Usually, it was a doll-like figure known as a (also called a 'Breedhoge' or 'Biddy'). It would be made from rushes or reeds and clad in bits of cloth, flowers, or shells. In the Hebrides of Scotland, a bright shell or crystal called the (guiding star of Brigid) was set on its chest. The girls would carry it in procession while singing a hymn to Brigid. All wore white with their hair unbound as a symbol of purity and youth. They visited every house in the area, where they received either food or more decoration for the . Afterward, they feasted in a house with the set in a place of honour, and put it to bed with lullabies. When the meal was done, the local young men humbly asked for admission, made obeisance to the , and joined the girls in dancing and merrymaking. In many places, only unwed girls could carry the , but in some both boys and girls carried it. In some areas, rather than carrying a , a girl took on the role of Brigid. Escorted by other girls, she went house-to-house wearing 'Brigid's crown' and carrying 'Brigid's shield' and 'Brigid's cross', all of which were made from rushes. The procession in some places included 'strawboys', who wore conical straw hats, masks and played folk music; much like the wrenboys. Up until the mid-20th century, children in Ireland still went house-to-house asking for pennies for "poor Biddy", or money for the poor. In County Kerry, men in white robes went from house to house singing. Brigid's cross In Ireland, Brigid's crosses (pictured on the right) were made on St Brigid's Day. A Brigid's cross usually consists of rushes woven into a four-armed equilateral cross, although there were also three-armed crosses. They were often hung over doors, windows and stables to welcome Brigid and for protection against fire, lightning, illness and evil spirits. The crosses were generally left there until the next St Brigid's Day. In western Connacht, people would make a ('s girdle); a great ring of rushes with a cross woven in the middle. Young boys would carry it around the village, inviting people to step through it and so be blessed. Weather divination The festival was traditionally a time of weather divination, and the old tradition of watching to see if serpents or badgers came from their winter dens may be a forerunner of the North American Groundhog Day. A Scottish Gaelic proverb about the day is: Imbolc was believed to be when the —the divine hag of Gaelic tradition—gathers her firewood for the rest of the winter. Legend has it that if she wishes to make the winter last a good while longer, she will make sure the weather on Imbolc is bright and sunny, so she can gather plenty of firewood. Therefore, people would be relieved if Imbolc is a day of foul weather, as it means the is asleep and winter is almost over. At Imbolc on the Isle of Man, where she is known as , the is said to take the form of a gigantic bird carrying sticks in her beak. Today Today, St Brigid's Day/Imbolc is observed by Christians and non-Christians. Some people still make Brigid's crosses and s or visit holy wells dedicated to St Brigid on 1 February. Brigid's Day parades have been revived in the town of Killorglin, County Kerry, which holds a yearly "Biddy's Day Festival". Men and women wearing elaborate straw hats and masks visit public houses carrying a to ward off evil spirits and bring good luck for the coming year. There are folk music sessions, historical talks, film screenings, drama productions and cross-making workshops. The main event is a torchlight parade of 'Biddy groups' through the town. Since 2009 a yearly "Brigid of Faughart Festival" is held in County Louth. This celebrates Brigid as both saint and goddess, and includes the long-standing pilgrimage to Faughart as well as music, poetry and lectures. The "Imbolc International Music Festival" of folk music is held in Derry at this time of year. In England, the village of Marsden, West Yorkshire holds a biennial "Imbolc Fire Festival" which includes a lantern procession, fire performers, music, fireworks, and a symbolic battle between giant characters representing the Green Man and Jack Frost. More recently, Irish embassies have hosted yearly events on St Brigid's Day
|
on Brigid, a Gaelic goddess. Like the saint, the goddess is associated with wisdom, poetry, healing, protection, blacksmithing and domesticated animals, according to Cormac's Glossary and Lebor Gabála Érenn. It is suggested that the festival, which celebrates the onset of spring, is linked with Brigid in her role as a fertility goddess. According to Hutton, it could be that the goddess Brigid was already linked to Imbolc and this was continued by making it the saint's feast day. Or it could be that Imbolc's association with milk drew the saint to it, because of a legend that she had been the wet-nurse of Christ. Historic customs Imbolc/St Brigid's Day is mentioned in several early Irish manuscripts, but they say very little about its rites and customs. Imbolc (1 February) was treated as one of four seasonal festivals in Gaelic Ireland along with Beltane (1 May), Lughnasadh (1 August) and Samhain (1 November). The tale Tochmarc Emire, which survives in a 10th-century version, names Imbolc as one of the four Gaelic seasonal festivals, and says it is "when the ewes are milked at spring's beginning". This linking of Imbolc with the arrival of lambs and sheep's milk probably reflected farming customs that ensured lambs were born before calves. In late winter/early spring, sheep could survive better than cows on the meager vegetation, and farmers sought to resume milking as soon as possible due to their dwindling stores. The Hibernica Minora includes an Old Irish poem about the four seasonal festivals, translated by Kuno Meyer (1894). It says "Tasting of each food according to order, this is what is proper at Imbolc: washing the hands, the feet, the head". This suggests ritual cleansing. Prominent folklorist Seán Ó Súilleabháin wrote: "The main significance of the Feast of St. Brigid would seem to be that it was a Christianisation of one of the focal points of the agricultural year in Ireland, the starting point of preparations for the spring sowing. Every manifestation of the cult of the saint (or of the deity she replaced) is bound up in some way with food production". From the 18th century to the mid 20th century, many accounts of the festival were recorded by folklorists and other writers. They tell us how it was celebrated then, and shed light on how it may have been celebrated in the past. The festival is observed on 1 February. It has also been argued that originally the timing of the festival was more fluid and based on seasonal changes. It is associated with the onset of the lambing season (which could vary by as much as two weeks before or after 1 February), the beginning of preparations for the spring sowing, and the blooming of blackthorn. In Ireland, a spring cleaning was also customary around the time of St Brigid's Day. Holy wells were visited, as they were during some of the other Gaelic festivals. Visitors to holy wells would pray for health while walking 'sunwise' around the well. They would then leave offerings, typically coins or clooties (see clootie well). Water from the well was used to bless the home, family members, livestock, and fields. Donald Alexander Mackenzie also recorded in the 19th century that offerings were made "to earth and sea". The offering could be milk poured into the ground or porridge poured into the water, as a libation. Saint Brigid As well as being a springtime festival, it is the feast day of Saint Brigid (, modern Irish: , modern Scottish Gaelic: or , anglicised Bridget). On St Brigid's Eve, Brigid was said to visit virtuous households and bless the inhabitants. As Brigid represented the light half of the year, and the power that will bring people from the dark season of winter into spring, her presence was very important at this time of year. Before going to bed, people would leave items of clothing or strips of cloth outside for Brigid to bless. The clothes or strips of cloth would be brought inside, and believed to now have powers of healing and protection. Families would have a special meal or supper on St Brigid's Eve to mark the last night of winter. This typically included food such as colcannon, sowans, dumplings, barmbrack or bannocks. Often, some of the food and drink would be set aside for Brigid. In County Kilkenny graves were decorated on Imbolc with box and laurel flowers (or any other flowers that could be obtained at that time). Additionally a Branch of Virginity was decorated with white ribbons and placed on the grave of a recently deceased maiden on Imbolc. Brigid's bed Brigid would be symbolically invited into the house and a bed would often be made for her. In the north of Ireland, a family member, representing Brigid, would circle the home three times carrying rushes. They would then knock on the door three times, asking to be let in. On the third attempt they are welcomed in, the meal is had, and the rushes are then made into crosses or a bed for Brigid. In 18th century Mann, the custom was to stand at the door with a bundle of rushes and say "Brede, Brede, come to my house tonight. Open the door for Brede and let Brede come in". Similarly, in Donegal, the householder who was sent to fetch the drying russhes knelt on the front step and repeated the following chant three times, "Go on your knees, open your eyes, and let in St. Brigid." Those inside the house answered three times "She's welcome." The rushes were then strewn on the floor as a carpet or bed for Brigid. In the 19th century, some old Manx women would make a bed for Brigid in the barn with food, ale, and a candle on a table. The custom of making Brigid's bed was particularly common in the Hebrides of Scotland, where it was recorded as far back as the 17th century. A bed of hay or a basket-like cradle would be made for Brigid and someone would then call out three times: "" (", come in; thy bed is ready"). A corn dolly called the dealbh Bríde (icon of Brigid) would be laid in the bed and a white wand, usually made of birch, would be laid beside it. It represented the wand that Brigid was said to use to make the vegetation start growing again. Ashes from the fire would be raked smooth and, in the morning, they would look for some kind of mark on the ashes as a sign that Brigid had visited. If there was no mark, they believed bad fortune would come unless they buried a cockerel at the meeting of three streams as an offering and burned incense on their fire that night. Women in some parts of the Hebrides would also dance while holding a large cloth and calling out "" (", come over and make your bed"). Brigid's procession In Ireland and Scotland, a representation of Brigid would be paraded around the community by girls and young women. Usually, it was a doll-like figure known as a (also called a 'Breedhoge' or 'Biddy'). It would be made from rushes or reeds and clad in bits of cloth, flowers, or shells. In the Hebrides of Scotland, a bright shell or crystal called the (guiding star of Brigid) was set on its chest. The girls would carry it in procession while singing a hymn to Brigid. All wore white with their hair unbound as a symbol of purity and youth. They visited every house in the area, where they received either food or more decoration for the . Afterward, they feasted in a house with the set in a place of honour, and put it to bed with lullabies. When the meal was done, the local young men humbly asked for admission, made obeisance to the , and joined the girls in dancing and merrymaking. In many places, only unwed girls could carry the , but in some both boys and girls carried it. In some areas, rather than carrying a , a girl took on the role of Brigid. Escorted by other girls, she went house-to-house wearing 'Brigid's crown' and carrying 'Brigid's shield' and 'Brigid's cross', all of which were made from rushes. The procession in some places included 'strawboys', who wore conical straw hats, masks and played folk music; much like the wrenboys. Up until the mid-20th century, children in Ireland still went house-to-house asking for pennies for "poor Biddy", or money for the poor. In County Kerry, men in white robes went from house to house singing. Brigid's cross In Ireland, Brigid's crosses (pictured on the right) were made on St Brigid's Day. A Brigid's cross usually consists of rushes woven into a four-armed equilateral cross, although there were also three-armed crosses. They were often hung over doors, windows and stables to welcome
|
false prophet and ending with Isaiah being martyred – none of which is attested in the original Biblical account. Gregory of Nyssa (c. 335–395) believed that the Prophet Isaiah "knew more perfectly than all others the mystery of the religion of the Gospel". Jerome (c. 342–420) also lauds the Prophet Isaiah, saying, "He was more of an Evangelist than a Prophet, because he described all of the Mysteries of the Church of Christ so vividly that you would assume he was not prophesying about the future, but rather was composing a history of past events." Of specific note are the songs of the Suffering Servant, which Christians say are a direct prophetic revelation of the nature, purpose, and detail of the death of Jesus Christ. The Book of Isaiah is quoted many times by New Testament writers. Ten of those references are about the Suffering Servant, how he will suffer and die to save many from their sins, be buried in a rich man's tomb, and be a light to the Gentiles. The Gospel of John says that Isaiah "saw Jesus' glory and spoke about him." The Eastern Orthodox Church celebrates Saint Isaiah the Prophet on May 9. Isaiah is also listed on the page of saints for May 9 in the Roman martyrology of the Roman Catholic Church. Latter Day Saint movement The Book of Mormon quotes Jesus Christ as stating that "great are the words of Isaiah", and that all things prophesied by Isaiah have been and will be fulfilled. The Book of Mormon and Doctrine and Covenants also quote Isaiah more than any other prophet from the Old Testament. Additionally, members of The Church of Jesus Christ of Latter-day Saints consider the founding of the church by Joseph Smith in the 19th century to be a fulfillment of Isaiah 11, the translation of the Book of Mormon to be a fulfillment of Isaiah 29, and the building of Latter-day Saint temples as a fulfillment of Isaiah 2:2. In Islam Isaiah, or his Arabic name أشعياء (transliterated: Ishaʻyā'''), is not mentioned by name in the Quran or the Hadith, but appears frequently as a prophet in Islamic sources, such as Qisas Al-Anbiya and Tafsir. Tabari (310/923) provides the typical accounts for Islamic traditions regarding Isaiah. He is further mentioned and accepted as a prophet by other Islamic scholars such as Ibn Kathir, Al-Tha`labi and Kisa'i and also modern scholars such as Muhammad Asad and Abdullah Yusuf Ali. According to Muslim scholars, Isaiah prophecised the coming of Jesus and Muhammad, although the reference to Muhammad is disputed by other religious scholars. Isaiah's narrative in Islamic literature can be divided into three sections. The first establishes Isaiah as a prophet of Israel during the reign of Hezekiah; the second relates Isaiah's actions during the siege of Jerusalem by Sennacherib; and the third warns the nation of coming doom. Paralleling the Hebrew Bible, Islamic tradition states that Hezekiah was king in Jerusalem during Isaiah's time. Hezekiah heard and obeyed Isaiah's advice, but could not quell the turbulence in Israel. This tradition maintains that Hezekiah was a righteous man and that the turbulence worsened after him. After the death of the king, Isaiah told the people not to forsake God, and warned Israel to cease from its persistent sin and disobedience. Muslim tradition maintains that the unrighteous of Israel in their anger sought to kill Isaiah. In a death that resembles that attributed to Isaiah in Lives of the Prophets, Muslim exegesis recounts that Isaiah was martyred by Israelites by being sawn in two. In the courts of Al-Ma'mun, the seventh Abbasid caliph, Ali al-Ridha, the great grandson of Muhammad and prominent scholar (Imam) of his era, was questioned by the High Jewish Rabbi to prove through the Torah that both Jesus and Muhammad were prophets. Among his several proofs, the Imam references the Book of Isaiah, stating "Sha‘ya (Isaiah), the Prophet, said in the Torah concerning what you and your companions say: ‘I have seen two riders to whom (He) illuminated earth. One of them was on a donkey and the other was on a camel. Who is the rider of the donkey, and who is the rider of the camel?'" The Rabbi was unable to answer with certainty. Al-Ridha goes on to state that "As for the rider of the donkey, he is ‘Isa (Jesus); and as for the rider of the camel, he is Muhammad, may Allah bless him and his family. Do you deny that this (statement) is in the Torah?" The Rabbi responds "No, I do not deny it." In rabbinic literature Allusions in Jewish rabbinic literature to Isaiah contain various expansions, elaborations and inferences that go beyond what is presented in the text of the Bible itself. Origin and calling According to the ancient rabbis, Isaiah was a descendant of Judah and Tamar, and his father Amoz was the brother of King Amaziah. While Isaiah, says the Midrash, was walking up and down in his study he heard God saying, "Whom shall I send?" Then Isaiah said, "Here am I; send me!" Thereupon God said to him," My children are troublesome and sensitive; if you are ready to be insulted and even beaten by them, you may accept My message; if not, you would better renounce it". Isaiah accepted the mission, and was the most forbearing, as well as the most patriotic, among the prophets, always defending Israel and imploring forgiveness for its sins. When Isaiah said, "I dwell in the midst of a people of unclean lips", he was rebuked by God for speaking in such terms of His people. His death It is related in the Talmud that Rabbi Simeon ben Azzai found in Jerusalem an account wherein it was written that King Manasseh killed Isaiah. King Manasseh said to Isaiah, "Moses, your master, said, 'No man may see God and live'; but you have said, 'I saw the Lord seated upon his throne'"; and went on to point out other contradictions—as between Deuteronomy and Isaiah 40; between Exodus 33 and 2 Kings Isaiah thought: "I know that he will not accept my explanations; why should I increase his guilt?" He then uttered the
|
Isaiah's wife was called "the prophetess", either because she was endowed with the prophetic gift, like Deborah and Huldah, or simply because she was the "wife of the prophet". They had two sons, naming the eldest Shear-jashub, meaning "A remnant shall return", and the youngest, Maher-Shalal-Hash-Baz, meaning, "Spoil quickly, plunder speedily." Soon after this, Shalmaneser V determined to subdue the kingdom of Israel, taking over and destroying Samaria (722 BC). So long as Ahaz reigned, the kingdom of Judah was untouched by the Assyrian power. But when Hezekiah gained the throne, he was encouraged to rebel "against the king of Assyria", and entered into an alliance with the king of Egypt. The king of Assyria threatened the king of Judah, and at length invaded the land. Sennacherib (701 BC) led a powerful army into Judah. Hezekiah was reduced to despair, and submitted to the Assyrians. But after a brief interval, war broke out again. Again Sennacherib led an army into Judah, one detachment of which threatened Jerusalem Isaiah on that occasion encouraged Hezekiah to resist the Assyrians, whereupon Sennacherib sent a threatening letter to Hezekiah, which he "spread before the LORD". According to the account in 2 Kings 19 (and its derivative account in 2 Chronicles 32) an angel of God fell on the Assyrian army and 185,000 of its men were killed in one night. "Like Xerxes in Greece, Sennacherib never recovered from the shock of the disaster in Judah. He made no more expeditions against either Southern Palestine or Egypt." The remaining years of Hezekiah's reign were peaceful. Isaiah probably lived to its close, and possibly into the reign of Manasseh. The time and manner of his death are not specified in either the Bible or other primary sources. Later Jewish tradition says that he suffered martyrdom by being sawn in two under the orders of Manasseh. The book of Isaiah, along with the book of Jeremiah, is distinctive in the Hebrew bible for its direct portrayal of the "wrath of the Lord" as presented, for example, in Isaiah 9:19 stating, "Through the wrath of the Lord of hosts is the land darkened, and the people shall be as the fuel of the fire." In Christianity The Ascension of Isaiah, a pseudepigraphical Christian text dated to sometime between the end of the 1st century and the beginning of the 3rd, gives a detailed story of Isaiah confronting an evil false prophet and ending with Isaiah being martyred – none of which is attested in the original Biblical account. Gregory of Nyssa (c. 335–395) believed that the Prophet Isaiah "knew more perfectly than all others the mystery of the religion of the Gospel". Jerome (c. 342–420) also lauds the Prophet Isaiah, saying, "He was more of an Evangelist than a Prophet, because he described all of the Mysteries of the Church of Christ so vividly that you would assume he was not prophesying about the future, but rather was composing a history of past events." Of specific note are the songs of the Suffering Servant, which Christians say are a direct prophetic revelation of the nature, purpose, and detail of the death of Jesus Christ. The Book of Isaiah is quoted many times by New Testament writers. Ten of those references are about the Suffering Servant, how he will suffer and die to save many from their sins, be buried in a rich man's tomb, and be a light to the Gentiles. The Gospel of John says that Isaiah "saw Jesus' glory and spoke about him." The Eastern Orthodox Church celebrates Saint Isaiah the Prophet on May 9. Isaiah is also listed on the page of saints for May 9 in the Roman martyrology of the Roman Catholic Church. Latter Day Saint movement The Book of Mormon quotes Jesus Christ as stating that "great are the words of Isaiah", and that all things prophesied by Isaiah have been and will be fulfilled. The Book of Mormon and Doctrine and Covenants also quote Isaiah more than any other prophet from the Old Testament. Additionally, members of The Church of Jesus Christ of Latter-day Saints consider the founding of the church by Joseph Smith in the 19th century to be a fulfillment of Isaiah 11, the translation of the Book of Mormon to be a fulfillment of Isaiah 29, and the building of Latter-day Saint temples as a fulfillment of Isaiah 2:2. In Islam Isaiah, or his Arabic name أشعياء (transliterated: Ishaʻyā'''), is not mentioned by name in the Quran or the Hadith, but appears frequently as a prophet in Islamic sources, such
|
concept was adopted in Western Sahara, with the gradual withdrawal of Spanish forces in the 1970s as the Zemla Intifada, but was essentially rooted into the Western Sahara conflict with the First Sahrawi Intifada – protests by Sahrawi activists in the Western Sahara, south of Morocco (1999–2004), Independence Intifada (Western Sahara) or Second Sahrawi Intifada and finally the Gdeim Izik protests in 2011. In the Palestinian context, the word refers to attempts to "shake off" the Israeli occupation of the West Bank and Gaza Strip in the First and Second Intifadas, where it was originally chosen to connote "aggressive nonviolent resistance", a meaning it bore among Palestinian students in struggles in the 1980s and which they adopted as less confrontational than terms in earlier militant rhetoric since it bore no nuance of violence. List of events named Intifada Intifada may refer to these events: Iraqi Intifada, a series of strikes and riots in Iraq in 1952, aimed against the Hashemite monarchy rule October Revolution, a series of strikes, riots, and demonstrations in Sudan, that ended with the dissolution of the Abbud military regime and the beginning of second civilian rule in 1964 March Intifada, a leftist uprising against the British colonial presence in Bahrain in March 1965 Zemla Intifada, against Spanish colonial rule in then Spanish Sahara, in June 1970 In Lebanese internal conflicts: February 6 Intifada (1984), during the Lebanese Civil War Cedar Revolution or "Intifada of Independence", the events in Lebanon after Rafic Hariri's 2005 assassination In the Israeli–Palestine conflict: First Intifada, a Palestinian uprising against the Israeli occupation lasting from December 1987 to 1993 Second Intifada or the Al-Aqsa Intifada, a period of intensified Israeli-Palestinian violence, which began in late September 2000 and ended around 2005 2014 Jerusalem unrest, a series of violent
|
is an Arabic word literally meaning, as a noun, "tremor", "shivering", "shuddering". It is derived from an Arabic term nafada meaning "to shake", "shake off", "get rid of", as a dog might shrug off water, or as one might shake off sleep, or dirt from one's sandals. History The concept intifada was first utilized in modern times in 1952 within the Kingdom of Iraq, when socialist and communist parties took to the streets to protest the Hashemite monarchy, with inspiration of the 1952 Egyptian Revolution. The concept was adopted in Western Sahara, with the gradual withdrawal of Spanish forces in the 1970s as the Zemla Intifada, but was essentially rooted into the Western Sahara conflict with the First Sahrawi Intifada – protests by Sahrawi activists in the Western Sahara, south of Morocco (1999–2004), Independence Intifada (Western Sahara) or Second Sahrawi Intifada and finally the Gdeim Izik protests in 2011. In the Palestinian context, the word refers to attempts to "shake off" the Israeli occupation of the West Bank and Gaza Strip in the First and Second Intifadas, where it was originally chosen to connote "aggressive nonviolent resistance", a meaning it bore among Palestinian students in struggles in the 1980s and which they adopted as less confrontational than terms in earlier militant rhetoric since it bore no nuance of violence. List of events named Intifada Intifada may refer to these events: Iraqi Intifada, a series of strikes and riots in Iraq in 1952, aimed against the Hashemite monarchy rule October Revolution, a series of strikes, riots, and demonstrations in Sudan, that ended with the dissolution of the Abbud military regime and the beginning of second civilian rule in 1964 March Intifada, a leftist uprising against the British colonial presence in Bahrain in March 1965 Zemla Intifada, against
|
instruments on several satellites and rockets. IRI is updated yearly. IRI is more accurate in describing the variation of the electron density from bottom of the ionosphere to the altitude of maximum density than in describing the total electron content (TEC). Since 1999 this model is "International Standard" for the terrestrial ionosphere (standard TS16457). Persistent anomalies to the idealized model Ionograms allow deducing, via computation, the true shape of the different layers. Nonhomogeneous structure of the electron/ion-plasma produces rough echo traces, seen predominantly at night and at higher latitudes, and during disturbed conditions. Winter anomaly At mid-latitudes, the F2 layer daytime ion production is higher in the summer, as expected, since the Sun shines more directly on the Earth. However, there are seasonal changes in the molecular-to-atomic ratio of the neutral atmosphere that cause the summer ion loss rate to be even higher. The result is that the increase in the summertime loss overwhelms the increase in summertime production, and total F2 ionization is actually lower in the local summer months. This effect is known as the winter anomaly. The anomaly is always present in the northern hemisphere, but is usually absent in the southern hemisphere during periods of low solar activity. Equatorial anomaly Within approximately ± 20 degrees of the magnetic equator, is the equatorial anomaly. It is the occurrence of a trough in the ionization in the F2 layer at the equator and crests at about 17 degrees in magnetic latitude. The Earth's magnetic field lines are horizontal at the magnetic equator. Solar heating and tidal oscillations in the lower ionosphere move plasma up and across the magnetic field lines. This sets up a sheet of electric current in the E region which, with the horizontal magnetic field, forces ionization up into the F layer, concentrating at ± 20 degrees from the magnetic equator. This phenomenon is known as the equatorial fountain. Equatorial electrojet The worldwide solar-driven wind results in the so-called Sq (solar quiet) current system in the E region of the Earth's ionosphere (ionospheric dynamo region) ( altitude). Resulting from this current is an electrostatic field directed west–east (dawn–dusk) in the equatorial day side of the ionosphere. At the magnetic dip equator, where the geomagnetic field is horizontal, this electric field results in an enhanced eastward current flow within ± 3 degrees of the magnetic equator, known as the equatorial electrojet. Ephemeral ionospheric perturbations X-rays: sudden ionospheric disturbances (SID) When the Sun is active, strong solar flares can occur that hit the sunlit side of Earth with hard X-rays. The X-rays penetrate to the D-region, releasing electrons that rapidly increase absorption, causing a high frequency (3–30 MHz) radio blackout that can persist for many hours after strong flares. During this time very low frequency (3–30 kHz) signals will be reflected by the D layer instead of the E layer, where the increased atmospheric density will usually increase the absorption of the wave and thus dampen it. As soon as the X-rays end, the sudden ionospheric disturbance (SID) or radio black-out steadily declines as the electrons in the D-region recombine rapidly and propagation gradually returns to pre-flare conditions over minutes to hours depending on the solar flare strength and frequency. Protons: polar cap absorption (PCA) Associated with solar flares is a release of high-energy protons. These particles can hit the Earth within 15 minutes to 2 hours of the solar flare. The protons spiral around and down the magnetic field lines of the Earth and penetrate into the atmosphere near the magnetic poles increasing the ionization of the D and E layers. PCA's typically last anywhere from about an hour to several days, with an average of around 24 to 36 hours. Coronal mass ejections can also release energetic protons that enhance D-region absorption in the polar regions. Geomagnetic storms A geomagnetic storm is a temporary -- sometimes intense -- disturbance of the Earth's magnetosphere. During a geomagnetic storm the F₂ layer will become unstable, fragment, and may even disappear completely. In the Northern and Southern polar regions of the Earth aurorae will be observable in the night sky. Lightning Lightning can cause ionospheric perturbations in the D-region in one of two ways. The first is through VLF (very low frequency) radio waves launched into the magnetosphere. These so-called "whistler" mode waves can interact with radiation belt particles and cause them to precipitate onto the ionosphere, adding ionization to the D-region. These disturbances are called "lightning-induced electron precipitation" (LEP) events. Additional ionization can also occur from direct heating/ionization as a result of huge motions of charge in lightning strikes. These events are called early/fast. In 1925, C. T. R. Wilson proposed a mechanism by which electrical discharge from lightning storms could propagate upwards from clouds to the ionosphere. Around the same time, Robert Watson-Watt, working at the Radio Research Station in Slough, UK, suggested that the ionospheric sporadic E layer (Es) appeared to be enhanced as a result of lightning but that more work was needed. In 2005, C. Davis and C. Johnson, working at the Rutherford Appleton Laboratory in Oxfordshire, UK, demonstrated that the Es layer was indeed enhanced as a result of lightning activity. Their subsequent research has focused on the mechanism by which this process can occur. Applications Radio communication Due to the ability of ionized atmospheric gases to refract high frequency (HF, or shortwave) radio waves, the ionosphere can reflect radio waves directed into the sky back toward the Earth. Radio waves directed at an angle into the sky can return to Earth beyond the horizon. This technique, called "skip" or "skywave" propagation, has been used since the 1920s to communicate at international or intercontinental distances. The returning radio waves can reflect off the Earth's surface into the sky again, allowing greater ranges to be achieved with multiple hops. This communication method is variable and unreliable, with reception over a given path depending on time of day or night, the seasons, weather, and the 11-year sunspot cycle. During the first half of the 20th century it was widely used for transoceanic telephone and telegraph service, and business and diplomatic communication. Due to its relative unreliability, shortwave radio communication has been mostly abandoned by the telecommunications industry, though it remains important for high-latitude communication where satellite-based radio communication is not possible. Some broadcasting stations and automated services still use shortwave radio frequencies, as do radio amateur hobbyists for private recreational contacts. Mechanism of refraction When a radio wave reaches the ionosphere, the electric field in the wave forces the electrons in the ionosphere into oscillation at the same frequency as the radio wave. Some of the radio-frequency energy is given up to this resonant oscillation. The oscillating electrons will then either be lost to recombination or will re-radiate the original wave energy. Total refraction can occur when the collision frequency of the ionosphere is less than the radio frequency, and if the electron density in the ionosphere is great enough. A qualitative understanding of how an electromagnetic wave propagates through the ionosphere can be obtained by recalling geometric optics. Since the ionosphere is a plasma, it can be shown that the refractive index is less than unity. Hence, the electromagnetic "ray" is bent away from the normal rather than toward the normal as would be indicated when the refractive index is greater than unity. It can also be shown that the refractive index of a plasma, and hence the ionosphere, is frequency-dependent, see Dispersion (optics). The critical frequency is the limiting frequency at or below which a radio wave is reflected by an ionospheric layer at vertical incidence. If the transmitted frequency is higher than the plasma frequency of the ionosphere, then the electrons cannot respond fast enough, and they are not able to re-radiate the signal. It is calculated as shown below: where N = electron density per m3 and fcritical is in Hz. The Maximum Usable Frequency (MUF) is defined as the upper frequency limit that can be used for transmission between two points at a specified time. where = angle of attack, the angle of the wave relative to the horizon, and sin is the sine function. The cutoff frequency is the frequency below which a radio wave fails to penetrate a layer of the ionosphere at the incidence angle required for transmission between two specified points by refraction from the layer. GPS/GNSS ionospheric correction There are a number of models used to understand the effects of the ionosphere global navigation satellite systems. The Klobuchar model is currently used to compensate for ionospheric effects in GPS. This model was developed at the US Air Force Geophysical Research Laboratory circa 1974 by John (Jack) Klobuchar. The Galileo navigation system uses the NeQuick model. Other applications The open system electrodynamic tether, which uses the ionosphere, is being researched. The space tether uses plasma contactors and the ionosphere as parts of a circuit to extract energy from the Earth's magnetic field by electromagnetic induction. Measurements Overview Scientists explore the structure of the ionosphere by a wide variety of methods. They include: passive observations of optical and radio emissions generated in the ionosphere bouncing radio waves of different frequencies from it
|
daytime ion production is higher in the summer, as expected, since the Sun shines more directly on the Earth. However, there are seasonal changes in the molecular-to-atomic ratio of the neutral atmosphere that cause the summer ion loss rate to be even higher. The result is that the increase in the summertime loss overwhelms the increase in summertime production, and total F2 ionization is actually lower in the local summer months. This effect is known as the winter anomaly. The anomaly is always present in the northern hemisphere, but is usually absent in the southern hemisphere during periods of low solar activity. Equatorial anomaly Within approximately ± 20 degrees of the magnetic equator, is the equatorial anomaly. It is the occurrence of a trough in the ionization in the F2 layer at the equator and crests at about 17 degrees in magnetic latitude. The Earth's magnetic field lines are horizontal at the magnetic equator. Solar heating and tidal oscillations in the lower ionosphere move plasma up and across the magnetic field lines. This sets up a sheet of electric current in the E region which, with the horizontal magnetic field, forces ionization up into the F layer, concentrating at ± 20 degrees from the magnetic equator. This phenomenon is known as the equatorial fountain. Equatorial electrojet The worldwide solar-driven wind results in the so-called Sq (solar quiet) current system in the E region of the Earth's ionosphere (ionospheric dynamo region) ( altitude). Resulting from this current is an electrostatic field directed west–east (dawn–dusk) in the equatorial day side of the ionosphere. At the magnetic dip equator, where the geomagnetic field is horizontal, this electric field results in an enhanced eastward current flow within ± 3 degrees of the magnetic equator, known as the equatorial electrojet. Ephemeral ionospheric perturbations X-rays: sudden ionospheric disturbances (SID) When the Sun is active, strong solar flares can occur that hit the sunlit side of Earth with hard X-rays. The X-rays penetrate to the D-region, releasing electrons that rapidly increase absorption, causing a high frequency (3–30 MHz) radio blackout that can persist for many hours after strong flares. During this time very low frequency (3–30 kHz) signals will be reflected by the D layer instead of the E layer, where the increased atmospheric density will usually increase the absorption of the wave and thus dampen it. As soon as the X-rays end, the sudden ionospheric disturbance (SID) or radio black-out steadily declines as the electrons in the D-region recombine rapidly and propagation gradually returns to pre-flare conditions over minutes to hours depending on the solar flare strength and frequency. Protons: polar cap absorption (PCA) Associated with solar flares is a release of high-energy protons. These particles can hit the Earth within 15 minutes to 2 hours of the solar flare. The protons spiral around and down the magnetic field lines of the Earth and penetrate into the atmosphere near the magnetic poles increasing the ionization of the D and E layers. PCA's typically last anywhere from about an hour to several days, with an average of around 24 to 36 hours. Coronal mass ejections can also release energetic protons that enhance D-region absorption in the polar regions. Geomagnetic storms A geomagnetic storm is a temporary -- sometimes intense -- disturbance of the Earth's magnetosphere. During a geomagnetic storm the F₂ layer will become unstable, fragment, and may even disappear completely. In the Northern and Southern polar regions of the Earth aurorae will be observable in the night sky. Lightning Lightning can cause ionospheric perturbations in the D-region in one of two ways. The first is through VLF (very low frequency) radio waves launched into the magnetosphere. These so-called "whistler" mode waves can interact with radiation belt particles and cause them to precipitate onto the ionosphere, adding ionization to the D-region. These disturbances are called "lightning-induced electron precipitation" (LEP) events. Additional ionization can also occur from direct heating/ionization as a result of huge motions of charge in lightning strikes. These events are called early/fast. In 1925, C. T. R. Wilson proposed a mechanism by which electrical discharge from lightning storms could propagate upwards from clouds to the ionosphere. Around the same time, Robert Watson-Watt, working at the Radio Research Station in Slough, UK, suggested that the ionospheric sporadic E layer (Es) appeared to be enhanced as a result of lightning but that more work was needed. In 2005, C. Davis and C. Johnson, working at the Rutherford Appleton Laboratory in Oxfordshire, UK, demonstrated that the Es layer was indeed enhanced as a result of lightning activity. Their subsequent research has focused on the mechanism by which this process can occur. Applications Radio communication Due to the ability of ionized atmospheric gases to refract high frequency (HF, or shortwave) radio waves, the ionosphere can reflect radio waves directed into the sky back toward the Earth. Radio waves directed at an angle into the sky can return to Earth beyond the horizon. This technique, called "skip" or "skywave" propagation, has been used since the 1920s to communicate at international or intercontinental distances. The returning radio waves can reflect off the Earth's surface into the sky again, allowing greater ranges to be achieved with multiple hops. This communication method is variable and unreliable, with reception over a given path depending on time of day or night, the seasons, weather, and the 11-year sunspot cycle. During the first half of the 20th century it was widely used for transoceanic telephone and telegraph service, and business and diplomatic communication. Due to its relative unreliability, shortwave radio communication has been mostly abandoned by the telecommunications industry, though it remains important for high-latitude communication where satellite-based radio communication is not possible. Some broadcasting stations and automated services still use shortwave radio frequencies, as do radio amateur hobbyists for private recreational contacts. Mechanism of refraction When a radio wave reaches the ionosphere, the electric field in the wave forces the electrons in the ionosphere into oscillation at the same frequency as the radio wave. Some of the radio-frequency energy is given up to this resonant oscillation. The oscillating electrons will then either be lost to recombination or will re-radiate the original wave energy. Total refraction can occur when the collision frequency of the ionosphere is less than the radio frequency, and if the electron density in the ionosphere is great enough. A qualitative understanding of how an electromagnetic wave propagates through the ionosphere can be obtained by recalling geometric optics. Since the ionosphere is a plasma, it can be shown that the refractive index is less than unity. Hence, the electromagnetic "ray" is bent away from the normal rather than toward the normal as would be indicated when the refractive index is greater than unity. It can also be shown that the refractive index of a plasma, and hence the ionosphere, is frequency-dependent, see Dispersion (optics). The critical frequency is the limiting frequency at or below which a radio wave is reflected by an ionospheric layer at vertical incidence. If the transmitted frequency is higher than the plasma frequency of the ionosphere, then the electrons cannot respond fast enough, and they are not able to re-radiate the signal. It is calculated as shown below: where N = electron density per m3 and fcritical is in Hz. The Maximum Usable Frequency (MUF) is defined as the upper frequency limit that can be used for transmission between two points at a specified time. where = angle of attack, the angle of the wave relative to the horizon, and sin is the sine function. The cutoff frequency is the frequency below which a radio wave fails to penetrate a layer of the ionosphere at the incidence angle required for transmission between two specified points by refraction from the layer. GPS/GNSS ionospheric correction There are a number of models used to understand the effects of the ionosphere global navigation satellite systems. The Klobuchar model is currently used to compensate for ionospheric effects in GPS. This model was developed at the US Air Force Geophysical Research Laboratory circa 1974 by John (Jack) Klobuchar. The Galileo navigation system uses the NeQuick model. Other applications The open system electrodynamic tether, which uses the ionosphere, is being researched. The space tether uses plasma contactors and the ionosphere as parts of a circuit to extract energy from the Earth's magnetic field by electromagnetic induction. Measurements Overview Scientists explore the structure of the ionosphere by a wide variety of methods. They include: passive observations of optical and radio emissions generated in the ionosphere bouncing radio waves of different frequencies from it incoherent scatter radars such as the EISCAT, Sondre Stromfjord, Millstone Hill, Arecibo, Advanced Modular Incoherent Scatter Radar (AMISR) and Jicamarca radars coherent scatter radars such as the Super Dual Auroral Radar Network (SuperDARN) radars special receivers to detect how the reflected waves have changed from the transmitted waves. A variety of experiments, such as HAARP (High Frequency Active Auroral Research Program), involve high power radio transmitters to modify the properties of the ionosphere. These investigations focus on studying the properties and behavior of ionospheric plasma, with particular emphasis on being able to understand and use it to enhance communications and surveillance systems for both civilian and military purposes. HAARP was started in 1993 as a proposed twenty-year experiment, and is currently active near Gakona, Alaska. The SuperDARN radar project researches the high- and mid-latitudes using coherent backscatter of radio waves in the 8 to 20 MHz range. Coherent backscatter is similar to Bragg scattering in crystals and involves the constructive interference of scattering from ionospheric density irregularities. The project involves more than 11 different countries and multiple radars in both hemispheres. Scientists are also examining the ionosphere by the changes to radio waves, from satellites and stars, passing through it. The Arecibo Telescope located in Puerto Rico, was originally intended to study Earth's ionosphere. Ionograms Ionograms show the virtual heights and critical frequencies of the ionospheric layers and which are measured by an ionosonde. An ionosonde sweeps a range of frequencies, usually from 0.1 to 30 MHz, transmitting at vertical incidence to the ionosphere. As the frequency increases, each wave is refracted less by the ionization in the layer, and so each penetrates further before it is reflected. Eventually, a frequency is reached that enables the wave to penetrate the layer without being reflected. For ordinary mode waves, this occurs when the transmitted frequency just exceeds the peak plasma, or critical, frequency of the layer. Tracings of the reflected high frequency radio pulses are known as ionograms. Reduction rules are given in: "URSI Handbook of Ionogram Interpretation and Reduction", edited by William Roy Piggott and Karl Rawer, Elsevier Amsterdam, 1961 (translations into Chinese, French, Japanese and Russian are available). Incoherent scatter radars Incoherent scatter radars operate above the critical frequencies. Therefore, the technique allows probing the ionosphere, unlike ionosondes, also above the electron density peaks. The thermal fluctuations of the electron density scattering the transmitted signals lack coherence, which gave the technique its name. Their power spectrum contains information not only on the density, but also on the ion and electron temperatures, ion masses and drift velocities. GNSS radio occultation Radio occultation is a remote sensing technique where a GNSS signal tangentially scrapes the Earth, passing through the atmosphere, and is received by a Low Earth Orbit (LEO) satellite. As the signal passes through the atmosphere, it is refracted, curved and delayed. An LEO satellite samples the total electron content and bending angle of many such signal paths as it watches the GNSS satellite rise or set behind the Earth. Using an Inverse Abel's transform, a radial profile of refractivity at that tangent point on earth can be reconstructed. Major GNSS radio occultation missions include the GRACE, CHAMP, and COSMIC. Indices of the ionosphere In empirical models of the ionosphere such as Nequick, the following indices are used as indirect indicators of the state of the ionosphere. Solar intensity F10.7 and R12 are two indices commonly used in ionospheric modelling. Both are valuable for their long historical records covering multiple solar cycles. F10.7 is a measurement of the intensity of solar radio emissions at a frequency of 2800 MHz made using a ground radio telescope. R12 is a 12
|
Esperanto, Esperanto II, Ido, Peano's Interlingua (Latino sine flexione), Novial, and Interlingue (Occidental). In pursuit of the last goal, it conducted parallel studies of these languages, with comparative studies of national languages, under the direction of scholars at American and European universities. It also arranged conferences with proponents of these IALs, who debated features and goals of their respective languages. With a "concession rule" that required participants to make a certain number of concessions, early debates at IALA sometimes grew from heated to explosive. At the Second International Interlanguage Congress, held in Geneva in 1931, IALA began to break new ground; 27 recognized linguists signed a testimonial of support for IALA's research program. An additional eight added their signatures at the third congress, convened in Rome in 1933. That same year, Herbert N. Shenton and Edward L. Thorndike became influential in IALA's work by authoring key studies in the interlinguistic field. The first steps towards the finalization of Interlingua were taken in 1937, when a committee of 24 eminent linguists from 19 universities published Some Criteria for an International Language and Commentary. However, the outbreak of World War II in 1939 cut short the intended biannual meetings of the committee. Development of a new language Originally, the association had not intended to create its own language. Its goal was to identify which auxiliary language already available was best suited for international communication, and how to promote it more effectively. However, after ten years of research, many more members of IALA concluded that none of the existing interlanguages were up to the task. By 1937, the members had made the decision to create a new language, to the surprise of the world's interlanguage community. To that point, much of the debate had been equivocal on the decision to use naturalistic (e.g., Peano's Interlingua, Novial and Occidental) or systematic (e.g., Esperanto and Ido) words. During the war years, proponents of a naturalistic interlanguage won out. The first support was Thorndike's paper; the second was a concession by proponents of the systematic languages that thousands of words were already present in many, or even a majority, of the European languages. Their argument was that systematic derivation of words was a Procrustean bed, forcing the learner to unlearn and re-memorize a new derivation scheme when a usable vocabulary was already available. This finally convinced supporters of the systematic languages, and IALA from that point assumed the position that a naturalistic language would be best. IALA's research activities were based in Liverpool, before relocating to New York due to the outbreak of World War II, where E. Clark Stillman established a new research staff. Stillman, with the assistance of Alexander Gode, developed a prototyping technique – an objective methodology for selecting and standardizing vocabulary based on a comparison of control languages. In 1943 Stillman left for war work and Gode became Acting Director of Research. IALA began to develop models of the proposed language, the first of which were presented in Morris's General Report in 1945. From 1946 to 1948, French linguist André Martinet was Director of Research. During this period IALA continued to develop models and conducted polling to determine the optimal form of the final language. In 1946, IALA sent an extensive survey to more than 3,000 language teachers and related professionals on three continents. Four models were canvassed: The results of the survey were striking. The two more schematic models were rejected – K overwhelmingly. Of the two naturalistic models, M received somewhat more support than P. IALA decided on a compromise between P and M, with certain elements of C. Martinet took up a position at Columbia University in 1948, and Gode took on the last phase of Interlingua's development. The vocabulary and grammar of Interlingua were first presented in 1951, when IALA published the finalized Interlingua Grammar and the 27,000-word Interlingua–English Dictionary (IED). In 1954, IALA published an introductory manual entitled Interlingua a Prime Vista ("Interlingua at First Sight"). Interlingua as presented by the IALA is very close to Peano's Interlingua (Latino sine flexione), both in its grammar and especially in its vocabulary. Accordingly, the very name "Interlingua" was kept, yet a distinct abbreviation was adopted: IA instead of IL. The four models Four models were canvassed: Model P and K, plus two new models similar to Model E of 1945. Model P was unchanged from 1945; Model M was relatively modern in comparison to more classical P. Model K was slightly modified in the direction of Ido. The vote total ended up as follows: P 26.6%, M 37.5%, C 20%, and K 15%. The results of the survey were striking. The two more schematic models, C and K, were rejected – K overwhelmingly. Of the two naturalistic models, M attracted somewhat more support than P. Taking national biases into account (for example, the French who were polled disproportionately favored Model M), IALA decided on a compromise between models M and P, with certain elements of C. Finalization When Martinet took up a position at Columbia University in 1948, Gode took on the last phase of Interlingua's development. His task was to combine elements of Model M and Model P; take the flaws seen in both by the polled community and repair them with elements of Model C as needed; and simultaneously develop a vocabulary. The vocabulary and verb conjugations of Interlingua were first presented in 1951, when IALA published the finalized Interlingua Grammar and the 27,000-word Interlingua-English Dictionary (IED). In 1954, IALA published an introductory manual entitled Interlingua a Prime Vista ("Interlingua at First Sight"). Success, decline, and resurgence An early practical application of Interlingua was the scientific newsletter Spectroscopia Molecular, published from 1952 to 1980. In 1954, Interlingua was used at the Second World Cardiological Congress in Washington, D.C. for both written summaries and oral interpretation. Within a few years, it found similar use at nine further medical congresses. Between the mid-1950s and the late 1970s, some thirty scientific and especially medical journals provided article summaries in Interlingua. Science Service, the publisher of Science Newsletter at the time, published a monthly column in Interlingua from the early 1950s until Gode's death in 1970. In 1967, the International Organization for Standardization, which normalizes terminology, voted almost unanimously to adopt Interlingua as the basis for its dictionaries. The IALA closed its doors in 1953 but was not formally dissolved until 1956 or later. Its role in promoting Interlingua was largely taken on by Science Service, which hired Gode as head of its newly formed Interlingua Division. Hugh E. Blair, Gode's close friend and colleague, became his assistant. A successor organization, the Interlingua Institute, was founded in 1970 to promote Interlingua in the US and Canada. The new institute supported the work of other linguistic organizations, made considerable scholarly contributions and produced Interlingua summaries for scholarly and medical publications. One of its largest achievements was two immense volumes on phytopathology produced by the American Phytopathological Society in 1976 and 1977. Interlingua had attracted many former adherents of other international-language projects, notably Occidental and Ido. The former Occidentalist Ric Berger founded The Union Mundial pro Interlingua (UMI) in 1955, and by the late 1950s, interest in Interlingua in Europe had already begun to overtake that in North America. Media coverage at the time, for example, was apparently heaviest in Northern and Eastern Europe. Frequent European coverage has continued to date, joined by media attention in South America in the early 1990s. Beginning in the 1980s, UMI has held international conferences every two years (typical attendance at the earlier meetings was 50 to 100) and launched a publishing programme that eventually produced over 100 volumes. Other Interlingua-language works were published by university presses in Sweden and Italy, and in the 1990s, Brazil and Switzerland. Several Scandinavian schools undertook projects that used Interlingua as a means of teaching the international scientific and intellectual vocabulary. In 2000, the Interlingua Institute was dissolved amid funding disputes with the UMI; the American Interlingua Society, established the following year, succeeded the institute and responded to new interest emerging in Mexico. In the Soviet bloc Interlingua was spoken and promoted in the Soviet bloc, despite attempts to suppress the language. In East Germany, government officials confiscated the letters and magazines that the UMI sent to Walter Rädler, the Interlingua representative there. In Czechoslovakia, Július Tomin published his first article on Interlingua in the Slovak magazine Príroda a spoločnosť (Nature and Society) in 1971, after which he received several anonymous threatening letters. He went on to become the Czech Interlingua representative, teach Interlingua in the school system, and publish a series of articles and books. Interlingua today Interest in Interlingua has expanded from the scientific community to the general public. Individuals, governments, and private companies use Interlingua for learning and instruction, travel, online publishing, and communication across language barriers. Interlingua is promoted internationally by the Union Mundial pro Interlingua. Periodicals and books are produced by many national organizations, such as the Societate American pro Interlingua, the Svenska Sällskapet för Interlingua, and the Union Brazilian pro Interlingua. Panorama In Interlingua is the most prominent of several Interlingua periodicals. It is a 28-page magazine published bimonthly that covers current events, science, editorials, and Interlingua. Thanks to the Internet, Interlingua has seen a resurgence over the last decade, with the number of speakers jumping tenfold by some estimates. Community It is not certain how many people have an active knowledge of Interlingua. As noted above, Interlingua is claimed to be the most widely spoken naturalistic auxiliary language. Interlingua's greatest advantage is that it is the most widely understood international auxiliary language besides Interlingua (IL) de A.p.I. by virtue of its naturalistic (as opposed to schematic) grammar and vocabulary, allowing those familiar with a Romance language, and educated speakers of English, to read and understand it without prior study. Interlingua has active speakers on all continents, especially in South America and in Eastern and Northern Europe, most notably Scandinavia; also in Russia and Ukraine. There are copious Interlingua web pages, including editions of Wikipedia and Wiktionary, and a number of periodicals, including Panorama in Interlingua from the Union Mundial pro Interlingua (UMI) and magazines of the national societies allied with it. There are several active mailing lists, and Interlingua is also in use in certain Usenet newsgroups, particularly in the europa.* hierarchy. Interlingua is presented on CDs, radio, and television. Interlingua is taught in many high schools and universities, sometimes as a means of teaching other languages quickly, presenting interlinguistics, or introducing the international vocabulary. The University of Granada in Spain, for example, offers an Interlingua course in collaboration with the Centro de Formación Continua. Every two years, the UMI organizes an international conference in a different country. In the year between, the Scandinavian Interlingua societies co-organize a conference in Sweden. National organizations such as the Union Brazilian pro Interlingua also organize regular conferences. , Google Keyboard supports Interlingua. Orthography Interlingua has a largely phonemic orthography. Interlingua alphabet Interlingua uses the 26 letters of the ISO basic Latin alphabet with no diacritics. The alphabet, pronunciation in IPA and letter names in Interlingua are: c is pronounced (or optionally ) before e, i, y ch is pronounced /ʃ/ in words of French origin e.g. chef = /ʃef/ meaning "chief" or "chef", /k/ in words of Greek and Italian origin e.g. choro = /koro/ meaning "chorus" and more rarely /t͡ʃ/ in words of English or Spanish origin as in Chile /t͡ʃile/ (the country Chile). Ch may be pronounced either /t͡ʃ/ or /ʃ/ depending on the speaker in many cases e.g. chocolate may be pronounced either /t͡ʃokolate/ or /ʃokolate/. there is no consensus on how to pronounce sc before e, i, y, as in scientia "science", though is common Unlike any of the Romance languages, g is /g/ even before e, i, y but in -age it is /(d)ʒ/ (i.e. like j), as it is in several words of French origin such as orange /oranʒe/ and mangiar /manʒar/ q only appears in the digraph qu, which is pronounced [kw] (but in the conjunction and pronoun que and pronoun qui and in terms derived from them such as anque and proque a single s between vowels is often pronounced like z, but pronunciation is irregular t is generally [t], but ti followed by a vowel, unless stressed or preceded by s, is pronounced the same as c (that is, [t͡sj] or [sj]) Collateral orthography The book Grammar of Interlingua defines in §15 a "collateral orthography" that defines how a word is spelt in Interlingua once assimilated regardless of etymology. Phonology Interlingua is primarily a written language, and the pronunciation is not entirely settled. The sounds in parentheses are not used by all speakers. Pronunciation For the most part, consonants are pronounced as in English, while the vowels are like Spanish. Written double consonants may be geminated as in Italian for extra clarity or pronounced as single as in English or French. Interlingua has five falling diphthongs, , and , although and are rare. Stress The general rule is that stress falls on the vowel before the last consonant (e.g., lingua, 'language', esser, 'to be', requirimento, 'requirement') ignoring the final plural -(e)s (e.g. linguas, the plural of lingua, still has the same stress as the singular), and where that is not possible, on the first vowel (via, 'way', io crea, 'I create'). There are a few exceptions, and the following rules account for most of them: Adjectives and nouns ending in a vowel followed by -le, -ne, or -re are stressed on the third-last syllable (fragile, margine, altere 'other', but illa impone 'she imposes'). Words ending in -ica/-ico, -ide/-ido and -ula/-ulo, are stressed on the third-last syllable (politica, scientifico, rapide, stupido, capitula, seculo 'century'). Words ending in -ic are stressed on the second-last syllable (cubic). Speakers may pronounce all words according to the general rule mentioned above. For example, kilometro is acceptable, although kilometro is more common. Phonotactics Interlingua has no explicitly defined phonotactics. However, the prototyping procedure for determining Interlingua words, which strives for internationality, should in general lead naturally to words that are easy for most learners to pronounce. In the process of forming new words, an ending cannot always be added without a modification of some kind in between. A good example is the plural -s, which is always preceded by a vowel to prevent the occurrence of a hard-to-pronounce consonant cluster at the end. If the singular does not end in a vowel, the final -s becomes -es. Loanwords Unassimilated foreign loanwords, or borrowed words, are spelled as in their language of origin. Their spelling may contain diacritics, or
|
tenfold by some estimates. Community It is not certain how many people have an active knowledge of Interlingua. As noted above, Interlingua is claimed to be the most widely spoken naturalistic auxiliary language. Interlingua's greatest advantage is that it is the most widely understood international auxiliary language besides Interlingua (IL) de A.p.I. by virtue of its naturalistic (as opposed to schematic) grammar and vocabulary, allowing those familiar with a Romance language, and educated speakers of English, to read and understand it without prior study. Interlingua has active speakers on all continents, especially in South America and in Eastern and Northern Europe, most notably Scandinavia; also in Russia and Ukraine. There are copious Interlingua web pages, including editions of Wikipedia and Wiktionary, and a number of periodicals, including Panorama in Interlingua from the Union Mundial pro Interlingua (UMI) and magazines of the national societies allied with it. There are several active mailing lists, and Interlingua is also in use in certain Usenet newsgroups, particularly in the europa.* hierarchy. Interlingua is presented on CDs, radio, and television. Interlingua is taught in many high schools and universities, sometimes as a means of teaching other languages quickly, presenting interlinguistics, or introducing the international vocabulary. The University of Granada in Spain, for example, offers an Interlingua course in collaboration with the Centro de Formación Continua. Every two years, the UMI organizes an international conference in a different country. In the year between, the Scandinavian Interlingua societies co-organize a conference in Sweden. National organizations such as the Union Brazilian pro Interlingua also organize regular conferences. , Google Keyboard supports Interlingua. Orthography Interlingua has a largely phonemic orthography. Interlingua alphabet Interlingua uses the 26 letters of the ISO basic Latin alphabet with no diacritics. The alphabet, pronunciation in IPA and letter names in Interlingua are: c is pronounced (or optionally ) before e, i, y ch is pronounced /ʃ/ in words of French origin e.g. chef = /ʃef/ meaning "chief" or "chef", /k/ in words of Greek and Italian origin e.g. choro = /koro/ meaning "chorus" and more rarely /t͡ʃ/ in words of English or Spanish origin as in Chile /t͡ʃile/ (the country Chile). Ch may be pronounced either /t͡ʃ/ or /ʃ/ depending on the speaker in many cases e.g. chocolate may be pronounced either /t͡ʃokolate/ or /ʃokolate/. there is no consensus on how to pronounce sc before e, i, y, as in scientia "science", though is common Unlike any of the Romance languages, g is /g/ even before e, i, y but in -age it is /(d)ʒ/ (i.e. like j), as it is in several words of French origin such as orange /oranʒe/ and mangiar /manʒar/ q only appears in the digraph qu, which is pronounced [kw] (but in the conjunction and pronoun que and pronoun qui and in terms derived from them such as anque and proque a single s between vowels is often pronounced like z, but pronunciation is irregular t is generally [t], but ti followed by a vowel, unless stressed or preceded by s, is pronounced the same as c (that is, [t͡sj] or [sj]) Collateral orthography The book Grammar of Interlingua defines in §15 a "collateral orthography" that defines how a word is spelt in Interlingua once assimilated regardless of etymology. Phonology Interlingua is primarily a written language, and the pronunciation is not entirely settled. The sounds in parentheses are not used by all speakers. Pronunciation For the most part, consonants are pronounced as in English, while the vowels are like Spanish. Written double consonants may be geminated as in Italian for extra clarity or pronounced as single as in English or French. Interlingua has five falling diphthongs, , and , although and are rare. Stress The general rule is that stress falls on the vowel before the last consonant (e.g., lingua, 'language', esser, 'to be', requirimento, 'requirement') ignoring the final plural -(e)s (e.g. linguas, the plural of lingua, still has the same stress as the singular), and where that is not possible, on the first vowel (via, 'way', io crea, 'I create'). There are a few exceptions, and the following rules account for most of them: Adjectives and nouns ending in a vowel followed by -le, -ne, or -re are stressed on the third-last syllable (fragile, margine, altere 'other', but illa impone 'she imposes'). Words ending in -ica/-ico, -ide/-ido and -ula/-ulo, are stressed on the third-last syllable (politica, scientifico, rapide, stupido, capitula, seculo 'century'). Words ending in -ic are stressed on the second-last syllable (cubic). Speakers may pronounce all words according to the general rule mentioned above. For example, kilometro is acceptable, although kilometro is more common. Phonotactics Interlingua has no explicitly defined phonotactics. However, the prototyping procedure for determining Interlingua words, which strives for internationality, should in general lead naturally to words that are easy for most learners to pronounce. In the process of forming new words, an ending cannot always be added without a modification of some kind in between. A good example is the plural -s, which is always preceded by a vowel to prevent the occurrence of a hard-to-pronounce consonant cluster at the end. If the singular does not end in a vowel, the final -s becomes -es. Loanwords Unassimilated foreign loanwords, or borrowed words, are spelled as in their language of origin. Their spelling may contain diacritics, or accent marks. If the diacritics do not affect pronunciation, they are removed. Vocabulary Words in Interlingua may be taken from any language, as long as their internationality is verified by their presence in seven control languages: Spanish, Portuguese, Italian, French, and English, with German and Russian acting as secondary controls. These are the most widely spoken Romance, Germanic, and Slavic languages, respectively. Because of their close relationship, Spanish and Portuguese are treated as one unit. The largest number of Interlingua words are of Latin origin, with the Greek and Germanic languages providing the second and third largest number. The remainder of the vocabulary originates in Slavic and non-Indo-European languages. Eligibility A word, that is a form with meaning, is eligible for the Interlingua vocabulary if it is verified by at least three of the four primary control languages. Either secondary control language can substitute for a primary language. Any word of Indo-European origin found in a control language can contribute to the eligibility of an international word. In some cases, the archaic or potential presence of a word can contribute to its eligibility. A word can be potentially present in a language when a derivative is present, but the word itself is not. English proximity, for example, gives support to Interlingua proxime, meaning 'near, close'. This counts as long as one or more control languages actually have this basic root word, which the Romance languages all do. Potentiality also occurs when a concept is represented as a compound or derivative in a control language, the morphemes that make it up are themselves international, and the combination adequately conveys the meaning of the larger word. An example is Italian fiammifero (lit. flamebearer), meaning "match, lucifer", which leads to Interlingua flammifero, or "match". This word is thus said to be potentially present in the other languages although they may represent the meaning with a single morpheme. Words do not enter the Interlingua vocabulary solely because cognates exist in a sufficient number of languages. If their meanings have become different over time, they are considered different words for the purpose of Interlingua eligibility. If they still have one or more meanings in common, however, the word can enter Interlingua with this smaller set of meanings. If this procedure did not produce an international word, the word for a concept was originally taken from Latin (see below). This only occurred with a few grammatical particles. Form The form of an Interlingua word is considered an international prototype with respect to the other words. On the one hand, it should be neutral, free from characteristics peculiar to one language. On the other hand, it should maximally capture the characteristics common to all contributing languages. As a result, it can be transformed into any of the contributing variants using only these language-specific characteristics. If the word has any derivatives that occur in the source languages with appropriate parallel meanings, then their morphological connection must remain intact; for example, the Interlingua word for 'time' is spelled tempore and not *tempus or *tempo in order to match it with its derived adjectives, such as temporal. The language-specific characteristics are closely related to the sound laws of the individual languages; the resulting words are often close or even identical to the most recent form common to the contributing words. This sometimes corresponds with that of Vulgar Latin. At other times, it is much more recent or even contemporary. It is never older than the classical period. An illustration The French œil, Italian occhio, Spanish ojo, and Portuguese olho appear quite different, but they descend from a historical form oculus. German Auge, Dutch oog and English eye (cf. Czech and Polish oko, Russian and Ukrainian око (óko)) are related to this form in that all three descend from Proto-Indo-European *okʷ. In addition, international derivatives like ocular and oculista occur in all of Interlingua's control languages. Each of these forms contributes to the eligibility of the Interlingua word. German and English base words do not influence the form of the Interlingua word, because their Indo-European connection is considered too remote. Instead, the remaining base words and especially the derivatives determine the form oculo found in Interlingua. Free word-building Words can also be included in Interlingua by deriving them using Interlingua words and affixes; a method called free word-building. Thus, in the Interlingua-English Dictionary (IED), Alexander Gode followed the principle that every word listed is accompanied by all of its clear compounds and derivatives, along with the word or words it is derived from. A reader skimming through the IED notices many entries followed by large groups of derived and compound words. A good example is the Interlingua word nation, which is followed by national, nationalismo, nationalista, nationalitate, nationalisar, international, internationalitate, and many other words. Other words in the IED do not have derivatives listed. Gode saw these words as potential word families. Although all derived words in the IED are found in at least one control language, speakers may make free use of Interlingua roots and affixes. For example, jada (jade) can be used to form jadificar, (to jadify, make into jade, make look like jade), jadification, and so on. These word forms would be impermissible in English but would be good Interlingua. Word-building by analogy Gode and
|
the abolition of its two borough councils and restructuring of the Isle of Wight County Council into the new Isle of Wight Council in 1995, it has been administered by a single unitary authority. Elections in the constituency have traditionally been a battle between the Conservatives and the Liberal Democrats. Andrew Turner of the Conservative Party gained the seat from Peter Brand of the Lib Dems at the 2001 general election. Since 2009, Turner was embroiled in controversy over his expenses, health, and relationships with colleagues, with local Conservatives having tried but failed to remove him in the runup to the 2015 general election. He stood down prior to the 2017 snap general election, and the new Conservative Party candidate Bob Seely was elected with a majority of 21,069 votes. At the Isle of Wight Council election of 2013, the Conservatives lost the majority which they had held since 2005 to the Island Independents, with Island Independent councillors holding 16 of the 40 seats, and a further five councillors sitting as independents outside the group. The Conservatives regained control, winning 10 more seats and taking their total to 25 at the 2017 local election, before losing 7 seats in 2021. A coalition entitled the Alliance Coalition was formed between independent, Green Party and Our Island councillors, with independent councillor Lora Peacey-Wilcox leading the council since May 2021. There have been small regionalist movements: the Vectis National Party and the Isle of Wight Party; but they have attracted little support at elections. Geography The Isle of Wight is situated between the Solent and the English Channel, is roughly rhomboid in shape, and covers an area of . Slightly more than half, mainly in the west, is designated as the Isle of Wight Area of Outstanding Natural Beauty. The island has of farmland, of developed areas, and of coastline. Its landscapes are diverse, leading to its oft-quoted description as "England in miniature". In June 2019 the whole island was designated a UNESCO Biosphere Reserve, recognising the sustainable relationships between its residents and the local environment. West Wight is predominantly rural, with dramatic coastlines dominated by the chalk downland ridge, running across the whole island and ending in the Needles stacks. The southwestern quarter is commonly referred to as the Back of the Wight, and has a unique character. The highest point on the island is St Boniface Down in the south east, which at is a marilyn. The most notable habitats on the rest of the island are probably the soft cliffs and sea ledges, which are scenic features, important for wildlife, and internationally protected. The island has three principal rivers. The River Medina flows north into the Solent, the Eastern Yar flows roughly northeast to Bembridge Harbour, and the Western Yar flows the short distance from Freshwater Bay to a relatively large estuary at Yarmouth. Without human intervention the sea might well have split the island into three: at the west end where a bank of pebbles separates Freshwater Bay from the marshy backwaters of the Western Yar east of Freshwater, and at the east end where a thin strip of land separates Sandown Bay from the marshy Eastern Yar basin. The Undercliff between St Catherine's Point and Bonchurch is the largest area of landslip morphology in western Europe. The north coast is unusual in having four high tides each day, with a double high tide every twelve and a half hours. This arises because the western Solent is narrower than the eastern; the initial tide of water flowing from the west starts to ebb before the stronger flow around the south of the island returns through the eastern Solent to create a second high water. Geology The Isle of Wight is made up of a variety of rock types dating from early Cretaceous (around 127 million years ago) to the middle of the Palaeogene (around 30 million years ago). The geological structure is dominated by a large monocline which causes a marked change in age of strata from the northern younger Tertiary beds to the older Cretaceous beds of the south. This gives rise to a dip of almost 90 degrees in the chalk beds, seen best at the Needles. The northern half of the island is mainly composed of clays, with the southern half formed of the chalk of the central east–west downs, as well as Upper and Lower Greensands and Wealden strata. These strata continue west from the island across the Solent into Dorset, forming the basin of Poole Harbour (Tertiary) and the Isle of Purbeck (Cretaceous) respectively. The chalky ridges of Wight and Purbeck were a single formation before they were breached by waters from the River Frome during the last ice age, forming the Solent and turning Wight into an island. The Needles, along with Old Harry Rocks on Purbeck, represent the edges of this breach. All the rocks found on the island are sedimentary, such as limestones, mudstones and sandstones. They are rich in fossils; many can be seen exposed on beaches as the cliffs erode. Lignitic coal is present in small quantities within seams, and can be seen on the cliffs and shore at Whitecliff Bay. Fossilised molluscs have been found there, and also on the northern coast along with fossilised crocodiles, turtles and mammal bones; the youngest date back to around 30 million years ago. The island is one of the most important areas in Europe for dinosaur fossils. The eroding cliffs often reveal previously hidden remains, particularly along the Back of the Wight. Dinosaur bones and fossilised footprints can be seen in and on the rocks exposed around the island's beaches, especially at Yaverland and Compton Bay, from the strata of the Wessex Formation. As a result, the island has been nicknamed "Dinosaur Island" and Dinosaur Isle was established in 2001. The area was affected by sea level changes during the repeated Quaternary glaciations. The island probably became separated from the mainland about 125,000 years ago, during the Ipswichian interglacial. Climate Like the rest of the UK, the island has an oceanic climate, but is somewhat milder and sunnier, which makes it a holiday destination. It also has a longer growing season. Lower Ventnor and the neighbouring Undercliff have a particular microclimate, because of their sheltered position south of the downs. The island enjoys 1,800–2,100 hours of sunshine a year. Some years have almost no snow in winter, and only a few days of hard frost. The island is in Hardiness zone 9. Flora and fauna The Isle of Wight is one of the few places in England where the red squirrel is still flourishing; no grey squirrels are to be found. There are occasional sightings of wild deer, and there is a colony of wild goats on Ventnor's downs. Protected species such as the dormouse and rare bats can be found. The Glanville fritillary butterfly's distribution in the United Kingdom is largely restricted to the edges of the island's crumbling cliffs. A competition in 2002 named the pyramidal orchid as the Isle of Wight's county flower. Settlements Newport is the centrally located county town, with a population of about 25,000 and the island's main shopping area. Located next to the River Medina, Newport Quay was a busy port until the mid-19th century. Ryde, the largest town with a population of about 30,000, is in the northeast. It is Victorian with the oldest seaside pier in England and miles of sandy and pebble beaches. Cowes hosts the annual Cowes Week and is an international sailing centre. East Cowes is famous for Osborne House, Norris Castle and as the home from 1929 to 1964 of Saunders-Roe, the historic aircraft, flying boat, rocket and hovercraft company. Sandown is a popular seaside resort. It is home to the Isle of Wight Zoo, the Dinosaur Isle geological museum and one of the island's two 18-hole golf courses. Shanklin, just south of Sandown, attracts tourists with its high summer sunshine levels, sandy beaches, Shanklin Chine and the old village. Ventnor, built on the steep slopes of St Boniface Down on the south coast of the island, leads down to a picturesque bay that attracts many tourists. Ventnor Haven is a small harbour. Economy Socio-economic data The table below shows the regional gross value (in millions of pounds) added by the Isle of Wight economy, at current prices, compiled by the Office for National Statistics. According to the 2011 census, the island's population of 138,625 lives in 61,085 households, giving an average household size of 2.27 people. 41% of households own their home outright and a further 29% own with a mortgage, so in total 70% of households are owned (compared to 68% for South East England). Compared to South East England, the island has fewer children (19% aged 0–17 against 22% for the South East) and more elderly (24% aged 65+ against 16%), giving an average age of 44 years for an island resident compared to 40 in South East England. Industry and agriculture The largest industry is tourism, but the island also has a strong agricultural heritage, including sheep and dairy farming and arable crops. Traditional agricultural commodities are more difficult to market off the island because of transport costs, but local farmers have succeeded in exploiting some specialist markets, with the higher price of such products absorbing the transport costs. One of the most successful agricultural sectors is now the growing of crops under cover, particularly salad crops including tomatoes and cucumbers. The island has a warmer climate and a longer growing season than much of the United Kingdom. Garlic has been successfully grown in Newchurch for many years, and is even exported to France. This has led to the establishment of an annual Garlic Festival at Newchurch, which is one of the largest events of the local calendar. A favourable climate supports two vineyards, including one of the oldest in the British Isles at Adgestone. Lavender is grown for its oil. The largest agricultural sector has been dairying, but due to low milk prices and strict legislation for UK milk producers, the dairy industry has been in decline: there were nearly 150 producers in the mid-1980s, but now just 24. Maritime industries, especially the making of sailcloth and boat building, have long been associated with the island, although this has diminished somewhat in recent years. GKN operates what began as the British Hovercraft Corporation, a subsidiary of (and known latterly as) Westland Aircraft, although they have reduced the extent of plant and workforce and sold the main site. Previously it had been the independent company Saunders-Roe, one of the island's most notable historic firms that produced many flying boats and the world's first hovercraft. Another manufacturing activity is in composite materials, used by boat-builders and the wind turbine manufacturer Vestas, which has a wind turbine blade factory and testing facilities in West Medina Mills and East Cowes. Bembridge Airfield is the home of Britten-Norman, manufacturers of the Islander and Trislander aircraft. This is shortly to become the site of the European assembly line for Cirrus light aircraft. The Norman Aeroplane Company is a smaller aircraft manufacturing company operating in Sandown. There have been three other firms that built planes on the island. In 2005, Northern Petroleum began exploratory drilling for oil at its Sandhills-2 borehole at Porchfield, but ceased operations in October that year after failing to find significant reserves. Breweries There are three breweries on the island. Goddards Brewery in Ryde opened in 1993. David Yates, who was head brewer of the Island Brewery, started brewing as Yates Brewery at the Inn at St Lawrence in 2000. Ventnor Brewery, which closed in 2009, was the last incarnation of Burt's Brewery, brewing since the 1840s in Ventnor. Until the 1960s most pubs were owned by Mews Brewery, situated in Newport near the old railway station, but it closed and the pubs were taken over by Strong's, and then by Whitbread. By some accounts Mews beer was apt to be rather cloudy and dark. In the 19th century they pioneered the use of screw top cans for export to British India. Services Tourism and heritage The island's heritage is a major asset that has for many years supported its tourist economy. Holidays focused on natural heritage, including wildlife and geology, are becoming an alternative to the traditional British seaside holiday, which went into decline in the second half of the 20th century due to the increased affordability of foreign holidays. The island is still an important destination for coach tours from other parts of the United Kingdom. Tourism is still the largest industry, and most island towns and villages offer hotels, hostels and camping sites. In 1999, it hosted 2.7 million visitors, with 1.5 million staying overnight, and 1.2 million day visits; only 150,000 of these were from abroad. Between 1993 and 2000, visits increased at an average rate of 3% per year. At the turn of the 19th century the island had ten pleasure piers, including two at Ryde and a "chain pier" at Seaview. The Victoria Pier in Cowes succeeded the earlier Royal Pier but was itself removed in 1960. The piers at Ryde, Seaview, Sandown, Shanklin and Ventnor originally served a coastal steamer service that operated from Southsea on the mainland. The piers at Seaview, Shanklin, Ventnor and Alum Bay were all destroyed by various storms during the 20th century; only the railway pier at Ryde and the piers at Sandown, Totland Bay (currently closed to the public) and Yarmouth survive. Blackgang Chine is the oldest theme park in Britain, opened in 1843. The skeleton of a dead whale that its founder Alexander Dabell found in 1844 is still on display. As well as its more traditional attractions, the island is often host to walking or cycling holidays through the attractive scenery. An annual walking festival has attracted considerable interest. The Isle of Wight Coastal Path follows the coastline as far as possible, deviating onto roads where the route along the coast is impassable. The tourist board for the island is Visit Isle of Wight, a not for profit company. It is the Destination Management Organisation for the Isle of Wight, a public and private sector partnership led by the private sector, and consists of over 1,200 companies, including the ferry operators, the local bus company, rail operator and tourism providers working together to collectively promote the island. Its income is derived from the Wight BID, a business improvement district levy fund. A major contributor to the local economy is sailing and marine-related tourism. Summer Camp at Camp Beaumont is an attraction at the old Bembridge School site. Media The main local newspaper is the Isle of Wight County Press, published most Fridays. The Island's leading news website, Island Echo, was launched in May 2012 and now publishes in excess of 5,000 news articles a year. Other online news sources for the Isle of Wight include On the Wight. The island has a local commercial radio station and a community radio station: commercial station Isle of Wight Radio has broadcast in the medium-wave band since 1990 and on 107.0 MHz (with three smaller transmitters on 102.0 MHz) FM since 1998, as well as streaming on the Internet. Community station Vectis Radio has broadcast online since 2010, and in 2017 started broadcasting on FM 104.6. The station operates from the Riverside Centre in Newport. The island is also covered by a number of local stations on the mainland, including the BBC station BBC Radio Solent broadcast from Southampton. The island's not-for-profit community radio station Angel Radio opened in 2007. Angel Radio began broadcasting on 91.5 MHz from studios in Cowes and a transmitter near Newport. The island has had community television stations in the past, first TV12 and then Solent TV from 2002 until its closure on 24 May 2007. iWight.tv is a local internet video news channel. The Isle of Wight is part of the BBC South region and the ITV Meridian region. Important broadcasting infrastructure includes Chillerton Down transmitting station with a mast that is the tallest structure on the island, and Rowridge transmitting station, which broadcasts the main television signal both locally and for most of Hampshire and parts of Dorset and West Sussex. Culture Language and dialect The local accent is similar to the traditional dialect of Hampshire, featuring the dropping of some consonants and an emphasis on longer vowels. It is similar to the West Country dialects heard in South West England, but less pronounced. The island has its own local and regional words. Some, such as nipper/nips (a young male person), are still commonly used and are shared with neighbouring areas of the mainland. A few are unique to the island, for example overner and caulkhead (see below). Others are more obscure and now used mainly for comic emphasis, such as mallishag (meaning "caterpillar"), gurt meaning "large", nammit (a mid-morning snack) and gallybagger ("scarecrow", and now the name of a local cheese). [[File:Bonchurch, near Ventnor, Isle of Wight.jpg|thumb|Henry Bates Joel's 1895 artwork 'Bonchurch, near Ventnor, Isle of Wight''' is a depiction of rural life on the island. It is exhibited in the Milntown Estate. ]] Identity There remains occasional confusion between the Isle of Wight as a county and its former position within Hampshire. The island was regarded and administered as a part of Hampshire until 1890, when its distinct identity was recognised with the formation of Isle of Wight County Council (see also Politics of the Isle of Wight). However, it remained a part of Hampshire until the local government reforms of 1974 when it became a full ceremonial county with its own Lord Lieutenant. In January 2009, the first general flag for the county was accepted by the Flag Institute. Island residents are sometimes referred to as "Vectensians", "Vectians" or, if born on the island, "caulkheads". One theory is that this last comes from the once prevalent local industry of caulking or sealing wooden boats; the term became attached to islanders either because they were so employed, or as a derisory term for perceived unintelligent labourers from elsewhere. The term "overner" is used for island residents originating from the mainland (an abbreviated form of "overlander", which is an archaic term
|
of a dead whale that its founder Alexander Dabell found in 1844 is still on display. As well as its more traditional attractions, the island is often host to walking or cycling holidays through the attractive scenery. An annual walking festival has attracted considerable interest. The Isle of Wight Coastal Path follows the coastline as far as possible, deviating onto roads where the route along the coast is impassable. The tourist board for the island is Visit Isle of Wight, a not for profit company. It is the Destination Management Organisation for the Isle of Wight, a public and private sector partnership led by the private sector, and consists of over 1,200 companies, including the ferry operators, the local bus company, rail operator and tourism providers working together to collectively promote the island. Its income is derived from the Wight BID, a business improvement district levy fund. A major contributor to the local economy is sailing and marine-related tourism. Summer Camp at Camp Beaumont is an attraction at the old Bembridge School site. Media The main local newspaper is the Isle of Wight County Press, published most Fridays. The Island's leading news website, Island Echo, was launched in May 2012 and now publishes in excess of 5,000 news articles a year. Other online news sources for the Isle of Wight include On the Wight. The island has a local commercial radio station and a community radio station: commercial station Isle of Wight Radio has broadcast in the medium-wave band since 1990 and on 107.0 MHz (with three smaller transmitters on 102.0 MHz) FM since 1998, as well as streaming on the Internet. Community station Vectis Radio has broadcast online since 2010, and in 2017 started broadcasting on FM 104.6. The station operates from the Riverside Centre in Newport. The island is also covered by a number of local stations on the mainland, including the BBC station BBC Radio Solent broadcast from Southampton. The island's not-for-profit community radio station Angel Radio opened in 2007. Angel Radio began broadcasting on 91.5 MHz from studios in Cowes and a transmitter near Newport. The island has had community television stations in the past, first TV12 and then Solent TV from 2002 until its closure on 24 May 2007. iWight.tv is a local internet video news channel. The Isle of Wight is part of the BBC South region and the ITV Meridian region. Important broadcasting infrastructure includes Chillerton Down transmitting station with a mast that is the tallest structure on the island, and Rowridge transmitting station, which broadcasts the main television signal both locally and for most of Hampshire and parts of Dorset and West Sussex. Culture Language and dialect The local accent is similar to the traditional dialect of Hampshire, featuring the dropping of some consonants and an emphasis on longer vowels. It is similar to the West Country dialects heard in South West England, but less pronounced. The island has its own local and regional words. Some, such as nipper/nips (a young male person), are still commonly used and are shared with neighbouring areas of the mainland. A few are unique to the island, for example overner and caulkhead (see below). Others are more obscure and now used mainly for comic emphasis, such as mallishag (meaning "caterpillar"), gurt meaning "large", nammit (a mid-morning snack) and gallybagger ("scarecrow", and now the name of a local cheese). [[File:Bonchurch, near Ventnor, Isle of Wight.jpg|thumb|Henry Bates Joel's 1895 artwork 'Bonchurch, near Ventnor, Isle of Wight''' is a depiction of rural life on the island. It is exhibited in the Milntown Estate. ]] Identity There remains occasional confusion between the Isle of Wight as a county and its former position within Hampshire. The island was regarded and administered as a part of Hampshire until 1890, when its distinct identity was recognised with the formation of Isle of Wight County Council (see also Politics of the Isle of Wight). However, it remained a part of Hampshire until the local government reforms of 1974 when it became a full ceremonial county with its own Lord Lieutenant. In January 2009, the first general flag for the county was accepted by the Flag Institute. Island residents are sometimes referred to as "Vectensians", "Vectians" or, if born on the island, "caulkheads". One theory is that this last comes from the once prevalent local industry of caulking or sealing wooden boats; the term became attached to islanders either because they were so employed, or as a derisory term for perceived unintelligent labourers from elsewhere. The term "overner" is used for island residents originating from the mainland (an abbreviated form of "overlander", which is an archaic term for "outsider" still found in parts of Australia). Residents refer to the island as "The Island", as did Jane Austen in Mansfield Park, and sometimes to the UK mainland as "North Island". To promote the island's identity and culture, the High Sheriff Robin Courage founded an Isle of Wight Day; the first was held on Saturday 24 September 2016. Sport Sport plays a key part of culture on the Isle of Wight. Sports include golf, marathon, cycling and sailing. Music The island is home to the Isle of Wight Festival and until 2016, Bestival before it was relocated to Lulworth Estate in Dorset. In 1970, the festival was headlined by Jimi Hendrix attracting an audience of 600,000, some six times the local population at the time. It is the home of the bands The Bees, Trixie's Big Red Motorbike, Level 42, and Wet Leg. Landmarks Transport The Isle of Wight has of roadway. It does not have a motorway, although there is a short stretch of dual carriageway towards the north of Newport near the hospital and prison. A comprehensive bus network operated by Southern Vectis links most settlements, with Newport as its central hub. Journeys away from the island involve a ferry journey. Car ferry and passenger catamaran services are run by Wightlink and Red Funnel, and a hovercraft passenger service (the only such remaining in the world) by Hovertravel. The island formerly had its own railway network of over , but only one line remains in regular use. The Island Line is part of the United Kingdom's National Rail network, running a little under from to , where there is a connecting ferry service to station on the mainland network. The line was opened by the Isle of Wight Railway in 1864, and from 1996 to 2007 was run by the smallest train operating company on the network, Island Line Trains. It is notable for utilising old ex-London Underground rolling stock, due to the small size of its tunnels and unmodernised signalling. Branching off the Island Line at is the heritage Isle of Wight Steam Railway, which runs for to the outskirts of on the former line to Newport. There are two airfields for general aviation, Isle of Wight Airport at Sandown and Bembridge Airport. The island has over of cycleways, many of which can be enjoyed off-road. The principal trails are: The Sunshine Trail, which is a circular route linking Sandown, Shanklin, Godshill, and Wroxall of ; The Red Squirrel Trail, a track between Cowes and Sandown that is in total; The Round the Island Cycle Route of . Prisons The Isle of Wight is near the densely populated south of England, yet separated from the mainland. This position led to it hosting three prisons: Albany, Camp Hill and Parkhurst, all located outside Newport near the main road to Cowes. Albany and Parkhurst were among the few Category A prisons in the UK until they were downgraded in the 1990s. The downgrading of Parkhurst was precipitated by a major escape: three prisoners (two murderers and a blackmailer) escaped from the prison on 3 January 1995 for four days, before being recaptured. Parkhurst enjoyed notoriety as one of the toughest jails in the United Kingdom, and housed many notable inmates including the Yorkshire Ripper Peter Sutcliffe, New Zealand drug lord Terry Clark and the Kray twins. Camp Hill is located adjacent but to the west of Albany and Parkhurst, on the very edge of Parkhurst Forest, having been converted first to a borstal and later to a Category C prison. It was built on the site of an army camp (both Albany and Parkhurst were barracks); there is a small estate of tree-lined roads with the former officers' quarters (now privately owned) to the south and east. Camp Hill closed as a prison in March 2013. The management of all three prisons was merged into a single administration, under HMP Isle of Wight in April 2009. Education There are 69 local education authority-maintained schools on the Isle of Wight, and two independent schools. As a rural community, many of these are small and with fewer pupils than in urban areas. The Isle of Wight College is located on the outskirts of Newport. From September 2010, there was a transition period from the three-tier system of primary, middle and high schools to the two-tier system that is usual in England. Some schools have now closed, such as Chale C.E. Primary. Others have become "federated", such as Brading C.E. Primary and St Helen's Primary. Christ the King College started as two "middle schools", Trinity Middle School and Archbishop King Catholic Middle School, but has now been converted into a dual-faith secondary school and sixth form. Since September 2011 five new secondary schools, with an age range of 11 to 18 years, replaced the island's high schools (as a part of the previous three-tier system). Notable people Notable residents have included: 17th century and earlier King Arwald, last pagan king in England King Charles I of England, who was imprisoned at Carisbrooke Castle Earl Tostig Godwinson, who supported Norwegian king Harald Hardrada's invasion Actor, highwayman and conspirator Cardell "Scum" Goodman Soldier and regicide of Charles I Thomas Harrison, imprisoned at Carisbrooke with John Rogers and Christopher Feake Soldier Peter de Heyno Philosopher and polymath Robert Hooke Murderer Michal Morey 18th century Marine painter Thomas Buttersworth Explorer Anthony Henday Radical journalist John Wilkes 19th century Queen Victoria and Prince Albert (monarch and consort), who built and lived at Osborne House Photographer Julia Margaret Cameron, who lived at Dimbola Lodge Irish Republican Thomas Clarke Naval captain Jeremiah Coghlan CBG, who retired to Ryde Writer Charles Dickens Poet John Keats Inventor and radio pioneer Guglielmo Marconi Poet and hymnwriter Albert Midlane Geologist and engineer John Milne Regency architect John Nash Novelist Miss Harriet Parr Early Hong Kong Government administrator William Pedder New Zealand PM Henry Sewell Poet Algernon Charles Swinburne Poet Alfred Tennyson Philosopher Karl Marx, who stayed at 1, St. Boniface Gardens, Ventnor Performance artist Nigel Rolfe 20th century onwards Scriptwriter Raymond Allen Indie rock group The Bees Concert organist E. Power Biggs Darts player Keegan Brown Singer Helen Clare Singer-songwriter Sarah Close Inventor of the hovercraft Sir Christopher Cockerell Presenter and actor Ray Cokes Actress Bella Emberg Yachtsman Uffa Fox Actor Marius Goring Musician Jack Green Survival expert and Chief Scout Bear Grylls Actress Sheila Hancock Actor Melvyn Hayes Folk-rock musician Robyn Hitchcock Actor Geoffrey Hughes Conspiracy theorist David Icke Actor Jeremy Irons Comedian Phill Jupitus Actor Laura Michelle Kelly Composer Albert Ketèlbey Iranian poet Mimi Khalvati Musician Mark King Radio presenter Allan Lake Yachtswoman Ellen MacArthur BBC Tonight presenter Cliff Michelmore Film director Anthony Minghella Actor David Niven Cyclist Kieran Page Musician Frederick Riddle Heptathlete Kelly Sotherton Gardener and presenter Alan Titchmarsh Novelist Edward Upward The indie band Wet Leg Overseas names The Isle of Wight has given names to many parts of former colonies, most notably Isle of Wight County in Virginia founded by settlers from the island in the 17th century. Its county seat is a town named Isle of Wight. Other notable examples include: Isle of Wight – an island off Maryland, United States Dunnose Head, West Falkland Ventnor, Cowes on Phillip Island, Victoria, Australia Carisbrook, Victoria, Australia Carisbrook, a former stadium in Dunedin, New Zealand Ryde, New South Wales, Australia Shanklin, Sandown, New Hampshire, United States Ventnor City, New Jersey, United States Gardiners Island, New York, United States shown as "Isle of Wight" on some of the older maps. Cultural references Film The film Something to Hide (1972; US title Shattered), starring Peter Finch, was filmed near Cowes, including a scene on the Red Funnel ferry; The British film That'll Be the Day (1973), starring David Essex and Ringo Starr, included scenes shot in Ryde (notably Cross Street), Sandown (school), Shanklin (beach) and Wootton Bridge (fairground); Mrs. Brown (1997), with Dame Judi Dench and Billy Connolly, was filmed at Osborne House and Chale; The film Fragile (2005), starring Calista Flockhart, is based on the Isle of Wight. Victoria and Abdul (2017) starring Dame Judi Dench and Ali Fazal began shooting principal photography at Osborne House in September 2016. Games John Worsley's Commodore 64 game Spirit of the Stones was set on the Isle of Wight. Literature The Isle of Wight was: the setting of Julian Barnes's novel England, England; called The Island in some editions of Thomas Hardy's novels in his fictional Wessex; selected for the development of a new base by the supercomputer "Colossus", in D. F. Jones' novel Colossus (1966); the setting for D.H. Lawrence's book The Trespasser, filmed for TV on location in 1981; the setting of Graham Masterton's book Prey; mentioned in J.K. Rowling's first Harry Potter book, which refers to Uncle Vernon's sister Marge on holiday on the island, who got sick after eating a whelk; a major element in Daniel O'Malley's series The Rook (2012) & its sequel Stiletto (2016). The antagonists try to invade in the 1600s, the effects of which continue to colour perceptions of the Crown's secret supernatural agency, the "Checquy Group"; the refuge of the British monarchy & government in S.M. Stirling's alternative history novel The Protector's War (2005), in which high energy technology ceased to function. After an ensuing holocaust, the island was the base for re-population of Europe, whose populations had mostly perished; one of the destinations to
|
has been exploited. In the "Ping of death", large or fragmented ICMP packets are used for denial-of-service attacks. ICMP data can also be used to create covert channels for communication. These channels are known as ICMP tunnels. Control messages Control messages are identified by the value in the type field. The code field gives additional context information for the message. Some control messages have been deprecated since the protocol was first introduced. Source quench Source Quench requests that the sender decrease the rate of messages sent to a router or host. This message may be generated if a router or host does not have sufficient buffer space to process the request, or may occur if the router or host buffer is approaching its limit. Data is sent at a very high speed from a host or from several hosts at the same time to a particular router on a network. Although a router has buffering capabilities, the buffering is limited to within a specified range. The router cannot queue any more data than the capacity of the limited buffering space. Thus if the queue gets filled up, incoming data is discarded until the queue is no longer full. But as no acknowledgement mechanism is present in the network layer, the client does not know whether the data has reached the destination successfully. Hence some remedial measures should be taken by the network layer to avoid these kind of situations. These measures are referred to as source quench. In a source quench mechanism, the router sees that the incoming data rate is much faster than the outgoing data rate, and sends an ICMP message to the clients, informing them that they should slow down their data transfer speeds or wait for a certain amount of time before attempting to send more data. When a client receives this message, it will automatically slow down the outgoing data rate or wait for a sufficient amount of time, which enables the router to empty the queue. Thus the source quench ICMP message acts as flow control in the network layer. Since research suggested that "ICMP Source Quench [was] an ineffective (and unfair) antidote for congestion", routers' creation of source quench messages was deprecated in 1995 by RFC 1812. Furthermore, forwarding of and any kind of reaction to (flow control actions) source quench messages was deprecated from 2012 by RFC 6633. Where: Type must be set to 4 Code must be set to 0 IP header and additional data is used by the sender to match the reply with the associated request Redirect Redirect requests data packets be sent on an alternative route. ICMP Redirect is a mechanism for routers to convey routing information to hosts. The message informs a host to update its routing information (to send packets on an alternative route). If a host tries to send data through a router (R1) and R1 sends the data on another router (R2) and a direct path from the host to R2 is available (that is, the host and R2 are on the same subnetwork), then R1 will send a redirect message to inform the host that the best route for the destination is via R2. The host should then change its route information and send packets for that destination directly to R2. The router will still send the original datagram to the intended destination. However, if the datagram contains routing information, this message will not be sent even if a better route is available. RFC 1122 states that redirects should only be sent by gateways and should not be sent by Internet hosts. Where: Type must be set to 5. Code specifies the reason for the redirection, and may be one of the following: {| class="wikitable" |- ! Code ! Description |- ! 0 | Redirect for Network |- ! 1 | Redirect for Host |- ! 2 | Redirect for Type of Service and Network |- ! 3 | Redirect for Type of Service and Host |} IP address is the 32-bit address of the gateway to which the redirection should be sent. IP header and additional data is included to allow the host to match the reply with the request that caused the redirection reply. Time exceeded Time Exceeded is generated by a gateway to inform the source of a discarded datagram due to the time to live field reaching zero. A time exceeded message may also be sent by a host if it fails to reassemble a fragmented datagram within its time limit. Time exceeded messages are used by the traceroute utility to identify gateways on the path between two hosts. Where: Type must be set to 11 Code specifies the reason for the time exceeded message, include the following: {| class="wikitable" ! Code || Description |- ! 0 | Time-to-live exceeded in transit. |- ! 1 | Fragment reassembly time exceeded. |} IP header and first 64 bits of the original payload are used by the source host to match the time exceeded message to the discarded datagram. For higher-level protocols such as UDP and TCP the 64-bit payload will include the source and destination ports of the discarded packet. Timestamp Timestamp is used for time synchronization. The originating timestamp is set to the time (in milliseconds since midnight) the sender last touched the packet. The receive and transmit timestamps are not used. Where: Type must be set to 13 Code must be set to 0 Identifier and Sequence Number can be used by the client to match the timestamp reply with the timestamp request. Originate timestamp is the number of milliseconds since midnight Universal Time (UT). If a UT reference is not available the most-significant bit can be set to indicate a non-standard time value. Timestamp reply Timestamp Reply replies to a Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as well as a receive timestamp indicating when the Timestamp was received and a transmit timestamp indicating when the Timestamp reply was sent. Where: Type must be set to 14 Code must be set to 0 Identifier and Sequence number can be used by the client to match the reply with the request that caused the reply. Originate timestamp is the time the sender last touched the message before sending it. Receive timestamp is the time the echoer first touched it on receipt. Transmit timestamp is the time the echoer last touched the message on sending it. All timestamps are in units of milliseconds
|
by Internet hosts. Where: Type must be set to 5. Code specifies the reason for the redirection, and may be one of the following: {| class="wikitable" |- ! Code ! Description |- ! 0 | Redirect for Network |- ! 1 | Redirect for Host |- ! 2 | Redirect for Type of Service and Network |- ! 3 | Redirect for Type of Service and Host |} IP address is the 32-bit address of the gateway to which the redirection should be sent. IP header and additional data is included to allow the host to match the reply with the request that caused the redirection reply. Time exceeded Time Exceeded is generated by a gateway to inform the source of a discarded datagram due to the time to live field reaching zero. A time exceeded message may also be sent by a host if it fails to reassemble a fragmented datagram within its time limit. Time exceeded messages are used by the traceroute utility to identify gateways on the path between two hosts. Where: Type must be set to 11 Code specifies the reason for the time exceeded message, include the following: {| class="wikitable" ! Code || Description |- ! 0 | Time-to-live exceeded in transit. |- ! 1 | Fragment reassembly time exceeded. |} IP header and first 64 bits of the original payload are used by the source host to match the time exceeded message to the discarded datagram. For higher-level protocols such as UDP and TCP the 64-bit payload will include the source and destination ports of the discarded packet. Timestamp Timestamp is used for time synchronization. The originating timestamp is set to the time (in milliseconds since midnight) the sender last touched the packet. The receive and transmit timestamps are not used. Where: Type must be set to 13 Code must be set to 0 Identifier and Sequence Number can be used by the client to match the timestamp reply with the timestamp request. Originate timestamp is the number of milliseconds since midnight Universal Time (UT). If a UT reference is not available the most-significant bit can be set to indicate a non-standard time value. Timestamp reply Timestamp Reply replies to a Timestamp message. It consists of the originating timestamp sent by the sender of the Timestamp as well as a receive timestamp indicating when the Timestamp was received and a transmit timestamp indicating when the Timestamp reply was sent. Where: Type must be set to 14 Code must be set to 0 Identifier and Sequence number can be used by the client to match the reply with the request that caused the reply. Originate timestamp is the time the sender last touched the message before sending it. Receive timestamp is the time the echoer first touched it on receipt. Transmit timestamp is the time the echoer last touched the message on sending it. All timestamps are in units of milliseconds since midnight UT. If the time is not available in milliseconds or cannot be provided with respect to midnight UT then any time can be inserted in a timestamp provided the high order bit of the timestamp is also set to indicate this non-standard value. The use of Timestamp and Timestamp Reply messages to synchronize the clocks of Internet nodes has largely been replaced by the UDP-based Network Time Protocol and the Precision Time Protocol. Address mask request Address mask request is normally sent by a host to a router in order to obtain an appropriate subnet mask. Recipients should reply to this message with an Address mask reply message. Where: Type must be set to 17 Code must be set to 0 Address mask can be set to 0 ICMP Address Mask Request may be used as a part of reconnaissance attack to gather information on the target network, therefore ICMP Address Mask Reply is disabled by default on Cisco IOS. Address mask reply Address mask reply is used to reply to an address mask request message with an appropriate subnet mask. Where: Type must be set to 18 Code must be set to 0 Address mask should be set to the subnet mask Destination unreachable Destination unreachable is generated by the host or its inbound gateway to inform the client that the destination is unreachable for some reason. Reasons for this message may include: the physical connection to the host does not exist (distance is infinite); the indicated protocol or port is not active; the data must be fragmented but the 'don't fragment' flag is on. Unreachable TCP ports notably respond with TCP RST rather than a destination unreachable type 3 as might be expected. Destination unreachable is never reported for IP Multicast transmissions. Where: Type field (bits 0-7) must be set to 3 Code field (bits 8-15) is used to specify the type of error, and can be any of the following: {| class="wikitable" ! Code || Description |- ! 0 | Network unreachable error. |- ! 1 | Host unreachable error. |- ! 2 | Protocol unreachable error (the designated transport protocol is not supported). |- ! 3 | Port unreachable error (the designated protocol is unable to inform the host of the incoming message). |- ! 4 | The
|
International Congress on Mathematical Physics Internet Control Message Protocol, used in computer networking Ischemic cardiomyopathy, a type of heart disease Other
|
of Microorganisms from Plants, a culture collection in New Zealand International Congress on Mathematical Physics Internet Control Message Protocol,
|
limit (also called the projective limit) is a construction that allows one to "glue together" several related objects, the precise gluing process being specified by morphisms between the objects. Thus, inverse limits can be defined in any category although their existence depends on the category that is considered. They are a special case of the concept of limit in category theory. By working in the dual category, that is by reverting the arrows, an inverse limit becomes a direct limit or injective limit, and a limit becomes a colimit. Formal definition Algebraic objects We start with the definition of an inverse system (or projective system) of groups and homomorphisms. Let be a directed poset (not all authors require I to be directed). Let (Ai)i∈I be a family of groups and suppose we have a family of homomorphisms for all (note the order) with the following properties: is the identity on , Then the pair is called an inverse system of groups and morphisms over , and the morphisms are called the transition morphisms of the system. We define the inverse limit of the inverse system as a particular subgroup of the direct product of the 's: The inverse limit comes equipped with natural projections \\ i: → which pick out the ith component of the direct product for each in . The inverse limit and the natural projections satisfy a universal property described in the next section. This same construction may be carried out if the 's are sets, semigroups, topological spaces, rings, modules (over a fixed ring), algebras (over a fixed ring), etc., and the homomorphisms are morphisms in the corresponding category. The inverse limit will also belong to that category. General definition The inverse limit can be defined abstractly in an arbitrary category by means of a universal property. Let be an inverse system of objects and morphisms in a category C (same definition as above). The inverse limit of this system is an object X in C together with morphisms i: X → Xi (called projections) satisfying i = ∘ j for all i ≤ j. The pair (X, i) must be universal in the sense that for any other such pair (Y, ψi) there exists a unique morphism u: Y → X such that the diagram commutes for all i ≤ j. The inverse limit is often denoted with the inverse system being understood. In some categories, the inverse limit of certain inverse systems does not exist. If it does, however, it is unique in a strong sense: given any two inverse limits X and X of an inverse system, there exists a unique isomorphism X′ → X commuting with the projection maps. Inverse systems and inverse limits in a category C admit an alternative description in terms of functors. Any partially ordered set I can be considered as a small category where the morphisms consist of arrows i → j if and only if i ≤ j. An inverse system is then just a contravariant functor I → C. Let be the category of these functors (with natural transformations as morphisms). An object X of C can be considered a trivial inverse system, where all objects are equal to X and all arrow are the identity of X. This defines a "trivial functor" from C to The direct limit, if it exists, is defined as a right adjoint of this trivial functor. Examples The ring of p-adic integers is the inverse limit of the rings (see modular arithmetic) with the index set being the natural numbers with the usual order, and the morphisms being "take remainder". That is, one considers sequences of integers such that each element of the sequence "projects" down to the previous ones, namely, that whenever The natural topology on the p-adic integers is the one implied here, namely the product topology with cylinder sets as the open sets. The p-adic solenoid is the inverse limit of the topological groups with the index set being the natural numbers with the usual order, and the morphisms being "take remainder". That is, one considers sequences of real numbers such that each element of the sequence "projects" down to the previous ones, namely, that whenever The ring of formal power series over a commutative ring R can be thought of as the inverse limit
|
will also belong to that category. General definition The inverse limit can be defined abstractly in an arbitrary category by means of a universal property. Let be an inverse system of objects and morphisms in a category C (same definition as above). The inverse limit of this system is an object X in C together with morphisms i: X → Xi (called projections) satisfying i = ∘ j for all i ≤ j. The pair (X, i) must be universal in the sense that for any other such pair (Y, ψi) there exists a unique morphism u: Y → X such that the diagram commutes for all i ≤ j. The inverse limit is often denoted with the inverse system being understood. In some categories, the inverse limit of certain inverse systems does not exist. If it does, however, it is unique in a strong sense: given any two inverse limits X and X of an inverse system, there exists a unique isomorphism X′ → X commuting with the projection maps. Inverse systems and inverse limits in a category C admit an alternative description in terms of functors. Any partially ordered set I can be considered as a small category where the morphisms consist of arrows i → j if and only if i ≤ j. An inverse system is then just a contravariant functor I → C. Let be the category of these functors (with natural transformations as morphisms). An object X of C can be considered a trivial inverse system, where all objects are equal to X and all arrow are the identity of X. This defines a "trivial functor" from C to The direct limit, if it exists, is defined as a right adjoint of this trivial functor. Examples The ring of p-adic integers is the inverse limit of the rings (see modular arithmetic) with the index set being the natural numbers with the usual order, and the morphisms being "take remainder". That is, one considers sequences of integers such that each element of the sequence "projects" down to the previous ones, namely, that whenever The natural topology on the p-adic integers is the one implied here, namely the product topology with cylinder sets as the open sets. The p-adic solenoid is the inverse limit of the topological groups with the index set being the natural numbers with the usual order, and the morphisms being "take remainder". That is, one considers sequences of real numbers such that each element of the sequence "projects" down to the previous ones, namely, that whenever The ring of formal power series over a commutative ring R can be thought of as the inverse limit of the rings , indexed by the natural numbers as usually ordered, with the morphisms from to given by the natural projection. Pro-finite groups are defined as inverse limits of (discrete) finite groups. Let the index set I of an inverse system (Xi, ) have a
|
is possible to use other nearby planets such as Venus or even the Moon as slingshots in journeys to the outer planets. This maneuver can only change an object's velocity relative to a third, uninvolved object, – possibly the “centre of mass” or the Sun. There is no change in the velocities of the two objects involved in the maneuver relative to each other. The Sun cannot be used in a gravitational slingshot because it is stationary compared to rest of the Solar System, which orbits the Sun. It may be used to send a spaceship or probe into the galaxy because the Sun revolves around the center of the Milky Way. Powered slingshot A powered slingshot is the use of a rocket engine at or around closest approach to a body (periapsis). The use at this point multiplies up the effect of the delta-v, and gives a bigger effect than at other times. Fuzzy orbits Computers did not exist when Hohmann transfer orbits were first proposed (1925) and were slow, expensive and unreliable when gravitational slingshots were developed (1959). Recent advances in computing have made it possible to exploit many more features of the gravity fields of astronomical bodies and thus calculate even lower-cost trajectories. Paths have been calculated which link the Lagrange points of the various planets into the so-called Interplanetary Transport Network. Such "fuzzy orbits" use significantly less energy than Hohmann transfers but are much, much slower. They aren't practical for human crewed missions because they generally take years or decades, but may be useful for high-volume transport of low-value commodities if humanity develops a space-based economy. Aerobraking Aerobraking uses the atmosphere of the target planet to slow down. It was first used on the Apollo program where the returning spacecraft did not enter Earth orbit but instead used a S-shaped vertical descent profile (starting with an initially steep descent, followed by a leveling out, followed by a slight climb, followed by a return to a positive rate of descent continuing to splash-down in the ocean) through Earth's atmosphere to reduce its speed until the parachute system could be deployed enabling a safe landing. Aerobraking does not require a thick atmosphere – for example most Mars landers use the technique, and Mars' atmosphere is only about 1% as thick as Earth's. Aerobraking converts the spacecraft's kinetic energy into heat, so it requires a heatshield to prevent the craft from burning up. As a result, aerobraking is only helpful in cases where the fuel needed to transport the heatshield to the planet is less than the fuel that would be required to brake an unshielded craft by firing its engines. This can be addressed by creating heatshields from material available near the target Improved technologies and methodologies Several technologies have been proposed which both save fuel and provide significantly faster travel than the traditional methodology of using Hohmann transfers. Some are still just theoretical, but over time, several of the theoretical approaches have been tested on spaceflight missions. For example, the Deep Space 1 mission was a successful test of an ion drive. These improved technologies typically focus on one or more of: Space propulsion systems with much better fuel economy. Such systems would make it possible to travel much faster while keeping the fuel cost within acceptable limits. Using solar energy and in-situ resource utilization to avoid or minimize the expensive task of shipping components and fuel up from the Earth's surface, against the Earth's gravity (see "Using non-terrestrial resources", below). Novel methodologies of using energy at different locations or in different ways that can shorten transport time or reduce cost per unit mass of space transport Besides making travel faster or cost less, such improvements could also allow greater design "safety margins" by reducing the imperative to make spacecraft lighter. Improved rocket concepts All rocket concepts are limited by the Tsiolkovsky rocket equation, which sets the characteristic velocity available as a function of exhaust velocity and mass ratio, of initial (M0, including fuel) to final (M1, fuel depleted) mass. The main consequence is that mission velocities of more than a few times the velocity of the rocket motor exhaust (with respect to the vehicle) rapidly become impractical, as the dry mass (mass of payload and rocket without fuel) falls to below 10% of the entire rocket's wet mass (mass of rocket with fuel). Nuclear thermal and solar thermal rockets In a nuclear thermal rocket or solar thermal rocket a working fluid, usually hydrogen, is heated to a high temperature, and then expands through a rocket nozzle to create thrust. The energy replaces the chemical energy of the reactive chemicals in a traditional rocket engine. Due to the low molecular mass and hence high thermal velocity of hydrogen these engines are at least twice as fuel efficient as chemical engines, even after including the weight of the reactor. The US Atomic Energy Commission and NASA tested a few designs from 1959 to 1968. The NASA designs were conceived as replacements for the upper stages of the Saturn V launch vehicle, but the tests revealed reliability problems, mainly caused by the vibration and heating involved in running the engines at such high thrust levels. Political and environmental considerations make it unlikely such an engine will be used in the foreseeable future, since nuclear thermal rockets would be most useful at or near the Earth's surface and the consequences of a malfunction could be disastrous. Fission-based thermal rocket concepts produce lower exhaust velocities than the electric and plasma concepts described below, and are therefore less attractive solutions. For applications requiring high thrust-to-weight ratio, such as planetary escape, nuclear thermal is potentially more attractive. Electric propulsion Electric propulsion systems use an external source such as a nuclear reactor or solar cells to generate electricity, which is then used to accelerate a chemically inert propellant to speeds far higher than achieved in a chemical rocket. Such drives produce feeble thrust, and are therefore unsuitable for quick maneuvers or for launching from the surface of a planet. But they are so economical in their use of reaction mass that they can keep firing continuously for days or weeks, while chemical rockets use up reaction mass so quickly that they can only fire for seconds or minutes. Even a trip to the Moon is long enough for an electric propulsion system to outrun a chemical rocket – the Apollo missions took 3 days in each direction. NASA's Deep Space One was a very successful test of a prototype ion drive, which fired for a total of 678 days and enabled the probe to run down Comet Borrelly, a feat which would have been impossible for a chemical rocket. Dawn, the first NASA operational (i.e., non-technology demonstration) mission to use an ion drive for its primary propulsion, successfully orbited the large main-belt asteroids 1 Ceres and 4 Vesta. A more ambitious, nuclear-powered version was intended for a Jupiter mission without human crew, the Jupiter Icy Moons Orbiter (JIMO), originally planned for launch sometime in the next decade. Due to a shift in priorities at NASA that favored human crewed space missions, the project lost funding in 2005. A similar mission is currently under discussion as the US component of a joint NASA/ESA program for the exploration of Europa and Ganymede. A NASA multi-center Technology Applications Assessment Team led from the Johnson Spaceflight Center, has as of January 2011 described "Nautilus-X", a concept study for a multi-mission space exploration vehicle useful for missions beyond low Earth orbit (LEO), of up to 24 months duration for a crew of up to six. Although Nautilus-X is adaptable to a variety of mission-specific propulsion units of various low-thrust, high specific impulse (Isp) designs, nuclear ion-electric drive is shown for illustrative purposes. It is intended for integration and checkout at the International Space Station (ISS), and would be suitable for deep-space missions from the ISS to and beyond the Moon, including Earth/Moon L1, Sun/Earth L2, near-Earth asteroidal, and Mars orbital destinations. It incorporates a reduced-g centrifuge providing artificial gravity for crew health to ameliorate the effects of long-term 0g exposure, and the capability to mitigate the space radiation environment. Fission powered rockets The electric propulsion missions already flown, or currently scheduled, have used solar electric power, limiting their capability to operate far from the Sun, and also limiting their peak acceleration due to the mass of the electric power source. Nuclear-electric or plasma engines, operating for long periods at low thrust and powered by fission reactors, can reach speeds much greater than chemically powered vehicles. Fusion rockets Fusion rockets, powered by nuclear fusion reactions, would "burn" such light element fuels as deuterium, tritium, or 3He. Because fusion yields about 1% of the mass of the nuclear fuel as released energy, it is energetically more favorable than fission, which releases only about 0.1% of the fuel's mass-energy. However, either fission or fusion technologies can in principle achieve velocities far higher than needed for Solar System exploration, and fusion energy still awaits practical demonstration on Earth. One proposal using a fusion rocket was Project Daedalus. Another fairly detailed vehicle system, designed and optimized for crewed Solar System exploration, "Discovery II", based on the D3He reaction but using hydrogen as reaction mass, has been described by a team from NASA's Glenn Research Center. It achieves characteristic velocities of >300 km/s with an acceleration of ~1.7•10−3 g, with a ship initial mass of ~1700 metric tons, and payload fraction above 10%. Fusion rockets are considered to be a likely source of interplanetary transport for a planetary civilization. Exotic propulsion See the spacecraft propulsion article for a discussion of a number of other technologies that could, in the medium to longer term, be the basis of interplanetary missions. Unlike the situation with interstellar travel, the barriers to fast interplanetary travel involve engineering and economics rather than any basic physics. Solar sails Solar sails rely on the fact that light reflected from a surface exerts pressure on the surface. The radiation pressure is small and decreases by the square of the distance from the Sun, but unlike rockets, solar sails require no fuel. Although the thrust is small, it continues as long as the Sun shines and the sail is deployed. The original concept relied only on radiation from the Sun – for example in Arthur C. Clarke's 1965 story "Sunjammer". More recent light sail designs propose to boost the thrust by aiming ground-based lasers or masers at the sail. Ground-based lasers or masers can also help a light-sail spacecraft to decelerate: the sail splits into an outer and inner section, the outer section is pushed forward and its shape is changed mechanically to focus reflected radiation on the inner portion, and the radiation focused on the inner section acts as a brake. Although most articles about light sails focus on interstellar travel, there have been several proposals for their use within the Solar System. Currently, the only spacecraft to use a solar sail as the main method of propulsion is IKAROS which was launched by JAXA on May 21, 2010. It has since been successfully deployed, and shown to be producing acceleration as expected. Many ordinary spacecraft and satellites also use solar collectors, temperature-control panels and Sun shades as light sails, to make minor corrections to their attitude and orbit without using fuel. A few have even had small purpose-built solar sails for this use (for example Eurostar E3000 geostationary communications satellites built by EADS Astrium). Cyclers It is possible to put stations or spacecraft on orbits that cycle between different planets, for example a Mars cycler would synchronously cycle between Mars and Earth, with very little propellant usage to maintain the trajectory. Cyclers are conceptually a good idea, because massive radiation shields, life support and other equipment only need to be put onto the cycler trajectory once. A cycler could combine several roles: habitat (for example it could spin to produce an "artificial gravity" effect); mothership (providing life support for the crews of smaller spacecraft which hitch a ride on it). Cyclers could also possibly make excellent cargo ships for resupply of a colony. Space elevator A space elevator is a theoretical structure that would transport material from a planet's surface into orbit. The idea is that, once the expensive job of building the elevator is complete, an indefinite number of loads can be transported into orbit at minimal cost. Even the simplest designs avoid the vicious circle of rocket launches from the surface, wherein the fuel needed to travel the last 10% of the distance into orbit must be lifted all the way from the surface, requiring even more fuel, and so on. More sophisticated space elevator designs reduce the energy cost per trip by using counterweights, and the most ambitious schemes aim to balance loads going up and down and thus make the energy cost close to zero. Space elevators have also sometimes been referred to as "beanstalks", "space bridges", "space lifts", "space ladders" and "orbital towers". A terrestrial space elevator is beyond our current technology, although a lunar space elevator could theoretically be built using existing materials. Skyhook A skyhook is a theoretical class of orbiting tether propulsion intended to lift payloads to high altitudes and speeds. Proposals for skyhooks include designs that employ tethers spinning at hypersonic speed for catching high speed payloads or high altitude aircraft and placing them in orbit. In addition, it has been suggested that the rotating skyhook is "not engineeringly feasible using presently available materials". Launch vehicle and spacecraft reusability The SpaceX Starship, with maiden launch slated to be no earlier than 2020, is designed to be fully and rapidly reusable, making use of the SpaceX reusable technology that was developed during 2011–2018 for Falcon 9 and Falcon Heavy launch vehicles. SpaceX CEO Elon Musk estimates that the reusability capability alone, on both the launch vehicle and the spacecraft associated with the Starship will reduce overall system costs per tonne delivered to Mars by at least two orders of magnitude over what NASA had previously achieved. Staging propellants When launching interplanetary probes from the surface of Earth, carrying all energy needed for the long-duration mission, payload quantities are necessarily extremely limited, due to the basis mass limitations described theoretically by the rocket equation. One alternative to transport more mass on interplanetary trajectories is to use up nearly all of the upper stage propellant on launch, and then refill propellants in Earth orbit before firing the rocket to escape velocity for a heliocentric trajectory. These propellants could be stored on orbit at a propellant depot, or carried to orbit in a propellant tanker to be directly transferred to the interplanetary spacecraft. For returning mass to Earth, a related option is to mine raw materials from a solar system celestial object, refine, process, and store the reaction products (propellant) on the Solar System body until such time as a vehicle needs to be loaded for launch. On-orbit tanker transfers As of
|
depleted) mass. The main consequence is that mission velocities of more than a few times the velocity of the rocket motor exhaust (with respect to the vehicle) rapidly become impractical, as the dry mass (mass of payload and rocket without fuel) falls to below 10% of the entire rocket's wet mass (mass of rocket with fuel). Nuclear thermal and solar thermal rockets In a nuclear thermal rocket or solar thermal rocket a working fluid, usually hydrogen, is heated to a high temperature, and then expands through a rocket nozzle to create thrust. The energy replaces the chemical energy of the reactive chemicals in a traditional rocket engine. Due to the low molecular mass and hence high thermal velocity of hydrogen these engines are at least twice as fuel efficient as chemical engines, even after including the weight of the reactor. The US Atomic Energy Commission and NASA tested a few designs from 1959 to 1968. The NASA designs were conceived as replacements for the upper stages of the Saturn V launch vehicle, but the tests revealed reliability problems, mainly caused by the vibration and heating involved in running the engines at such high thrust levels. Political and environmental considerations make it unlikely such an engine will be used in the foreseeable future, since nuclear thermal rockets would be most useful at or near the Earth's surface and the consequences of a malfunction could be disastrous. Fission-based thermal rocket concepts produce lower exhaust velocities than the electric and plasma concepts described below, and are therefore less attractive solutions. For applications requiring high thrust-to-weight ratio, such as planetary escape, nuclear thermal is potentially more attractive. Electric propulsion Electric propulsion systems use an external source such as a nuclear reactor or solar cells to generate electricity, which is then used to accelerate a chemically inert propellant to speeds far higher than achieved in a chemical rocket. Such drives produce feeble thrust, and are therefore unsuitable for quick maneuvers or for launching from the surface of a planet. But they are so economical in their use of reaction mass that they can keep firing continuously for days or weeks, while chemical rockets use up reaction mass so quickly that they can only fire for seconds or minutes. Even a trip to the Moon is long enough for an electric propulsion system to outrun a chemical rocket – the Apollo missions took 3 days in each direction. NASA's Deep Space One was a very successful test of a prototype ion drive, which fired for a total of 678 days and enabled the probe to run down Comet Borrelly, a feat which would have been impossible for a chemical rocket. Dawn, the first NASA operational (i.e., non-technology demonstration) mission to use an ion drive for its primary propulsion, successfully orbited the large main-belt asteroids 1 Ceres and 4 Vesta. A more ambitious, nuclear-powered version was intended for a Jupiter mission without human crew, the Jupiter Icy Moons Orbiter (JIMO), originally planned for launch sometime in the next decade. Due to a shift in priorities at NASA that favored human crewed space missions, the project lost funding in 2005. A similar mission is currently under discussion as the US component of a joint NASA/ESA program for the exploration of Europa and Ganymede. A NASA multi-center Technology Applications Assessment Team led from the Johnson Spaceflight Center, has as of January 2011 described "Nautilus-X", a concept study for a multi-mission space exploration vehicle useful for missions beyond low Earth orbit (LEO), of up to 24 months duration for a crew of up to six. Although Nautilus-X is adaptable to a variety of mission-specific propulsion units of various low-thrust, high specific impulse (Isp) designs, nuclear ion-electric drive is shown for illustrative purposes. It is intended for integration and checkout at the International Space Station (ISS), and would be suitable for deep-space missions from the ISS to and beyond the Moon, including Earth/Moon L1, Sun/Earth L2, near-Earth asteroidal, and Mars orbital destinations. It incorporates a reduced-g centrifuge providing artificial gravity for crew health to ameliorate the effects of long-term 0g exposure, and the capability to mitigate the space radiation environment. Fission powered rockets The electric propulsion missions already flown, or currently scheduled, have used solar electric power, limiting their capability to operate far from the Sun, and also limiting their peak acceleration due to the mass of the electric power source. Nuclear-electric or plasma engines, operating for long periods at low thrust and powered by fission reactors, can reach speeds much greater than chemically powered vehicles. Fusion rockets Fusion rockets, powered by nuclear fusion reactions, would "burn" such light element fuels as deuterium, tritium, or 3He. Because fusion yields about 1% of the mass of the nuclear fuel as released energy, it is energetically more favorable than fission, which releases only about 0.1% of the fuel's mass-energy. However, either fission or fusion technologies can in principle achieve velocities far higher than needed for Solar System exploration, and fusion energy still awaits practical demonstration on Earth. One proposal using a fusion rocket was Project Daedalus. Another fairly detailed vehicle system, designed and optimized for crewed Solar System exploration, "Discovery II", based on the D3He reaction but using hydrogen as reaction mass, has been described by a team from NASA's Glenn Research Center. It achieves characteristic velocities of >300 km/s with an acceleration of ~1.7•10−3 g, with a ship initial mass of ~1700 metric tons, and payload fraction above 10%. Fusion rockets are considered to be a likely source of interplanetary transport for a planetary civilization. Exotic propulsion See the spacecraft propulsion article for a discussion of a number of other technologies that could, in the medium to longer term, be the basis of interplanetary missions. Unlike the situation with interstellar travel, the barriers to fast interplanetary travel involve engineering and economics rather than any basic physics. Solar sails Solar sails rely on the fact that light reflected from a surface exerts pressure on the surface. The radiation pressure is small and decreases by the square of the distance from the Sun, but unlike rockets, solar sails require no fuel. Although the thrust is small, it continues as long as the Sun shines and the sail is deployed. The original concept relied only on radiation from the Sun – for example in Arthur C. Clarke's 1965 story "Sunjammer". More recent light sail designs propose to boost the thrust by aiming ground-based lasers or masers at the sail. Ground-based lasers or masers can also help a light-sail spacecraft to decelerate: the sail splits into an outer and inner section, the outer section is pushed forward and its shape is changed mechanically to focus reflected radiation on the inner portion, and the radiation focused on the inner section acts as a brake. Although most articles about light sails focus on interstellar travel, there have been several proposals for their use within the Solar System. Currently, the only spacecraft to use a solar sail as the main method of propulsion is IKAROS which was launched by JAXA on May 21, 2010. It has since been successfully deployed, and shown to be producing acceleration as expected. Many ordinary spacecraft and satellites also use solar collectors, temperature-control panels and Sun shades as light sails, to make minor corrections to their attitude and orbit without using fuel. A few have even had small purpose-built solar sails for this use (for example Eurostar E3000 geostationary communications satellites built by EADS Astrium). Cyclers It is possible to put stations or spacecraft on orbits that cycle between different planets, for example a Mars cycler would synchronously cycle between Mars and Earth, with very little propellant usage to maintain the trajectory. Cyclers are conceptually a good idea, because massive radiation shields, life support and other equipment only need to be put onto the cycler trajectory once. A cycler could combine several roles: habitat (for example it could spin to produce an "artificial gravity" effect); mothership (providing life support for the crews of smaller spacecraft which hitch a ride on it). Cyclers could also possibly make excellent cargo ships for resupply of a colony. Space elevator A space elevator is a theoretical structure that would transport material from a planet's surface into orbit. The idea is that, once the expensive job of building the elevator is complete, an indefinite number of loads can be transported into orbit at minimal cost. Even the simplest designs avoid the vicious circle of rocket launches from the surface, wherein the fuel needed to travel the last 10% of the distance into orbit must be lifted all the way from the surface, requiring even more fuel, and so on. More sophisticated space elevator designs reduce the energy cost per trip by using counterweights, and the most ambitious schemes aim to balance loads going up and down and thus make the energy cost close to zero. Space elevators have also sometimes been referred to as "beanstalks", "space bridges", "space lifts", "space ladders" and "orbital towers". A terrestrial space elevator is beyond our current technology, although a lunar space elevator could theoretically be built using existing materials. Skyhook A skyhook is a theoretical class of orbiting tether propulsion intended to lift payloads to high altitudes and speeds. Proposals for skyhooks include designs that employ tethers spinning at hypersonic speed for catching high speed payloads or high altitude aircraft and placing them in orbit. In addition, it has been suggested that the rotating skyhook is "not engineeringly feasible using presently available materials". Launch vehicle and spacecraft reusability The SpaceX Starship, with maiden launch slated to be no earlier than 2020, is designed to be fully and rapidly reusable, making use of the SpaceX reusable technology that was developed during 2011–2018 for Falcon 9 and Falcon Heavy launch vehicles. SpaceX CEO Elon Musk estimates that the reusability capability alone, on both the launch vehicle and the spacecraft associated with the Starship will reduce overall system costs per tonne delivered to Mars by at least two orders of magnitude over what NASA had previously achieved. Staging propellants When launching interplanetary probes from the surface of Earth, carrying all energy needed for the long-duration mission, payload quantities are necessarily extremely limited, due to the basis mass limitations described theoretically by the rocket equation. One alternative to transport more mass on interplanetary trajectories is to use up nearly all of the upper stage propellant on launch, and then refill propellants in Earth orbit before firing the rocket to escape velocity for a heliocentric trajectory. These propellants could be stored on orbit at a propellant depot, or carried to orbit in a propellant tanker to be directly transferred to the interplanetary spacecraft. For returning mass to Earth, a related option is to mine raw materials from a solar system celestial object, refine, process, and store the reaction products (propellant) on the Solar System body until such time as a vehicle needs to be loaded for launch. On-orbit tanker transfers As of 2019, SpaceX is developing a system in which a reusable first stage vehicle would transport a crewed interplanetary spacecraft to Earth orbit, detach, return to its launch pad where a tanker spacecraft would be mounted atop it, then both fueled, then launched again to rendezvous with the waiting crewed spacecraft. The tanker would then transfer its fuel to the human crewed spacecraft for use on its interplanetary voyage. The SpaceX Starship is a stainless steel-structure spacecraft propelled by six Raptor engines operating on densified methane/oxygen propellants. It is -long, -diameter at its widest point, and is capable of transporting up to of cargo and passengers per trip to Mars, with on-orbit propellant refill before the interplanetary part of the journey. Propellant plant on a celestial body As an example of a funded project currently under development, a key part of the system SpaceX has designed for Mars in order to radically decrease the cost of spaceflight to interplanetary destinations is the placement and operation of a physical plant on Mars to handle production and storage of the propellant components necessary to launch and fly the Starships back to Earth, or perhaps to increase the mass that can be transported onward to destinations in the outer Solar System. The first Starship to Mars will carry a small propellant plant as a part of its cargo load. The plant will be expanded over multiple synods as more equipment arrives, is installed, and placed into mostly-autonomous production. The SpaceX propellant plant will take advantage of the large supplies of carbon dioxide and water resources on Mars, mining the water (H2O) from subsurface ice and collecting CO2 from the atmosphere. A chemical plant will process the raw materials by means of electrolysis and the Sabatier process to produce oxygen (O2) and methane (CH4), and then liquefy it to facilitate long-term storage and ultimate use. Using extraterrestrial resources Current space vehicles attempt to launch with all their fuel (propellants and energy supplies) on board that they will need for their entire journey, and current space structures are lifted from the Earth's surface. Non-terrestrial sources of energy and materials are mostly a lot further away, but most would not require lifting out of a strong gravity field and therefore should be much cheaper to use in space in the long term. The most important non-terrestrial resource is energy, because it can be used to transform non-terrestrial materials into useful forms (some of which may also produce energy). At least two fundamental non-terrestrial energy sources have been proposed: solar-powered energy generation (unhampered by clouds), either directly by solar cells or indirectly by focusing solar radiation on boilers which produce steam to drive generators; and electrodynamic tethers which generate electricity from the powerful magnetic fields of some planets (Jupiter has a very powerful magnetic field). Water ice would be very useful and is widespread on the moons of Jupiter and Saturn: The low gravity of these moons would make them a cheaper source of water for space stations and planetary bases than lifting it up from Earth's surface. Non-terrestrial power supplies could be used to electrolyse water ice into oxygen and hydrogen for use in bipropellant rocket engines. Nuclear thermal rockets or Solar thermal rockets could use it as reaction mass. Hydrogen has also been proposed for use in these engines and would provide much greater specific impulse (thrust per kilogram of reaction mass), but it has been claimed that water will beat hydrogen in cost/performance terms despite its much lower specific impulse by orders of magnitude. A spacecraft with an adequate water supply could carry the water under the hull, which could provide a considerable additional safety margin for the vessel and its occupants: The water would absorb and conduct solar energy, thus acting as a heat shield. A vessel traveling in the inner Solar System could maintain a constant heading relative to the Sun without overheating the side of the spacecraft facing the Sun, provided the water under the hull was constantly circulated to evenly distribute the solar heat throughout the hull; The water would provide some additional protection against ionizing radiation; The water would act as an insulator against the extreme cold assuming it was kept heated, whether by the Sun when traveling in the inner Solar System or by an on board power source when traveling further away from the Sun; The water would provide some additional protection against micrometeoroid impacts, provided the hull was compartmentalized so as to ensure any leak could be isolated to a small section of the hull. Oxygen is a common constituent of the moon's crust, and is probably abundant in most other bodies in the Solar System. Non-terrestrial oxygen would be valuable as a source of water ice only if an adequate source of hydrogen can be found. Possible uses include: In the life support systems of space ships, space stations and planetary bases. In rocket engines. Even if the other propellant has to be lifted from Earth, using non-terrestrial oxygen could reduce propellant launch costs by up to 2/3 for hydrocarbon fuel, or 85% for hydrogen. The savings are so high because oxygen accounts for the majority of the mass in most rocket propellant combinations. Unfortunately hydrogen, along with other volatiles like carbon and nitrogen, are much less abundant than oxygen in the inner Solar System. Scientists expect to find a vast range of organic compounds in some of the planets, moons and comets of the outer Solar System, and the range of possible uses is even wider. For example, methane can be used as a fuel (burned with non-terrestrial oxygen), or as a feedstock for petrochemical processes such as making plastics. And ammonia could be a valuable feedstock for producing fertilizers to be used in the vegetable gardens of orbital and planetary bases, reducing the need to lift food to them from Earth. Even unprocessed rock may be useful as rocket propellant if mass drivers are employed. Design requirements for crewed interplanetary travel Life support Life support systems must be capable of supporting human life for weeks, months or even years. A breathable atmosphere of at least must be maintained, with adequate amounts of oxygen, nitrogen, and controlled levels of carbon dioxide, trace gases and water vapor. In October 2015, the NASA Office of Inspector General issued a health hazards report related to human spaceflight, including a human mission to Mars. Radiation Once a vehicle leaves low Earth orbit and the protection of Earth's
|
this can be written This represents a wave at the original frequency, traveling to the right like its components, whose amplitude is proportional to the cosine of . Constructive interference: If the phase difference is an even multiple of : then , so the sum of the two waves is a wave with twice the amplitude Destructive interference: If the phase difference is an odd multiple of : then , so the sum of the two waves is zero Between two plane waves A simple form of interference pattern is obtained if two plane waves of the same frequency intersect at an angle. Interference is essentially an energy redistribution process. The energy which is lost at the destructive interference is regained at the constructive interference. One wave is travelling horizontally, and the other is travelling downwards at an angle θ to the first wave. Assuming that the two waves are in phase at the point B, then the relative phase changes along the x-axis. The phase difference at the point A is given by It can be seen that the two waves are in phase when and are half a cycle out of phase when Constructive interference occurs when the waves are in phase, and destructive interference when they are half a cycle out of phase. Thus, an interference fringe pattern is produced, where the separation of the maxima is and is known as the fringe spacing. The fringe spacing increases with increase in wavelength, and with decreasing angle . The fringes are observed wherever the two waves overlap and the fringe spacing is uniform throughout. Between two spherical waves A point source produces a spherical wave. If the light from two point sources overlaps, the interference pattern maps out the way in which the phase difference between the two waves varies in space. This depends on the wavelength and on the separation of the point sources. The figure to the right shows interference between two spherical waves. The wavelength increases from top to bottom, and the distance between the sources increases from left to right. When the plane of observation is far enough away, the fringe pattern will be a series of almost straight lines, since the waves will then be almost planar. Multiple beams Interference occurs when several waves are added together provided that the phase differences between them remain constant over the observation time. It is sometimes desirable for several waves of the same frequency and amplitude to sum to zero (that is, interfere destructively, cancel). This is the principle behind, for example, 3-phase power and the diffraction grating. In both of these cases, the result is achieved by uniform spacing of the phases. It is easy to see that a set of waves will cancel if they have the same amplitude and their phases are spaced equally in angle. Using phasors, each wave can be represented as for waves from to , where To show that one merely assumes the converse, then multiplies both sides by The Fabry–Pérot interferometer uses interference between multiple reflections. A diffraction grating can be considered to be a multiple-beam interferometer; since the peaks which it produces are generated by interference between the light transmitted by each of the elements in the grating; see interference vs. diffraction for further discussion. Optical interference Because the frequency of light waves (~1014 Hz) is too high to be detected by currently available detectors, it is possible to observe only the intensity of an optical interference pattern. The intensity of the light at a given point is proportional to the square of the average amplitude of the wave. This can be expressed mathematically as follows. The displacement of the two waves at a point is: where represents the magnitude of the displacement, represents the phase and represents the angular frequency. The displacement of the summed waves is The intensity of the light at is given by This can be expressed in terms of the intensities of the individual waves as Thus, the interference pattern maps out the difference in phase between the two waves, with maxima occurring when the phase difference is a multiple of 2. If the two beams are of equal intensity, the maxima are four times as bright as the individual beams, and the minima have zero intensity. The two waves must have the same polarization to give rise to interference fringes since it is not possible for waves of different polarizations to cancel one another out or add together. Instead, when waves of different polarization are added together, they give rise to a wave of a different polarization state. Light source requirements The discussion above assumes that the waves which interfere with one another are monochromatic, i.e. have a single frequency—this requires that they are infinite in time. This is not, however, either practical or necessary. Two identical waves of finite duration whose frequency is fixed over that period will give rise to an interference pattern while they overlap. Two identical waves which consist of a narrow spectrum of frequency waves of finite duration (but shorter than their coherence time), will give a series of fringe patterns of slightly differing spacings, and provided the spread of spacings
|
beats can be readily recognized. Tuning two tones to a unison will present a peculiar effect: when the two tones are close in pitch but not identical, the difference in frequency generates the beating. The volume varies like in a tremolo as the sounds alternately interfere constructively and destructively. As the two tones gradually approach unison, the beating slows down and may become so slow as to be imperceptible. As the two tones get further apart, their beat frequency starts to approach the range of human pitch perception, the beating starts to sound like a note, and a combination tone is produced. This combination tone can also be referred to as a missing fundamental, as the beat frequency of any two tones is equivalent to the frequency of their implied fundamental frequency. Optical interferometry Interferometry has played an important role in the advancement of physics, and also has a wide range of applications in physical and engineering measurement. Thomas Young's double slit interferometer in 1803 demonstrated interference fringes when two small holes were illuminated by light from another small hole which was illuminated by sunlight. Young was able to estimate the wavelength of different colours in the spectrum from the spacing of the fringes. The experiment played a major role in the general acceptance of the wave theory of light. In quantum mechanics, this experiment is considered to demonstrate the inseparability of the wave and particle natures of light and other quantum particles (wave–particle duality). Richard Feynman was fond of saying that all of quantum mechanics can be gleaned from carefully thinking through the implications of this single experiment. The results of the Michelson–Morley experiment are generally considered to be the first strong evidence against the theory of a luminiferous aether and in favor of special relativity. Interferometry has been used in defining and calibrating length standards. When the metre was defined as the distance between two marks on a platinum-iridium bar, Michelson and Benoît used interferometry to measure the wavelength of the red cadmium line in the new standard, and also showed that it could be used as a length standard. Sixty years later, in 1960, the metre in the new SI system was defined to be equal to 1,650,763.73 wavelengths of the orange-red emission line in the electromagnetic spectrum of the krypton-86 atom in a vacuum. This definition was replaced in 1983 by defining the metre as the distance travelled by light in vacuum during a specific time interval. Interferometry is still fundamental in establishing the calibration chain in length measurement. Interferometry is used in the calibration of slip gauges (called gauge blocks in the US) and in coordinate-measuring machines. It is also used in the testing of optical components. Radio interferometry In 1946, a technique called astronomical interferometry was developed. Astronomical radio interferometers usually consist either of arrays of parabolic dishes or two-dimensional arrays of omni-directional antennas. All of the telescopes in the array are widely separated and are usually connected together using coaxial cable, waveguide, optical fiber, or other type of transmission line. Interferometry increases the total signal collected, but its primary purpose is to vastly increase the resolution through a process called Aperture synthesis. This technique works by superposing (interfering) the signal waves from the different telescopes on the principle that waves that coincide with the same phase will add to each other while two waves that have opposite phases will cancel each other out. This creates a combined telescope that is equivalent in resolution (though not in sensitivity) to a single antenna whose diameter is equal to the spacing of the antennas farthest apart in the array. Acoustic interferometry An acoustic interferometer is an instrument for measuring the physical characteristics of sound waves in a gas or liquid, such velocity, wavelength, absorption, or impedance. A vibrating crystal creates ultrasonic waves that are radiated into the medium. The waves strike a reflector placed parallel to the crystal, reflected back to the source and measured. Quantum interference Quantum interference is quite different from the classical wave interference described above. Below, an enumeration of the important differences is provided. Quantum interference is, however, similar to optical interference. Let be a wavefunction solution of the Schrödinger equation for a quantum mechanical object. Then the probability of observing the object at position is where * indicates complex conjugation. Quantum interference concerns the issue of this probability when the wavefunction is expressed as a sum or linear superposition of two terms : Usually, and correspond to distinct situations A and B. When this is the case, the equation indicates that the object can be in situation A or situation B. The above equation can then be interpreted as: The probability of finding the object at is the probability of finding the object at when it is in situation A plus the probability of finding the object at when it is in situation B plus an extra term. This extra term, which is called the quantum interference term, is in the above equation. As in the classical wave case above, the quantum interference term can add (constructive interference) or subtract (destructive interference) from in the above equation depending on whether the quantum interference term is positive or negative. If this term is absent for all , then there is no quantum mechanical interference associated with situations A and B. The best known example of quantum interference is the double-slit experiment. In this experiment, electrons, atoms or other quantum mechanical objects approach a barrier with two slits in it. If the quantum object succeeds in passing through the slits, its position is measured with a detection screen a certain distance beyond and behind the barrier. For this system, one lets be that part of the wavefunction that passes through one of the slits and lets be that part of the wavefunction that passes through the other slit. When the object almost reaches the screen, the probability of where it is located is given by the above equation. In this context, the equation says that the probability of finding the object at some point just before it hits the screen is the probability that would be obtained if it went through the first slit plus the probability that would be obtained if it went through the second slit plus the quantum interference term, which has no counterpart in classical physics. The quantum interference term can significantly change the pattern observed on the detection screen. The separation of is particularly clear in the path integral formulation of quantum mechanics in the context of the double-slit experiment. consists of the path integral contributions in which the paths pass through the first slit; consists of the path integral contributions in which they pass through the second slit. Here
|
offences such as murder and rape are considered so serious that they can only be tried on indictment at the Crown Court where the widest range of sentencing powers is available to the judge. The expression indictable-only offence was defined by section 51 of the Crime and Disorder Act 1998, as originally enacted, as an offence triable only on indictment. Sections 51 and 52 of, and Schedule 3 to, that Act abolished committal proceedings for such offences and made other provisions in relation to them. When the accused is charged with an indictable-only offence, he or she will be tried in the Crown Court. The rules are different in England and Wales in respect of those under 18 years of age. See also section 14(a) of the Criminal Law Act 1977. New Zealand Similarly in New Zealand, a rape or murder charge will be tried at the High Court, while less serious offences such as theft will be tried at the District Court. However, the District Court can hold both jury and summary trials. United States In United States penal law, other than a felony, court findings of, or an act of gross negligence can be counted as an indictable offence. See also Federal crime Felony Indictment Summary offence
|
fiscal will commence solemn proceedings for serious crimes to be prosecuted on indictment before a jury. Canada In Canada, an indictable offence is a crime that is more serious than a summary offence. Examples of indictable offences include theft over $5,000, breaking and entering, aggravated sexual assault, and murder. Maximum penalties for indictable offences are different depending on the crime and can include life in prison. There are minimum penalties for some indictable offences. England and Wales In relation to England and Wales, the expression indictable offence means an offence which, if committed by an adult, is triable on indictment, whether it is exclusively so triable or triable either way; and the term indictable, in its application to offences, is to be construed accordingly. In this definition, references to the way or ways in which an offence is triable are to be construed without regard to the effect, if any, of section 22 of the Magistrates' Courts Act 1980 on the mode of trial in a particular case. An either-way offence allows the defendant to elect between trial by jury on indictment in the Crown Court and summary trial in a magistrates' court. However, the election may be overruled by the magistrates' court if the facts suggest that the sentencing powers of a magistrates' court would be inadequate to reflect the seriousness of the offence. In relation to some indictable offences, for example criminal damage, only summary trial is available unless the damage caused exceeds £5,000. A youth court has jurisdiction to try all indictable offences with the exception of homicide and certain firearms offences, and will normally do so provided that the available sentencing power of two years' detention is adequate to punish the offender if found guilty. History See section 64 of the
|
football matches, as opposed to many multi-purpose stadiums used in Serie A. It is therefore renowned in Italy for its fantastic atmosphere during matches owing to the closeness of the stands to the pitch. The frequent use of flares by supporters contributes to the atmosphere, but the practice has occasionally also caused problems. Supporters and rivalries Inter is one of the most supported clubs in Italy, according to an August 2007 research by Italian newspaper La Repubblica. Historically, the largest section of Inter fans from the city of Milan were the middle-class bourgeoisie Milanese, while Milan fans were typically working-class. The traditional ultras group of Inter is Boys San; they hold a significant place in the history of the ultras scene in general due to the fact that they are one of the oldest, being founded in 1969. Politically, the ultras of Inter are usually considered right-wing and they have good relationships with the Lazio ultras. As well as the main group of Boys San, there are four more significant groups: Viking, Irriducibili, Ultras, and Brianza Alcoolica. Inter's most vocal fans are known to gather in the Curva Nord, or north curve of the San Siro. This longstanding tradition has led to the Curva Nord being synonymous with the club's most die-hard supporters, who unfurl banners and wave flags in support of their team. Inter have several rivalries, two of which are highly significant in Italian football; firstly, they participate in the intracity Derby della Madonnina with AC Milan; the rivalry has existed ever since Inter splintered off from Milan in 1908. The name of the derby refers to the Blessed Virgin Mary, whose statue atop the Milan Cathedral is one of the city's main attractions. The match usually creates a lively atmosphere, with numerous (often humorous or offensive) banners unfolded before the match. Flares are commonly present, but they also led to the abandonment of the second leg of the 2004–05 Champions League quarter-final matchup between Milan and Inter on 12 April after a flare thrown from the crowd by an Inter supporter struck Milan keeper Dida on the shoulder. The other most significant rivalry is with Juventus; matches between the two clubs are known as the Derby d'Italia. Up until the 2006 Italian football scandal, which saw Juventus relegated, the two were the only Italian clubs to have never played below Serie A. In the 2000s, Inter developed a rivalry with Roma, who finished as runners-up to Inter in all but one of Inter's five Scudetto-winning seasons between 2005–06 and 2009–10. The two sides have also contested in five Coppa Italia finals and four Supercoppa Italiana finals since 2006. Other clubs, like Atalanta and Napoli, are also considered amongst their rivals. Their supporters collectively go by Interisti, or Nerazzurri. Honours Inter have won 32 domestic trophies, including the league 19 times, the Coppa Italia seven times and the Supercoppa Italiana six times. From 2006 to 2010, the club won five successive league titles, equalling the all-time record before 2017, when Juventus won the sixth successive league title. They have won the Champions League three times: two back-to-back in 1964 and 1965 and then another in 2010; the last completed an unprecedented Italian treble with the Coppa Italia and the Scudetto. The club has also won three UEFA Cups, two Intercontinental Cups and one FIFA Club World Cup. Inter has never been relegated from the top flight of Italian football in its entire existence. It is the sole club to have competed in Serie A and its predecessors in every season since its debut in 1909. Club statistics and records Javier Zanetti holds the records for both total appearances and Serie A appearances for Inter, with 858 official games played in total and 618 in Serie A. Giuseppe Meazza is Inter's all-time top goalscorer, with 284 goals in 408 games. Behind him, in second place, is Alessandro Altobelli with 209 goals in 466 games, and Roberto Boninsegna in third place, with 171 goals over 281 games. Helenio Herrera had the longest reign as Inter coach, with nine years (eight consecutive) in charge, and is the most successful coach in Inter history with three Scudetti, two European Cups, and two Intercontinental Cup wins. José Mourinho, who was appointed on 2 June 2008, completed his first season in Italy by winning the Serie A title and the Supercoppa Italiana; in his second season he won the first "treble" in Italian history: the Serie A, Coppa Italia and the UEFA Champions League. Players First-team squad Other players under contract Out on loan Women team Notable players Retired numbers 3 – Giacinto Facchetti, left back, played for Inter 1960–1978 (posthumous honour). The number was retired on 8 September 2006, four days after Facchetti had died from cancer aged 64. The last player to wear the number 3 shirt was Argentinian center back Nicolás Burdisso, who took on the number 16 shirt for the rest of the season. 4 – Javier Zanetti, defensive midfielder, played 858 games for Inter between 1995 and his retirement in the summer of 2014. In June 2014, club chairman Erick Thohir confirmed that Zanetti's number 4 was to be retired out of respect. Technical staff Chairmen and managers Chairmen history Below is a list of Inter chairmen from 1908 until the present day. Managerial history Below is a list of Inter coaches from 1909 until the present day. Corporate FC Internazionale Milano S.p.A. was described as one of the financial "black-holes" among the Italian clubs, which was heavily dependent on the financial contribution from the owner Massimo Moratti. In June 2006, the shirt sponsor and the minority shareholder of the club, Pirelli, sold 15.26% shares of the club to Moratti family, for €13.5 million. The tyre manufacturer retained 4.2%. However, due to several capital increases of Inter, such as a reversed merger with an intermediate holding company, Inter Capital S.r.l. in 2006, which held 89% shares of Inter and €70 million capitals at that time, or issues new shares for €70.8 million in June 2007, €99.9 million in December 2007, €86.6 million in 2008, €70 million in 2009, €40 million in 2010 and 2011, €35 million in 2012 or allowing Thoir subscribed €75 million new shares of Inter in 2013, Pirelli became the third largest shareholders of just 0.5%, . Inter had yet another recapitalization that was reserved for Suning Holdings Group in 2016. In the prospectus of Pirelli's second IPO in 2017, the company also revealed that the value of the remaining shares of Inter that was owned by Pirelli, was write-off to zero in 2016 financial year. Inter also received direct capital contribution from the shareholders to cover loss which was excluded from issuing shares in the past. () Right before the takeover of Thohir, the consolidated balance sheets of "Internazionale Holding S.r.l." showed the whole companies group had a bank debt of €157 million, including the bank debt of a subsidiary "Inter Brand Srl", as well as the club itself, to Istituto per il Credito Sportivo (ICS), for €15.674 million on the balance sheet at end of 2012–13 financial year. In 2006 Inter sold its brand to the new subsidiary, "Inter Brand S.r.l.", a special purpose entity with a shares capital of €40 million, for €158 million (the deal made Internazionale make a net loss of just €31 million in a separate financial statement). At the same time the subsidiary secured a €120 million loan from Banca Antonveneta, which would be repaid in installments until 30 June 2016; La Repubblica described the deal as "doping". In September 2011 Inter secured a loan from ICS by factoring the sponsorship of Pirelli of 2012–13 and 2013–14 season, for €24.8 million, in an interest rate of 3 months Euribor + 1.95% spread. In June 2014 new Inter Group secured €230 million loan from Goldman Sachs and UniCredit at a new interest rate of 3 months Euribor + 5.5% spread, as well as setting up a new subsidiary to be the debt carrier: "Inter Media and Communication S.r.l.". €200 million of which would be utilized in debt refinancing of the group. The €230million loan, €1 million (plus interests) would be due on 30 June 2015, €45 million (plus interests) would be repaid in 15 installments from 30 September 2015 to 31 March 2019, as well as €184 million (plus interests) would be due on 30 June 2019. In ownership side, the Hong Kong-based International Sports Capital HK Limited, had pledged the shares of Italy-based International Sports Capital S.p.A. (the direct holding company of Inter) to CPPIB Credit Investments for €170 million in 2015, at an interest rate of 8% p.a (due March 2018) to 15% p.a. (due March 2020). ISC repaid the notes on 1 July 2016 after they sold part of the shares of Inter to Suning Holdings Group. However, in the late 2016 the shares of ISC S.p.A. was pledged again by ISC HK to private equity funds of OCP Asia for US$80 million. In December 2017, the club also refinanced its debt of €300 million, by issuing corporate bond to the market, via Goldman Sachs as the bookkeeper, for an interest rate of 4.875% p.a. Considering revenue alone, Inter surpassed city rivals in Deloitte Football Money League for the first time, in the 2008–2009 season, to rank in ninth place, one place behind Juventus in eighth place, with Milan in tenth place. In the 2009–10 season, Inter remained in ninth place, surpassing Juventus (10th) but Milan re-took the leading role as the seventh. Inter became the eighth in 2010–2011, but was still one place behind Milan. Since 2011, Inter fell to 11th in 2011–12, 15th in 2012–13, 17th in 2013–14, 19th in 2014–15 and 2015–16 season. In 2016–17 season, Inter was ranked 15th in the Money League. In 2010 Football Money League (2008–09 season), the normalized revenue of €196.5 million were divided up between matchday (14%, €28.2 million), broadcasting (59%, €115.7 million, +7%, +€8 million) and commercial (27%, €52.6 million, +43%). Kit sponsors Nike and Pirelli contributed €18.1 million and €9.3 million respectively to commercial revenues, while broadcasting revenues were boosted €1.6 million (6%) by Champions League distribution. Deloitte expressed the idea that issues in Italian football, particularly matchday revenue issues were holding Inter back compared to other European giants, and developing their own stadia would result in Serie A clubs being more competitive on the world stage. In 2009–10 season the revenue of Inter was boosted by the sales of Ibrahimović, the treble and the release clause of coach José Mourinho. According to the normalized figures by Deloitte in their 2011 Football Money League, in 2009–10 season, the revenue had increased €28.3 million (14%) to €224.8 million. The ratio of matchday, broadcasting and commercial in the adjusted figures was 17%:62%:21%. For the 2010–11 season, Serie A clubs started negotiating club TV rights collectively rather than individually. This was predicted to result in lower broadcasting revenues for big clubs such as Juventus and Inter, with smaller clubs gaining from the loss. Eventually the result included an extraordinary income of €13 million from RAI. In 2012 Football Money League (2010–11 season), the normalized revenue was €211.4 million. The ratio of matchday, broadcasting and commercial in the adjusted figures was 16%:58%:26%. However, combining revenue and cost, in the 2006–07 season they had a net loss of €206 million (€112 million extraordinary basis, due to the abolition of non-standard accounting practice of the special amortization fund), followed by a net loss of €148 million in the 2007–08 season, a net loss of €154 million in 2008–09 season, a net loss of €69 million in the 2009–10 season, a net loss of €87 million in the 2010–11 season, a net loss of €77 million in the 2011–12 season, a net loss of €80 million in 2012–13 season and a net profit of €33 million in 2013–14 season, due to special income from the establishment of subsidiary Inter Media and Communication. All aforementioned figures were in separate financial
|
shares from Internazionale Holding S.r.l. Immediately after the deal, Moratti's Internazionale Holding S.r.l. still retained 29.5% of the shares of FC Internazionale Milano S.p.A. After the deal, the shares of Inter was owned by a chain of holding companies, namely International Sports Capital S.p.A. of Italy (for 70% stake), International Sports Capital HK Limited and Asian Sports Ventures HK Limited of Hong Kong. Asian Sports Ventures HK Limited, itself another intermediate holding company, was owned by Nusantara Sports Ventures HK Limited (60% stake, a company owned by Thohir), Alke Sports Investment HK Limited (20% stake) and Aksis Sports Capital HK Limited (20% stake). Thohir, whom also co-owned Major League Soccer (MLS) club D.C. United and Indonesia Super League (ISL) club Persib Bandung, announced on 2 December 2013 that Inter and D.C. United had formed strategic partnership. During the Thohir era the club began to modify its financial structure from one reliant on continual owner investment to a more self sustain business model although the club still breached UEFA Financial Fair Play Regulations in 2015. The club was fined and received squad reduction in UEFA competitions, with additional penalties suspended in the probation period. During this time, Roberto Mancini returned as the club manager on 14 November 2014, with Inter finishing eighth. Inter finished 2015–2016 season fourth, failing to return to Champions League. On 6 June 2016, Suning Holdings Group (via a Luxembourg-based subsidiary Great Horizon S.á r.l.) a company owned by Zhang Jindong, co-founder and chairman of Suning Commerce Group, acquired a majority stake of Inter from Thohir's consortium International Sports Capital S.p.A. and from Moratti family's remaining shares in Internazionale Holding S.r.l. According to various filings, the total investment from Suning was €270 million. The deal was approved by an extraordinary general meeting on 28 June 2016, from which Suning Holdings Group had acquired a 68.55% stake in the club. The first season of new ownership, however, started with poor performance in pre-season friendlies. On 8 August 2016, Inter parted company with head coach Roberto Mancini by mutual consent over disagreements regarding the club's direction. He was replaced by Frank de Boer who was sacked on 1 November 2016 after leading Inter to a 4W–2D–5L record in 11 Serie A games as head coach. The successor, Stefano Pioli, didn't save the team from getting the worst group result in UEFA competitions in the club's history. Despite an eight-game winning streak, he and the club parted away before season's end when it became clear they would finish outside the league's top three for the sixth consecutive season. On 9 June 2017, former Roma coach Luciano Spalletti was appointed as Inter manager, signing a two-year contract, and eleven months later Inter clinched a UEFA Champions League group stage spot after going six years without Champions League participation thanks to a 3–2 victory against Lazio in the final game of 2017–18 Serie A. Due to this success, in August the club extended the contract with Spalletti to 2021. On 26 October 2018, Steven Zhang was appointed as new president of the club. On 25 January 2019, the club officially announced that LionRock Capital from Hong Kong reached an agreement with International Sports Capital HK Limited, in order to acquire its 31.05% shares in Inter and to become the club's new minority shareholder. After the 2018–19 Serie A season, despite Inter finishing fourth, Spalletti was sacked. Recent history (2019–present) On 31 May 2019, Inter appointed former Juventus and Italian manager Antonio Conte as their new coach, signing a three-year deal. In September 2019, Steven Zhang was elected to the board of the European Club Association. In the 2019–20 Serie A, Inter Milan finished as runner-up as they won 2–0 against Atalanta on the last matchday. They also reached the 2020 UEFA Europa League Final, ultimately losing 3–2 to Sevilla. Following Atalanta's draw against Sassuolo on 2 May 2021, Internazionale were confirmed as champions for the first time in eleven years, ending Juventus' run of nine consecutive titles. However, despite securing Serie A glory, Conte left the club by mutual consent on 26 May 2021. The departure was reportedly due to disagreements between Conte and the board over player transfers. In June 2021, Simone Inzaghi was appointed as Conte's replacement. On 22 June 2021, Carlo Cottarelli launched the shareholding of the fans of the Inter Milan club with InterSpac project. On 6 July 2021, Achraf Hakimi was sold to Paris Saint-Germain F.C. for 68 million euro. On 8 August 2021, Romelu Lukaku was sold to Chelsea F.C. for 115 million euros, representing the most expensive association football transfer by an Italian football club ever. On 10 August 2021, Inter Milan confirmed they will be terminating Radja Nainggolan's contract. On 12 August 2021, Inter Milan and PSV Eindhoven have reached an agreement for the transfer of Denzel Dumfries. The deal closed for €12.5 million plus a 2.5 million bonus for the Eindhoven club. On 13 August 2021, Inter Milan confirms the acquisition of Edin Džeko who is sold by Roma outright and has signed a contract with the club until 30 June 2023. He will receive an annual salary of 6 million plus bonuses. Colours and badge One of the founders of Inter, a painter named Giorgio Muggiani, was responsible for the design of the first Inter logo in 1908. The first design incorporated the letters "FCIM" in the centre of a series of circles that formed the badge of the club. The basic elements of the design have remained constant even as finer details have been modified over the years. Starting at the 1999–2000 season, the original club crest was reduced in size, to give place for the addition of the club's name and foundation year at the upper and lower part of the logo respectively. In 2007, the logo was returned to the pre-1999–2000 era. It was given a more modern look with a smaller Scudetto star and lighter color scheme. This version was used until July 2014, when the club decided to undertake a rebranding. The most significant difference between the current and the previous logo is the omission of the star from other media except match kits. Since its founding in 1908, Inter have almost always worn black and blue stripes, earning them the nickname Nerazzurri. According to the tradition, the colours were adopted to represent the nocturnal sky: in fact, the club was established on the night of 9 March, at 23:30; moreover, blue was chosen by Giorgio Muggiani because he considered it to be the opposite colour to red, worn by the Milan Cricket and Football Club rivals. During the 1928–29 season, however, Inter were forced to abandon their black and blue uniforms. In 1928, Inter's name and philosophy made the ruling Fascist Party uneasy; as a result, during the same year the 20-year-old club was merged with Unione Sportiva Milanese: the new club was named Società Sportiva Ambrosiana after the patron saint of Milan. The flag of Milan (the red cross on white background) replaced the traditional black and blue. In 1929 the black-and-blue jerseys were restored, and after World War II, when the Fascists had fallen from power, the club reverted to their original name. In 2008, Inter celebrated their centenary with a red cross on their away shirt. The cross is reminiscent of the flag of their city, and they continue to use the pattern on their third kit. In 2014, the club adopted a predominantly black home kit with thin blue pinstripes before returning to a more traditional design the following season. Animals are often used to represent football clubs in Italy – the grass snake, called Biscione, represents Inter. The snake is an important symbol for the city of Milan, appearing often in Milanese heraldry as a coiled viper with a man in its jaws. The symbol is present on the coat of arms of the House of Sforza (which ruled over Italy from Milan during the Renaissance period), the city of Milan, the historical Duchy of Milan (a 400-year state of the Holy Roman Empire) and Insubria (a historical region the city of Milan falls within). For the 2010–11 season, Inter's away kit featured the serpent. Stadium The team's stadium is the 75,923 seat San Siro, officially known as the Stadio Giuseppe Meazza after the former player who represented both Milan and Inter. The more commonly used name, San Siro, is the name of the district where it is located. San Siro has been the home of Milan since 1926, when it was privately built by funding from Milan's chairman at the time, Piero Pirelli. Construction was performed by 120 workers, and took 13 and a half months to complete. The stadium was owned by the club until it was sold to the city in 1935, and since 1947 it has been shared with Inter, when they were accepted as joint tenant. The first game played at the stadium was on 19 September 1926, when Inter beat Milan 6–3 in a friendly match. Milan played its first league game in San Siro on 19 September 1926, losing 1–2 to Sampierdarenese. From an initial capacity of 35,000 spectators, the stadium has undergone several major renovations, most recently in preparation for the 1990 FIFA World Cup when its capacity was set to 85,700, all covered with a polycarbonate roof. In the summer of 2008, its capacity was reduced to 80,018 to meet the new standards set by UEFA. Based on the English model for stadiums, San Siro is specifically designed for football matches, as opposed to many multi-purpose stadiums used in Serie A. It is therefore renowned in Italy for its fantastic atmosphere during matches owing to the closeness of the stands to the pitch. The frequent use of flares by supporters contributes to the atmosphere, but the practice has occasionally also caused problems. Supporters and rivalries Inter is one of the most supported clubs in Italy, according to an August 2007 research by Italian newspaper La Repubblica. Historically, the largest section of Inter fans from the city of Milan were the middle-class bourgeoisie Milanese, while Milan fans were typically working-class. The traditional ultras group of Inter is Boys San; they hold a significant place in the history of the ultras scene in general due to the fact that they are one of the oldest, being founded in 1969. Politically, the ultras of Inter are usually considered right-wing and they have good relationships with the Lazio ultras. As well as the main group of Boys San, there are four more significant groups: Viking, Irriducibili, Ultras, and Brianza Alcoolica. Inter's most vocal fans are known to gather in the Curva Nord, or north curve of the San Siro. This longstanding tradition has led to the Curva Nord being synonymous with the club's most die-hard supporters, who unfurl banners and wave flags in support of their team. Inter have several rivalries, two of which are highly significant in Italian football; firstly, they participate in the intracity Derby della Madonnina with AC Milan; the rivalry has existed ever since Inter splintered off from Milan in 1908. The name of the derby refers to the Blessed Virgin Mary, whose statue atop the Milan Cathedral is one of the city's main attractions. The match usually creates a lively atmosphere, with numerous (often humorous or offensive) banners unfolded before the match. Flares are commonly present, but they also led to the abandonment of the second leg of the 2004–05 Champions League quarter-final matchup between Milan and Inter on 12 April after a flare thrown from the crowd by an Inter supporter struck Milan keeper Dida on the shoulder. The other most significant rivalry is with Juventus; matches between the two clubs are known as the Derby d'Italia. Up until the 2006 Italian football scandal, which saw Juventus relegated, the two were the only Italian clubs to have never played below Serie A. In the 2000s, Inter developed a rivalry with Roma, who finished as runners-up to Inter in all but one of Inter's five Scudetto-winning seasons between 2005–06 and 2009–10. The two sides have also contested in five Coppa Italia finals and four Supercoppa Italiana finals since 2006. Other clubs, like Atalanta and Napoli, are also considered amongst their rivals. Their supporters collectively go by Interisti, or Nerazzurri. Honours Inter have won 32 domestic trophies, including the league 19 times, the Coppa Italia seven times and the Supercoppa Italiana six times. From 2006 to 2010, the club won five successive league titles, equalling the all-time record before 2017, when Juventus won the sixth successive league title. They have won the Champions League three times: two back-to-back in 1964 and 1965 and then another in 2010; the last completed an unprecedented Italian treble with the Coppa Italia and the Scudetto. The club has also won three UEFA Cups, two Intercontinental Cups and one FIFA Club World Cup. Inter has never been relegated from the top flight of Italian football in its entire existence. It is the sole club to have competed in Serie A and its predecessors in every season since its debut in 1909. Club statistics and records Javier Zanetti holds the records for both total appearances and Serie A appearances for Inter, with 858 official games played in total and 618 in Serie A. Giuseppe Meazza is Inter's all-time top goalscorer, with 284 goals in 408 games. Behind him, in second place, is Alessandro Altobelli with 209 goals in 466 games, and Roberto Boninsegna in third place, with 171 goals over 281 games. Helenio Herrera had the longest reign as Inter coach, with nine years (eight consecutive) in charge, and is the most successful coach in Inter history with three Scudetti, two European Cups, and two Intercontinental Cup wins. José Mourinho, who was appointed on 2 June 2008, completed his first season in Italy by winning the Serie A title and the Supercoppa Italiana; in his second season he won the first "treble" in Italian history: the Serie A, Coppa Italia and the UEFA Champions League. Players First-team squad Other players under contract Out on loan Women team Notable players Retired numbers 3 – Giacinto Facchetti, left back, played for Inter 1960–1978 (posthumous honour). The number was retired on 8 September 2006, four days after Facchetti had died from cancer aged 64. The last player to wear the number 3 shirt was Argentinian center back Nicolás Burdisso, who took on the number 16 shirt for the rest of the season. 4 – Javier Zanetti, defensive midfielder, played 858 games for Inter between 1995 and his retirement in the summer of 2014. In June 2014, club chairman Erick Thohir confirmed that Zanetti's number 4 was to be retired out of respect. Technical staff Chairmen and managers Chairmen history Below is a list of Inter chairmen from 1908 until the present day. Managerial history Below is a list of Inter coaches from 1909 until the present day. Corporate FC Internazionale Milano S.p.A. was described as one of the financial "black-holes" among the Italian clubs, which was heavily dependent on the financial contribution from the owner Massimo Moratti. In June 2006, the shirt sponsor and the minority shareholder of the club, Pirelli, sold 15.26% shares of the club to Moratti family, for €13.5 million. The tyre manufacturer retained 4.2%. However, due to several capital increases of Inter, such as a reversed merger with an intermediate holding company, Inter Capital S.r.l. in 2006, which held 89% shares of Inter and €70 million capitals at that time, or issues new shares for €70.8 million in June 2007, €99.9 million in December 2007, €86.6 million in 2008, €70 million in 2009, €40 million in 2010 and 2011, €35 million in 2012 or allowing Thoir subscribed €75 million new shares of Inter in 2013, Pirelli became the third largest shareholders of just 0.5%, . Inter had yet another recapitalization that was reserved for Suning Holdings Group in 2016. In the prospectus of Pirelli's second IPO in 2017, the company also revealed that the value of the remaining shares of Inter that was owned by Pirelli, was write-off to zero in 2016 financial year. Inter also received direct capital contribution from the shareholders to cover loss which was excluded from issuing shares in the past. () Right before the takeover of Thohir, the consolidated balance sheets of "Internazionale Holding S.r.l." showed the whole companies group had a bank debt of €157 million, including the bank debt of a subsidiary "Inter Brand Srl", as well as the club itself, to Istituto per il Credito Sportivo (ICS), for €15.674 million on the balance sheet at end of 2012–13 financial year. In 2006 Inter sold its brand to the new subsidiary, "Inter Brand S.r.l.", a special purpose entity with a shares capital of €40 million, for €158 million (the deal made Internazionale make a net loss of just €31 million in a separate financial statement). At the same time the subsidiary secured a €120 million loan from Banca Antonveneta, which would be repaid in installments until 30 June 2016; La Repubblica described the deal as "doping". In September 2011 Inter secured a loan from ICS by factoring the sponsorship of Pirelli of 2012–13 and 2013–14 season, for €24.8 million, in an interest rate of 3 months Euribor + 1.95% spread. In June 2014 new Inter Group secured €230 million loan from Goldman Sachs and UniCredit at a new interest rate of 3 months Euribor + 5.5% spread, as well as setting up a new subsidiary to be the debt carrier: "Inter Media and Communication S.r.l.". €200 million of which would be utilized in debt refinancing of the group. The €230million loan, €1 million (plus interests) would be due on 30 June 2015, €45 million (plus interests) would be repaid in 15 installments from 30 September 2015 to 31 March 2019, as well as €184 million (plus interests) would be due on 30 June 2019. In ownership side, the Hong Kong-based International Sports Capital HK Limited, had pledged the shares of Italy-based International Sports Capital S.p.A. (the direct holding company of Inter) to CPPIB Credit Investments for €170 million in 2015, at an interest rate of 8% p.a (due
|
are a group of signaling proteins made and released by host cells in response to the presence of several viruses. In a typical scenario, a virus-infected cell will release interferons causing nearby cells to heighten their anti-viral defenses. IFNs belong to the large class of proteins known as cytokines, molecules used for communication between cells to trigger the protective defenses of the immune system that help eradicate pathogens. Interferons are named for their ability to "interfere" with viral replication by protecting cells from virus infections. However, virus-encoded genetic elements have the ability to antagonize the IFN response contributing to viral pathogenesis and viral diseases. IFNs also have various other functions: they activate immune cells, such as natural killer cells and macrophages, and they increase host defenses by up-regulating antigen presentation by virtue of increasing the expression of major histocompatibility complex (MHC) antigens. Certain symptoms of infections, such as fever, muscle pain and "flu-like symptoms", are also caused by the production of IFNs and other cytokines. More than twenty distinct IFN genes and proteins have been identified in animals, including humans. They are typically divided among three classes: Type I IFN, Type II IFN, and Type III IFN. IFNs belonging to all three classes are important for fighting viral infections and for the regulation of the immune system. Types of interferon Based on the type of receptor through which they signal, human interferons have been classified into three major types. Interferon type I: All type I IFNs bind to a specific cell surface receptor complex known as the IFN-α/β receptor (IFNAR) that consists of IFNAR1 and IFNAR2 chains. The type I interferons present in humans are IFN-α, IFN-β, IFN-ε, IFN-κ and IFN-ω. In general, type I interferons are produced when the body recognizes a virus that has invaded it. They are produced by fibroblasts and monocytes. However, the production of type I IFN-α is inhibited by another cytokine known as Interleukin-10. Once released, type I interferons bind to specific receptors on target cells, which leads to expression of proteins that will prevent the virus from producing and replicating its RNA and DNA. Overall, IFN-α can be used to treat hepatitis B and C infections, while IFN-β can be used to treat multiple sclerosis. Interferon type II (IFN-γ in humans): This is also known as immune interferon and is activated by Interleukin-12. Type II interferons are also released by cytotoxic T cells and type-1 T helper cells. However, they block the proliferation of type-2 T helper cells. The previous results in an inhibition of Th2 immune response and a further induction of Th1 immune response. IFN type II binds to IFNGR, which consists of IFNGR1 and IFNGR2 chains. Interferon type III: Signal through a receptor complex consisting of IL10R2 (also called CRF2-4) and IFNLR1 (also called CRF2-12). Although discovered more recently than type I and type II IFNs, recent information demonstrates the importance of Type III IFNs in some types of virus or fungal infections. In general, type I and II interferons are responsible for regulating and activating the immune response. Expression of type I and III IFNs can be induced in virtually all cell types upon recognition of viral components, especially nucleic acids, by cytoplasmic and endosomal receptors, whereas type II interferon is induced by cytokines such as IL-12, and its expression is restricted to immune cells such as T cells and NK cells. Function All interferons share several common effects: they are antiviral agents and they modulate functions of the immune system. Administration of Type I IFN has been shown experimentally to inhibit tumor growth in animals, but the beneficial action in human tumors has not been widely documented. A virus-infected cell releases viral particles that can infect nearby cells. However, the infected cell can protect neighboring cells against a potential infection of the virus by releasing interferons. In response to interferon, cells produce large amounts of an enzyme known as protein kinase R (PKR). This enzyme phosphorylates a protein known as eIF-2 in response to new viral infections; the phosphorylated eIF-2 forms an inactive complex with another protein, called eIF2B, to reduce protein synthesis within the cell. Another cellular enzyme, RNAse L—also induced by interferon action—destroys RNA within the cells to further reduce protein synthesis of both viral and host genes. Inhibited protein synthesis impairs both virus replication and infected host cells. In addition, interferons induce production of hundreds of other proteins—known collectively as interferon-stimulated genes (ISGs)—that have roles in combating viruses and other actions produced by interferon. They also limit viral spread by increasing p53 activity, which kills virus-infected cells by promoting apoptosis. The effect of IFN on p53 is also linked to its protective role against certain cancers. Another function of interferons is to up-regulate major histocompatibility complex molecules, MHC I and MHC II, and increase immunoproteasome activity. All interferons significantly enhance the presentation of MHC I dependent antigens. Interferon gamma (IFN-gamma) also significantly stimulates the MHC II-dependent presentation of antigens. Higher MHC I expression increases presentation of viral and abnormal peptides from cancer cells to cytotoxic T cells, while the immunoproteasome processes these peptides for loading onto the MHC I molecule, thereby increasing the recognition and killing of infected or malignant cells. Higher MHC II expression increases presentation of these peptides to helper T cells; these cells release cytokines (such as more interferons and interleukins, among others) that signal to and co-ordinate the activity of other immune cells. Interferons can also suppress angiogenesis by down regulation of angiogenic stimuli deriving from tumor cells. They also suppress the proliferation of endothelial cells. Such suppression causes a decrease in tumor angiogenesis, a decrease in its vascularization and subsequent growth inhibition. Interferons, such as interferon gamma, directly activate other immune cells, such as macrophages and natural killer cells. Induction of interferons Production of interferons occurs mainly in response to microbes, such as viruses and bacteria, and their products. Binding of molecules uniquely found in microbes—viral glycoproteins, viral RNA, bacterial endotoxin (lipopolysaccharide), bacterial flagella, CpG motifs—by pattern recognition receptors, such as membrane bound toll like receptors or the cytoplasmic receptors RIG-I or MDA5, can trigger release of IFNs. Toll Like Receptor 3 (TLR3) is important for inducing interferons in response to the presence of double-stranded RNA viruses; the ligand for this receptor is double-stranded RNA (dsRNA). After binding dsRNA, this receptor activates the transcription factors IRF3 and NF-κB, which are important for initiating synthesis of many inflammatory proteins. RNA interference technology tools such as siRNA or vector-based reagents can either silence or stimulate interferon pathways. Release of IFN from cells (specifically IFN-γ in lymphoid cells) is also induced by mitogens. Other cytokines, such as interleukin 1, interleukin 2, interleukin-12, tumor necrosis factor and colony-stimulating factor, can also enhance interferon production. Downstream signaling By interacting with their specific receptors, IFNs activate signal transducer and activator of transcription (STAT) complexes; STATs are a family of transcription factors that regulate the expression of certain immune system genes. Some STATs are activated by both type I and type II IFNs. However each IFN type can also activate unique STATs. STAT activation initiates the most well-defined cell signaling pathway for all IFNs, the classical Janus kinase-STAT (JAK-STAT) signaling pathway. In this pathway, JAKs associate with IFN receptors and, following receptor engagement with IFN, phosphorylate both STAT1 and STAT2. As a result, an IFN-stimulated gene factor 3 (ISGF3) complex forms—this contains STAT1, STAT2 and a third transcription factor called IRF9—and moves into the cell nucleus. Inside the nucleus, the ISGF3 complex binds to specific nucleotide sequences called IFN-stimulated response elements (ISREs) in the promoters of certain genes, known as IFN stimulated genes ISGs. Binding of ISGF3 and other transcriptional complexes activated by IFN signaling to these specific regulatory elements induces transcription of those genes. A collection of known ISGs is available on Interferome, a curated online database of ISGs (www.interferome.org); Additionally, STAT homodimers or heterodimers form from different combinations of STAT-1, -3, -4, -5, or -6 during IFN signaling; these dimers initiate gene transcription by binding to IFN-activated site (GAS) elements in gene promoters. Type I IFNs can induce expression of genes with either ISRE or GAS elements, but gene induction by type II IFN can occur only in the presence of a GAS element. In addition to the JAK-STAT pathway, IFNs can activate several other signaling cascades. For instance, both type I and type II IFNs activate a member of the CRK family of adaptor proteins called CRKL, a nuclear adaptor for STAT5 that also regulates signaling through the C3G/Rap1 pathway. Type I IFNs further activate p38 mitogen-activated protein kinase (MAP kinase) to induce gene transcription. Antiviral and antiproliferative effects specific to type I IFNs result from p38 MAP kinase signaling. The phosphatidylinositol 3-kinase (PI3K) signaling pathway is also regulated by both type I and type II IFNs. PI3K activates P70-S6 Kinase 1, an enzyme that increases protein synthesis and cell proliferation; phosphorylates ribosomal protein s6, which is involved in protein synthesis; and phosphorylates a translational repressor protein called eukaryotic translation-initiation factor 4E-binding protein 1 (EIF4EBP1) in order to deactivate it. Interferons can disrupt signaling by other stimuli. For example, Interferon alpha induces RIG-G, which disrupts the CSN5-containing COP9 signalosome (CSN), a highly conserved multiprotein complex implicated in
|
up-regulate major histocompatibility complex molecules, MHC I and MHC II, and increase immunoproteasome activity. All interferons significantly enhance the presentation of MHC I dependent antigens. Interferon gamma (IFN-gamma) also significantly stimulates the MHC II-dependent presentation of antigens. Higher MHC I expression increases presentation of viral and abnormal peptides from cancer cells to cytotoxic T cells, while the immunoproteasome processes these peptides for loading onto the MHC I molecule, thereby increasing the recognition and killing of infected or malignant cells. Higher MHC II expression increases presentation of these peptides to helper T cells; these cells release cytokines (such as more interferons and interleukins, among others) that signal to and co-ordinate the activity of other immune cells. Interferons can also suppress angiogenesis by down regulation of angiogenic stimuli deriving from tumor cells. They also suppress the proliferation of endothelial cells. Such suppression causes a decrease in tumor angiogenesis, a decrease in its vascularization and subsequent growth inhibition. Interferons, such as interferon gamma, directly activate other immune cells, such as macrophages and natural killer cells. Induction of interferons Production of interferons occurs mainly in response to microbes, such as viruses and bacteria, and their products. Binding of molecules uniquely found in microbes—viral glycoproteins, viral RNA, bacterial endotoxin (lipopolysaccharide), bacterial flagella, CpG motifs—by pattern recognition receptors, such as membrane bound toll like receptors or the cytoplasmic receptors RIG-I or MDA5, can trigger release of IFNs. Toll Like Receptor 3 (TLR3) is important for inducing interferons in response to the presence of double-stranded RNA viruses; the ligand for this receptor is double-stranded RNA (dsRNA). After binding dsRNA, this receptor activates the transcription factors IRF3 and NF-κB, which are important for initiating synthesis of many inflammatory proteins. RNA interference technology tools such as siRNA or vector-based reagents can either silence or stimulate interferon pathways. Release of IFN from cells (specifically IFN-γ in lymphoid cells) is also induced by mitogens. Other cytokines, such as interleukin 1, interleukin 2, interleukin-12, tumor necrosis factor and colony-stimulating factor, can also enhance interferon production. Downstream signaling By interacting with their specific receptors, IFNs activate signal transducer and activator of transcription (STAT) complexes; STATs are a family of transcription factors that regulate the expression of certain immune system genes. Some STATs are activated by both type I and type II IFNs. However each IFN type can also activate unique STATs. STAT activation initiates the most well-defined cell signaling pathway for all IFNs, the classical Janus kinase-STAT (JAK-STAT) signaling pathway. In this pathway, JAKs associate with IFN receptors and, following receptor engagement with IFN, phosphorylate both STAT1 and STAT2. As a result, an IFN-stimulated gene factor 3 (ISGF3) complex forms—this contains STAT1, STAT2 and a third transcription factor called IRF9—and moves into the cell nucleus. Inside the nucleus, the ISGF3 complex binds to specific nucleotide sequences called IFN-stimulated response elements (ISREs) in the promoters of certain genes, known as IFN stimulated genes ISGs. Binding of ISGF3 and other transcriptional complexes activated by IFN signaling to these specific regulatory elements induces transcription of those genes. A collection of known ISGs is available on Interferome, a curated online database of ISGs (www.interferome.org); Additionally, STAT homodimers or heterodimers form from different combinations of STAT-1, -3, -4, -5, or -6 during IFN signaling; these dimers initiate gene transcription by binding to IFN-activated site (GAS) elements in gene promoters. Type I IFNs can induce expression of genes with either ISRE or GAS elements, but gene induction by type II IFN can occur only in the presence of a GAS element. In addition to the JAK-STAT pathway, IFNs can activate several other signaling cascades. For instance, both type I and type II IFNs activate a member of the CRK family of adaptor proteins called CRKL, a nuclear adaptor for STAT5 that also regulates signaling through the C3G/Rap1 pathway. Type I IFNs further activate p38 mitogen-activated protein kinase (MAP kinase) to induce gene transcription. Antiviral and antiproliferative effects specific to type I IFNs result from p38 MAP kinase signaling. The phosphatidylinositol 3-kinase (PI3K) signaling pathway is also regulated by both type I and type II IFNs. PI3K activates P70-S6 Kinase 1, an enzyme that increases protein synthesis and cell proliferation; phosphorylates ribosomal protein s6, which is involved in protein synthesis; and phosphorylates a translational repressor protein called eukaryotic translation-initiation factor 4E-binding protein 1 (EIF4EBP1) in order to deactivate it. Interferons can disrupt signaling by other stimuli. For example, Interferon alpha induces RIG-G, which disrupts the CSN5-containing COP9 signalosome (CSN), a highly conserved multiprotein complex implicated in protein deneddylation, deubiquitination, and phosphorylation. RIG-G has shown the capacity to inhibit NF-κB and STAT3 signaling in lung cancer cells, which demonstrates the potential of type I IFNs. Virus resistance to interferons Many viruses have evolved mechanisms to resist interferon activity. They circumvent the IFN response by blocking downstream signaling events that occur after the cytokine binds to its receptor, by preventing further IFN production, and by inhibiting the functions of proteins that are induced by IFN. Viruses that inhibit IFN signaling include Japanese Encephalitis Virus (JEV), dengue type 2 virus (DEN-2), and viruses of the herpesvirus family, such as human cytomegalovirus (HCMV) and Kaposi's sarcoma-associated herpesvirus (KSHV or HHV8). Viral proteins proven to affect IFN signaling include EBV nuclear antigen 1 (EBNA1) and EBV nuclear antigen 2 (EBNA-2) from Epstein-Barr virus, the large T antigen of Polyomavirus, the E7 protein of Human papillomavirus (HPV), and the B18R protein of vaccinia virus. Reducing IFN-α activity may prevent signaling via STAT1, STAT2, or IRF9 (as with JEV infection) or through the JAK-STAT pathway (as with DEN-2 infection). Several poxviruses encode soluble IFN receptor homologs—like the B18R protein of the vaccinia virus—that bind to and prevent IFN interacting with its cellular receptor, impeding communication between this cytokine and its target cells. Some viruses can encode proteins that bind to double-stranded RNA (dsRNA) to prevent the activity of RNA-dependent protein kinases; this is the mechanism
|
areas with a millennial association with Jewish life, shall be forever "judenrein". Professor Ben Saul took exception to this view, arguing that Article 49(6) can be read to include voluntary or assisted transfers, as indeed it was in the advisory opinion of the International Court of Justice which had expressed this interpretation in the Israeli Wall Advisory Opinion (2003). Israel maintains that a temporary use of land and buildings for various purposes is permissible under a plea of military necessity and that the settlements fulfilled security needs. Israel argues that its settlement policy is consistent with international law, including the Fourth Geneva Convention, while recognising that some settlements have been constructed illegally on private land. The Israeli Supreme Court has ruled that the power of the Civil Administration and the Military Commander in the occupied territories is limited by the entrenched customary rules of public international law as codified in the Hague Regulations. In 1998 the Israeli Minister of Foreign Affairs produced "The International Criminal Court Background Paper". It concludesInternational law has long recognised that there are crimes of such severity they should be considered "international crimes." Such crimes have been established in treaties such as the Genocide Convention and the Geneva Conventions.... The following are Israel's primary issues of concern [ie with the rules of the ICC]: The inclusion of settlement activity as a "war crime" is a cynical attempt to abuse the Court for political ends. The implication that the transfer of civilian population to occupied territories can be classified as a crime equal in gravity to attacks on civilian population centres or mass murder is preposterous and has no basis in international law. A UN conference was held in Rome in 1998, where Israel was one of seven countries to vote against the Rome Statute to establish the International Criminal Court. Israel was opposed to a provision that included as a war crime the transfer of civilian populations into territory the government occupies. Israel has signed the statute, but not ratified the treaty. Land ownership A 1996 amendment to an Israeli military order, states that land privately owned can not be part of a settlement, unless the land in question has been confiscated for military purposes. In 2006 Peace Now acquired a report, which it claims was leaked from the Israeli Government's Civil Administration, indicating that up to 40 percent of the land Israel plans to retain in the West Bank is privately owned by Palestinians. Peace Now called this a violation of Israeli law. Peace Now published a comprehensive report about settlements on private lands. In the wake of a legal battle, Peace Now lowered the figure to 32 percent, which the Civil Administration also denied. The Washington Post reported that "The 38-page report offers what appears to be a comprehensive argument against the Israeli government's contention that it avoids building on private land, drawing on the state's own data to make the case." In February 2008, the Civil Administration stated that the land on which more than a third of West Bank settlements was built had been expropriated by the IDF for "security purposes." The unauthorized seizure of private Palestinian land was defined by the Civil Administration itself as 'theft.' According to B'Tselem, more than 42 percent of the West Bank are under control of the Israeli settlements, 21 percent of which was seized from private Palestinian owners, much of it in violation of the 1979 Israeli Supreme Court decision. In 1979, the government decided to extend settlements or build new ones only on "state lands". A secret database, drafted by a retired senior officer, Baruch Spiegel, on orders from former defense minister Shaul Mofaz, found that some settlements deemed legal by Israel were illegal outposts, and that large portions of Ofra, Elon Moreh and Beit El were built on private Palestinian land. The "Spiegel report" was revealed by Haaretz in 2009. Many settlements are largely built on private lands, without approval of the Israeli Government. According to Israel, the bulk of the land was vacant, was leased from the state, or bought fairly from Palestinian landowners. Invoking the Absentee Property Law to transfer, sell or lease property in East Jerusalem owned by Palestinians who live elsewhere without compensation has been criticized both inside and outside of Israel. Opponents of the settlements claim that "vacant" land belonged to Arabs who fled or collectively to an entire village, a practice that developed under Ottoman rule. B'Tselem charged that Israel is using the absence of modern legal documents for the communal land as a legal basis for expropriating it. These "abandoned lands" are sometimes laundered through a series of fraudulent sales. According to Amira Hass, one of the techniques used by Israel to expropriate Palestinian land is to place desired areas under a 'military firing zone' classification, and then issue orders for the evacuation of Palestinians from the villages in that range, while allowing contiguous Jewish settlements to remain unaffected. Effects on Palestinian human rights Amnesty International argues that Israel's settlement policy is discriminatory and a violation of Palestinian human rights. B'Tselem claims that Israeli travel restrictions impact on Palestinian freedom of movement and Palestinian human rights have been violated in Hebron due to the presence of the settlers within the city. According to B'Tselem, over fifty percent of West Bank land expropriated from Palestinians has been used to establish settlements and create reserves of land for their future expansion. The seized lands mainly benefit the settlements and Palestinians cannot use them. The roads built by Israel in the West Bank to serve the settlements are closed to Palestinian vehicles' and act as a barrier often between villages and the lands on which they subsist. Human Rights Watch and other human rights observer volunteer regularly file reports on "settler violence," referring to stoning and shooting incidents involving Israeli settlers. Israel's withdrawal from Gaza and Hebron have led to violent settler protests and disputes over land and resources. Meron Benvenisti described the settlement enterprise as a "commercial real estate project that conscripts Zionist rhetoric for profit." The construction of the Israeli West Bank barrier has been criticized as an infringement on Palestinian human and land rights. The United Nations Office for the Coordination of Humanitarian Affairs estimated that 10% of the West Bank would fall on the Israeli side of the barrier. In July 2012, the UN Human Rights Council decided to set up a probe into Jewish settlements. The report of the independent international fact-finding mission which investigated the "implications of the Israeli settlements on the civil, political, economic, social and cultural rights of the Palestinian people throughout the Occupied Palestinian Territory" was published in February 2013. In February 2020, the Office of the United Nations High Commissioner for Human Rights published a list of 112 companies linked to activities related to Israeli settlements in the occupied West Bank. Economy Goods produced in Israeli settlements are able to stay competitive on the global market, in part because of massive state subsidies they receive from the Israeli government. Farmers and producers are given state assistance, while companies that set up in the territories receive tax breaks and direct government subsidies. An Israeli government fund has also been established to help companies pay customs penalties. Palestinian officials estimate that settlers sell goods worth some $500 million to the Palestinian market. Israel has built 16 industrial zones, containing roughly 1000 industrial plants, in the West Bank and East Jerusalem on acreage that consumes large parts of the territory planned for a future Palestinian state. According to Jodi Rudoren these installations both entrench the occupation and provide work for Palestinians, even those opposed to it. The 16 parks are located at Shaked, Beka'ot, Baran, Karnei Shomron, Emmanuel, Barkan, Ariel, Shilo, Halamish, Ma'ale Efraim, Sha'ar Binyamin, Atarot, Mishor Adumim, Gush Etzion, Kiryat Arba and Metarim (2001). In spite of this, the West Bank settlements have failed to develop a self-sustaining local economy. About 60% of the settler workforce commutes to Israel for work. The settlements rely primarily on the labor of their residents in Israel proper rather than local manufacturing, agriculture, or research and development. Of the industrial parks in the settlements, there are only two significant ones, at Ma'ale Adumim and Barkan, with most of the workers there being Palestinian. Only a few hundred settler households cultivate agricultural land, and rely primarily on Palestinian labor in doing so. Settlement has an economic dimension, much of it driven by the significantly lower costs of housing for Israeli citizens living in Israeli settlements compared to the cost of housing and living in Israel proper. Government spending per citizen in the settlements is double that spent per Israeli citizen in Tel Aviv and Jerusalem, while government spending for settlers in isolated Israeli settlements is three times the Israeli national average. Most of the spending goes to the security of the Israeli citizens living there. Export to EU According to Israeli government estimates, $230 million worth of settler goods including fruit, vegetables, cosmetics, textiles and toys are exported to the EU each year, accounting for approximately 2% of all Israeli exports to Europe. A 2013 report of Profundo revealed that at least 38 Dutch companies imported settlement products. European Union law requires a distinction to be made between goods originating in Israel and those from the occupied territories. The former benefit from preferential custom treatment according to the EU-Israel Association Agreement (2000); the latter don't, having been explicitly excluded from the agreement. In practice, however, settler goods often avoid mandatory customs through being labelled as originating in Israel, while European customs authorities commonly fail to complete obligatory postal code checks of products to ensure they have not originated in the occupied territories. In 2009, the United Kingdom's Department for the Environment, Food and Rural Affairs issued new guidelines concerning labelling of goods imported from the West Bank. The new guidelines require labelling to clarify whether West Bank products originate from settlements or from the Palestinian economy. Israel's foreign ministry said that the UK was "catering to the demands of those whose ultimate goal is the boycott of Israeli products"; but this was denied by the UK government, who said that the aim of the new regulations was to allow consumers to choose for themselves what produce they buy. Denmark has similar legislation requiring food products from settlements in the occupied territories to be accurately labelled. On 12 November 2019 the Court of Justice of the European Union in a ruling covering all territory Israel captured in the 1967 war decided that labels on foodstuffs must not imply that goods produced in occupied territory came from Israel itself and must "prevent consumers from being misled as to the fact that the State of Israel is present in the territories concerned as an occupying power and not as a sovereign entity". In its ruling, the court said that failing to inform EU consumers they were potentially buying goods produced in settlements denies them access to "ethical considerations and considerations relating to the observance of international law". In January 2019 the Dail (Ireland's lower house) voted in favour, by 78 to 45, of the Control of Economic Activity (Occupied Territories) bill. This piece of legislation prohibits the purchasing of any good and/or service from the Golan Heights, East Jerusalem or West Bank settlements. As of February 2019 the bill has some stages to be completed,once codified, either a five-year jail sentence or fines of up to €250,000 ($284,000) will affect anyone who breaks this law. A petition under the European Citizens' Initiative, submitted in September 2021, was accepted on 20 February 2022. The petition seeks the adoption of legislation to ban trade with unlawful settlements. The petition requires a million signatures from across the EU and has received support from civil society groups including Human Rights Watch. Palestinian economy and resources A Palestinian report argued in 2011 that settlements have a detrimental effect on the Palestinian economy, equivalent to about 85% of the nominal gross domestic product of Palestine, and that the "occupation enterprise" allows the state of Israel and commercial firms to profit from Palestinian natural resources and tourist potential. A 2013 report published by the World Bank analysed the impact that the limited access to Area C lands and resources had on the Palestinian economy. While settlements represent a single axis of control, it is the largest with 68% of the Area C lands reserved for the settlements. The report goes on to calculate that access to the lands and resources of Area C, including the territory in and around settlements, would increase the Palestinian GDP by some $3.5 billion (or 35%) per year. The Israeli Supreme Court has ruled that Israeli companies are entitled to exploit the West Bank's natural resources for economic gain, and that international law must be "adapted" to the "reality on the ground" of long-term occupation. Palestinian labour Due to the availability of jobs offering twice the prevailing salary of the West Bank (), as well as high unemployment, tens of thousands of Palestinians work in Israeli settlements. According to the Manufacturers Association of Israel, some 22,000 Palestinians were employed in construction, agriculture, manufacturing and service industries. An Al-Quds University study in 2011 found that 82% of Palestinian workers said they would prefer to not work in Israeli settlements if they had alternative employment in the West Bank. Palestinians have been highly involved in the construction of settlements in the West Bank. In 2013, the Palestinian Central Bureau of Statistics released their survey showing that the number of Palestinian workers who are employed by the Jewish settlements increased from 16,000 to 20,000 in the first quarter. The survey also found that Palestinians who work in Israel and the settlements are paid more than twice their salary compared to what they receive from Palestinian employers. In 2008, Kav LaOved charged that Palestinians who work in Israeli settlements are not granted basic protections of Israeli labor law. Instead, they are employed under Jordanian labor law, which does not require minimum wage, payment for overtime and other social rights. In 2007, the Supreme Court of Israel ruled that Israeli labor law does apply to Palestinians working in West Bank settlements and applying different rules in the same work place constituted discrimination. The ruling allowed Palestinian workers to file lawsuits in Israeli courts. In 2008, the average sum claimed by such lawsuits stood at 100,000 shekels. According to Palestinian Center for Policy and Survey Research, 63% of Palestinians opposed PA plans to prosecute Palestinians who work in the settlements. However, 72% of Palestinians support a boycott of the products they sell. Although the Palestinian Authority has criminalized working in the settlements, the director-general at the Palestinian Ministry of Labor, Samer Salameh, described the situation in February 2014 as being "caught between two fires". He said "We strongly discourage work in the settlements, since the entire enterprise is illegal and illegitimate...but given the high unemployment rate and the lack of alternatives, we do not enforce the law that criminalizes work in the settlements." Violence Israeli settler violence Gush Emunim Underground was a militant organization that operated in 1979–1984. The organization planned attacks on Palestinian officials and the Dome of the Rock. In 1994, Baruch Goldstein of Hebron, a member of Kach carried out the Cave of the Patriarchs massacre, killing 29 Muslim worshipers and injuring 125. The attack was widely condemned by the Israeli government and Jewish community. The Palestinian leadership has accused Israel of "encouraging and enabling" settler violence in a bid to provoke Palestinian riots and violence in retaliation. Violence perpetrated by Israeli settlers against Palestinians constitutes terrorism according to the U.S. Department of State, and former IDF Head of Central Command Avi Mizrahi stated that such violence constitutes "terror." In mid-2008, a UN report recorded 222 acts of Israeli settler violence against Palestinians and IDF troops compared with 291 in 2007. This trend reportedly increased in 2009. Maj-Gen Shamni said that the number had risen from a few dozen individuals to hundreds, and called it "a very grave phenomenon." In 2008–2009, the defense establishment adopted a harder line against the extremists. This group responded with a tactic dubbed "price tagging", vandalizing Palestinian property whenever police or soldiers were sent in to dismantle outposts. From January through to September 2013, 276 attacks by settlers against Palestinians were recorded. Leading religious figures in the West Bank have harshly criticized these tactics. Rabbi Menachem Froman of Tekoa said that "Targeting Palestinians and their property is a shocking thing, (...) It's an act of hurting humanity. (...) This builds a wall of fire between Jews and Arabs." The Yesha Council and Hanan Porat also condemned such actions. Other rabbis have been accused of inciting violence against non-Jews. In response to settler violence, the Israeli government said that it would increase law enforcement and cut off aid to illegal outposts. Some settlers are thought to lash out at Palestinians because they are "easy victims." The United Nations accused Israel of failing to intervene and arrest settlers suspected of violence. In 2008, Haaretz wrote that "Israeli society has become accustomed to seeing lawbreaking settlers receive special treatment and no other group could similarly attack Israeli law enforcement agencies without being severely punished." In September 2011, settlers vandalized a mosque and an army base. They slashed tires and cut cables of 12 army vehicles and sprayed graffiti. In November 2011, the United Nations Office for Coordination of Human Affairs (OCHA) in the Palestinian territories published a report on settler violence that showed a significant rise compared to 2009 and 2010. The report covered physical violence and property damage such as uprooted olive trees, damaged tractors and slaughtered sheep. The report states that 90% of complaints filed by Palestinians have been closed without charge. According to EU reports, Israel has created an "atmosphere of impunity" for Jewish attackers, which is seen as tantamount to tacit approval by the state. In the West Bank, Jews and Palestinians live under two different legal regimes and it is difficult for Palestinians to lodge complaints, which must be filed in Hebrew in Israeli settlements. The 27 ministers of foreign affairs of the European Union published a report in May 2012 strongly denouncing policies of the State of Israel in the West Bank and denouncing "continuous settler violence and deliberate provocations against Palestinian civilians." The report by all EU ministers called "on the government of Israel to bring the perpetrators to justice and to comply with its obligations under international law." In July 2014, a day after the burial of three murdered Israeli teens, Khdeir, a 16-year-old Palestinian, was forced into a car by 3 Israeli settlers on an East Jerusalem street. His family immediately reported the fact to Israeli Police who located his charred body a few hours later at Givat Shaul in the Jerusalem Forest. Preliminary results from the autopsy suggested that he was beaten and burnt while still alive. The murder suspects explained the attack as a response to the June abduction and murder of three Israeli teens. The murders contributed to a breakout of hostilities in the 2014 Israel–Gaza conflict. In July 2015, a similar incident occurred where Israeli settlers made an arson attack on two Palestinian houses, one of which was empty; however, the other was occupied, resulting in the burning to death of a Palestinian infant; the four other members of his family were evacuated to the hospital suffering serious injuries. These two incidents received condemnation from the United States, European Union and the IDF. The European Union criticized Israel for "failing to protect the Palestinian population". Olive trees While the Economy of the Palestinian territories has shown signs of growth, the International Committee of the Red Cross reported that Palestinian olive farming has suffered. According to the ICRC, 10,000 olive trees were cut down or burned by settlers in 2007–2010. Foreign ministry spokesman Yigal Palmor said the report ignored official PA data showing that the economic situation of Palestinians had improved substantially, citing Mahmoud Abbas's comment to The Washington Post in May 2009, where he said "in the West Bank, we have a good reality, the people are living a normal life." Haaretz blamed the violence during the olive harvest on a handful of extremists. In 2010, trees belonging to both Jews and Arabs were cut down, poisoned or torched. In the first two weeks of the harvest, 500 trees owned by Palestinians and 100 trees owned by Jews had been vandalized. In October 2013, 100 trees were cut down. Violent attacks on olive trees seem to be facilitated by the apparently systematic refusal of the Israeli authorities to allow Palestinians to visit their own groves, sometimes for years, especially in cases where the groves are deemed to be too close to settlements. Palestinian violence against settlers Israeli civilians living in settlements have been targeted by violence from armed Palestinian groups. These groups, according to Human Rights Watch, assert that settlers are "legitimate targets" that have "forfeited their civilian status by residing in settlements that are illegal under international humanitarian law." Both Human Rights Watch and B'tselem rejected this argument on the basis that the legal status of the settlements has no effect on the civilian status of their residents. Human Rights Watch said the "prohibition against intentional attacks against civilians is absolute." B'tselem said "The settlers constitute a distinctly civilian population, which is entitled to all the protections granted civilians by international law. The Israeli security forces' use of land in the settlements or the membership of some settlers in the Israeli security forces does not affect the status of the other residents living among them, and certainly does not make them proper targets of attack." Fatal attacks on settlers have included firing of rockets and mortars and drive-by shootings, also targeting infants and children. Violent incidents include the murder of Shalhevet Pass, a ten-month-old baby shot by a Palestinian sniper in Hebron, and the murder of two teenagers by unknown perpetrators on 8 May 2001, whose bodies were hidden in a cave near Tekoa, a crime that Israeli authorities suggest may have been committed by Palestinian terrorists. In the Bat Ayin axe attack, children in Bat Ayin were attacked by a Palestinian wielding an axe and a knife. A 13-year-old boy was killed and another was seriously wounded. Rabbi Meir Hai, a father of seven, was killed in a drive-by shooting. In August 2011, five members of one family were killed in their beds. The victims were the father Ehud (Udi) Fogel, the mother Ruth Fogel, and three of their six children—Yoav, 11, Elad, 4, and Hadas, the youngest, a three-month-old infant. According to David Ha'ivri, and as reported by multiple sources, the infant was decapitated. Pro-Palestinian activist violence Pro-Palestinian activists who hold regular protests near the settlements have been accused of stone-throwing, physical assault and provocation. In 2008, Avshalom Peled, head of the Israel Police's Hebron district, called "left-wing" activity in the city dangerous and provocative, and accused activists of antagonizing the settlers in the hope of getting a reaction. Environmental issues Municipal Environmental Associations of Judea and Samaria, an environmental awareness group, was established by the settlers to address sewage treatment problems and cooperate with the Palestinian Authority on environmental issues. According to a 2004 report by Friends of the Earth Middle East, settlers account for 10% of the population in the West Bank but produce 25% of the sewage output. Beit Duqqu and Qalqilyah have accused settlers of polluting their farmland and villagers claim children have become ill after swimming in a local stream. Legal action was taken against 14 settlements by the Israeli Ministry of the Environment. The Palestinian Authority has also been criticized by environmentalists for not doing more to prevent water pollution. Settlers and Palestinians share the mountain aquifer as a water source, and both generate sewage and industrial effluents that endanger the aquifer. Friends of the Earth Middle East claimed that sewage treatment was inadequate in both sectors. Sewage from Palestinian sources was estimated at 46 million cubic meters a year, and sources from settler sources at 15 million cubic meters a year. A 2004 study found that sewage was not sufficiently treated in many settlements, while sewage from Palestinian villages and cities flowed into unlined cesspits, streams and the open environment with no treatment at all. In a 2007 study, the Israel Nature and Parks Authority and Israeli Ministry of Environmental Protection, found that Palestinian towns and cities produced 56 million cubic meters of sewage per year, 94 percent discharged without adequate treatment, while Israeli
|
absorb annually about 1000 new immigrants from outside Israel. The American Kulanu organization works with such right-wing Israeli settler groups as Amishav and Shavei Israel to settle "lost" Jews of color in such areas where local Palestinians are being displaced. In the 1990s, the annual settler population growth was more than three times the annual population growth in Israel. Population growth has continued in the 2000s. According to the BBC, the settlements in the West Bank have been growing at a rate of 5–6% since 2001. In 2016, there were sixty thousand American Israelis living in settlements in the West Bank. The establishment of settlements in the Palestinian territories is linked to the displacement of the Palestinian populations as evidenced by a 1979 Security Council Commission which established a link between Israeli settlements and the displacement of the local population. The commission also found that those who remained were under consistent pressure to leave to make room for further settlers who were being encouraged into the area. In conclusion the commission stated that settlement in the Palestinian territories was causing "profound and irreversible changes of a geographic and demographic nature". Administration and local government West Bank The Israeli settlements in the West Bank fall under the administrative district of Judea and Samaria Area. Since December 2007, approval by both the Israeli Prime Minister and Israeli Defense Minister of all settlement activities (including planning) in the West Bank is required. Authority for planning and construction is held by the Israel Defense Forces Civil Administration. The area consists of four cities, thirteen local councils and six regional councils. Cities: Ariel, Betar Illit, Maale Adumim, Modi'in Illit; Local councils: Alfei Menashe, Beit Aryeh-Ofarim, Beit El, Efrat, Elkana, Giv'at Ze'ev, Har Adar, Immanuel, Karnei Shomron, Kedumim, Kiryat Arba, Ma'ale Efraim, Oranit; Regional councils: Gush Etzion (Ezion Bloc), Har Hebron (Mount Hebron), Matte Binyamin (Staff of Benjamin, named after the ancient Israelite tribe that dwelled in the area), Megilot (Scrolls, named after the Dead Sea scrolls, which were discovered in the area), Shomron Regional Council (Samaria), Biq'at HaYarden (Jordan valley). The Yesha Council (, Moatzat Yesha, a Hebrew acronym for Judea, Samaria and Gaza) is the umbrella organization of municipal councils in the West Bank. The actual buildings of the Israeli settlements cover only 1 percent of the West Bank, but their jurisdiction and their regional councils extend to about 42 percent of the West Bank, according to the Israeli NGO B'Tselem. Yesha Council chairman Dani Dayan disputes the figures and claims that the settlements only control 9.2 percent of the West Bank. Between 2001 and 2007 more than 10,000 Israeli settlement units were built, while 91 permits were issued for Palestinian construction, and 1,663 Palestinian structures were demolished in Area C. West Bank Palestinians have their cases tried in Israel's military courts while Jewish Israeli settlers living in the same occupied territory are tried in civil courts. The arrangement has been described as "de facto segregation" by the UN Committee on the Elimination of Racial Discrimination. A bill to formally extend Israeli law to the Israeli settlements in the West Bank was rejected in 2012. The basic military laws governing the West Bank are influenced by what is called the "pipelining" of Israeli legislation. As a result of "enclave law", large portions of Israeli civil law are applied to Israeli settlements and Israeli residents in the occupied territories. On 31 August 2014, Israel announced it was appropriating 400 hectares of land in the West Bank to eventually house 1,000 Israel families. The appropriation was described as the largest in more than 30 years. According to reports on Israel Radio, the development is a response to the 2014 kidnapping and murder of Israeli teenagers. East Jerusalem East Jerusalem is defined in the Jerusalem Law as part of Israel and its capital, Jerusalem. As such it is administered as part of the city and its district, the Jerusalem District. Pre-1967 residents of East Jerusalem and their descendants have residency status in the city but many have refused Israeli citizenship. Thus, the Israeli government maintains an administrative distinction between Israeli citizens and non-citizens in East Jerusalem, but the Jerusalem municipality does not. Golan Heights The Golan Heights is administered under Israeli civil law as the Golan sub-district, a part of the Northern District. Israel makes no legal or administrative distinction between pre-1967 communities in the Golan Heights (mainly Druze) and the post-1967 settlements. Sinai Peninsula After the capture of the Sinai Peninsula from Egypt in the 1967 Six-Day War, settlements were established along the Gulf of Aqaba and in northeast Sinai, just below the Gaza Strip. Israel had plans to expand the settlement of Yamit into a city with a population of 200,000, though the actual population of Yamit did not exceed 3,000. The Sinai Peninsula was returned to Egypt in stages beginning in 1979 as part of the Egypt–Israel Peace Treaty. As required by the treaty, in 1982 Israel evacuated the Israeli civilian population from the 18 Sinai settlements in Sinai. In some instances evacuations were done forcefully, such as the evacuation of Yamit. All the settlements were then dismantled. Gaza Strip Before Israel's unilateral disengagement plan in which the Israeli settlements were evacuated, there were 21 settlements in the Gaza Strip under the administration of the Hof Aza Regional Council. The land was allocated in such a way that each Israeli settler disposed of 400 times the land available to the Palestinian refugees, and 20 times the volume of water allowed to the peasant farmers of the Strip. Legal status The consensus view in the international community is that the existence of Israeli settlements in the West Bank including East Jerusalem and the Golan Heights is in violation of international law. The Fourth Geneva Convention includes statements such as "the Occupying Power shall not deport or transfer parts of its own civilian population into the territory it occupies". On 20 December 2019, International Criminal Court chief prosecutor Fatou Bensouda announced an International Criminal Court investigation in Palestine into alleged war crimes committed during the Israeli–Palestinian conflict. At present, the view of the international community, as reflected in numerous UN resolutions, regards the building and existence of Israeli settlements in the West Bank, East Jerusalem and the Golan Heights as a violation of international law. UN Security Council Resolution 446 refers to the Fourth Geneva Convention as the applicable international legal instrument, and calls upon Israel to desist from transferring its own population into the territories or changing their demographic makeup. The reconvened Conference of the High Contracting Parties to the Geneva Conventions has declared the settlements illegal as has the primary judicial organ of the UN, the International Court of Justice. The position of successive Israeli governments is that all authorized settlements are entirely legal and consistent with international law. In practice, Israel does not accept that the Fourth Geneva Convention applies de jure, but has stated that on humanitarian issues it will govern itself de facto by its provisions, without specifying which these are. The scholar and jurist Eugene Rostow has disputed the illegality of authorized settlements. Under Israeli law, West Bank settlements must meet specific criteria to be legal. In 2009, there were approximately 100 small communities that did not meet these criteria and are referred to as illegal outposts. In 2014 twelve EU countries warned businesses against involving themselves in the settlements. According to the warnings, economic activities relating to the settlements involve legal and economic risks stemming from the fact that the settlements are built on occupied land not recognized as Israel's. Illegality arguments The consensus of the international community – the vast majority of states, the overwhelming majority of legal experts, the International Court of Justice and the UN, is that settlements are in violation of international law. After the Six-Day War, in 1967, Theodor Meron, legal counsel to the Israeli Foreign Ministry stated in a legal opinion to the Prime Minister, "My conclusion is that civilian settlement in the administered territories contravenes the explicit provisions of the Fourth Geneva Convention." This legal opinion was sent to Prime Minister Levi Eshkol. However, it was not made public at the time. The Labor cabinet allowed settlements despite the warning. This paved the way for future settlement growth. In 2007, Meron stated that "I believe that I would have given the same opinion today." In 1978, the Legal Adviser of the Department of State of the United States reached the same conclusion. The International Court of Justice, in its advisory opinion, has since ruled that Israel is in breach of international law by establishing settlements in Occupied Palestinian Territory, including East Jerusalem. The Court maintains that Israel cannot rely on its right of self-defense or necessity to impose a regime that violates international law. The Court also ruled that Israel violates basic human rights by impeding liberty of movement and the inhabitants' right to work, health, education and an adequate standard of living. International intergovernmental organizations such as the Conference of the High Contracting Parties to the Fourth Geneva Convention, major organs of the United Nations, the European Union, and Canada, also regard the settlements as a violation of international law. The Committee on the Elimination of Racial Discrimination wrote that "The status of the settlements was clearly inconsistent with Article 3 of the Convention, which, as noted in the Committee's General Recommendation XIX, prohibited all forms of racial segregation in all countries. There is a consensus among publicists that the prohibition of racial discrimination, irrespective of territories, is an imperative norm of international law." Amnesty International, and Human Rights Watch have also characterized the settlements as a violation of international law. In late January 2013 a report drafted by three justices, presided over by Christine Chanet, and issued by the United Nations Human Rights Council declared that Jewish settlements constituted a creeping annexation based on multiple violations of the Geneva Conventions and international law, and stated that if Palestine ratified the Rome Accord, Israel could be tried for "gross violations of human rights law and serious violations of international humanitarian law." A spokesman for Israel's Foreign Ministry declared the report 'unfortunate' and accused the UN's Human Rights Council of a "systematically one-sided and biased approach towards Israel." According to Talia Sasson, the High Court of Justice in Israel, with a variety of different justices sitting, has repeatedly stated for more than 4 decades that Israel's presence in the West Bank is in violation of international law. Legality arguments Four prominent jurists cited the concept of the "sovereignty vacuum" in the immediate aftermath of the Six-Day War to describe the legal status of the West Bank and Gaza: Yehuda Zvi Blum in 1968, Elihu Lauterpacht in 1968, Julius Stone in 1969 and 1981, and Stephen M. Schwebel in 1970. Eugene V. Rostow also argued in 1979 that the occupied territories' legal status was undetermined. Stephen M. Schwebel made three distinctions specific to the Israeli situation to claim that the territories were seized in self-defense and that Israel has more title to them than the previous holders. Professor Julius Stone also wrote that "Israel's presence in all these areas pending negotiation of new borders is entirely lawful, since Israel entered them lawfully in self-defense." He argued that it would be an "irony bordering on the absurd" to read Article 49(6) as meaning that the State of Israel was obliged to ensure (by force if necessary) that areas with a millennial association with Jewish life, shall be forever "judenrein". Professor Ben Saul took exception to this view, arguing that Article 49(6) can be read to include voluntary or assisted transfers, as indeed it was in the advisory opinion of the International Court of Justice which had expressed this interpretation in the Israeli Wall Advisory Opinion (2003). Israel maintains that a temporary use of land and buildings for various purposes is permissible under a plea of military necessity and that the settlements fulfilled security needs. Israel argues that its settlement policy is consistent with international law, including the Fourth Geneva Convention, while recognising that some settlements have been constructed illegally on private land. The Israeli Supreme Court has ruled that the power of the Civil Administration and the Military Commander in the occupied territories is limited by the entrenched customary rules of public international law as codified in the Hague Regulations. In 1998 the Israeli Minister of Foreign Affairs produced "The International Criminal Court Background Paper". It concludesInternational law has long recognised that there are crimes of such severity they should be considered "international crimes." Such crimes have been established in treaties such as the Genocide Convention and the Geneva Conventions.... The following are Israel's primary issues of concern [ie with the rules of the ICC]: The inclusion of settlement activity as a "war crime" is a cynical attempt to abuse the Court for political ends. The implication that the transfer of civilian population to occupied territories can be classified as a crime equal in gravity to attacks on civilian population centres or mass murder is preposterous and has no basis in international law. A UN conference was held in Rome in 1998, where Israel was one of seven countries to vote against the Rome Statute to establish the International Criminal Court. Israel was opposed to a provision that included as a war crime the transfer of civilian populations into territory the government occupies. Israel has signed the statute, but not ratified the treaty. Land ownership A 1996 amendment to an Israeli military order, states that land privately owned can not be part of a settlement, unless the land in question has been confiscated for military purposes. In 2006 Peace Now acquired a report, which it claims was leaked from the Israeli Government's Civil Administration, indicating that up to 40 percent of the land Israel plans to retain in the West Bank is privately owned by Palestinians. Peace Now called this a violation of Israeli law. Peace Now published a comprehensive report about settlements on private lands. In the wake of a legal battle, Peace Now lowered the figure to 32 percent, which the Civil Administration also denied. The Washington Post reported that "The 38-page report offers what appears to be a comprehensive argument against the Israeli government's contention that it avoids building on private land, drawing on the state's own data to make the case." In February 2008, the Civil Administration stated that the land on which more than a third of West Bank settlements was built had been expropriated by the IDF for "security purposes." The unauthorized seizure of private Palestinian land was defined by the Civil Administration itself as 'theft.' According to B'Tselem, more than 42 percent of the West Bank are under control of the Israeli settlements, 21 percent of which was seized from private Palestinian owners, much of it in violation of the 1979 Israeli Supreme Court decision. In 1979, the government decided to extend settlements or build new ones only on "state lands". A secret database, drafted by a retired senior officer, Baruch Spiegel, on orders from former defense minister Shaul Mofaz, found that some settlements deemed legal by Israel were illegal outposts, and that large portions of Ofra, Elon Moreh and Beit El were built on private Palestinian land. The "Spiegel report" was revealed by Haaretz in 2009. Many settlements are largely built on private lands, without approval of the Israeli Government. According to Israel, the bulk of the land was vacant, was leased from the state, or bought fairly from Palestinian landowners. Invoking the Absentee Property Law to transfer, sell or lease property in East Jerusalem owned by Palestinians who live elsewhere without compensation has been criticized both inside and outside of Israel. Opponents of the settlements claim that "vacant" land belonged to Arabs who fled or collectively to an entire village, a practice that developed under Ottoman rule. B'Tselem charged that Israel is using the absence of modern legal documents for the communal land as a legal basis for expropriating it. These "abandoned lands" are sometimes laundered through a series of fraudulent sales. According to Amira Hass, one of the techniques used by Israel to expropriate Palestinian land is to place desired areas under a 'military firing zone' classification, and then issue orders for the evacuation of Palestinians from the villages in that range, while allowing contiguous Jewish settlements to remain unaffected. Effects on Palestinian human rights Amnesty International argues that Israel's settlement policy is discriminatory and a violation of Palestinian human rights. B'Tselem claims that Israeli travel restrictions impact on Palestinian freedom of movement and Palestinian human rights have been violated in Hebron due to the presence of the settlers within the city. According to B'Tselem, over fifty percent of West Bank land expropriated from Palestinians has been used to establish settlements and create reserves of land for their future expansion. The seized lands mainly benefit the settlements and Palestinians cannot use them. The roads built by Israel in the West Bank to serve the settlements are closed to Palestinian vehicles' and act as a barrier often between villages and the lands on which they subsist. Human Rights Watch and other human rights observer volunteer regularly file reports on "settler violence," referring to stoning and shooting incidents involving Israeli settlers. Israel's withdrawal from Gaza and Hebron have led to violent settler protests and disputes over land and resources. Meron Benvenisti described the settlement enterprise as a "commercial real estate project that conscripts Zionist rhetoric for profit." The construction of the Israeli West Bank barrier has been criticized as an infringement on Palestinian human and land rights. The United Nations Office for the Coordination of Humanitarian Affairs estimated that 10% of the West Bank would fall on the Israeli side of the barrier. In July 2012, the UN Human Rights Council decided to set up a probe into Jewish settlements. The report of the independent international fact-finding mission which investigated the "implications of the Israeli settlements on the civil, political, economic, social and cultural rights of the Palestinian people throughout the Occupied Palestinian Territory" was published in February 2013. In February 2020, the Office of the United Nations High Commissioner for Human Rights published a list of 112 companies linked to activities related to Israeli settlements in the occupied West Bank. Economy Goods produced in Israeli settlements are able to stay competitive on the global market, in part because of massive state subsidies they receive from the Israeli government. Farmers and producers are given state assistance, while companies that set up in the territories receive tax breaks and direct government subsidies. An Israeli government fund has also been established to help companies pay customs penalties. Palestinian officials estimate that settlers sell goods worth some $500 million to the Palestinian market. Israel has built 16 industrial zones, containing roughly 1000 industrial plants, in the West Bank and East Jerusalem on acreage that consumes large parts of the territory planned for a future Palestinian state. According to Jodi Rudoren these installations both entrench the occupation and provide work for Palestinians, even those opposed to it. The 16 parks are located at Shaked, Beka'ot, Baran, Karnei Shomron, Emmanuel, Barkan, Ariel, Shilo, Halamish, Ma'ale Efraim, Sha'ar Binyamin, Atarot, Mishor Adumim, Gush Etzion, Kiryat Arba and Metarim (2001). In spite of this, the West Bank settlements have failed to develop a self-sustaining local economy. About 60% of the settler workforce commutes to Israel for work. The settlements rely primarily on the labor of their residents in Israel proper rather than local manufacturing, agriculture, or research and development. Of the industrial parks in the settlements, there are only two significant ones, at Ma'ale Adumim and Barkan, with most of the workers there being Palestinian. Only a few hundred settler households cultivate agricultural land, and rely primarily on Palestinian labor in doing so. Settlement has an economic dimension, much of it driven by the significantly lower costs of housing for Israeli citizens living in Israeli settlements compared to the cost of housing and living in Israel proper. Government spending per citizen in the settlements is double that spent per Israeli citizen in Tel Aviv and Jerusalem, while government spending for settlers in isolated Israeli settlements is three times the Israeli national average. Most of the spending goes to the security of the Israeli citizens living there. Export to EU According to Israeli government estimates, $230 million worth of settler goods including fruit, vegetables, cosmetics, textiles and toys are exported to the EU each year, accounting for approximately 2% of all Israeli exports to Europe. A 2013 report of Profundo revealed that at least 38 Dutch companies imported settlement products. European Union law requires a distinction to be made between goods originating in Israel and those from the occupied territories. The former benefit from preferential custom treatment according to the EU-Israel Association Agreement (2000); the latter don't, having been explicitly excluded from the agreement. In practice, however, settler goods often avoid mandatory customs through being labelled as originating in Israel, while European customs authorities commonly fail to complete obligatory postal code checks of products to ensure they have not originated in the occupied territories. In 2009, the United Kingdom's Department for the Environment, Food and Rural Affairs issued new guidelines concerning labelling of goods imported from the West Bank. The new guidelines require labelling to clarify whether West Bank products originate from settlements or from the Palestinian economy. Israel's foreign ministry said that the UK was "catering to the demands of those whose ultimate goal is the boycott of Israeli products"; but this was denied by the UK government, who said that the aim of the new regulations was to allow consumers to choose for themselves what produce they buy. Denmark has similar legislation requiring food products from settlements in the occupied territories to be accurately labelled. On 12 November 2019 the Court of Justice of the European Union in a ruling covering all territory Israel captured in the 1967 war decided that labels on foodstuffs must not imply that goods produced in occupied territory came from Israel itself and must "prevent consumers from being misled as to the fact that the State of Israel is present in the territories concerned as an occupying power and not as a sovereign entity". In its ruling, the court said that failing to inform EU consumers they were potentially buying goods produced in settlements denies them access to "ethical considerations and considerations relating to the observance of international law". In January 2019 the Dail (Ireland's lower house) voted in favour, by 78 to 45, of the Control of Economic Activity (Occupied Territories) bill. This piece of legislation prohibits the purchasing of any good and/or service from the Golan Heights, East Jerusalem or West Bank settlements. As of February 2019 the bill has some stages to be completed,once codified, either a five-year jail sentence or fines of up to €250,000 ($284,000) will affect anyone who breaks this law. A petition under the European Citizens' Initiative, submitted in September 2021, was accepted on 20 February 2022. The petition seeks the adoption of legislation to ban trade with unlawful settlements. The petition requires a million signatures from across the EU and has received support from civil society groups including Human Rights Watch. Palestinian economy and resources A Palestinian report argued in 2011 that settlements have a detrimental effect on the Palestinian economy, equivalent to about 85% of the nominal gross domestic product of Palestine, and that the "occupation enterprise" allows the state of Israel and commercial firms to profit from Palestinian natural resources and tourist potential. A 2013 report published by the World Bank analysed the impact that the limited access to Area C lands and resources had on the Palestinian economy. While settlements represent a single axis of control, it is the largest with 68% of the Area C lands reserved for the settlements. The report goes on to calculate that access to the lands and resources of Area C, including the territory in and around settlements, would increase the Palestinian GDP by some $3.5 billion (or 35%) per year. The Israeli Supreme Court has ruled that Israeli companies are entitled to exploit the West Bank's natural resources for economic gain, and that international law must be "adapted" to the "reality on the ground" of long-term occupation. Palestinian labour Due to the availability of jobs offering twice the prevailing salary of the West Bank (), as well as high unemployment, tens of thousands of Palestinians work in Israeli settlements. According to the Manufacturers Association of Israel, some 22,000 Palestinians were employed in construction, agriculture, manufacturing and service industries. An Al-Quds University study in 2011 found that 82% of Palestinian workers said they would prefer to not work in Israeli settlements if they had alternative employment in the West Bank. Palestinians have been highly involved in the construction of settlements in the West Bank. In 2013, the Palestinian Central Bureau of Statistics released their survey showing that the number of Palestinian workers who are employed by the Jewish settlements increased from 16,000 to 20,000 in the first quarter. The survey also found that Palestinians who work in Israel and the settlements are paid more than twice their salary compared to what they receive from Palestinian employers. In 2008, Kav LaOved charged that Palestinians who work in Israeli settlements are not granted basic protections of Israeli labor law. Instead, they are employed under Jordanian labor law, which does not require minimum wage, payment for overtime and other social rights. In 2007, the Supreme Court of Israel ruled that Israeli labor law does apply to Palestinians working in West Bank settlements and applying different rules in the same work place constituted discrimination. The ruling allowed Palestinian workers to file lawsuits in Israeli courts. In 2008, the average sum claimed by such lawsuits stood at 100,000 shekels. According to Palestinian Center for Policy and Survey Research, 63% of Palestinians opposed PA plans to prosecute Palestinians who work in the settlements. However, 72% of Palestinians support a boycott of the products they sell. Although the Palestinian Authority has criminalized working in the settlements, the director-general at the Palestinian Ministry of Labor, Samer Salameh, described the situation in February 2014 as being "caught between two fires". He said "We strongly discourage work in the settlements, since the entire enterprise is illegal and illegitimate...but given the high unemployment rate and the lack of alternatives, we do not enforce the law that criminalizes work in the settlements." Violence Israeli settler violence Gush Emunim Underground was a militant organization that operated in 1979–1984. The organization planned attacks on Palestinian officials and the Dome of the Rock. In 1994, Baruch Goldstein of Hebron, a member of Kach carried out the Cave of the Patriarchs massacre, killing 29 Muslim worshipers and injuring 125. The attack was widely condemned by the Israeli government and Jewish community. The Palestinian leadership has accused Israel of "encouraging and enabling" settler violence in a bid to provoke Palestinian riots and violence in retaliation. Violence perpetrated by Israeli settlers against Palestinians constitutes terrorism according to the U.S. Department of State, and former IDF Head of Central Command Avi Mizrahi stated that such violence constitutes "terror." In mid-2008, a UN report recorded 222 acts of Israeli settler violence against Palestinians and IDF troops compared with 291 in 2007. This trend reportedly increased in 2009. Maj-Gen Shamni said that the number had risen from a few dozen individuals to hundreds, and called it "a very grave phenomenon." In 2008–2009, the defense establishment adopted a harder line against the extremists. This group responded with a tactic dubbed "price tagging", vandalizing Palestinian property whenever police or soldiers were sent in to dismantle outposts. From January through to September 2013, 276 attacks by settlers against Palestinians were recorded. Leading religious figures in the West Bank have harshly criticized these tactics. Rabbi Menachem Froman of Tekoa said that "Targeting Palestinians and their property is a shocking thing, (...) It's an act of hurting humanity. (...) This builds a wall of fire between Jews and Arabs." The Yesha Council and Hanan Porat also condemned such actions. Other rabbis have been accused of inciting violence against non-Jews. In response to settler violence, the Israeli government said that it would increase law enforcement and cut off aid to illegal outposts. Some settlers are thought to lash out at Palestinians because they are "easy victims." The United Nations accused Israel of failing to intervene and arrest settlers suspected of violence. In 2008, Haaretz wrote that "Israeli society has become accustomed to seeing lawbreaking settlers receive special treatment and no other group could similarly attack Israeli law enforcement agencies without being severely punished." In September 2011, settlers vandalized a mosque and an army base. They slashed tires and cut cables of 12 army vehicles and sprayed graffiti. In November 2011, the United Nations Office for Coordination of Human Affairs (OCHA) in the Palestinian territories published a report on settler violence that showed a significant rise compared to 2009 and 2010. The report covered physical violence and property damage such as uprooted olive trees, damaged tractors and slaughtered sheep. The report states that 90% of complaints filed by Palestinians have been closed without charge. According to EU reports, Israel has created an "atmosphere of impunity" for Jewish attackers, which is seen as tantamount to tacit approval by the state. In the West Bank, Jews and Palestinians live under two different legal regimes and it is difficult for Palestinians to lodge complaints, which must be filed in Hebrew in Israeli settlements. The 27 ministers of foreign affairs of the European Union published a report in May 2012 strongly denouncing policies of the State of Israel in the West Bank and denouncing "continuous settler violence and deliberate provocations against Palestinian civilians." The report by all EU ministers called "on the government of Israel to bring the perpetrators to justice and to comply with its obligations under international law." In July 2014, a day after the burial of three murdered Israeli teens, Khdeir, a 16-year-old Palestinian, was forced into a car by 3 Israeli settlers on an East Jerusalem street. His family immediately reported the fact to Israeli Police who located his charred body a few hours later at Givat Shaul in the Jerusalem Forest. Preliminary results from the autopsy suggested that he was beaten and burnt while still alive. The murder suspects explained the attack as a response to the June abduction and murder of three Israeli teens. The murders contributed to a breakout of hostilities in the 2014 Israel–Gaza conflict. In July 2015, a similar incident occurred where Israeli settlers made an arson attack on two Palestinian houses, one of which was empty; however, the other was occupied, resulting in the burning to death of a Palestinian infant; the four other members of his family were evacuated to the hospital suffering serious injuries. These two incidents received condemnation from the United States, European Union and the IDF. The European Union criticized Israel for "failing to protect the Palestinian population". Olive trees While the Economy of the Palestinian territories has shown signs of growth, the International Committee of the Red Cross reported that Palestinian olive farming has suffered. According to the ICRC, 10,000 olive trees were cut down or burned by settlers in 2007–2010. Foreign ministry spokesman Yigal Palmor said the report ignored official PA data showing that the economic situation of Palestinians had improved substantially, citing Mahmoud Abbas's comment to The Washington Post in May 2009, where he said "in the West Bank, we have a good reality, the people are living a normal life." Haaretz blamed the violence during the olive harvest on a handful of extremists. In 2010, trees belonging to both Jews and Arabs were cut down, poisoned or torched. In the first two weeks of the harvest, 500 trees owned by Palestinians and 100 trees owned by Jews had been vandalized. In October 2013, 100 trees were cut down. Violent attacks on olive trees seem to be facilitated by the apparently systematic refusal of the Israeli authorities to allow Palestinians to visit their own groves, sometimes for years, especially in cases where the groves are deemed to be too close to settlements. Palestinian violence against settlers Israeli civilians living in settlements have been targeted by violence from armed Palestinian groups. These groups, according to Human Rights Watch, assert that settlers are "legitimate targets" that have "forfeited their civilian status by residing in settlements that are illegal under international humanitarian law." Both Human Rights Watch and B'tselem rejected this argument on the basis that the legal status of the settlements has no effect on the civilian status of their residents. Human Rights Watch said the "prohibition against intentional attacks against civilians is absolute." B'tselem said "The settlers constitute a distinctly civilian population, which is entitled to all the protections granted civilians by international law. The Israeli security forces' use of land in the settlements or the membership of some settlers in the Israeli security forces does not affect the status of the other residents living among them, and certainly does not make them proper targets of attack." Fatal attacks on settlers have included firing of rockets and mortars and drive-by shootings, also targeting infants and children. Violent incidents include the murder of Shalhevet Pass, a ten-month-old baby shot by a Palestinian sniper in Hebron, and the murder of two teenagers by unknown perpetrators on 8 May 2001, whose bodies were hidden in a cave near Tekoa, a crime that Israeli authorities suggest may have been committed by Palestinian terrorists. In the Bat Ayin axe attack, children in Bat Ayin were attacked by a Palestinian wielding an axe and a knife. A 13-year-old boy was killed and another was seriously wounded. Rabbi Meir Hai, a father of seven, was killed in a drive-by shooting. In August 2011, five members of one family were killed in their beds. The victims were the father Ehud (Udi) Fogel, the mother Ruth Fogel, and three of their six children—Yoav, 11, Elad, 4, and Hadas, the youngest, a three-month-old infant. According to David Ha'ivri, and as reported by multiple sources, the infant was decapitated. Pro-Palestinian activist violence Pro-Palestinian activists who hold regular protests near the settlements have been accused of stone-throwing, physical assault and provocation. In 2008, Avshalom Peled, head of the Israel Police's Hebron district, called "left-wing" activity in the city dangerous and provocative, and accused activists of antagonizing the settlers in the hope of getting a reaction. Environmental issues Municipal Environmental Associations of Judea and Samaria, an environmental awareness group, was established by the settlers to address sewage treatment problems and cooperate with the Palestinian Authority on environmental issues. According to a 2004 report by Friends of the Earth Middle East, settlers account for 10% of the population in the West Bank but produce 25% of the sewage output. Beit Duqqu and Qalqilyah have accused settlers of polluting their farmland and villagers claim children have become ill after swimming in a local stream. Legal action was taken against 14 settlements by the Israeli Ministry of the Environment. The Palestinian Authority has also been criticized by environmentalists for not doing more to prevent water pollution. Settlers and Palestinians share the mountain aquifer as a water source, and both generate sewage and industrial effluents that endanger the aquifer. Friends of the Earth Middle East claimed that sewage treatment was inadequate in both sectors. Sewage from Palestinian sources was estimated at 46 million cubic meters a year, and sources from settler sources at 15 million cubic meters a year. A 2004 study found that sewage was not sufficiently treated in many settlements, while sewage from Palestinian villages and cities flowed into unlined cesspits, streams and the open environment with no treatment at all. In a 2007 study, the Israel Nature and Parks Authority and Israeli Ministry of Environmental Protection, found that Palestinian towns and cities produced 56 million cubic meters of sewage per year, 94 percent discharged without adequate treatment, while Israeli sources produced 17.5 million cubic meters per year, 31.5 percent without adequate treatment. According to Palestinian environmentalists, the settlers operate industrial and manufacturing plants that can create pollution as many do not conform to Israeli standards. In 2005, an old quarry between Kedumim and Nablus was slated for conversion into an industrial waste dump. Pollution experts warned that the dump would threaten Palestinian water sources. Impact on Palestinian demographics The Consortium for Applied Research on International Migration (CARIM) has reported in their 2011 migration profile for Palestine that the reasons for individuals to leave the country are similar to those of other countries in the region and they attribute less importance to the specific political situation of the occupied Palestinian territory. Human Rights Watch in 2010 reported that Israeli settlement policies have had the effect of "forcing residents to leave their communities". In 2008, Condoleezza Rice suggested sending Palestinian refugees to South America, which might reduce pressure on Israel to withdraw from the settlements. Sushil P. Seth speculates that Israelis seem to feel that increasing settlements will force many Palestinians to flee to other countries and that the remainder will be forced to live under Israeli terms. Speaking anonymously with regard to Israeli policies in the South Hebron Hills, a UN expert said that the Israeli crackdown on alternative energy infrastructures like solar panels is part of a deliberate strategy in Area C. "From December 2010 to April 2011, we saw a systematic targeting of the water infrastructure in Hebron, Bethlehem and the Jordan valley. Now, in the last couple of months, they are targeting electricity. Two villages in the area have had their electrical poles demolished. There is this systematic effort by the civil administration targeting all Palestinian infrastructure in Hebron. They are hoping that by making it miserable enough, they [the Palestinians] will pick up and leave." Approximately 1,500 people in 16 communities are dependent on energy produced by these installations duct business are threatened with work stoppage orders from the Israeli administration on their installation of alternative power infrastructure, and demolition
|
relativity. "The Irrealist work, then, operates within a given system," writes Swinford, "and attests to its plausibility, despite the fact that this system, and the world it represents, is often a mutation, an aberration." The online journal The Cafe Irreal , on the other hand, has defined irrealism as being a type of existentialist literature in which the means are continually and absurdly rebelling against the ends that we have determined for them. An example of this would be Franz Kafka's story The Metamorphosis, in which the salesman Gregor Samsa's plans for supporting his family and rising up in rank by hard work and determination are suddenly thrown topsy-turvy by his sudden and inexplicable transformation into a man-sized insect. Such fiction is said to emphasize the fact that human consciousness, being finite in nature, can never make complete sense of, or successfully order, a universe that is infinite in its aspects and possibilities. Which is to say: as much as we might try to order our world with a certain set of norms and goals (which we consider our real world), the paradox of a finite consciousness in an infinite universe creates a zone of irreality ("that which is beyond the real") that offsets, opposes, or threatens the real world of the human subject. Irrealist writing often highlights this irreality, and our strange fascination with it, by combining the unease we feel because the real world doesn't conform to our desires with the narrative quality of the dream state (where reality is constantly and inexplicably being undermined); it is thus said to communicate directly, "by feeling rather than articulation, the uncertainties inherent in human existence or, to put it another way... the irreconcilability between human aspiration and human reality." If the irreal story can be considered an allegory, then, it would be an allegory that is "so many pointers to an unknown meaning," in which the meaning is felt more than it is articulated or systematically analyzed. Irrealism in art Various writers have addressed the question of Irrealism in Art. Many salient observations on Irrealism in Art are found in Nelson Goodman's Languages of Art. Goodman himself produced some multimedia shows, one of which inspired by hockey and is entitled Hockey Seen: A Nightmare in Three Periods and Sudden Death. Garret Rowlan, writing in The Cafe Irreal, writes that the malaise present in the work
|
Tolkien, the magical realism of Gabriel García Márquez) and what the significance of this difference is. This can be seen in Dean Swinford's essay Defining irrealism: scientific development and allegorical possibility. Approaching the issue from a structuralist and narratological point of view, he has defined irrealism as a "peculiar mode of postmodern allegory" that has resulted from modernity’s fragmentation and dismantling of the well-ordered and coherent medieval system of symbol and allegory. Thus a lion, when presented in a given context in medieval literature, could only be interpreted in a single, approved way. Contemporary literary theory, however, denies the attribution of such fixed meanings. According to Swinford, this change can be attributed in part to the fact that "science and technical culture have changed perceptions of the natural world, have significantly changed the natural world itself, thereby altering the vocabulary of symbols applicable to epistemological and allegorical attempts to understand it." Thus irreal works such as Italo Calvino's Cosmicomics and Jorge Luis Borges' Ficciones can be seen as an attempt to find a new allegorical language to explain our changed perceptions of the world that have been brought about by our scientific and technical culture, especially concepts such as quantum physics or the theory of relativity. "The Irrealist work, then, operates within a given system," writes Swinford, "and attests to its plausibility, despite the fact that this system, and the world it represents, is often a mutation, an aberration." The online journal The Cafe Irreal , on the other hand, has defined irrealism as being a type of existentialist literature in which the means are continually and absurdly rebelling against the ends that we have determined for them. An example of this would be Franz Kafka's story The Metamorphosis, in which the salesman Gregor Samsa's plans for supporting his family and rising up in rank by hard work and determination are suddenly thrown topsy-turvy by his sudden and inexplicable transformation into a man-sized insect. Such fiction is said to emphasize the fact that human consciousness, being finite in nature, can never make complete sense of, or successfully order, a universe that is infinite in its aspects and possibilities. Which is to say: as much as we might try to order our world with a certain set of norms and goals (which we consider our real world), the paradox of a finite consciousness in an infinite universe creates a zone of irreality ("that which is beyond the real") that offsets, opposes, or threatens the real world of the human subject. Irrealist writing often
|
Bill Sherk mentions that such lists circulated throughout the United States since around 1936 under the title "Parable of the Isms". A column in The Chicago Daily Tribune in 1938 attributes a version involving socialism, communism, fascism and New Dealism to an address by Silas Strawn to the Economic Club of Chicago on 29 November 1935. Notable usages Jokes of this genre formed the base of a monologue by American comedian Pat Paulsen on The Smothers Brothers Comedy Hour in the late 1960s. Satirising the satire, he appended this comment to capitalism: "...Then put both of them in your wife's name and declare bankruptcy." This material was later used as an element of his satirical US presidential campaign in 1968, and was included on his 1968 comedy album Pat
|
two cows. The punch line is what happens to the listener and the cows in this system. History An article in The Modern Language Journal lists the following classical ones: Socialism: You have two cows. You give one to your neighbor. Communism: You have two cows. You give them to the government, and the government then gives you some milk. Fascism: You have two cows. You keep the cows and give the milk to the government. The government then sells you milk. Capitalism: You have two cows. You sell one and buy a bull. Nazism: You have two cows. The government takes both and shoots you. Bill Sherk mentions that such lists circulated throughout the United States since around 1936 under the title "Parable of the Isms". A column in The Chicago Daily Tribune in 1938 attributes a version involving socialism, communism, fascism and New Dealism to an address by Silas Strawn to the Economic Club of Chicago on 29 November 1935. Notable usages Jokes of this genre formed the base of a monologue by American comedian Pat Paulsen on The
|
people of a certain group are needed to change, replace, or screw in a light bulb. Generally, the punch line answer highlights a stereotype of the target group. There are numerous versions of the lightbulb joke satirizing a wide range of cultures, beliefs and occupations. Early versions of the joke, popular in the late 1960s and the 1970s, were used to insult the intelligence of people, especially Poles ("Polish jokes"). For instance: Although lightbulb jokes tend to be derogatory
|
Poles ("Polish jokes"). For instance: Although lightbulb jokes tend to be derogatory in tone (e.g., "How many drummers..." / "Four: one to hold the light bulb and three to drink until the room spins"), the people targeted by them may take pride in the stereotypes expressed and are often themselves the jokes' originators, as in "How many Germans does it take to change a lightbulb? One, we're very efficient but not funny." where the joke itself becomes a statement of ethnic pride. Lightbulb jokes applied to subgroups can be used to ease tensions between them. Variations Some versions of
|
as national standards by its members. IEC standards The IEC cooperates closely with the International Organization for Standardization (ISO) and the International Telecommunication Union (ITU). In addition, it works with several major standards development organizations, including the IEEE with which it signed a cooperation agreement in 2002, which was amended in 2008 to include joint development work. IEC standards that are not jointly developed with ISO have numbers in the range 60000–79999 and their titles take a form such as IEC 60417: Graphical symbols for use on equipment. Following the Dresden Agreement with CENELEC the numbers of older IEC standards were converted in 1997 by adding 60000, for example IEC 27 became IEC 60027. Standards of the 60000 series are also found preceded by EN to indicate that the IEC standard is also adopted by CENELEC as a European standard; for example IEC 60034 is also available as EN 60034. Standards developed jointly with ISO, such as ISO/IEC 26300 (Open Document Format for Office Applications (OpenDocument) v1.0), ISO/IEC 27001 (Information technology, Security techniques, Information security management systems, Requirements), and ISO/IEC 17000 series, carry the acronym of both organizations. The use of the ISO/IEC prefix covers publications from ISO/IEC Joint Technical Committee 1 – Information Technology, as well as conformity assessment standards developed by ISO CASCO (Committee on conformity assessment) and IEC CAB (Conformity Assessment Board). Other standards developed in cooperation between IEC and ISO are assigned numbers in the 80000 series, such as IEC 82045–1. IEC standards are also being adopted by other certifying bodies such as BSI (United Kingdom), CSA (Canada), UL & ANSI/INCITS (United States), SABS (South Africa), Standards Australia, SPC/GB (China) and DIN (Germany). IEC standards adopted by other certifying bodies may have some noted differences from the original IEC standard. Membership and participation The IEC is made up of members, called national committees, and each NC represents its nation's electrotechnical interests in the IEC. This includes manufacturers, providers, distributors and vendors, consumers and users, all levels of governmental agencies, professional societies and trade associations as well as standards developers from national standards bodies. National committees are constituted in different ways. Some NCs are public sector only, some are a combination of public and private sector, and some are private sector only. About 90% of those who prepare IEC standards work in industry. IEC Member countries include: Full members Algeria Argentina Australia Austria Belarus Belgium Brazil Bulgaria Canada Colombia Chile China Croatia Czech Republic Denmark Egypt Finland France Germany Greece Hungary India Indonesia Iran Iraq Ireland Israel Italy Japan Kuwait Libya Luxembourg Malaysia Mexico Netherlands New Zealand Nigeria Norway Oman Pakistan Perú Philippines Poland Portugal Qatar Romania Russia Saudi Arabia Serbia Singapore Slovakia Slovenia South Korea South Africa Spain Sweden Switzerland Thailand Turkey Ukraine United Arab Emirates United Kingdom United States Associate members (limited voting and managerial rights) Albania Bahrain Bangladesh Bosnia & Herzegovina Cuba Cyprus Democratic People's Republic of Korea Estonia Ethiopia Georgia Ghana Iceland Jordan Kazakhstan Kenya Latvia Lithuania North
|
Committee 1 – Information Technology, as well as conformity assessment standards developed by ISO CASCO (Committee on conformity assessment) and IEC CAB (Conformity Assessment Board). Other standards developed in cooperation between IEC and ISO are assigned numbers in the 80000 series, such as IEC 82045–1. IEC standards are also being adopted by other certifying bodies such as BSI (United Kingdom), CSA (Canada), UL & ANSI/INCITS (United States), SABS (South Africa), Standards Australia, SPC/GB (China) and DIN (Germany). IEC standards adopted by other certifying bodies may have some noted differences from the original IEC standard. Membership and participation The IEC is made up of members, called national committees, and each NC represents its nation's electrotechnical interests in the IEC. This includes manufacturers, providers, distributors and vendors, consumers and users, all levels of governmental agencies, professional societies and trade associations as well as standards developers from national standards bodies. National committees are constituted in different ways. Some NCs are public sector only, some are a combination of public and private sector, and some are private sector only. About 90% of those who prepare IEC standards work in industry. IEC Member countries include: Full members Algeria Argentina Australia Austria Belarus Belgium Brazil Bulgaria Canada Colombia Chile China Croatia Czech Republic Denmark Egypt Finland France Germany Greece Hungary India Indonesia Iran Iraq Ireland Israel Italy Japan Kuwait Libya Luxembourg Malaysia Mexico Netherlands New Zealand Nigeria Norway Oman Pakistan Perú Philippines Poland Portugal Qatar Romania Russia Saudi Arabia Serbia Singapore Slovakia Slovenia South Korea South Africa Spain Sweden Switzerland Thailand Turkey Ukraine United Arab Emirates United Kingdom United States Associate members (limited voting and managerial rights) Albania Bahrain Bangladesh Bosnia & Herzegovina Cuba Cyprus Democratic People's Republic of Korea Estonia Ethiopia Georgia Ghana Iceland Jordan Kazakhstan Kenya Latvia Lithuania North Macedonia Malta Moldova Montenegro Morocco Sri Lanka Tunisia Vietnam Uganda Affiliates In 2001 and in response to calls from the WTO to open itself to more developing nations, the IEC launched the Affiliate Country Programme to encourage developing nations to become involved in the Commission's work or to use its International Standards. Countries signing a pledge to participate in the work and to encourage the use of IEC Standards in national standards and regulations are granted access to a limited number of technical committee documents for the purposes of commenting. In addition, they
|
GB (more precisely, one byte less than 4 GiB). It is possible to circumvent this limitation by using the multi-extent (fragmentation) feature of ISO 9660 Level 3 to create ISO 9660 file systems and single files up to 8 TB. With this, files larger than 4 GiB can be split up into multiple extents (sequential series of sectors), each not exceeding the 4 GiB limit. For example, the free software such as InfraRecorder, ImgBurn and mkisofs as well as Roxio Toast are able to create ISO 9660 file systems that use multi-extent files to store files larger than 4 GiB on appropriate media such as recordable DVDs. Linux supports multiple extents. Extensions and improvements There are several extensions to ISO 9660 that relax some of its limitations. Notable examples include Rock Ridge (Unix-style permissions and longer names), Joliet (Unicode, allowing non-Latin scripts to be used), El Torito (enables CDs to be bootable) and the Apple ISO 9660 Extensions (macOS-specific file characteristics such as resource forks, file backup date and more). SUSP System Use Sharing Protocol (SUSP, IEEE P1281) provides a generic way of including additional properties for any directory entry reachable from the primary volume descriptor (PVD). In an ISO 9660 volume, every directory entry has an optional system use area whose contents are undefined and left to be interpreted by the system. SUSP defines a method to subdivide that area into multiple system use fields, each identified by a two-character signature tag. The idea behind SUSP was that it would enable any number of independent extensions to ISO 9660 to be created and included on a volume without conflicting. It also allows for the inclusion of property data that would otherwise be too large to fit within the limits of the system use area. SUSP defines several common tags and system use fields: CE: Continuation area PD: Padding field SP: System use sharing protocol indicator ST: System use sharing protocol terminator ER: Extensions reference ES: Extension selector Other known SUSP fields include: AA: Apple extension, preferred BA: Apple extension, old (length attribute is missing) AS: Amiga file properties ZF: zisofs compressed file, usually produced by program mkzftree or by libisofs. Transparently decompressed by Linux kernel if built with CONFIG_ZISOFS. AL: records Extended File Attributes, including ACLs. Proposed by libburnia, supported by libisofs. The Apple extensions do not technically follow the SUSP standard; however the basic structure of the AA and AB fields defined by Apple are forward compatible with SUSP; so that, with care, a volume can use both Apple extensions as well as RRIP extensions. Rock Ridge The Rock Ridge Interchange Protocol (RRIP, IEEE P1282) is an extension which adds POSIX file system semantics. The availability of these extension properties allows for better integration with Unix and Unix-like operating systems. The standard takes its name from the fictional town Rock Ridge in Mel Brooks' film Blazing Saddles. The RRIP extensions are, briefly: Longer file names (up to 255 bytes) and fewer restrictions on allowed characters (support for lowercase, etc.) UNIX-style file modes, user ids and group ids, and file timestamps Support for Symbolic links and device files Deeper directory hierarchy (more than 8 levels) Efficient storage of sparse files The RRIP extensions are built upon SUSP, defining additional tags for support of POSIX semantics, along with the format and meaning of the corresponding system use fields: RR: Rock Ridge extensions in-use indicator (note: dropped from standard after version 1.09) PX: POSIX file attributes PN: POSIX device numbers SL: symbolic link NM: alternate name CL: child link PL: parent link RE: relocated directory TF: time stamp SF: sparse file data Amiga Rock Ridge is similar to RRIP, except it provides additional properties used by AmigaOS. It too is built on the SUSP standard by defining an "AS"-tagged system use field. Thus both Amiga Rock Ridge and the POSIX RRIP may be used simultaneously on the same volume. Some of the specific properties supported by this extension are the additional Amiga-bits for files. There is support for attribute "P" that stands for "pure" bit (indicating re-entrant command) and attribute "S" for script bit (indicating batch file). This includes the protection flags plus an optional comment field. These extensions were introduced by Angela Schmidt with the help of Andrew Young, the primary author of the Rock Ridge Interchange Protocol and System Use Sharing Protocol. The first publicly available software to master a CD-ROM with Amiga extensions was MakeCD, an Amiga software which Angela Schmidt developed together with Patrick Ohly. El Torito El Torito is an extension designed to allow booting a computer from a CD-ROM. It was announced in November 1994 and first issued in January 1995 as a joint proposal by IBM and BIOS manufacturer Phoenix Technologies. According to legend, the El Torito CD/DVD extension to ISO 9660 got its name because its design originated in an El Torito restaurant in Irvine, California (). The initial two authors were Curtis Stevens, of Phoenix Technologies, and Stan Merkin, of IBM. A 32-bit PC BIOS will search for boot code on an ISO 9660 CD-ROM. The standard allows for booting in two different modes. Either in hard disk emulation when the boot information can be accessed directly from the CD media, or in floppy emulation mode where the boot information is stored in an image file of a floppy disk, which is loaded from the CD and then behaves as a virtual floppy disk. This is useful for computers that were designed to boot only from a floppy drive. For modern computers the "no emulation" mode is generally the more reliable method. The BIOS will assign a BIOS drive number to the CD drive. The drive number (for INT 13H) assigned is any of 80hex (hard disk emulation), 00hex (floppy disk emulation) or an arbitrary number if the BIOS should not provide emulation. Emulation is useful for booting older operating systems from a CD, by making it appear to them as if they were booted from a hard or floppy disk. El Torito can also be used to produce CDs which can boot up Linux operating systems, by including the GRUB bootloader on the CD and following the Multiboot Specification. While the El Torito spec alludes to a "Mac" platform ID, PowerPC-based Apple Macintosh computers don't use it. Joliet Joliet is an extension specified and endorsed by Microsoft and has been supported by all versions of its Windows operating system since Windows 95 and Windows NT 4.0. Its primary focus is the relaxation of the filename restrictions inherent with full ISO 9660 compliance. Joliet accomplishes this by supplying an additional set of filenames that are encoded in UCS-2BE (UTF-16BE in practice since Windows 2000). These filenames are stored in a special supplementary volume descriptor, that is safely ignored by ISO 9660-compliant software, thus preserving backward compatibility. The specification only allows filenames to be up to 64 Unicode characters in length. However, the documentation for mkisofs states filenames up to 103 characters in length do not appear to cause problems. Microsoft has documented it "can use up to 110 characters." Joliet allows Unicode characters to be used for all text fields, which includes file names and the volume name. A "Secondary" volume descriptor with type 2 contains the same information as the Primary one (sector 16 offset 40 bytes), but in UCS-2BE in sector 17, offset 40 bytes. As a result of this, the volume name is limited to 16 characters. Many current PC operating systems are able to read Joliet-formatted media, thus allowing exchange of files between those operating systems even if non-Roman characters are involved (such as Arabic, Japanese or Cyrillic), which was formerly not possible with plain ISO 9660-formatted media. Operating systems which can read Joliet media include: Microsoft Windows; Microsoft recommends the use of the Joliet extension for developers targeting Windows. Linux macOS FreeBSD OpenSolaris Haiku AmigaOS RISC OS Romeo Romeo was developed by Adaptec and allows the use of long filenames up to 128 characters. However, Romeo is not backwards compatible with ISO 9660 and discs authored using this file system can only be read under the Windows 9x and Windows NT platforms, thus not allowing exchange of files between those operating systems if non-Roman characters are involved (such as Arabic, Japanese or Cyrillic), for example ü becomes ³. Apple extensions Apple Computer authored a set of extensions that add ProDOS or HFS/HFS+ (the primary contemporary file system for Mac OS) properties to the filesystem. Some of the additional metadata properties include: Date of last backup File type Creator code Flags and data for display Reference to a resource fork In order to allow non-Macintosh systems to access Macintosh files on CD-ROMs, Apple chose to use an extension of the standard ISO 9660 format. Most of the data, other than the Apple specific metadata, remains visible to operating systems that are able to read ISO 9660. Other extensions For operating systems which do not support any extensions, a name translation file TRANS.TBL must be used. The TRANS.TBL file is a plain ASCII text file. Each line contains three fields, separated by
|
links and device files Deeper directory hierarchy (more than 8 levels) Efficient storage of sparse files The RRIP extensions are built upon SUSP, defining additional tags for support of POSIX semantics, along with the format and meaning of the corresponding system use fields: RR: Rock Ridge extensions in-use indicator (note: dropped from standard after version 1.09) PX: POSIX file attributes PN: POSIX device numbers SL: symbolic link NM: alternate name CL: child link PL: parent link RE: relocated directory TF: time stamp SF: sparse file data Amiga Rock Ridge is similar to RRIP, except it provides additional properties used by AmigaOS. It too is built on the SUSP standard by defining an "AS"-tagged system use field. Thus both Amiga Rock Ridge and the POSIX RRIP may be used simultaneously on the same volume. Some of the specific properties supported by this extension are the additional Amiga-bits for files. There is support for attribute "P" that stands for "pure" bit (indicating re-entrant command) and attribute "S" for script bit (indicating batch file). This includes the protection flags plus an optional comment field. These extensions were introduced by Angela Schmidt with the help of Andrew Young, the primary author of the Rock Ridge Interchange Protocol and System Use Sharing Protocol. The first publicly available software to master a CD-ROM with Amiga extensions was MakeCD, an Amiga software which Angela Schmidt developed together with Patrick Ohly. El Torito El Torito is an extension designed to allow booting a computer from a CD-ROM. It was announced in November 1994 and first issued in January 1995 as a joint proposal by IBM and BIOS manufacturer Phoenix Technologies. According to legend, the El Torito CD/DVD extension to ISO 9660 got its name because its design originated in an El Torito restaurant in Irvine, California (). The initial two authors were Curtis Stevens, of Phoenix Technologies, and Stan Merkin, of IBM. A 32-bit PC BIOS will search for boot code on an ISO 9660 CD-ROM. The standard allows for booting in two different modes. Either in hard disk emulation when the boot information can be accessed directly from the CD media, or in floppy emulation mode where the boot information is stored in an image file of a floppy disk, which is loaded from the CD and then behaves as a virtual floppy disk. This is useful for computers that were designed to boot only from a floppy drive. For modern computers the "no emulation" mode is generally the more reliable method. The BIOS will assign a BIOS drive number to the CD drive. The drive number (for INT 13H) assigned is any of 80hex (hard disk emulation), 00hex (floppy disk emulation) or an arbitrary number if the BIOS should not provide emulation. Emulation is useful for booting older operating systems from a CD, by making it appear to them as if they were booted from a hard or floppy disk. El Torito can also be used to produce CDs which can boot up Linux operating systems, by including the GRUB bootloader on the CD and following the Multiboot Specification. While the El Torito spec alludes to a "Mac" platform ID, PowerPC-based Apple Macintosh computers don't use it. Joliet Joliet is an extension specified and endorsed by Microsoft and has been supported by all versions of its Windows operating system since Windows 95 and Windows NT 4.0. Its primary focus is the relaxation of the filename restrictions inherent with full ISO 9660 compliance. Joliet accomplishes this by supplying an additional set of filenames that are encoded in UCS-2BE (UTF-16BE in practice since Windows 2000). These filenames are stored in a special supplementary volume descriptor, that is safely ignored by ISO 9660-compliant software, thus preserving backward compatibility. The specification only allows filenames to be up to 64 Unicode characters in length. However, the documentation for mkisofs states filenames up to 103 characters in length do not appear to cause problems. Microsoft has documented it "can use up to 110 characters." Joliet allows Unicode characters to be used for all text fields, which includes file names and the volume name. A "Secondary" volume descriptor with type 2 contains the same information as the Primary one (sector 16 offset 40 bytes), but in UCS-2BE in sector 17, offset 40 bytes. As a result of this, the volume name is limited to 16 characters. Many current PC operating systems are able to read Joliet-formatted media, thus allowing exchange of files between those operating systems even if non-Roman characters are involved (such as Arabic, Japanese or Cyrillic), which was formerly not possible with plain ISO 9660-formatted media. Operating systems which can read Joliet media include: Microsoft Windows; Microsoft recommends the use of the Joliet extension for developers targeting Windows. Linux macOS FreeBSD OpenSolaris Haiku AmigaOS RISC OS Romeo Romeo was developed by Adaptec and allows the use of long filenames up to 128 characters. However, Romeo is not backwards compatible with ISO 9660 and discs authored using this file system can only be read under the Windows 9x and Windows NT platforms, thus not allowing exchange of files between those operating systems if non-Roman characters are involved (such as Arabic, Japanese or Cyrillic), for example ü becomes ³. Apple extensions Apple Computer authored a set of extensions that add ProDOS or HFS/HFS+ (the primary contemporary file system for Mac OS) properties to the filesystem. Some of the additional metadata properties include: Date of last backup File type Creator code Flags and data for display Reference to a resource fork In order to allow non-Macintosh systems to access Macintosh files on CD-ROMs, Apple chose to use an extension of the standard ISO 9660 format. Most of the data, other than the Apple specific metadata, remains visible to operating systems that are able to read ISO 9660. Other extensions For operating systems which do not support any extensions, a name translation file TRANS.TBL must be used. The TRANS.TBL file is a plain ASCII text file. Each line contains three fields, separated by an arbitrary amount of whitespace: The file type ("F" for file or "D" for directory); The ISO 9660 filename (including the usually hidden ";1" for files); and The extended filename, which may contain spaces. Most implementations that create TRANS.TBL files put a single space between the file type and ISO 9660 name and some arbitrary number of tabs between the ISO 9660 filename and the extended filename. Native support for using TRANS.TBL still exists in many ISO 9660 implementations, particularly those related to Unix. However, it has long since been superseded by other extensions, and modern utilities that create ISO 9660 images either cannot create TRANS.TBL files at all, or no longer create them unless explicitly requested by the user. Since a TRANS.TBL file has no special identification other than its name, it can also be created separately and included in the directory before filesystem creation. The ISO 13490 standard is an extension to the ISO 9660 format that adds support for multiple sessions on a disc. Since ISO 9660 is by design a read-only, pre-mastered file system, all the data has to be written in one go or "session" to the medium. Once written, there is no provision for altering the stored
|
and others, by diverse gentlemen and others, with scheets after the manner of the Hollanders". Two weeks later, on 15 December 1662, Pepys accompanied the Duke of York, later King James II, on a skating outing: "To the Duke, and followed him in the Park, when, though the ice was broken, he would go slide upon his skates, which I did not like; but he slides very well." In 1711 Jonathan Swift still thinks the sport might be unfamiliar to his "Stella", writing to her: "Delicate walking weather; and the Canal and Rosamund's Pond full of the rabble and with skates, if you know what that is. The first organised skating club was the Edinburgh Skating Club, formed in the 1740s, (some claim the club was established as early as 1642).An early contemporary reference to the club appeared in the second edition (1783) of the Encyclopædia Britannica: From this description and others, it is apparent that the form of skating practiced by club members was indeed an early form of figure skating rather than speed skating. For admission to the club, candidates had to pass a skating test where they performed a complete circle on either foot (e.g., a figure eight), and then jumped over first one hat, then two and three, placed over each other on the ice. On the Continent, participation in ice skating was limited to members of the upper classes. Emperor Rudolf II of the Holy Roman Empire enjoyed ice skating so much, he had a large ice carnival constructed in his court in order to popularise the sport. King Louis XVI of France brought ice skating to Paris during his reign. Madame de Pompadour, Napoleon I, Napoleon III, and the House of Stuart were, among others, royal and upper-class fans of ice skating. The next skating club to be established was in London and was not founded until 1830. Members wore a silver skate hanging from their buttonhole and met on The Serpentine, Hyde Park on 27th December, 1830. By the mid-19th century, ice skating was a popular pastime among the British upper and middle classes—Queen Victoria became acquainted with her future husband, Prince Albert, through a series of ice skating trips. Albert continued to skate after their marriage and on falling through the ice was once rescued by Victoria and a lady in waiting from a stretch of water in the grounds of Buckingham Palace. Early attempts at the construction of artificial ice rinks were made during the "rink mania" of 1841–44. As the technology for the maintenance of natural ice did not exist, these early rinks used a substitute consisting of a mixture of hog's lard and various salts. An item in the 8 May 1844 issue of Littell's 'Living Age' headed the 'Glaciarium' reported that "This establishment, which has been removed to Grafton Street East' Tottenham Court Road, was opened on Monday afternoon. The area of artificial ice is extremely convenient for such as may be desirous of engaging in the graceful and manly pastime of skating." Emergence as a sport Skating became popular as a recreation, a means of transport and spectator sport in The Fens in England for people from all walks of life. Racing was the preserve of workers, most of them agricultural labourers. It is not known when the first skating matches were held, but by the early nineteenth century racing was well established and the results of matches were reported in the press. Skating as a sport developed on the lakes of Scotland and the canals of the Netherlands. In the 13th and 14th centuries wood was substituted for bone in skate blades, and in 1572 the first iron skates were manufactured. When the waters froze, skating matches were held in towns and villages all over the Fens. In these local matches men (or sometimes women or children) would compete for prizes of money, clothing, or food. The winners of local matches were invited to take part in the grand or championship matches, in which skaters from across the Fens would compete for cash prizes in front of crowds of thousands. The championship matches took the form of a Welsh main or "last man standing" contest (single-elimination tournament). The competitors, 16 or sometimes 32, were paired off in heats and the winner of each heat went through to the next round. A course of 660 yards was measured out on the ice, and a barrel with a flag on it placed at either end. For a one-and-a-half-mile race the skaters completed two rounds of the course, with three barrel turns. In the Fens, skates were called pattens, fen runners, or Whittlesey runners. The footstock was made of beechwood. A screw at the back was screwed into the heel of the boot, and three small spikes at the front kept the skate steady. There were holes in the footstock for leather straps to fasten it to the foot. The metal blades were slightly higher at the back than the front. In the 1890s, fen skaters started to race in Norwegian style skates. On Saturday 1 February 1879, a number of professional ice skaters from Cambridgeshire and Huntingdonshire met in the Guildhall, Cambridge, to set up the National Skating Association, the first national ice skating body in the world. The founding committee consisted of several landowners, a vicar, a fellow of Trinity College, a magistrate, two members of parliament, the mayor of Cambridge, the Lord Lieutenant of Cambridge, journalist James Drake Digby, the president of Cambridge University Skating Club, and Neville Goodman, a graduate of Peterhouse, Cambridge (and son of Potto Brown's milling partner, Joseph Goodman). The newly formed Association held their first one-and-a-half-mile British professional championship at Thorney in December 1879. Figure skating The first instructional book concerning ice skating was published in London in 1772. The book, written by a British artillery lieutenant, Robert Jones, describes basic figure skating forms such as circles and figure eights. The book was written solely for men, as women did not normally ice skate in the late 18th century. It was with the publication of this manual that ice skating split into its two main disciplines, speed skating and figure skating. The founder of modern figure skating as it is known today was Jackson Haines, an American. He was the first skater to incorporate ballet and dance movements into his skating, as opposed to focusing on tracing patterns on the ice. Haines also invented the sit spin and developed a shorter, curved blade for figure skating that allowed for easier turns. He was also the first to wear blades
|
it is apparent that the form of skating practiced by club members was indeed an early form of figure skating rather than speed skating. For admission to the club, candidates had to pass a skating test where they performed a complete circle on either foot (e.g., a figure eight), and then jumped over first one hat, then two and three, placed over each other on the ice. On the Continent, participation in ice skating was limited to members of the upper classes. Emperor Rudolf II of the Holy Roman Empire enjoyed ice skating so much, he had a large ice carnival constructed in his court in order to popularise the sport. King Louis XVI of France brought ice skating to Paris during his reign. Madame de Pompadour, Napoleon I, Napoleon III, and the House of Stuart were, among others, royal and upper-class fans of ice skating. The next skating club to be established was in London and was not founded until 1830. Members wore a silver skate hanging from their buttonhole and met on The Serpentine, Hyde Park on 27th December, 1830. By the mid-19th century, ice skating was a popular pastime among the British upper and middle classes—Queen Victoria became acquainted with her future husband, Prince Albert, through a series of ice skating trips. Albert continued to skate after their marriage and on falling through the ice was once rescued by Victoria and a lady in waiting from a stretch of water in the grounds of Buckingham Palace. Early attempts at the construction of artificial ice rinks were made during the "rink mania" of 1841–44. As the technology for the maintenance of natural ice did not exist, these early rinks used a substitute consisting of a mixture of hog's lard and various salts. An item in the 8 May 1844 issue of Littell's 'Living Age' headed the 'Glaciarium' reported that "This establishment, which has been removed to Grafton Street East' Tottenham Court Road, was opened on Monday afternoon. The area of artificial ice is extremely convenient for such as may be desirous of engaging in the graceful and manly pastime of skating." Emergence as a sport Skating became popular as a recreation, a means of transport and spectator sport in The Fens in England for people from all walks of life. Racing was the preserve of workers, most of them agricultural labourers. It is not known when the first skating matches were held, but by the early nineteenth century racing was well established and the results of matches were reported in the press. Skating as a sport developed on the lakes of Scotland and the canals of the Netherlands. In the 13th and 14th centuries wood was substituted for bone in skate blades, and in 1572 the first iron skates were manufactured. When the waters froze, skating matches were held in towns and villages all over the Fens. In these local matches men (or sometimes women or children) would compete for prizes of money, clothing, or food. The winners of local matches were invited to take part in the grand or championship matches, in which skaters from across the Fens would compete for cash prizes in front of crowds of thousands. The championship matches took the form of a Welsh main or "last man standing" contest (single-elimination tournament). The competitors, 16 or sometimes 32, were paired off in heats and the winner of each heat went through to the next round. A course of 660 yards was measured out on the ice, and a barrel with a flag on it placed at either end. For a one-and-a-half-mile race the skaters completed two rounds of the course, with three barrel turns. In the Fens, skates were called pattens, fen runners, or Whittlesey runners. The footstock was made of beechwood. A screw at the back was screwed into the heel of the boot, and three small spikes at the front kept the skate steady. There were holes in the footstock for leather straps to fasten it to the foot. The metal blades were slightly higher at the back than the front. In the 1890s, fen skaters started to race in Norwegian style skates. On Saturday 1 February 1879, a number of professional ice skaters from Cambridgeshire and Huntingdonshire met in the Guildhall, Cambridge, to set up the National Skating Association, the first national ice skating body in the world. The founding committee consisted of several landowners, a vicar, a fellow of Trinity College, a magistrate, two members of parliament, the mayor of Cambridge, the Lord Lieutenant of Cambridge, journalist James Drake Digby, the president of Cambridge University Skating Club, and Neville Goodman, a graduate of Peterhouse, Cambridge (and son of Potto Brown's milling partner, Joseph Goodman). The newly formed Association held their first one-and-a-half-mile British professional championship at Thorney in December 1879. Figure skating The first instructional book concerning ice skating was published in London in 1772. The book, written by a British artillery lieutenant, Robert Jones, describes basic figure skating forms such as circles and figure eights. The book was written solely for men, as women did not normally ice skate in the late 18th century. It was with the publication of this manual that ice skating split into its two main disciplines, speed skating and figure skating. The founder of modern figure skating as it is known today was Jackson Haines, an American. He was the first skater to incorporate ballet and dance movements into his skating, as opposed to focusing on tracing patterns on the ice. Haines also invented the sit spin and developed a shorter, curved blade for figure skating that allowed for easier turns. He was also the first to wear blades that were permanently attached to the boot. The International Skating Union was founded in 1892 as the first international ice skating organisation in Scheveningen, in the Netherlands.
|
Olympic Foundation (Lausanne, Switzerland) IOC Television and Marketing Services S.A. (Lausanne, Switzerland) The Olympic Partner Programme (Lausanne, Switzerland) Olympic Broadcasting Services S.A. (Lausanne, Switzerland) Olympic Broadcasting Services S.L. (Madrid, Spain) Olympic Channel Services S.A. (Lausanne, Switzerland) Olympic Channel Services S.L. (Madrid, Spain) Olympic Foundation for Culture and Heritage (Lausanne, Switzerland) IOC Heritage Management Olympic Studies Centre Olympic Museum International Programmes for Arts, Culture and Education Olympic Solidarity (Lausanne, Switzerland) Honours In addition to the Olympic medals for competitors, the IOC awards a number of other honours. The Pierre de Coubertin medal is awarded to athletes who demonstrate a special spirit of sportsmanship in Olympic events The Olympic Cup is awarded to institutions or associations with a record of merit and integrity in actively developing the Olympic Movement The Olympic Order is awarded to individuals for exceptionally distinguished contributions to the Olympic Movement; superseded the Olympic Certificate The Olympic Laurel is awarded to individuals for promoting education, culture, development, and peace through sport The Olympic town status has been given to some towns that have been particularly important for the Olympic Movement IOC members For most of its existence, the IOC was controlled by members who were selected by other members. Countries that had hosted the Games were allowed two members. When named, they did not become the representatives of their respective countries to the IOC, but rather the opposite, IOC members in their respective countries. Oath of the International Olympic Committee "Granted the honour of becoming a member of the International Olympic Committee and declaring myself aware of my responsibilities in such a capacity, I undertake to serve the Olympic Movement to the very best of my ability; to respect and ensure the respect of all the provisions of the Olympic Charter and the decisions of the International Olympic Committee which I consider as not the subject to appeal on my part; to comply with the code of ethics to keep myself free from any political or commercial influence and from any racial or religious consideration; to fight against all other forms of discrimination; and to promote in all circumstances the interests of the International Olympic Committee and those of the Olympic Movement." Cessation of membership The membership of IOC members ceases in the following circumstances: Resignation: any IOC member may cease their membership at any time by delivering a written resignation to the President. Non re-election: any IOC member ceases to be a member without further formality if they are not re-elected. Age limit: any IOC member ceases to be a member at the end of the calendar year during which they reach the age of 70 or 80. Any member who joined in the 1900s ceases to be a member at age 80 and any member who joined in the 2000s ceases to be a member at age 70. Failure to attend Sessions or take active part in IOC work for two consecutive years. Transfer of domicile or of main center of interests to a country other than the country which was theirs at the time of their election. Members elected as active athletes cease to be a member upon ceasing to be a member of the IOC Athletes' Commission. Presidents and individuals holding an executive or senior leadership position within NOCs, world or continental associations of NOCs, IFs or associations of IFs, or other organisations recognised by the IOC cease to be a member upon ceasing to exercise the function they were exercising at the time of their election. Expulsion: an IOC member may be expelled by decision of the Session if such member has betrayed their oath or if the Session considers that such member has neglected or knowingly jeopardised the interests of the IOC or acted in a way which is unworthy of the IOC. Sports federations recognised by IOC There are currently 82 international sports federations (IFs) recognised by the IOC. These are: The 33 members of Association of Summer Olympic International Federations (ASOIF) The 7 members of Association of International Olympic Winter Sports Federations (AIOWF) The 42 members of Association of IOC Recognised International Sports Federations (ARISF) Olympic marketing During the first half of the 20th century the IOC ran on a small budget. As president of the IOC from 1952 to 1972, Avery Brundage rejected all attempts to link the Olympics with commercial interest. Brundage believed the lobby of corporate interests would unduly impact the IOC's decision-making. Brundage's resistance to this revenue stream meant the IOC left organising committees to negotiate their own sponsorship contracts and use the Olympic symbols. When Brundage retired the IOC had US$2 million in assets; eight years later the IOC coffers had swelled to US$45 million. This was primarily due to a shift in ideology toward expansion of the Games through corporate sponsorship and the sale of television rights. When Juan Antonio Samaranch was elected IOC president in 1980 his desire was to make the IOC financially independent. Samaranch appointed Canadian IOC member Richard Pound to lead the initiative as Chairman of the "New Sources of Finance Commission". In 1982 the IOC drafted International Sport and Leisure, a Swiss sports marketing company, to develop a global marketing programme for the Olympic Movement. ISL successfully developed the programme but was replaced by Meridian Management, a company partly owned by the IOC in the early 1990s. In 1989, one of the staff members at ISL Marketing, Michael Payne, moved to the IOC and became the organisation's first marketing director. However ISL and subsequently Meridian, continued in the established role as the IOC's sales and marketing agents until 2002. In collaboration with ISL Marketing and subsequently Meridian Management, Payne made major contributions to the creation of a multibillion-dollar sponsorship marketing programme for the organisation which, along with improvements in TV marketing and improved financial management, helped to restore the IOC's financial viability. Revenue The Olympic Movement generates revenue through five major programmes. Broadcast partnerships, managed by the IOC. Commercial sponsorship, organised through the IOC's worldwide TOP programme. Domestic sponsorship, managed by the Organising Committees for the Olympic Games (OCOGs). Ticketing. Licensing programmes within the host country. The OCOGs have responsibility for the domestic sponsorship, ticketing and licensing programmes, under the direction of the IOC. The Olympic Movement generated a total of more than US$4 billion (€2.5 billion) in revenue during the Olympic quadrennium from 2001 to 2004. Revenue distribution The IOC distributes some of the Olympic marketing revenue to organisations throughout the Olympic Movement to support the staging of the Olympic Games and to promote the worldwide development of sport. The IOC retains approximately 10% of the Olympic marketing revenue for the operational and administrative costs of governing the Olympic Movement. For the 2013-2016 period, the IOC had revenues of about US$5.0 billion, of which 73% were from broadcasting rights and 18% were from The Olympic Partners. The Rio 2016 organising committee received US$1.5 billion and the Sochi 2014 organising committee received 833 million. National Olympic committees and international federations received US$739 million each. Organizing Committees for the Olympic Games The IOC provides TOP programme contributions and Olympic broadcast revenue to the OCOGs to support the staging of the Summer Olympic Games and the Winter Olympic Games: TOP programme revenue to OCOGs: the two OCOGs of each Olympic quadrennium generally share approximately 50% of TOP programme revenue and value-in-kind contributions, with approximately 30% provided to the summer OCOG and 20% provided to the winter OCOG. Broadcast revenue to OCOGs: the IOC contributes 49% of the Olympic broadcast revenue for each Games to the OCOG. During the 2001–2004 Olympic quadrennium, the Salt Lake 2002 Organizing Committee received US$443 million, €395 million in broadcast revenue from the IOC, and the Athens 2004 Organizing Committee received US$732 million, €690 million. Domestic programme revenue to OCOGs: the OCOGs generate substantial revenue from the domestic marketing programmes that they manage within the host country, including domestic sponsorship, ticketing and licensing. National Olympic Committees The NOCs receive financial support for the training and development of Olympic teams, Olympic athletes and Olympic hopefuls. The IOC distributes TOP programme revenue to each of the NOCs throughout the world. The IOC also contributes Olympic broadcast revenue to Olympic Solidarity, an IOC organisation that provides financial support to NOCs with the greatest need. The continued success of the TOP programme and Olympic broadcast agreements has enabled the IOC to provide increased support for the NOCs with each Olympic quadrennium. The IOC provided approximately US$318.5 million to NOCs for the 2001–2004 quadrennium. International Olympic Sports Federations The IOC is now the largest single revenue source for the majority of IFs, with its contributions of Olympic broadcast revenue that assist the IFs in the development of their respective sports worldwide. The IOC provides financial support from Olympic broadcast revenue to the 28 IFs of Olympic summer sports and the seven IFs of Olympic winter sports after the completion of the Summer Olympics and the Winter Olympics, respectively. The continually increasing value of Olympic broadcast partnership has enabled the IOC to deliver substantially increased financial support to the IFs with each successive Games. The seven winter sports IFs shared US$85.8 million, €75 million in Salt Lake 2002 broadcast revenue. The contribution to the 28 summer sports IFs from Athens 2004 broadcast revenue has not yet been determined, but the contribution is expected to mark a significant increase over the US$190 million, €150 million that the IOC provided to the summer IFs following Sydney 2000. Other organisations The IOC contributes Olympic marketing revenue to the programmes of various recognised international sports organisations, including the International Paralympic Committee (IPC), and the World Anti-Doping Agency (WADA). The Olympic Partner programme The Olympic Partner (TOP) sponsorship programme includes the following commercial sponsors of the Olympic Games. Airbnb Allianz Alibaba Group Atos Bridgestone Coca-Cola Dow Chemical Company (to 2020) General Electric (to 2020) Intel Mengniu Dairy (joint partnership with Coca-Cola) Omega SA (previously The Swatch Group, its parent company) Panasonic Procter & Gamble Samsung Toyota Visa Inc. Environmental concerns The IOC recognises that the Olympic Games demand substantial environmental resources, activities, and construction projects that could be detrimental to a host city's environment. In 1995, IOC President Juan Antonio Samaranch stated, "the International Olympic Committee is resolved to ensure that the environment becomes the third dimension of the organization of the Olympic Games, the first and second being sport and culture." Acting on this statement, in 1996 the IOC added the "environment" as a third pillar to its vision for the Olympic Games. The IOC requires cities bidding to host the Olympics to provide a comprehensive strategy to protect the environment in preparation for hosting, and following the conclusion of the Games. This initiative was most notably acted upon in 2000, when the "Green Olympics" effort was developed by the Beijing Organizing Committee for the Beijing Olympic Games. The Beijing 2008 Summer Olympics effort to host environmentally friendly games resulted in over 160 projects meeting the goal of "green" games through improved air quality and water quality, implementation of sustainable energy sources, improved waste management, and environmental education. These projects included industrial plant relocation or closure, furnace replacement, introduction of new emission standards, and more strict traffic control. Most of these measures were adopted on a temporary basis, and although real improvements were realized (particularly in air quality), most of these improvements had disappeared one year following the Games. Although these improvements were short lived, IOC's inclusion of environmental policies in evaluating and selecting host cities demonstrates a corporate responsibility that may be built upon in years to come. Detailed frameworks for environmental sustainability have been released for the 2018 Winter Olympics, and 2020 Summer Olympics in PyeongChang, South Korea, and Tokyo, Japan, respectively. IOC approaches The IOC has four major approaches to addressing environmental health concerns during the construction and competitions of the Olympic Games. First, the IOC Sustainability and Legacy Commission focuses on how the IOC can improve the strategies and policies associated with environmental health throughout the process of cities hosting the Olympic Games. Secondly, every candidate city must provide information to the IOC on environmental health issues like air quality and environmental impact assessments. Thirdly, every host city is given the option to declare "pledges" to address specific or general environmental health concerns of hosting the Olympic Game. Fourthly, the IOC has every host city collaborate with the United Nations to work towards addressing environmental health objectives. Ultimately, the IOC uses these four major approaches in an attempt to minimize the negative environmental health concerns of a host city. Venue construction effects on air Cities hosting the Olympic Games have two primary concerns: traffic congestion and air pollution, both of which can result in compromised air quality during and after Olympic venue construction. Research at the Beijing Olympic Games identified particulate matter – measured in terms of PM10 (the amount of aerodynamic diameter of particle≤10 μm in a given amount of air) – as a top priority that should be taken into consideration. The particulate matter in the air, along with other airborne pollutants, cause both serious health problems, such as asthma, and contribute to the deterioration of urban ecosystems. Black Carbon is released into the air from incomplete combustion of carbonaceous fluids contributing to global climate change and human health effects. The black carbon concentrations are highly impacted by the truck traffic due to the traffic congestion during the massive construction. Additionally, secondary pollutants like CO, NOx, SO2, benzene, toluene, ethylbenzene, and xylenes (BTEX) are also released during the venue construction, resulting in harmful effects to the environment. Methods to measure particulates in the air Environmental magnetic methods have been established as a successful way of measuring the degree of pollution in air, water and soil. Environmental magnetism is sensitive to particle size, and has proven effective even at low detection levels. For these reasons, it is becoming more widely used. Measures taken to improve air quality Various air quality measures are undertaken before and after the Olympic Games. Research studies demonstrate that the primary method to reduce concentrations of air pollutants is traffic control, including barring heavy vehicles from the roads. For the Beijing Olympics, vehicles not meeting the Euro 1 emission standards were also banned from the roads, and the odd-even rule was implemented in the Beijing administrative area. Additional air quality improvement measures include replacing coal with natural gas, suspending construction and/or imposing strict dust control on construction sites, closing or relocating the polluting industrial plants, building long subway lines, using cleaner fluid in power plants, and reducing the activity by some of the polluting factories. These were several air quality improvement measures implemented by the Beijing government. There, levels of primary and secondary pollutants were reduced, and good air quality was recorded during the Beijing Olympics on most of the days. Venue construction effects on soil Soil contamination can occur during the process of constructing the Olympic venues. In the case of the 2006 Winter Olympic Games in Torino, Italy, negative environmental impacts were observed, including impacts on soil. Before the Games, researchers studied four areas which the Games would likely affect: a floodplain, a highway, the motorway connecting the city to Lyon, France, and a landfill. They performed an extensive analysis in the types of chemicals found in the soils in these areas both before and after the Games. Their findings revealed an increase in the number of metals in the topsoils post-Games, and indicated that soil was capable, as part of an ecosystem, of negating, or "buffering," the effects of many heavy metals. However, their findings also revealed that this was not the case for all metals, and that mercury, lead, and arsenic may have been transferred into the food chain on a massive scale. One of the promises made to Londoners when they won the right to host the 2012 Olympic Games was that the Olympic Park would be a "blueprint for sustainable living." However, residents of the allotments of Manor Road were relocated, due to the building of the Olympic stadium, and would later disagree that the Olympics had had any positive effect on their lives. Allotments, originally, were intended to provide low-income residents with a plot of land on which to grow their own food, thus receiving the dual health benefits of a supply of fresh food and outdoor work. Many of these sites were lost as a result of the Olympic venue construction, most notably the Manor Road site. Residents were promised that the allotments would be returned, and they eventually were. However, the soil quality would never be the same. Crops tended by allotment residents were the result of years of careful cultivation, and thus, those years of care and attention were destroyed by a bulldozer. Further, allotment residents were exposed to radioactive waste for five months prior to moving, during the excavation of the site for the Games. Other local residents, construction workers, and onsite archeologists faced similar exposures and risks. In contrast, the Sydney Olympic Games of 2000 provided an opportunity to improve a highly contaminated area known as the Homebush Bay site. A study commissioned by the New South Wales Government Olympic Coordination Authority, which was responsible for the Games' site preparation, looked at soil contamination prior to the Games. The work assessed soils that had been previously impacted by waste and identified areas that could pose a risk to the environment. Soil metal concentrations were found to be high enough to potentially contaminate groundwater. After risk areas were identified, a remediation strategy was developed. Contaminated soil was consolidated into four containment areas within the site, which left the remaining areas available for recreational use. Also, the contained waste materials no longer posed a threat to surrounding aquifers. Sydney's winning Olympic bid provided a catalyst to undertake the "greenest" single urban remediation ever attempted in Australia. Venue construction effects on water The Olympic Games can affect water quality in the surrounding region in several ways, including water runoff and the transfer of polluting substances from the air to water sources through rainfall. Harmful particulates come from both natural substances (such as plant matter crushed by higher volumes of pedestrian and vehicle traffic) and man-made substances (such as exhaust from vehicles or industry). Contaminants from these two categories lead to elevated amounts of toxins in street dust. Street dust then reaches water sources through runoff, facilitating the transfer of toxins to environments and communities that rely on these water sources. For example, one method of measuring the runoff contamination of water sources involves magnetism. Magnetism measurement systems allow specialists to measure the differences in mineral magnetic parameters in samples of water, air, and vegetation. Unlike traditional methods of measuring pollutants, magnetism is relatively inexpensive, and can identify smaller particle sizes. Another method used to assess the amount and effects of water pollutants is to measure the amount of PM2.5 in rainfall. Measuring PM2.5 (the amount of aerodynamic diameter of particle≤2.5 μm in a given amount of air) is a common metric for assessing air quality. Comparing PM2.5 levels between air and rainfall samples allows scientists to determine the amount of air pollution being transferred to water sources. Pollutants in rainfall quickly and directly affect pollution in groundwater sources. In 2013, researchers in Beijing found a significant relationship between the amount of PM2.5 concentrations in the air and in rainfall. Studies showed that rainfall had a significant "washing" effect on PM2.5 in the air, transferring a large portion of these pollutants from the air to water sources. In this way, Beijing's notorious air pollution has a direct and significant impact on rainfall, and therefore, on water resources throughout the region. Controversies Amateurism and professionalism Pierre de Coubertin, founder of the IOC, was influenced by the ethos of the aristocracy as exemplified in the English public schools. The public schools subscribed to the belief that sport formed an important part of education and there was a prevailing concept of fairness in which practicing or training was considered cheating. As class structure evolved through the 20th century, the definition of the amateur athlete as an aristocratic gentleman became outdated. The advent of the state-sponsored "full-time amateur athlete" of the Eastern Bloc countries further eroded the ideology of the pure amateur, as it put the self-financed amateurs of the Western countries at a disadvantage. The Soviet Union entered teams of athletes who were all nominally students, soldiers, or working in a profession, but many of whom were in reality paid by the state to train on a full-time basis. Nevertheless, the IOC held to the traditional rules regarding amateurism. Near the end of the 1960s, the Canadian Amateur Hockey Association (CAHA) felt their amateur players could no longer be competitive against the Soviet team's full-time athletes and the other constantly improving European teams. They pushed for the ability to use players from professional leagues but met opposition from the IIHF and IOC. At the IIHF Congress in 1969, the IIHF decided to allow Canada to use nine non-NHL professional hockey players at the 1970 World Championships in Montreal and Winnipeg, Manitoba, Canada. The decision was reversed in January 1970 after Brundage said that ice hockey's status as an Olympic sport would be in jeopardy if the change was made. In response, Canada withdrew from international ice hockey competition and
|
process of cities hosting the Olympic Games. Secondly, every candidate city must provide information to the IOC on environmental health issues like air quality and environmental impact assessments. Thirdly, every host city is given the option to declare "pledges" to address specific or general environmental health concerns of hosting the Olympic Game. Fourthly, the IOC has every host city collaborate with the United Nations to work towards addressing environmental health objectives. Ultimately, the IOC uses these four major approaches in an attempt to minimize the negative environmental health concerns of a host city. Venue construction effects on air Cities hosting the Olympic Games have two primary concerns: traffic congestion and air pollution, both of which can result in compromised air quality during and after Olympic venue construction. Research at the Beijing Olympic Games identified particulate matter – measured in terms of PM10 (the amount of aerodynamic diameter of particle≤10 μm in a given amount of air) – as a top priority that should be taken into consideration. The particulate matter in the air, along with other airborne pollutants, cause both serious health problems, such as asthma, and contribute to the deterioration of urban ecosystems. Black Carbon is released into the air from incomplete combustion of carbonaceous fluids contributing to global climate change and human health effects. The black carbon concentrations are highly impacted by the truck traffic due to the traffic congestion during the massive construction. Additionally, secondary pollutants like CO, NOx, SO2, benzene, toluene, ethylbenzene, and xylenes (BTEX) are also released during the venue construction, resulting in harmful effects to the environment. Methods to measure particulates in the air Environmental magnetic methods have been established as a successful way of measuring the degree of pollution in air, water and soil. Environmental magnetism is sensitive to particle size, and has proven effective even at low detection levels. For these reasons, it is becoming more widely used. Measures taken to improve air quality Various air quality measures are undertaken before and after the Olympic Games. Research studies demonstrate that the primary method to reduce concentrations of air pollutants is traffic control, including barring heavy vehicles from the roads. For the Beijing Olympics, vehicles not meeting the Euro 1 emission standards were also banned from the roads, and the odd-even rule was implemented in the Beijing administrative area. Additional air quality improvement measures include replacing coal with natural gas, suspending construction and/or imposing strict dust control on construction sites, closing or relocating the polluting industrial plants, building long subway lines, using cleaner fluid in power plants, and reducing the activity by some of the polluting factories. These were several air quality improvement measures implemented by the Beijing government. There, levels of primary and secondary pollutants were reduced, and good air quality was recorded during the Beijing Olympics on most of the days. Venue construction effects on soil Soil contamination can occur during the process of constructing the Olympic venues. In the case of the 2006 Winter Olympic Games in Torino, Italy, negative environmental impacts were observed, including impacts on soil. Before the Games, researchers studied four areas which the Games would likely affect: a floodplain, a highway, the motorway connecting the city to Lyon, France, and a landfill. They performed an extensive analysis in the types of chemicals found in the soils in these areas both before and after the Games. Their findings revealed an increase in the number of metals in the topsoils post-Games, and indicated that soil was capable, as part of an ecosystem, of negating, or "buffering," the effects of many heavy metals. However, their findings also revealed that this was not the case for all metals, and that mercury, lead, and arsenic may have been transferred into the food chain on a massive scale. One of the promises made to Londoners when they won the right to host the 2012 Olympic Games was that the Olympic Park would be a "blueprint for sustainable living." However, residents of the allotments of Manor Road were relocated, due to the building of the Olympic stadium, and would later disagree that the Olympics had had any positive effect on their lives. Allotments, originally, were intended to provide low-income residents with a plot of land on which to grow their own food, thus receiving the dual health benefits of a supply of fresh food and outdoor work. Many of these sites were lost as a result of the Olympic venue construction, most notably the Manor Road site. Residents were promised that the allotments would be returned, and they eventually were. However, the soil quality would never be the same. Crops tended by allotment residents were the result of years of careful cultivation, and thus, those years of care and attention were destroyed by a bulldozer. Further, allotment residents were exposed to radioactive waste for five months prior to moving, during the excavation of the site for the Games. Other local residents, construction workers, and onsite archeologists faced similar exposures and risks. In contrast, the Sydney Olympic Games of 2000 provided an opportunity to improve a highly contaminated area known as the Homebush Bay site. A study commissioned by the New South Wales Government Olympic Coordination Authority, which was responsible for the Games' site preparation, looked at soil contamination prior to the Games. The work assessed soils that had been previously impacted by waste and identified areas that could pose a risk to the environment. Soil metal concentrations were found to be high enough to potentially contaminate groundwater. After risk areas were identified, a remediation strategy was developed. Contaminated soil was consolidated into four containment areas within the site, which left the remaining areas available for recreational use. Also, the contained waste materials no longer posed a threat to surrounding aquifers. Sydney's winning Olympic bid provided a catalyst to undertake the "greenest" single urban remediation ever attempted in Australia. Venue construction effects on water The Olympic Games can affect water quality in the surrounding region in several ways, including water runoff and the transfer of polluting substances from the air to water sources through rainfall. Harmful particulates come from both natural substances (such as plant matter crushed by higher volumes of pedestrian and vehicle traffic) and man-made substances (such as exhaust from vehicles or industry). Contaminants from these two categories lead to elevated amounts of toxins in street dust. Street dust then reaches water sources through runoff, facilitating the transfer of toxins to environments and communities that rely on these water sources. For example, one method of measuring the runoff contamination of water sources involves magnetism. Magnetism measurement systems allow specialists to measure the differences in mineral magnetic parameters in samples of water, air, and vegetation. Unlike traditional methods of measuring pollutants, magnetism is relatively inexpensive, and can identify smaller particle sizes. Another method used to assess the amount and effects of water pollutants is to measure the amount of PM2.5 in rainfall. Measuring PM2.5 (the amount of aerodynamic diameter of particle≤2.5 μm in a given amount of air) is a common metric for assessing air quality. Comparing PM2.5 levels between air and rainfall samples allows scientists to determine the amount of air pollution being transferred to water sources. Pollutants in rainfall quickly and directly affect pollution in groundwater sources. In 2013, researchers in Beijing found a significant relationship between the amount of PM2.5 concentrations in the air and in rainfall. Studies showed that rainfall had a significant "washing" effect on PM2.5 in the air, transferring a large portion of these pollutants from the air to water sources. In this way, Beijing's notorious air pollution has a direct and significant impact on rainfall, and therefore, on water resources throughout the region. Controversies Amateurism and professionalism Pierre de Coubertin, founder of the IOC, was influenced by the ethos of the aristocracy as exemplified in the English public schools. The public schools subscribed to the belief that sport formed an important part of education and there was a prevailing concept of fairness in which practicing or training was considered cheating. As class structure evolved through the 20th century, the definition of the amateur athlete as an aristocratic gentleman became outdated. The advent of the state-sponsored "full-time amateur athlete" of the Eastern Bloc countries further eroded the ideology of the pure amateur, as it put the self-financed amateurs of the Western countries at a disadvantage. The Soviet Union entered teams of athletes who were all nominally students, soldiers, or working in a profession, but many of whom were in reality paid by the state to train on a full-time basis. Nevertheless, the IOC held to the traditional rules regarding amateurism. Near the end of the 1960s, the Canadian Amateur Hockey Association (CAHA) felt their amateur players could no longer be competitive against the Soviet team's full-time athletes and the other constantly improving European teams. They pushed for the ability to use players from professional leagues but met opposition from the IIHF and IOC. At the IIHF Congress in 1969, the IIHF decided to allow Canada to use nine non-NHL professional hockey players at the 1970 World Championships in Montreal and Winnipeg, Manitoba, Canada. The decision was reversed in January 1970 after Brundage said that ice hockey's status as an Olympic sport would be in jeopardy if the change was made. In response, Canada withdrew from international ice hockey competition and officials stated that they would not return until "open competition" was instituted. Beginning in the 1970s, amateurism requirements were gradually phased out of the Olympic Charter. After the 1988 Games, the IOC decided to make all professional athletes eligible for the Olympics, subject to the approval of the IFs. 1976 Winter Olympics (Denver, Colorado) The cities of Denver, Colorado, United States; Sion, Switzerland; Tampere, Finland; and Vancouver (with the Garibaldi mountains), Canada, made bids for the 1976 Winter Olympics. The Games were originally awarded to Denver on 12 May 1970, but a rise in costs led to Colorado voters' rejection on 7 November 1972, by a 3 to 2 margin, of a $5 million bond issue to finance the Games with public funds. Denver officially withdrew on 15 November, and the IOC then offered the Games to Whistler, British Columbia, Canada, but they too declined, owing to a change of government following elections. Whistler would go on to be associated with neighbouring Vancouver's successful bid for the 2010 Games. Salt Lake City, Utah, a 1972 Winter Olympics final candidate who would eventually host the 2002 Winter Olympics, offered itself as a potential host after the withdrawal of Denver. The IOC, still reeling from the Denver rejection, declined the offer from Salt Lake City and, on 5 February 1973, selected Innsbruck to host the 1976 Winter Olympics, the same city that had hosted the Games twelve years earlier. 2002 bid A scandal broke on 10 December 1998, when Swiss IOC member Marc Hodler, head of the coordination committee overseeing the organisation of the 2002 Games, announced that several members of the IOC had taken gifts. Although nothing strictly illegal had been done, it was felt that the acceptance of the gifts was morally dubious. Soon four independent investigations were underway: by the IOC, the United States Olympic Committee (USOC), the SLOC, and the United States Department of Justice. Before any of the investigations could even get under way, Tom Welch and David Johnson, the co-heads of the SLOC, both resigned their posts. Many others soon followed. The Department of Justice filed charges against the two: fifteen counts of bribery and fraud. As a result of the investigation, ten members of the IOC were expelled and another ten were sanctioned. Stricter rules were adopted for future bids, and caps were put into place as to how much IOC members could accept from bid cities. Additionally, new term and age limits were put into place for IOC membership, and fifteen former Olympic athletes were added to the committee. From sporting and business standpoints, however, Salt Lake 2002 was one of the most successful Winter Olympiads in history; records were set in both the broadcasting and marketing programs. Over 2 billion viewers watched more than 13 billion viewer-hours. The Games were also financially successful raising more money with fewer sponsors than any prior Olympic Games, which left SLOC with a surplus of $40 million. The surplus was used to create the Utah Athletic Foundation, which maintains and operates many of the remaining Olympic venues. Sex verification controversies Sex verification is a practice used by Olympic and other sporting institutions to ensure participants compete only in categories for their sex. Verifying the sex of Olympic participants dates back to ancient Greece when Kallipateira attempted to break Greek law by dressing as a man to enter the arena as a trainer. After she was discovered a new policy was erected wherein trainers, just as athletes, were made to attend naked in order to better assure all were male. In more recent history, sex verification has taken many forms and been subject to dispute within various societal spheres. Before mandatory sex testing, Olympic officials relied on “nude parades” and doctor's notes. Successful women athletes perceived to be masculine were most likely to be targeted for inspection. In 1968, the International Olympic Committee (IOC) implemented compulsory sex verification at the Grenoble Winter Games where a lottery system was used to determine who would be inspected with a Barr body test. The scientific community also found fault in this policy for different reasons. The use of the Barr body test was evaluated by fifteen geneticists who unanimously agreed it was scientifically invalid. By the 1970s this method was replaced with PCR testing, as well as evaluating other factors including brain anatomy and behaviour in order to verify sex. Following continued backlash against mandatory sex testing of both forms, the IOC's Athletes' Commission successfully advocated for the end of the practice in 1999. Although sex testing was no longer mandated by IOC policy, women who did not present as feminine enough continued to be inspected based on suspicion in the 2000, 2004, and 2008 Summer Games. By 2011 the IOC created a Hyperandrogenism Regulation, which aimed to standardize natural testosterone levels in women athletes. This transition in sex testing was to assure a fairness within female categories. This was due to the belief that higher testosterone levels increased athletic ability and gave unfair advantages to certain women including intersex and transgender competitors. Any female athlete flagged for suspicion and whose testosterone surpassed regulation levels, was prohibited from competing until medical treatment brought their hormone levels within the standardized amounts. It has been argued by press, scholars, and politicians that some ethnicities are disproportionately impacted by this regulation and it has been alleged that the rule endorses hegemonic gender norms. Most notable cases of competition bans due to sex testing results are as follows: Maria José Martínez-Patiño (1985), Santhi Soundarajan (2006), Caster Semenya (2009), Annet Negesa (2012), and Dutee Chand (2014). In 2014 Dutee Chand was banned from competing internationally after being found to be in violation of the Hyperandrogenism Regulation. Following the decision of her appeal by the Court of Arbitration for Sport, the IOC suspended the policy for the 2016 and 2018 Games. Press advocated for the continued suspension of sex verification practices for the 2020 Tokyo Games. Other controversies: 2006–2013 In 2006, a report ordered by the Nagano region's governor said the Japanese city provided millions of dollars in an "illegitimate and excessive level of hospitality" to IOC members, including $4.4 million spent on entertainment alone. Earlier reports put the figure at approximately $14 million. The precise figures are unknown since Nagano, after the IOC asked that the entertainment expenditures not be made public, destroyed the financial records. International groups attempted to pressure the IOC to reject Beijing's bid in protest of the state of human rights in the People's Republic of China. One Chinese dissident who expressed similar sentiments was arrested and sentenced to two years in prison for calling on the IOC to do just that at the same time that IOC inspectors were touring the city. Amnesty International expressed concern in 2006 regarding the Olympic Games to be held in China in 2008, likewise expressing concerns over the human rights situation. The second principle in the Fundamental Principles of Olympism, Olympic Charter states that "The goal of Olympism is to place sport at the service of the harmonious development of man, with a view to promoting a peaceful society concerned with the preservation of human dignity." Amnesty International considers the policies and practices of the People's Republic as failing to meet that principle, and urged the IOC to press China to immediately enact human rights reform. In August 2008, the IOC issued DMCA take down notices on Tibetan Protest videos of the Beijing Olympics hosted on YouTube. YouTube and the Electronic Frontier Foundation (EFF) both pushed back against the IOC, which then withdrew their complaint. In 2010, the IOC was nominated for the Public Eye Awards. This award seeks to present "shame-on-you-awards to the nastiest corporate players of the year". Before the start of the 2012 Olympic Games, the IOC decided not to hold a minute of silence to honor the 11 Israeli Olympians who were killed 40 years prior in the Munich Massacre. Jacques Rogge, the then-IOC President, said it would be "inappropriate" to do so. Speaking of the decision, Israeli Olympian Shaul Ladany, who had survived the Munich Massacre, commented: "I do not understand. I do not understand, and I do not accept it". In February 2013, the IOC did not include wrestling as one of its core Olympic sports for the Summer Olympic programme for the 2020 Olympics. This decision was poorly received by the sporting and wrestling community. Wrestling was still part of the programme at the 2016 Summer Olympics in Rio de Janeiro. This decision was later overturned, and wrestling was a part of the 2020 Olympic Games in Tokyo. Russian doping scandal Media attention began growing in December 2014 when German broadcaster ARD reported on state-sponsored doping in Russia, comparing it to doping in East Germany. In November 2015, the World Anti-Doping Agency (WADA) published a report and the International Association of Athletics Federations (IAAF) suspended Russia indefinitely from world track and field events. The United Kingdom Anti-Doping agency later assisted WADA with testing in Russia. In June 2016, they reported that they were unable to fully carry out their work and noted intimidation by armed Federal Security Service (FSB) agents. After a Russian former lab director made allegations about the 2014 Winter Olympics in Sochi, WADA commissioned an independent investigation led by Richard McLaren. McLaren's investigation found corroborating evidence, concluding in a report published in July 2016 that the Ministry of Sport and the FSB had operated a "state-directed failsafe system" using a "disappearing positive [test] methodology" (DPM) from "at least late 2011 to August 2015". In response to these findings, WADA announced that RUSADA should be regarded as non-compliant with respect to the World Anti-Doping Code and recommended that Russia be banned from competing at the 2016 Summer Olympics. The IOC rejected the recommendation, stating that a separate decision would be made for each athlete by the relevant IF and the IOC, based on the athlete's individual circumstances. One day prior to the opening ceremony, 270 athletes were cleared to compete under the Russian flag, while 167 were removed because of doping. In contrast, the entire Kuwaiti team was banned from competing under their own flag (for a non-doping related matter). The IOC's decision on 24 July 2016 was criticised by athletes and writers. It received support from the European Olympic Committees, which said that Russia was "a valued member". Cam Cole of Canada's National Post said that the IOC had "caved, as it always does, defaulting to whatever compromise it could safely adopt without offending a superpower." Expressing disappointment, a member of the IOC Athletes' Commission, Hayley Wickenheiser, wrote, "I ask myself if we were not dealing with Russia would this decision to ban a nation [have] been an easier one? I fear the answer is yes." Writing for Deutsche Welle in Germany, Olivia Gerstenberger said that Bach had "flunked" his first serious test, adding, "With this decision, the credibility of the organization is shattered once more, while that of state-sponsored doping actually receives a minor boost." Bild (Germany) described Bach as "Putin's poodle". Paul Hayward, chief sports writer of The Daily Telegraph (UK), remarked, "The white flag of capitulation flies over the International Olympic Committee. Russia's deep political reach should have told us this would happen." Leaders of thirteen national anti-doping organisations wrote that the IOC had "violated the athletes' fundamental rights to participate in Games that meet the stringent requirements of the World Anti-Doping Code" and "[demonstrated that] it lacks the independence required to keep commercial and political interests from influencing
|
each year for applications such as cellphones, tablets, and digital cameras. This sub-field of ICs won the Nobel Prize in 2009. Very small mechanical devices driven by electricity can be integrated onto chips, a technology known as microelectromechanical systems. These devices were developed in the late 1980s and are used in a variety of commercial and military applications. Examples include DLP projectors, inkjet printers, and accelerometers and MEMS gyroscopes used to deploy automobile airbags. Since the early 2000s, the integration of optical functionality (optical computing) into silicon chips has been actively pursued in both academic research and in industry resulting in the successful commercialization of silicon based integrated optical transceivers combining optical devices (modulators, detectors, routing) with CMOS based electronics. Photonic integrated circuits that use light are also being developed, using the emerging field of physics known as photonics. Integrated circuits are also being developed for sensor applications in medical implants or other bioelectronic devices. Special sealing techniques have to be applied in such biogenic environments to avoid corrosion or biodegradation of the exposed semiconductor materials. , the vast majority of all transistors are MOSFETs fabricated in a single layer on one side of a chip of silicon in a flat two-dimensional planar process. Researchers have produced prototypes of several promising alternatives, such as: various approaches to stacking several layers of transistors to make a three-dimensional integrated circuit (3DIC), such as through-silicon via, "monolithic 3D", stacked wire bonding, and other methodologies. transistors built from other materials: graphene transistors, molybdenite transistors, carbon nanotube field-effect transistor, gallium nitride transistor, transistor-like nanowire electronic devices, organic field-effect transistor, etc. fabricating transistors over the entire surface of a small sphere of silicon. modifications to the substrate, typically to make "flexible transistors" for a flexible display or other flexible electronics, possibly leading to a roll-away computer. As it becomes more difficult to manufacture ever smaller transistors, companies are using multi-chip modules, three-dimensional integrated circuits, package on package, High Bandwidth Memory and through-silicon vias with die stacking to increase performance and reduce size, without having to reduce the size of the transistors. Such techniques are collectively known as advanced packaging. Advanced packaging is mainly divided into 2.5D and 3D packaging. 2.5D describes approaches such as multi-chip modules while 3D describes approaches where dies are stacked in one way or another, such as package on package and high bandwidth memory. All approaches involve 2 or more dies in a single package. Alternatively, approaches such as 3D NAND stack multiple layers on a single die. Design The cost of designing and developing a complex integrated circuit is quite high, normally in the multiple tens of millions of dollars. Therefore, it only makes economic sense to produce integrated circuit products with high production volume, so the non-recurring engineering (NRE) costs are spread across typically millions of production units. Modern semiconductor chips have billions of components, and are too complex to be designed by hand. Software tools to help the designer are essential. Electronic Design Automation (EDA), also referred to as Electronic Computer-Aided Design (ECAD), is a category of software tools for designing electronic systems, including integrated circuits. The tools work together in a design flow that engineers use to design and analyze entire semiconductor chips. Types Integrated circuits can be broadly classified into analog, digital and mixed signal, consisting of analog and digital signaling on the same IC. Digital integrated circuits can contain billions of logic gates, flip-flops, multiplexers, and other circuits in a few square millimeters. The small size of these circuits allows high speed, low power dissipation, and reduced manufacturing cost compared with board-level integration. These digital ICs, typically microprocessors, DSPs, and microcontrollers, use boolean algebra to process "one" and "zero" signals. Among the most advanced integrated circuits are the microprocessors or "cores", used in personal computers, cell-phones, microwave ovens, etc. Several cores may be integrated together in a single IC or chip. Digital memory chips and application-specific integrated circuits (ASICs) are examples of other families of integrated circuits. In the 1980s, programmable logic devices were developed. These devices contain circuits whose logical function and connectivity can be programmed by the user, rather than being fixed by the integrated circuit manufacturer. This allows a chip to be programmed to do various LSI-type functions such as logic gates, adders and registers. Programmability comes in various forms – devices that can be programmed only once, devices that can be erased and then re-programmed using UV light, devices that can be (re)programmed using flash memory, and field-programmable gate arrays (FPGAs) which can be programmed at any time, including during operation. Current FPGAs can (as of 2016) implement the equivalent of millions of gates and operate at frequencies up to 1 GHz. Analog ICs, such as sensors, power management circuits, and operational amplifiers (op-amps), process continuous signals, and perform analog functions such as amplification, active filtering, demodulation, and mixing. ICs can combine analog and digital circuits on a chip to create functions such as analog-to-digital converters and digital-to-analog converters. Such mixed-signal circuits offer smaller size and lower cost, but must account for signal interference. Prior to the late 1990s, radios could not be fabricated in the same low-cost CMOS processes as microprocessors. But since 1998, radio chips have been developed using RF CMOS processes. Examples include Intel's DECT cordless phone, or 802.11 (Wi-Fi) chips created by Atheros and other companies. Modern electronic component distributors often further sub-categorize integrated circuits: Digital ICs are categorized as logic ICs (such as microprocessors and microcontrollers), memory chips (such as MOS memory and floating-gate memory), interface ICs (level shifters, serializer/deserializer, etc.), power management ICs, and programmable devices. Analog ICs are categorized as linear integrated circuits and RF circuits (radio frequency circuits). Mixed-signal integrated circuits are categorized as data acquisition ICs (including A/D converters, D/A converters, digital potentiometers), clock/timing ICs, switched capacitor (SC) circuits, and RF CMOS circuits. Three-dimensional integrated circuits (3D ICs) are categorized into through-silicon via (TSV) ICs and Cu-Cu connection ICs. Manufacturing Fabrication The semiconductors of the periodic table of the chemical elements were identified as the most likely materials for a solid-state vacuum tube. Starting with copper oxide, proceeding to germanium, then silicon, the materials were systematically studied in the 1940s and 1950s. Today, monocrystalline silicon is the main substrate used for ICs although some III-V compounds of the periodic table such as gallium arsenide are used for specialized applications like LEDs, lasers, solar cells and the highest-speed integrated circuits. It took decades to perfect methods of creating crystals with minimal defects in semiconducting materials' crystal structure. Semiconductor ICs are fabricated in a planar process which includes three key process steps photolithography, deposition (such as chemical vapor deposition), and etching. The main process steps are supplemented by doping and cleaning. More recent or high-performance ICs may instead use multi-gate FinFET or GAAFET transistors instead of planar ones, starting at the 22 nm node (Intel) or 16/14 nm nodes. Mono-crystal silicon wafers are used in most applications (or for special applications, other semiconductors such as gallium arsenide are used). The wafer need not be entirely silicon. Photolithography is used to mark different areas of the substrate to be doped or to have polysilicon, insulators or metal (typically aluminium or copper) tracks deposited on them. Dopants are impurities intentionally introduced to a semiconductor to modulate its electronic properties. Doping is the process of adding dopants to a semiconductor material. Integrated circuits are composed of many overlapping layers, each defined by photolithography, and normally shown in different colors. Some layers mark where various dopants are diffused into the substrate (called diffusion layers), some define where additional ions are implanted (implant layers), some define the conductors (doped polysilicon or metal layers), and some define the connections between the conducting layers (via or contact layers). All components are constructed from a specific combination of these layers. In a self-aligned CMOS process, a transistor is formed wherever the gate layer (polysilicon or metal) crosses a diffusion layer. Capacitive structures, in form very much like the parallel conducting plates of a traditional electrical capacitor, are formed according to the area of the "plates", with insulating material between the plates. Capacitors of a wide range of sizes are common on ICs. Meandering stripes of varying lengths are sometimes used to form on-chip resistors, though most logic circuits do not need any resistors. The ratio of the length of the resistive structure to its width, combined with its sheet resistivity, determines the resistance. More rarely, inductive structures can be built as tiny on-chip coils, or simulated by gyrators. Since a CMOS device only draws current on the transition between logic states, CMOS devices consume much less current than bipolar junction transistor devices. A random-access memory is the most regular type of integrated circuit; the highest density devices are thus memories; but even a microprocessor will have memory on the chip. (See the regular array structure at the bottom of the first image.) Although the structures are intricate – with widths which have been shrinking for decades – the layers remain much thinner than the device widths. The layers of material are fabricated much like a photographic process, although light waves in the visible spectrum cannot be used to "expose" a layer of material, as they would be too large for the features. Thus photons of higher frequencies (typically ultraviolet) are used to create the patterns for each layer. Because each feature is so small, electron microscopes are essential tools for a process engineer who might be debugging a fabrication process. Each device is tested before packaging using automated test equipment (ATE), in a process known as wafer testing, or wafer probing. The wafer is then cut into rectangular blocks, each of which is called a die. Each good die (plural dice, dies, or die) is then connected into a package using aluminium (or gold) bond wires which are thermosonically bonded to pads, usually found around the edge of the die. Thermosonic bonding was first introduced by A. Coucoulas which provided a reliable means of forming these vital electrical connections to the outside world. After packaging, the devices go through final testing on the same or similar ATE used during wafer probing. Industrial CT scanning can also be used. Test cost can account for over 25% of the cost of fabrication on lower-cost products, but can be negligible on low-yielding, larger, or higher-cost devices. , a fabrication facility (commonly known as a semiconductor fab) can cost over US$8 billion to construct. The cost of a fabrication facility rises over time because of increased complexity of new products; this is known as Rock's law. Such a facility features: The wafers up to 300 mm in diameter (wider than a common dinner plate). Copper interconnects where copper wiring replaces aluminum for interconnects. Low-κ dielectric insulators. Silicon on insulator (SOI). Strained silicon in a process used by IBM known as Strained silicon directly on insulator (SSDOI). Multigate devices such as tri-gate transistors. ICs can be manufactured either in-house by integrated device manufacturers (IDMs) or using the foundry model. IDMs are vertically integrated companies (like Intel and Samsung) that design, manufacture and sell their own ICs, and may offer design and/or manufacturing (foundry) services to other companies (the latter often to fabless companies). In the foundry model, fabless companies (like Nvidia only design and sell ICs and outsource all manufacturing to pure play foundries such as TSMC. These foundries may offer IC design services. Packaging The earliest integrated circuits were packaged in ceramic flat packs, which continued to be used by the military for their reliability and small size for many years. Commercial circuit packaging quickly moved to the dual in-line package (DIP), first in ceramic and later in plastic, which is commonly cresol-formaldehyde-novolac. In the 1980s pin counts of VLSI circuits exceeded the practical limit for DIP packaging, leading to pin grid array (PGA) and leadless chip carrier (LCC) packages. Surface mount packaging appeared in the early 1980s and became popular in the late 1980s, using finer lead pitch with leads formed as either gull-wing or J-lead, as exemplified by the small-outline integrated circuit (SOIC) package – a carrier which occupies an area about 30–50% less than an equivalent DIP and is typically 70% thinner. This package has "gull wing" leads protruding from the two long sides and a lead spacing of 0.050 inches. In the late 1990s, plastic quad flat pack (PQFP) and thin small-outline package (TSOP) packages became the most common for high pin count devices, though PGA packages are still used for high-end microprocessors. Ball grid array (BGA) packages have existed since the 1970s. Flip-chip Ball Grid Array packages, which allow for a much higher pin count than other package types, were developed in the 1990s. In an FCBGA package, the die is mounted upside-down (flipped) and connects to the package balls via a package substrate that is similar to a printed-circuit board rather than by wires. FCBGA packages allow an array of input-output signals (called Area-I/O) to be distributed over the entire die rather than being confined to the die periphery. BGA devices have the advantage of not needing a dedicated socket but are much harder to replace in case of device failure. Intel transitioned away from PGA to land grid array (LGA) and BGA beginning in 2004, with the last PGA socket released in 2014 for mobile platforms. , AMD uses PGA packages on mainstream desktop processors, BGA packages on mobile processors, and high-end desktop and server microprocessors use LGA packages. Electrical signals leaving the die must pass through the material electrically connecting the die to the package, through the conductive traces (paths) in the package, through the leads connecting the package to the conductive traces on the printed circuit board. The materials and structures used in the path these electrical signals must travel have very different electrical properties, compared to those that travel to different parts of the same die. As a result, they require special design techniques to ensure
|
a set of electronic circuits on one small flat piece (or "chip") of semiconductor material, usually silicon. Large numbers of tiny MOSFETs (metal–oxide–semiconductor field-effect transistors) integrate into a small chip. This results in circuits that are orders of magnitude smaller, faster, and less expensive than those constructed of discrete electronic components. The IC's mass production capability, reliability, and building-block approach to integrated circuit design has ensured the rapid adoption of standardized ICs in place of designs using discrete transistors. ICs are now used in virtually all electronic equipment and have revolutionized the world of electronics. Computers, mobile phones, and other digital home appliances are now inextricable parts of the structure of modern societies, made possible by the small size and low cost of ICs such as modern computer processors and microcontrollers. Very-large-scale integration was made practical by technological advancements in metal–oxide–silicon (MOS) semiconductor device fabrication. Since their origins in the 1960s, the size, speed, and capacity of chips have progressed enormously, driven by technical advances that fit more and more MOS transistors on chips of the same size – a modern chip may have many billions of MOS transistors in an area the size of a human fingernail. These advances, roughly following Moore's law, make the computer chips of today possess millions of times the capacity and thousands of times the speed of the computer chips of the early 1970s. ICs have two main advantages over discrete circuits: cost and performance. The cost is low because the chips, with all their components, are printed as a unit by photolithography rather than being constructed one transistor at a time. Furthermore, packaged ICs use much less material than discrete circuits. Performance is high because the IC's components switch quickly and consume comparatively little power because of their small size and proximity. The main disadvantage of ICs is the high cost of designing them and fabricating the required photomasks. This high initial cost means ICs are only commercially viable when high production volumes are anticipated. Terminology An integrated circuit is defined as: A circuit in which all or some of the circuit elements are inseparably associated and electrically interconnected so that it is considered to be indivisible for the purposes of construction and commerce. Circuits meeting this definition can be constructed using many different technologies, including thin-film transistors, thick-film technologies, or hybrid integrated circuits. However, in general usage integrated circuit has come to refer to the single-piece circuit construction originally known as a monolithic integrated circuit, often built on a single piece of silicon. History An early attempt at combining several components in one device (like modern ICs) was the Loewe 3NF vacuum tube from the 1920s. Unlike ICs, it was designed with the purpose of tax avoidance, as in Germany, radio receivers had a tax that was levied depending on how many tube holders a radio receiver had. It allowed radio receivers to have a single tube holder. Early concepts of an integrated circuit go back to 1949, when German engineer Werner Jacobi (Siemens AG) filed a patent for an integrated-circuit-like semiconductor amplifying device showing five transistors on a common substrate in a three-stage amplifier arrangement. Jacobi disclosed small and cheap hearing aids as typical industrial applications of his patent. An immediate commercial use of his patent has not been reported. Another early proponent of the concept was Geoffrey Dummer (1909–2002), a radar scientist working for the Royal Radar Establishment of the British Ministry of Defence. Dummer presented the idea to the public at the Symposium on Progress in Quality Electronic Components in Washington, D.C. on 7 May 1952. He gave many symposia publicly to propagate his ideas and unsuccessfully attempted to build such a circuit in 1956. Between 1953 and 1957, Sidney Darlington and Yasuo Tarui (Electrotechnical Laboratory) proposed similar chip designs where several transistors could share a common active area, but there was no electrical isolation to separate them from each other. The monolithic integrated circuit chip was enabled by the inventions of the planar process by Jean Hoerni and p–n junction isolation by Kurt Lehovec. Hoerni's invention was built on Mohamed M. Atalla's work on surface passivation, as well as Fuller and Ditzenberger's work on the diffusion of boron and phosphorus impurities into silicon, Carl Frosch and Lincoln Derick's work on surface protection, and Chih-Tang Sah's work on diffusion masking by the oxide. First integrated circuits A precursor idea to the IC was to create small ceramic substrates (so-called micromodules), each containing a single miniaturized component. Components could then be integrated and wired into a bidimensional or tridimensional compact grid. This idea, which seemed very promising in 1957, was proposed to the US Army by Jack Kilby and led to the short-lived Micromodule Program (similar to 1951's Project Tinkertoy). However, as the project was gaining momentum, Kilby came up with a new, revolutionary design: the IC. Newly employed by Texas Instruments, Kilby recorded his initial ideas concerning the integrated circuit in July 1958, successfully demonstrating the first working example of an integrated circuit on 12 September 1958. In his patent application of 6 February 1959, Kilby described his new device as "a body of semiconductor material … wherein all the components of the electronic circuit are completely integrated." The first customer for the new invention was the US Air Force. Kilby won the 2000 Nobel Prize in physics for his part in the invention of the integrated circuit. However, Kilby's invention was a hybrid integrated circuit (hybrid IC), rather than a monolithic integrated circuit (monolithic IC) chip. Kilby's IC had external wire connections, which made it difficult to mass-produce. Half a year after Kilby, Robert Noyce at Fairchild Semiconductor invented the first true monolithic IC chip. It was a new variety of integrated circuit, more practical than Kilby's implementation. Noyce's design was made of silicon, whereas Kilby's chip was made of germanium. Noyce's monolithic IC put all components on a chip of silicon and connected them with copper lines. Noyce's monolithic IC was fabricated using the planar process, developed in early 1959 by his colleague Jean Hoerni. Modern IC chips are based on Noyce's monolithic IC, rather than Kilby's hybrid IC. NASA's Apollo Program was the largest single consumer of integrated circuits between 1961 and 1965. TTL integrated circuits Transistor–transistor logic (TTL) was developed by James L. Buie in the early 1960s at TRW Inc. TTL became the dominant integrated circuit technology during the 1970s to early 1980s. Dozens of TTL integrated circuits were a standard method of construction for the processors of minicomputers and mainframe computers. Computers such as IBM 360 mainframes, PDP-11 minicomputers and the desktop Datapoint 2200 were built from bipolar integrated circuits, either TTL or the even faster emitter-coupled logic (ECL). MOS integrated circuits Nearly all modern IC chips are metal–oxide–semiconductor (MOS) integrated circuits, built from MOSFETs (metal–oxide–silicon field-effect transistors). The MOSFET (also known as the MOS transistor), which was invented by Mohamed M. Atalla and Dawon Kahng at Bell Labs in 1959, made it possible to build high-density integrated circuits. In contrast to bipolar transistors which required a number of steps for the p–n junction isolation of transistors on a chip, MOSFETs required no such steps but could be easily isolated from each other. Its advantage for integrated circuits was pointed out by Dawon Kahng in 1961. The list of IEEE milestones includes the first integrated circuit by Kilby in 1958, Hoerni's planar process and Noyce's planar IC in 1959, and the MOSFET by Atalla and Kahng in 1959. The earliest experimental MOS IC to be fabricated was a 16-transistor chip built by Fred Heiman and Steven Hofstein at RCA in 1962. General Microelectronics later introduced the first commercial MOS integrated circuit in 1964, a 120-transistor shift register developed by Robert Norman. By 1964, MOS chips had reached higher transistor density and lower manufacturing costs than bipolar chips. MOS chips further increased in complexity at a rate predicted by Moore's law, leading to large-scale integration (LSI) with hundreds of transistors on a single MOS chip by the late 1960s. Following the development of the self-aligned gate (silicon-gate) MOSFET by Robert Kerwin, Donald Klein and John Sarace at Bell Labs in 1967, the first silicon-gate MOS IC technology with self-aligned gates, the basis of all modern CMOS integrated circuits, was developed at Fairchild Semiconductor by Federico Faggin in 1968. The application of MOS LSI chips to computing was the basis for the first microprocessors, as engineers began recognizing that a complete computer processor could be contained on a single MOS LSI chip. This led to the inventions of the microprocessor and the microcontroller by the early 1970s. During the early 1970s, MOS integrated circuit technology enabled the very large-scale integration (VLSI) of more than 10,000 transistors on a single chip. At first, MOS-based computers only made sense when high density was required, such as aerospace and pocket calculators. Computers built entirely from TTL, such as the 1970 Datapoint 2200, were much faster and more powerful than single-chip MOS microprocessors such as the 1972 Intel 8008 until the early 1980s. Advances in IC technology, primarily smaller features and larger chips, have allowed the number of MOS transistors in an integrated circuit to double every two years, a trend known as Moore's law. Moore originally stated it would double every year, but he went on to change the claim to every two years in 1975. This increased capacity has been used to decrease cost and increase functionality. In general, as the feature size shrinks, almost every aspect of an IC's operation improves. The cost per transistor and the switching power consumption per transistor goes down, while the memory capacity and speed go up, through the relationships defined by Dennard scaling (MOSFET scaling). Because speed, capacity, and power consumption gains are apparent to the end user, there is fierce competition among the manufacturers to use finer geometries. Over the years, transistor sizes have decreased from 10s of microns in the early 1970s to 10 nanometers in 2017 with a corresponding million-fold increase in transistors per unit area. As of 2016, typical chip areas range from a few square millimeters to around 600 mm2, with up to 25 million transistors per mm2. The expected shrinking of feature sizes and the needed progress in related areas was forecast for many years by the International Technology Roadmap for Semiconductors (ITRS). The final ITRS was issued in 2016, and it is being replaced by the International Roadmap for Devices and Systems. Initially, ICs were strictly electronic devices. The success of ICs has led to the integration of other technologies, in an attempt to obtain the same advantages of small size and low cost. These technologies include mechanical devices, optics, and sensors. Charge-coupled devices, and the closely related active-pixel sensors, are chips that are sensitive to light. They have largely replaced photographic film in scientific, medical, and consumer applications. Billions of these devices are now produced each year for applications such as cellphones, tablets, and digital cameras. This sub-field of ICs won the Nobel Prize in 2009. Very small mechanical devices driven by electricity can be integrated onto chips, a technology known as microelectromechanical systems. These devices were developed in the late 1980s and are used in a variety of commercial and military applications. Examples include DLP projectors, inkjet printers, and accelerometers and MEMS gyroscopes used to deploy automobile airbags. Since the early 2000s, the integration of optical functionality (optical computing) into silicon chips has been actively pursued in both academic research and in industry resulting in the successful commercialization of silicon based integrated optical transceivers combining optical devices (modulators, detectors, routing) with CMOS based electronics. Photonic integrated circuits that use light are also being developed, using the emerging field of physics known as photonics. Integrated circuits are also being developed for sensor applications in medical implants or other bioelectronic devices. Special sealing techniques have to be applied in such biogenic environments to avoid corrosion or biodegradation of the exposed semiconductor materials. , the vast majority of all transistors are MOSFETs fabricated in a single layer on one side of a chip of silicon in a
|
of the 3276 itself, was more or less identical to those of the 3278. Printers 3284 matrix printer 3286 matrix printer 3287 printer, including a color model 3288 line printer 3268-1 R-loop connected stand-alone printer for the IBM 8100 system 4224 matrix printer In 1984 announced IPDS – Intelligent Printer Data Stream for online printing of AFP - Advanced Function Presentation documents, using bidirectional communications between the application and the printer. IPDS support among others printing of text, fonts, images, graphics, and barcodes. The IBM 4224 is one of the IPDS capable dot matrix printers. With the emergence of printers, including laser printers, from HP, Canon, and others, targeted the PC market, 3270 customers got an alternative to IBM 3270 printers by connecting this type of printers through printer protocol converters from manufactures like I-data, MPI Tech, Adacom, and others. The printer protocol converters basically emulate a 3287 type printer, and later extended to support IPDS. The IBM 3482 terminal, announced in 1992, offered a printer port, which could be used for host addressable printing as well as local screen copy. In the later versions of 3174 the Asynchronous Emulation Adapter (AEA), supporting async RS-232 character-based type terminals, was enhanced to support printers equipped with a serial interface. Controllers 3271 remote controller 3272 local controller 3274 cluster controller (different models could be channel-attached or remote via BSC or SDLC communication lines, and had between eight and 32 co-ax ports) 3174 cluster controller On the 3274 and 3174, IBM used the term configuration support letter, sometimes followed by a release number, to designate a list of features together with the hardware and microcode needed to support them. By 1994 the 3174 Establishment Controller supported features such as attachment to multiple hosts via Token Ring, Ethernet, or X.25 in addition to the standard channel attach or SDLC; terminal attachment via twisted pair, Token Ring or Ethernet in addition to co-ax; and TN3270. They also support attachment of asynchronous ASCII terminals, printers, and plotters alongside 3270 devices. 3274 controller IBM introduced the 3274 controller family in 1977, replacing the 3271–2 product line. Where the features of the 3271–2 was hardcoded, the 3274 was controlled by its microcode that was read from the 3274's build in 8” floppy drive. 3274 models included 8, 12, 16, and 32 port remote controllers and 32-port local channel attached units. In total 16 different models were over time released to the market. The 3274-1A was an SNA physical Unit type 2.0 (PU2.0), required only a single address on the channel for all 32 devices and was not compatible with the 3272. The 3274-1B and 3274-1D were compatible with the 3272 and were referred to as local non-SNA models. The 3274 controllers introduced a new generation of the coax protocol, named Category A, to differentiate them from the Category B coax devices, such as the 3277 terminal and the 3284 printer. The first Category A coax devices were the 3278 and the first color terminal, the IBM 3279 Color Display Station. Enabling backward compatibility, it was possible to install coax boards, so-called ‘panels’, in groups of 4 or 8 supporting the now older Category B coax devices. A maximum of 16 Category B terminals could be supported, and only 8 if the controller were fully loaded with a maximum of 4 panels each supporting 8 Category A devices. During its life span, the 3274 supported several features including: Extended Data Stream Extended Highlighting Programmed Symbol Set (PSS) V.24 interfaces with speed up to 14.4 kbit/s V.35 interfaces with speed up to 56 kbit/s X.25 network attachment DFT – Distributed Function Terminal DSL – Downstream load for 3290 and 3179G 9901 and 3299 multiplexer Entry Assist Dual Logic (the feature of having two sessions from a CUT mode display). 3174 controller IBM introduced the 3174 Subsystem Control Unit in 1986, replacing the 3274 product line. The 3174 was designed to enhance the 3270 product line with many new connectivity options and features. Like the 3274, it was customizable, the main difference was that it used smaller (5.25-inch) diskettes than the 3274 (8-inch diskettes), and that the larger floor models had 10 slots for adapters, some of them were per default occupied by channel adapter/serial interface, coax adapter, etc. Unlike the 3274, any local models could be configured as either local SNA or local non-SNA, including PU2.1 (APPN). The models included: 01L, 01R, 02R, 03R, 51R, 52R, 53R, 81R and 82R. The 01L were local channel attached, the R models remotely connected, and the x3R Token Ring (upstream) connected. The 0xL/R models were floor units supporting up to 32 coax devices through the use of internal or external multiplexers (TMA/3299). The 5xR, models were shelf units with 9 coax ports, expandable to 16, by the connection of a 3299 multiplexer. The smallest desktop units, 8xR, had 4 coax ports expandable to 8, by the connection of a 3299 multiplexer. In the 3174 controller line IBM also slightly altered the classical BNC coax connector by changing the BNC connector to DPC – Dual Purpose Connector. The DPC female connector was a few millimeters longer and with a build-in switch that detected if a normal BNC connector were connected or a newer DPC connector was connected, thereby changing the physical layer from 93 ohm unbalanced coax, to 150 ohm balanced twisted-pair, thereby directly supporting the IBM Cabling system without the need for a so-called red balun. Configuration Support A was the first microcode offered with the 3174. It supported all the hardware modules present at the time, almost all the microcode features found in 3274 and introduced a number of new features including: Intelligent Printer Data Stream (IPDS), Multiple Logical Terminals, Country Extended Code Page (CECP), Response Time Monitor, and Token Ring configured as host interface. Configuration Support S, strangely following release A, introduced that a local or remote controller could act as 3270 Token-Ring DSPU Gateway, supporting up to 80 Downstream PU's. In 1989, IBM introduced a new range of 3174 models and changed the name from 3174 Subsystem Control Unit to 3174 Establishment Controller. The main new feature was support for an additional 32 coax port in floor models. The models included: 11L, 11R, 12R, 13R, 61R, 62R, 63R, 91R, and 92R. The new line of controllers came with Configuration Support B release 1, increased the number of supported DSPU on the Token-Ring gateway to 250 units, and introduced at the same time ‘Group Polling’ that offloaded the mainframe/VTAM polling requirement on the channel. Configuration Support B release 2 to 5, enabled features like: Local Format Storage (CICS Screen Buffer), Type Ahead, Null/Space Processing, ESCON channel support. In 1990–1991, a total of 7 more models were added: 21R, 21L, 12L, 22L, 22R, 23R, and 90R. The 12L offered ESCON fibreoptic channel attachment. The models with 2xx designation were equal to the 1xx models but repacked for rackmount and offered only 4 adapter slots. The 90R was not intended as a coax controller, it was positioned as a Token Ring 3270 DSPU gateway. However, it did have one coax port for configuring the unit, which with a 3299 multiplexer could be expanded to 8. The line of controllers came with Configuration Support C to support ISDN, APPN and Peer Communication. The ISDN feature allowed downstream devices, typically PC's, to connect to the 3174 via the ISDN network. The APPN support enabled the 3174 to be a part of an APPN network, and the Peer Communication allowed coax attached PC's with ‘Peer Communication Support’ to access resources on the Token-Ring network attached to the 3174. The subsequent releases 2 to 6 of Configuration Support C enables support for: Split screen, Copy from session to session, Calculator function, Access to AS/400 host and 5250 keyboard emulation, Numerous APPN enhancements, TCP/IP Telnet support that allowed 3270 CUT terminals to communicate with TCP/IP servers using Telnet, and at the same time in another screen to communicate with the mainframe using native 3270. TN3270 support where the 3174 could connect to a TN3270 host/gateway, eliminating SNA, but preserving the 3270 data stream. IP forwarding allowing bridging of LAN (Token-Ring or Ethernet) connected devices downstream to the 3174 to route IP traffic onto the Frame Relay WAN interface. In 1993, three new models were added with the announcement of Ethernet Adapter (FC 3045). The models were: 14R, 24R, and 64R. This was also IBM's final hardware announcement of 3174. The floor models, and the rack-mountable units, could be expanded with a range of special 3174 adapters, that by 1993 included: Channel adapter, ESCON adapter, Serial (V.24/V.35) adapter, Concurrent Communication Adapter, Coax adapter, Fiber optic “coax” adapter, Async adapter, ISDN adapter, Token-Ring adapter, Ethernet adapter, and line encryption adapter. In 1994, IBM incorporated the functions of RPQ 8Q0935 into Configuration Support-C release 3, including the TN3270 client. Non-IBM Controllers GTE The GTE IS/7800 Video Display Systems used one of two nominally IBM compatible controllers: 7801 (remote, 3271 equivalent) 7802 (local, 3277 equivalent) Harris The Harris 8000 Series Terminal Systems used one of four controllers: 8171 (remote, 3271 equivalent) 8172 (local, 3277 equivalent) 8181 (remote, 3271 equivalent) 8182 (local, 3277 equivalent) 9116 9210 9220 Home grown An alternative implementation of an establishment controller exists in form of OEC (Open Establishment Controller). It's a combination of an Arduino shield with a BNC connector and a Python program that runs on a POSIX system. OEC allows to connect a 3270 display to IBM mainframes via TN3270 or to other systems via VT100. Currently only CUT but not DFT displays are supported. Memorex Memorex had two controllers for its 3277-compatible 1377; the 1371 for remote connection and the 1372 for local connection. Later Memorex offered a series of controllers compatible with the IBM 3274 and 3174 2074 2076 2174 2274 Multiplexers IBM offered a device called 3299 that acted as a multiplexer between an accordingly configured 3274 controller, with the 9901 multiplexer feature, and up to 8 displays/printers, thereby reducing the number of coax cables between the 3x74 controller and the displays/printers. With the introduction of the 3174 controller internal or external multiplexers (3299) became mainstream as the 3174-1L controller was equipped with 4 multiplexed ports each supporting 8 devices. The internal 3174 multiplexer card was named TMA – Terminal Multiplexer adapter 9176. A number of vendors manufactured 3270 multiplexers before and alongside IBM including Fibronics and Adacom offering multiplexers that supported TTP – Telephone Twisted Pair as an alternative to coax, and fiber-optic links between the multiplexers. In some instances, the multiplexer worked as an “expansion” unit on smaller remote controllers including the 3174-81R / 91R, where the 3299 expanded the number of coax ports from 4 to 8, or the 3174-51R / 61R, where the 3299 expanded the number of coax ports from 8 to 16. Manufacture The IBM 3270 display terminal subsystem was designed and developed by IBM's Kingston, New York, laboratory (which later closed during IBM's difficult time in the mid-1990s). The printers were developed by the Endicott, New York, laboratory. As the subsystem expanded, the 3276 display-controller was developed by the Fujisawa laboratory, Japan, and later the Yamato laboratory; and the 3279 color display and 3287 color printer by the Hursley, UK, laboratory. The subsystem products were manufactured in Kingston (displays and controllers), Endicott (printers), and Greenock, Scotland, UK, (most products) and shipped to users in U.S. and worldwide. 3278 terminals continued to be manufactured in Hortolândia, near Campinas, Brazil as far as late 1980s, having its internals redesigned by a local engineering team using modern CMOS technology, while retaining its external look and feel. Telnet 3270 Telnet 3270, or tn3270 describes both the process of sending and receiving 3270 data streams using the telnet protocol and the software that emulates a 3270 class terminal that communicates using that process. tn3270 allows a 3270 terminal emulator to communicate over a TCP/IP network instead of an SNA network. Telnet 3270 can be used for either terminal or print connections. Standard telnet clients cannot be used as a substitute for tn3270 clients, as they use fundamentally different techniques for exchanging data. Technical Information 3270 character set The 3270 displays are available with a variety of keyboards and character sets. The following table shows the 3275/3277/3284–3286 character set for US English EBCDIC (optional characters were available for US ASCII, and UK, French, German, and Italian EBCDIC). On the 3275 and 3277 terminals without the a text feature, lower case characters display as uppercase. NL, EM, DUP, and FM control characters display and print as 5, 9, *, and ; characters, respectively, except by the printer when WCC or CCC bits 2 and 3 = '00'b, in which case NL and EM serve their control function and do not print. Data stream Data sent to the 3270 consist of commands, a Copy Control Character (CCC) or Write Control Character (WCC) if appropriate, a device address for copy, orders, character data and structured fields. Commands instruct the 3270 control unit to perform some action on a specified device, such as a read or write. Orders are sent as part of the data stream to control the format of the device buffer. Structured fields are to convey additional control functions and data to or from the terminal. On a local non-SNA controller, the command is a CCW opcode rather than the first byte of the outbound display stream; on all other controllers, the command is the first byte of the display stream, exclusive of protocol headers. Commands The following table includes datastream commands and CCW opcodes for local non-SNA controllers; it does not include CCW opcodes for local SNA controllers. Write control character The data sent by Write or Erase/Write consists of the command code itself followed by a Write Control Character (WCC) optionally followed by a buffer containing orders or data (or both). The WCC controls the operation of the device. Bits may start printer operation and specify a print format. Other bit settings will sound the audible alarm if installed, unlock the keyboard to allow operator entry, or reset all the Modified Data Tags in the device buffer. Orders Orders consist of the order code byte followed by zero to three bytes of variable information. Attributes The 3270 has three kinds of attributes: Field attributes Extended attributes Character attributes Field attributes The original 3277 and 3275 displays used an 8-bit field attribute byte of which five bits were used. Bits 0 and 1 are set so that the attribute will always be a valid EBCDIC (or ASCII) character. Bit 2 is zero to indicate that the associated field is unprotected (operator could enter data) or one for protected. Bit 3 is zero to indicate that this field, if unprotected, could accept alphanumeric input. One indicates that only numeric input is accepted, and automatically shifts to numeric for some keyboards. Bit 4 and 5 operate in tandem: '00'B indicate that the field is displayed on the screen and is not selector-pen detectable. '01'B indicates that the field is displayable and selector-pen detectable. '10'B indicates that the field is intensified (bright), displayable, and selector-pen detectable. '11'B indicates that the field is non-display, non-printable, and not pen detectable. This last can be used in conjunction with the modified data tag to imbed static data on the screen that will be read each time data was read from the device. Bit 7 is the "Modified Data Tag", where '0' indicates that the associated field has not been modified by the operator and '1' indicates that it has been modified. As noted above, this bit can be set programmatically to cause the field to be treated as modified. Later models include base color: "Base color (four colors) can be produced on color displays and color printers from current 3270 application programs by use of combinations of the field intensify and field protection attribute bits. For more information on color, refer to IBM 3270 Information System: Color and Programmed Symbols, GA33-3056." Extended attributes The 3278 and 3279 and later models used extended attributes to add support for seven colors, blinking, reverse video, underscoring, field outlining, field validation, and programmed symbols. Character attributes The 3278 and 3279 and later models allowed attributes on individual characters in a field to override the corresponding field attributes. Buffer addressing 3270 displays and printers have a buffer containing one byte for every screen position. For example, a 3277 model 2 featured a screen size of 24 rows of 80 columns for a buffer size of 1920 bytes. Bytes are addressed from zero to the screen size minus one, in this example 1919. "There is a fixed relationship between each ... buffer storage location and its position on the display screen." Most orders start operation at the "current" buffer address, and executing an order or writing data will update this address. The buffer address can be set directly using the Set Buffer Address (SBA) order, often followed by Start Field or Start Field Extended. For a device with a 1920 character display a twelve bit address is sufficient. Later 3270s with larger screen sizes use fourteen or sixteen bits. Addresses are encoded within orders in two bytes. For twelve bit addresses the high order two bits of each byte are set to form valid EBCDIC (or ASCII) characters. For example, address 0 is coded as X'4040', or space-space, address 1919 is coded as X'5D7F', or ''. Programmers hand-coding panels usually keep the table of addresses from the 3270 Component Description or the 3270 Reference Card handy. For fourteen and sixteen-bit address, the address uses contiguous bits in two bytes. Example The following data stream writes an attribute in row 24, column 1, writes the (protected) characters '> ' in row 24, columns 2 and 3, and creates an unprotected field on row 24 from columns 5-79. Because the buffer wraps around an attribute is placed on row 24, column 80 to terminate the input field. This data stream would
|
for full screen applications, e.g., ISPF. Device independent Display Operator Console Support (DIDOCS) in Multiple Console Support (MCS) for OS/360 and successors. The SPF and Program Development Facility (ISPF/PDF) editors for MVS and VM/SP (ISPF/PDF was available for VM, but little used) and the XEDIT editors for VM/SP through z/VM make extensive use of 3270 features. Customer Information Control System (CICS) has support for 3270 panels. Various versions of Wylbur have support for 3270, including support for full-screen applications. The modified data tag is well suited to converting formatted, structured punched card input onto the 3270 display device. With the appropriate programming, any batch program that uses formatted, structured card input can be layered onto a 3270 terminal. IBM's OfficeVision office productivity software enjoyed great success with 3270 interaction because of its design understanding. And for many years the PROFS calendar was the most commonly displayed screen on office terminals around the world. A version of the WordPerfect word processor ported to System/370 was designed for the 3270 architecture. SNA 3270 devices can be a part of an SNA – System Network Architecture network or non-SNA network. If the controllers are SNA connected, they appear to SNA as PU – Physical Unit type 2.0 (PU2.1 for APPN) nodes typically with LU – Logical Unit type 1, 2, and 3 devices connected. Local, channel attached, controllers are controlled by VTAM – Virtual Telecommunications Access Method. Remote controllers are controlled by the NCP – Network Control Program in the Front End Processor i.e. 3705, 3720, 3725, 3745, and VTAM. Third parties One of the first groups to write and provide operating system support for the 3270 and its early predecessors was the University of Michigan, who created the Michigan Terminal System in order for the hardware to be useful outside of the manufacturer. MTS was the default OS at Michigan for many years, and was still used at Michigan well into the 1990s. Many manufacturers, such as GTE, Hewlett Packard, Honeywell/Incoterm Div, Memorex, ITT Courier, McData, Harris, Alfaskop and Teletype/AT&T created 3270 compatible terminals, or adapted ASCII terminals such as the HP 2640 series to have a similar block-mode capability that would transmit a screen at a time, with some form validation capability. The industry distinguished between ‘System compatible controllers’ and ‘Plug compatibility controllers’, where ‘System compatibility’ meant that the 3rd party system was compatible with the 3270 data stream terminated in the unit, but not as ‘Plug compatibility’ equipment, also were compatible at the coax level thereby allowing IBM terminals to be connected to a 3rd party controller or vice versa. Modern applications are sometimes built upon legacy 3270 applications, using software utilities to capture (screen scraping) screens and transfer the data to web pages or GUI interfaces. In the early 1990s a popular solution to link PCs with the mainframes was the Irma board, an expansion card that plugged into a PC and connected to the controller through a coaxial cable. 3270 simulators for IRMA and similar adapters typically provide file transfers between the PC and the mainframe using the same protocol as the IBM 3270 PC. Models The IBM 3270 display terminal subsystem consists of displays, printers and controllers. Optional features for the 3275 and 3277 are the selector-pen, ASCII rather than EBCDIC character set, an audible alarm, and a keylock for the keyboard. A keyboard numeric lock was available and will lock the keyboard if the operator attempts to enter non-numeric data into a field defined as numeric. Later an Operator Identification Card Reader was added which could read information encoded on a magnetic stripe card. Displays Generally, 3277 models allow only upper-case input, except for the mixed EBCDIC/APL or text keyboards, which have lower case. Lower-case capability and dead keys were available as an RPQ (Request Price Quotation); these were added to the later 3278 & 3279 models. A version of the IBM PC called the 3270 PC, released in October 1983, includes 3270 terminal emulation. Later, the 3270 PC/G (graphics), 3270 PC/GX (extended graphics), 3270 Personal Computer AT, 3270 PC AT/G (graphics) and 3270 PC AT/GX (extended graphics) followed. CUT vs. DFT There are two types of 3270 displays in respect to where the 3270 data stream terminates. For CUT (Control Unit Terminal) displays, the stream terminates in the display controller, the controller instructs the display to move the cursor, position a character, etc. EBCDIC is translated by the controller into ‘3270 Character Set’, and keyboard scan-codes from the terminal, read by the controller through a poll, is translated by the controller into EBCDIC. For DFT (Distributed Function Terminal) type displays, most of the 3270 data stream is forwarded to the display by the controller. The display interprets the 3270 protocol itself. In addition to passing the 3270 data stream directly to the terminal, allowing for features like EAB - Extended Attributes, Graphics, etc., DFT also enabled multi sessions (up to 5 simultaneous), featured in the 3290 and 3194 multisession displays. This feature was also widely used in 2nd generation 3270 terminal emulation software. The MLT - Multiple Logical Terminals feature of the 3174 controller also enabled multiple sessions from a CUT type terminal. 3277 3277 model 1: 40×12 terminal 3277 model 2: 80×24 terminal, the biggest success of all 3277 GA: a 3277 with an RS232C I/O, often used to drive a Tektronix 4013 or 4015 graphic screen (monochrome) 3278 3278 models 1–5: next-generation, with accented characters and dead keys in countries that needed them model 1: 80x12 model 2: 80×24 model 2A: 80x24 (console) with 4 lines reserved model 3: 80×32 or 80x24 (switchable) model 4: 80×43 or 80x24 (switchable) model 5: 132×27 or 80×24 (switchable) 3278 PS: programmable characters; able to display monochrome graphics 3279 The IBM 3279 was IBM's first color terminal. IBM initially announced four models, and later added a fifth model for use as a processor console. Models model 2A: 80-24 base color model 2B: 80-24 extended color model 2C: 80-24 base color (console) with 4 lines reserved model 3A: 80-32 base color model 3B: 80-32 extended color Base colorIn base color mode the protection and intensity field attributes determine the color: {| class="wikitable" |+ Base color mode |- | Protection | Intensity | Color |- | Unprotected | Normal | Green |- | Unprotected | Intensified | Red |- | Protected | Normal | Blue |- | Protected | Intensified | White |} Extended colorIn extended color mode the color field and character attributes determine the color as one of Neutral (White) Red Blue Green Pink Yellow Turquoise The 3279 was introduced in 1979. The 3279 was widely used as an IBM mainframe terminal before PCs became commonly used for the purpose. It was part of the 3270 series, using the 3270 data stream. Terminals could be connected to a 3274 controller, either channel connected to an IBM mainframe or linked via an SDLC (Synchronous Data Link Control) link. In the Systems Network Architecture (SNA) protocol these terminals were logical unit type 2 (LU2). The basic models 2A and 3A used red, green for input fields, and blue and white for output fields. However, the models 2B and 3B supported seven colors, and when equipped with the optional Programmed Symbol Set feature had a loadable character set that could be used to show graphics. The IBM 3279 with its graphics software support, Graphical Data Display Manager (GDDM), was designed at IBM's Hursley Development Laboratory, near Winchester, England. 3290 The 3290 Information Panel a 17", amber monochrome plasma display unit announced March 8, 1983, capable of displaying in various modes, including four independent 3278 model 2 terminals, or a single 160×62 terminal; it also supports partitioning. The 3290 supports graphics through the use of programmed symbols. A 3290 application can divide its screen area up into as many as 16 separate explicit partitions (logical screens). The 3290 is a Distributed Function Terminal (DFT) and requires that the controller do a downstream load (DSL) of microcode from floppy or hard disk. 317x 3178: lower cost terminal (1983) 3179: low cost color terminal announced March 20, 1984. 3180 The 3180 was a monochrome display, introduced on March 20, 1984, that the user could configure for several different basic and extended display modes; all of the basic modes have a primary screen size of 24x80. Modes 2 and 2+ have a secondary size of 24x80, 3 and 3+ have a secondary size of 32x80, 4 and 4+ have a secondary size of 43x80 and 5 and 5+ have a secondary size of 27x132. An application can override the primary and alternate screen sizes for the extended mode. The 3180 also supported a single explicit partition that could be reconfigured under application control. 3191 The IBM 3191 Display Station is an economical monochrome CRT. Models A and B are 1920 characters 12-inch CRTs. Models D, E and L are 1920 or 2560 character 14-inch CRTs. 3192 Model C provides a 7-color 14 inch CRT with 80x24 or 80x32 characters Model D provides a green monochrome 15 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters Model F provides a 7-color high-resolution 14 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters Model G provides a 7-color 14 inch CRT with 80x24 or 80x32 characters Model L provides a green monochrome 15 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters with a selector pen capability Model W provides a black and while 15 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters 3193 The IBM 3193 Display Station is a high-resolution, portrait-type, monochrome, 380mm (15 inch) CRT image display providing up to letter or A4 size document display capabilities in addition to alphanumeric data. Compressed images can be sent to the 3193 from a scanner and decompression is performed in the 3193. Image data compression is a technique to save transmission time and reduce storage requirements. 3194 The IBM 3194 is a Display Station that features a 1.44MB 3.5" floppy drive and IND$FILE transfer. Model C provides a 12-inch color CRT with 80x24 or 80x32 characters Model D provides a 15-inch monochrome CRT with 80x24, 80x31, 80x44 or 132x27 characters Model H provides a 14-inch color CRT with 80x24, 80x31, 80x44 or 132x27 characters Subsequent 3104: low-cost R-loop connected terminal for the IBM 8100 system 3472 Infowindow Non-IBM Displays Several third-party manufacturers produced 3270 displays besides IBM. GTE GTE manufactured the IS/7800 Video Display System, nominally compatible with IBM 3277 displays attached to a 3271 or 3272. An incompatibility with the RA buffer order broke the logon screen in VM/SE (SEPP). Harris Harris manufactured the 8000 Series Terminal Systems, compatible with IBM 3277 displays attached to a 3271 or 3272. Harris later manufactured the 9100–9200 Information Processing Systems, which included 9178 9278 9279-2A 9279-3G 9280 Informer 270 376/SNA The Informer company manufactured a special version of their model 270 terminal that was compatible with IBM 3270 and its associated coax port to connect to a 3x74. Memorex Telex Memorex 1377, compatible with IBM 3277Attaches to 1371 or 1372 Documentation for the following is available at Memorex/Telex 2078 Memorex/Telex 2079 Memorex/Telex 2080 Memorex/Telex 2178 Memorex/Telex 2179 Nokia/Alfaskop Alfaskop Display Unit 4110 Alfaskop Display Unit 4112 AT&T AT&T introduced the Dataspeed 40 terminal/controller, compatible with the IBM 3275, in 1980. Graphics models IBM had two different implementations for supporting graphics. The first was implemented in the optional Programmed Symbol Sets (PSS) of the 3278, 3279 and 3287, which became a standard feature on the later 3279-S3G, a.k.a. 3279G, and was based on piecing together graphics with on-the-fly custom-defined symbols downloaded to the terminal. The second later implementation provided All Points Addressable (APA) graphics, a.k.a. Vector Graphics, allowing more efficient graphics than the older technique. The first terminal to support APA / Vector graphics was the 3179G terminal that later was replaced by first the 3192G and later the 3472G. Both implementations are supported by IBM GDDM - Graphical Data Display Manager first released in 1979, and by SAS with their SAS/GRAPH software. IBM 3279G IBM 3279-S3G, a.k.a. 3279G, terminal, announced in 1979, was IBM's graphics replacement for the 3279-3B with PSS. The terminal supported 7 colors and the graphics were made up of Programmable Symbol sets loaded to the terminal by the graphical application GDDM - Graphical Data Display Manager using Write Structured Field command. Programmable Symbols is an addition to the normal base character set consisting of Latin characters, numbers, etc. hardwired into the terminal. The 3279G supports 6 additional sets of symbols each supporting 190 symbols, resulting in a total of 1.140 programmable symbols. 3 of the Programmable Symbols sets have 3 planes each enabling coloring (red, blue, green) the Programmable Symbols downloaded to those sets, thereby supporting a total of 7 colors. Each ‘character’ cell consists of a 9x12 or a 9x16 dot matrix depending on the screen model. In order to program a cell with a symbol 18 bytes of data is needed making the data load quite heavy in some instances when compared to classic text screens. If one for example wishes to draw a hyperbole on the screen, the application must first compute the required Programmable Symbols to make up hyperbole and load them to the terminal. The next step is then for the application to paint the screen by addressing the screen cell position and select the appropriate symbol in one of the Programmable Symbols sets. The 3279G could be ordered with Attribute Select Keyboard enabling the operator to select attributes, colors and Programmable Symbols sets, making that version of the terminal quite distinctive. IBM 3179G The IBM 3179G announced June 18, 1985, is an IBM mainframe computer terminal providing 80×24 or 80×32 characters, 16 colors, plus graphics and is the first terminal to support the APA graphics apart from the 3270 PC/G, 3270 PC/GX, PC AT/G and PC AT/GX. 3179-G terminals combine text and graphics as separate layers on the screen. Although the text and graphics appear combined on the screen, the text layer actually sits over the graphics layer. The text layer contains the usual 3270-style cells which display characters (letters, numbers, symbols, or invisible control characters). The graphics layer is an area of 720×384 pixels. All Points Addressable or vector graphics is used to paint each pixel in one of sixteen colors. As well as being separate layers on the screen, the text and graphics layers are sent to the display in separate data streams, making them completely independent. The application i.e. GDDM sends the vector definitions to the 3179-G, and the work of activating the pixels that represent the picture (the vector-to-raster conversion) is done in the terminal itself. The datastream is related to the number of graphics primitives (lines, arcs, and so on) in the picture. Arcs are split into short vectors, that are sent to the 3179-G to be drawn. The 3179-G does not store graphic data, and so cannot offload any manipulation function from GDDM. In particular, with user control, each new viewing operation means that the data has to be regenerated and retransmitted. The 3179G is a distributed function terminal (DFT) and requires a downstream load (DSL) to load its microcode from the cluster controller's floppy disk or hard drive. The G10 model is a standard 122-key typewriter keyboard, while the G20 model offers APL on the same layout. Compatible with IBM System/370, IBM 4300 series, 303x, 308x, IBM 3090, and IBM 9370. IBM 3192G The IBM 3192G, announced in 1987 was the successor to 3179G. It featured 16 colors, and support for printers (i.e., IBM Proprinter) for local hardcopy with graphical support, or system printer, text only, implemented as an additional LU. IBM 3472G The IBM 3472G announced in 1989 was the successor to 3192G and featured five concurrent sessions, one of which could be graphics. Unlike the 3192-G, it needed no expansion unit to attach a mouse or color plotter, and it needed no expansion unit to attach a mouse or color plotter and it could also attach a tablet device for digitised input and a bar code reader. APL / APL2 Most IBM terminals, starting with the 3277, could be delivered with an APL keyboard, allowing the operator/programmer to enter APL symbolic instructions directly into the editor. In order to display APL symbols on the terminal, it had to be equipped with an APL character set in addition to the normal 3270-character set. The APL character set is addressed with a preceding Graphic Escape X'08' instruction. With the advent of the graphic terminal 3179G, the APL character set was expandable to 138 characters, called APL2. The added characters were: Diamond, Quad Null, Iota Underbar, Epsilon Underbar, Left Tack, Right Tack, Equal Underbar, Squished Quad, Quad Slope, and Dieresis Dot. Later APL2 symbols were supported by 3191 Models D, E, L, the CUT version of 3192, and 3472. Please note that IBM's version's of APL also is called APL2. Display-Controller 3275 remote display with controller function (no additional displays up to one printer) 3276 remote display with controller function. IBM 3276, announced in 1981, was a combined remote controller and display terminal, offering support for up to 8 displays, the 3276 itself included. By default, the 3276 had two type A coax ports, one for its own display, and one free for an additional terminal or printer. Up to three additional adapters, each supporting two coax devices, could be installed. The 3276 could connect to a non-SNA or SNA host using BSC or SDLC with line speed of up to 9,600 bit/s. The 3276 looked very much like the 3278 terminal, and the terminal feature of the 3276 itself, was more or less identical to those of the 3278. Printers 3284 matrix printer 3286 matrix printer 3287 printer, including a color model 3288 line printer 3268-1 R-loop connected stand-alone printer for the IBM 8100 system 4224 matrix printer In 1984 announced IPDS – Intelligent Printer Data Stream for online printing of AFP - Advanced Function Presentation documents, using bidirectional communications between the application and the printer. IPDS support among others printing of text, fonts, images, graphics, and barcodes. The IBM 4224 is one of the IPDS capable dot matrix printers. With the emergence of printers, including laser printers, from HP, Canon, and others, targeted the PC market, 3270 customers got an alternative to IBM 3270 printers by connecting this type of printers through printer protocol
|
chosen with careful precision. To match the look and texture of the original gallery's marble walls, builders re-opened the quarry in Knoxville, Tennessee, from which the first batch of stone had been harvested. The project even found and hired Malcolm Rice, a quarry supervisor who had overseen the original 1941 gallery project. The marble was cut into three-inch-thick blocks and arranged over the concrete foundation, with darker blocks at the bottom and lighter blocks on top. The East Building was honored on May 30, 1978, two days before its public unveiling, with a black-tie party attended by celebrities, politicians, benefactors, and artists. When the building opened, popular opinion was enthusiastic. Large crowds visited the new museum, and critics generally voiced their approval. Ada Louise Huxtable wrote in The New York Times that Pei's building was "a palatial statement of the creative accommodation of contemporary art and architecture". The sharp angle of the smaller building has been a particular note of praise for the public; over the years it has become stained and worn from the hands of visitors. Some critics disliked the unusual design, however, and criticized the reliance on triangles throughout the building. Others took issue with the large main lobby, particularly its attempt to lure casual visitors. In his review for Artforum, critic Richard Hennessy described a "shocking fun-house atmosphere" and "aura of ancient Roman patronage". One of the earliest and most vocal critics, however, came to appreciate the new gallery once he saw it in person. Allan Greenberg had scorned the design when it was first unveiled, but wrote later to J. Carter Brown: "I am forced to admit that you are right and I was wrong! The building is a masterpiece." Fragrant Hills, China After U.S. President Richard Nixon made his famous 1972 visit to China, a wave of exchanges took place between the two countries. One of these was a delegation of the American Institute of Architects in 1974, which Pei joined. It was his first trip back to China since leaving in 1935. He was favorably received, returned the welcome with positive comments, and a series of lectures ensued. Pei noted in one lecture that since the 1950s Chinese architects had been content to imitate Western styles; he urged his audience in one lecture to search China's native traditions for inspiration. In 1978, Pei was asked to initiate a project for his home country. After surveying a number of different locations, Pei fell in love with a valley that had once served as an imperial garden and hunting preserve known as Fragrant Hills. The site housed a decrepit hotel; Pei was invited to tear it down and build a new one. As usual, he approached the project by carefully considering the context and purpose. Likewise, he considered modernist styles inappropriate for the setting. Thus, he said, it was necessary to find "a third way". After visiting his ancestral home in Suzhou, Pei created a design based on some simple but nuanced techniques he admired in traditional residential Chinese buildings. Among these were abundant gardens, integration with nature, and consideration of the relationship between enclosure and opening. Pei's design included a large central atrium covered by glass panels that functioned much like the large central space in his East Building of the National Gallery. Openings of various shapes in walls invited guests to view the natural scenery beyond. Younger Chinese who had hoped the building would exhibit some of Cubist flavor for which Pei had become known were disappointed, but the new hotel found more favour with government officials and architects. The hotel, with 325 guest rooms and a four-story central atrium, was designed to fit perfectly into its natural habitat. The trees in the area were of special concern, and particular care was taken to cut down as few as possible. He worked with an expert from Suzhou to preserve and renovate a water maze from the original hotel, one of only five in the country. Pei was also meticulous about the arrangement of items in the garden behind the hotel; he even insisted on transporting of rocks from a location in southwest China to suit the natural aesthetic. An associate of Pei's said later that he never saw the architect so involved in a project. During construction, a series of mistakes collided with the nation's lack of technology to strain relations between architects and builders. Whereas 200 or so workers might have been used for a similar building in the US, the Fragrant Hill project employed over 3,000 workers. This was mostly because the construction company lacked the sophisticated machines used in other parts of the world. The problems continued for months, until Pei had an uncharacteristically emotional moment during a meeting with Chinese officials. He later explained that his actions included "shouting and pounding the table" in frustration. The design staff noticed a difference in the manner of work among the crew after the meeting. As the opening neared, however, Pei found the hotel still needed work. He began scrubbing floors with his wife and ordered his children to make beds and vacuum floors. The project's difficulties took an emotional and physical strain on the Pei family. The Fragrant Hill Hotel opened on October 17, 1982, but quickly fell into disrepair. A member of Pei's staff returned for a visit several years later and confirmed the dilapidated condition of the hotel. He and Pei attributed this to the country's general unfamiliarity with deluxe buildings. The Chinese architectural community at the time gave the structure little attention, as their interest at the time centered on the work of American postmodernists such as Michael Graves. Javits Convention Center, New York As the Fragrant Hill project neared completion, Pei began work on the Jacob K. Javits Convention Center in New York City, for which his associate James Freed served as lead designer. Hoping to create a vibrant community institution in what was then a run-down neighborhood on Manhattan's west side, Freed developed a glass-coated structure with an intricate space frame of interconnected metal rods and spheres. The convention center was plagued from the start by budget problems and construction blunders. City regulations forbid a general contractor having final authority over the project, so architects and program manager Richard Kahan had to coordinate the wide array of builders, plumbers, electricians, and other workers. The forged steel globes to be used in the space frame came to the site with hairline cracks and other defects: 12,000 were rejected. These and other problems led to media comparisons with the disastrous Hancock Tower. One New York City official blamed Kahan for the difficulties, indicating that the building's architectural flourishes were responsible for delays and financial crises. The Javits Center opened on April 3, 1986, to a generally positive reception. During the inauguration ceremonies, however, neither Freed nor Pei was recognized for their role in the project. Grand Louvre, Paris When François Mitterrand was elected President of France in 1981, he laid out an ambitious plan for a variety of construction projects. One of these was the renovation of the Louvre. Mitterrand appointed a civil servant named to oversee it. After visiting museums in Europe and the United States, including the U.S. National Gallery, he asked Pei to join the team. The architect made three secretive trips to Paris, to determine the feasibility of the project; only one museum employee knew why he was there. Pei finally agreed that a new construction project was not only possible, but necessary for the future of the museum. He thus became the first foreign architect to work on the Louvre. The heart of the new design included not only a renovation of the Cour Napoléon in the midst of the buildings, but also a transformation of the interiors. Pei proposed a central entrance, not unlike the lobby of the National Gallery East Building, which would link the three major wings around the central space. Below would be a complex of additional floors for research, storage, and maintenance purposes. At the center of the courtyard he designed a glass and steel pyramid, first proposed with the Kennedy Library, to serve as entrance and anteroom skylight. It was mirrored by an inverted pyramid to the west, to reflect sunlight into the complex. These designs were partly an homage to the fastidious geometry of the French landscape architect André Le Nôtre (1613–1700). Pei also found the pyramid shape best suited for stable transparency, and considered it "most compatible with the architecture of the Louvre, especially with the faceted planes of its roofs". Biasini and Mitterrand liked the plans, but the scope of the renovation displeased Louvre administrator André Chabaud. He resigned from his post, complaining that the project was "unfeasible" and posed "architectural risks". Some sections of the French public also reacted harshly to the design, mostly because of the proposed pyramid. One critic called it a "gigantic, ruinous gadget"; another charged Mitterrand with "despotism" for inflicting Paris with the "atrocity". Pei estimated that 90 percent of Parisians opposed his design. "I received many angry glances in the streets of Paris," he said. Some condemnations carried nationalistic overtones. One opponent wrote: "I am surprised that one would go looking for a Chinese architect in America to deal with the historic heart of the capital of France." Soon, however, Pei and his team won the support of several key cultural icons, including the conductor Pierre Boulez and Claude Pompidou, widow of former French President Georges Pompidou, after whom the similarly controversial Centre Georges Pompidou was named. In an attempt to soothe public ire, Pei took a suggestion from then-mayor of Paris Jacques Chirac and placed a full-sized cable model of the pyramid in the courtyard. During the four days of its exhibition, an estimated 60,000 people visited the site. Some critics eased their opposition after witnessing the proposed scale of the pyramid. Pei demanded a method of glass production that resulted in clear panes. The pyramid was constructed at the same time as the subterranean levels below, which caused difficulties during the building stages. As they worked, construction teams came upon an abandoned set of rooms containing 25,000 historical items; these were incorporated into the rest of the structure to add a new exhibition zone. The new Cour Napoléon was opened to the public on October 14, 1988, and the Pyramid entrance was opened the following March. By this time, public opposition had softened; a poll found a 56 percent approval rating for the pyramid, with 23 percent still opposed. The newspaper Le Figaro had vehemently criticized Pei's design, but later celebrated the tenth anniversary of its magazine supplement at the pyramid. Prince Charles of Britain surveyed the new site with curiosity, and declared it "marvelous, very exciting". A writer in Le Quotidien de Paris wrote: "The much-feared pyramid has become adorable." The experience was exhausting for Pei, but also rewarding. "After the Louvre," he said later, "I thought no project would be too difficult." The pyramid achieved further widespread international recognition for its central role in the plot at the denouement of The Da Vinci Code by Dan Brown and its appearance in the final scene of the subsequent screen adaptation. The Louvre Pyramid has become Pei's most famous structure. Meyerson Symphony Center, Dallas The opening of the Louvre Pyramid coincided with four other projects on which Pei had been working, prompting architecture critic Paul Goldberger to declare 1989 "the year of Pei" in The New York Times. It was also the year in which Pei's firm changed its name to Pei Cobb Freed & Partners, to reflect the increasing stature and prominence of his associates. At the age of 72, Pei had begun thinking about retirement, but continued working long hours to see his designs come to light. One of the projects took Pei back to Dallas, Texas, to design the Morton H. Meyerson Symphony Center. The success of city's performing artists, particularly the Dallas Symphony Orchestra then led by conductor Eduardo Mata, led to interest by city leaders in creating a modern center for musical arts that could rival the best halls in Europe. The organizing committee contacted 45 architects, but at first Pei did not respond, thinking that his work on the Dallas City Hall had left a negative impression. One of his colleagues from that project, however, insisted that he meet with the committee. He did and, although it would be his first concert hall, the committee voted unanimously to offer him the commission. As one member put it: "We were convinced that we would get the world's greatest architect putting his best foot forward." The project presented a variety of specific challenges. Because its main purpose was the presentation of live music, the hall needed a design focused on acoustics first, then public access and exterior aesthetics. To this end, a professional sound technician was hired to design the interior. He proposed a shoebox auditorium, used in the acclaimed designs of top European symphony halls such as the Amsterdam Concertgebouw and Vienna Musikverein. Pei drew inspiration for his adjustments from the designs of the German architect Johann Balthasar Neumann, especially the Basilica of the Fourteen Holy Helpers. He also sought to incorporate some of the panache of the Paris Opéra designed by Charles Garnier. Pei's design placed the rigid shoebox at an angle to the surrounding street grid, connected at the north end to a long rectangular office building, and cut through the middle with an assortment of circles and cones. The design attempted to reproduce with modern features the acoustic and visual functions of traditional elements like filigree. The project was risky: its goals were ambitious and any unforeseen acoustic flaws would be virtually impossible to remedy after the hall's completion. Pei admitted that he did not completely know how everything would come together. "I can imagine only 60 percent of the space in this building," he said during the early stages. "The rest will be as surprising to me as to everyone else." As the project developed, costs rose steadily and some sponsors considered withdrawing their support. Billionaire tycoon Ross Perot made a donation of US$10 million, on the condition that it be named in honor of Morton H. Meyerson, the longtime patron of the arts in Dallas. The building opened and immediately garnered widespread praise, especially for its acoustics. After attending a week of performances in the hall, a music critic for The New York Times wrote an enthusiastic account of the experience and congratulated the architects. One of Pei's associates told him during a party before the opening that the symphony hall was "a very mature building"; he smiled and replied: "Ah, but did I have to wait this long?" Bank of China, Hong Kong A new offer had arrived for Pei from the Chinese government in 1982. With an eye toward the transfer of sovereignty of Hong Kong from the British in 1997, authorities in China sought Pei's aid on a new tower for the local branch of the Bank of China. The Chinese government was preparing for a new wave of engagement with the outside world and sought a tower to represent modernity and economic strength. Given the elder Pei's history with the bank before the Communist takeover, government officials visited the 89-year-old man in New York to gain approval for his son's involvement. Pei then spoke with his father at length about the proposal. Although the architect remained pained by his experience with Fragrant Hills, he agreed to accept the commission. The proposed site in Hong Kong's Central District was less than ideal; a tangle of highways lined it on three sides. The area had also been home to a headquarters for Japanese military police during World War II, and was notorious for prisoner torture. The small parcel of land made a tall tower necessary, and Pei had usually shied away from such projects; in Hong Kong especially, the skyscrapers lacked any real architectural character. Lacking inspiration and unsure of how to approach the building, Pei took a weekend vacation to the family home in Katonah, New York. There he found himself experimenting with a bundle of sticks until he happened upon a cascading sequence. Pei felt that his design for the Bank of China Tower needed to reflect "the aspirations of the Chinese people". The design that he developed for the skyscraper was not only unique in appearance, but also sound enough to pass the city's rigorous standards for wind-resistance. The building is composed of four triangular shafts rising up from a square base, supported by a visible truss structure that distributes stress to the four corners of the base. Using the reflective glass that had become something of a trademark for him, Pei organized the facade around diagonal bracing in a union of structure and form that reiterates the triangle motif established in the plan. At the top, he designed the roofs at sloping angles to match the rising aesthetic of the building. Some influential advocates of feng shui in Hong Kong and China criticized the design, and Pei and government officials responded with token adjustments. As the tower neared completion, Pei was shocked to witness the government's massacre of unarmed civilians at the Tiananmen Square protests of 1989. He wrote an opinion piece for The New York Times titled "China Won't Ever Be the Same," in which he said that the killings "tore the heart out of a generation that carries the hope for the future of the country". The massacre deeply disturbed his entire family, and he wrote that "China is besmirched." 1990–2019: museum projects As the 1990s began, Pei transitioned into a role of decreased involvement with his firm. The staff had begun to shrink, and Pei wanted to dedicate himself to smaller projects allowing for more creativity. Before he made this change, however, he set to work on his last major project as active partner: the Rock and Roll Hall of Fame in Cleveland, Ohio. Considering his work on such bastions of high culture as the Louvre and U.S. National Gallery, some critics were surprised by his association with what many considered a tribute to low culture. The sponsors of the hall, however, sought Pei for specifically this reason; they wanted the building to have an aura of respectability from the beginning. As in the past, Pei accepted the commission in part because of the unique challenge it presented. Using a glass wall for the entrance, similar in appearance to his Louvre pyramid, Pei coated the exterior of the main building in white metal, and placed a large cylinder on a narrow perch to serve as a performance space. The combination of off-centered wraparounds and angled walls was, Pei said, designed to provide "a sense of tumultuous youthful energy, rebelling, flailing about". The building opened in 1995, and was received with moderate praise. The New York Times called it "a fine building", but Pei was among those who felt disappointed with the results. The museum's early beginnings in New York combined with an unclear mission created a fuzzy understanding among project leaders for precisely what was needed. Although the city of Cleveland benefited greatly from the new tourist attraction, Pei was unhappy with it. At the same time, Pei designed a new museum for Luxembourg, the Musée d'art moderne Grand-Duc Jean, commonly known as the Mudam. Drawing from the original shape of the Fort Thüngen walls where the museum was located, Pei planned to remove a portion of the original foundation. Public resistance to the historical loss forced a revision of his plan, however, and the project was nearly abandoned. The size of the building was halved, and it was set back from the original wall segments to preserve the foundation. Pei was disappointed with the alterations, but remained involved in the building process even during construction. In 1995, Pei was hired to design an extension to the Deutsches Historisches Museum, or German Historical Museum in Berlin. Returning to the challenge of the East Building of the U.S. National Gallery, Pei worked to combine a modernist approach with a classical main structure. He described the glass cylinder addition as a "beacon," and topped it with a glass roof to allow plentiful sunlight inside. Pei had difficulty working with German government officials on the project; their utilitarian approach clashed with his passion for aesthetics. "They thought I was nothing but trouble", he said. Pei also worked at this time on two projects for a new Japanese religious movement called Shinji Shumeikai. He was approached by the movement's spiritual leader, Kaishu Koyama, who impressed the architect with her sincerity and willingness to give him significant artistic freedom. One of the buildings was a bell tower, designed to resemble the bachi used when playing traditional instruments like the shamisen. Pei was unfamiliar with the movement's beliefs, but explored them in order to represent something meaningful in the tower. As he said: "It was a search for the sort of expression that is not at all technical." The experience was rewarding for Pei, and he agreed immediately to work with the group again. The new project was the Miho Museum, to display Koyama's collection of tea ceremony artifacts. Pei visited the site in Shiga Prefecture, and during their conversations convinced Koyama to expand her collection. She conducted a global search and acquired more than 300 items showcasing the history of the Silk Road. One major challenge was the approach to the museum. The Japanese team proposed a winding road up the mountain, not unlike the approach to the NCAR building in Colorado. Instead, Pei ordered a hole cut through a nearby mountain, connected to a major road via a bridge suspended from ninety-six steel cables and supported by a post set into the mountain. The museum itself was built into the mountain, with 80 percent of the building underground. When designing the exterior, Pei borrowed from the tradition of Japanese temples, particularly those found in nearby Kyoto. He created a concise spaceframe wrapped into French limestone and covered with a glass roof. Pei also oversaw specific decorative details, including a bench in the entrance lobby, carved from a 350-year-old keyaki tree. Because of Koyama's considerable wealth, money was rarely considered an obstacle; estimates at the time of completion put the cost of the project at US$350 million. During the first decade of the 2000s, Pei designed a variety of buildings, including the Suzhou Museum near his childhood home. He also designed the Museum of Islamic Art in Doha, Qatar at the request of the Al-Thani Family. Although it was originally planned for the corniche road along Doha Bay, Pei convinced the project coordinators to build a new island to provide the needed space. He then spent six months touring the region and surveying mosques in Spain, Syria, and Tunisia. He was especially impressed with the elegant simplicity of the Mosque of Ibn Tulun in Cairo. Once again, Pei sought to combine new design elements with the classical aesthetic most appropriate for the location of the building. The sand-colored rectangular boxes rotate evenly to create a subtle movement, with small arched windows at regular intervals into the limestone exterior. Inside, galleries are arranged around a massive atrium, lit from above. The museum's coordinators were pleased with the project; its official website describes its "true splendour unveiled in the sunlight," and speaks of "the shades of colour and the interplay of shadows paying tribute to the essence of Islamic architecture". The Macao Science Center in Macau was designed by Pei Partnership Architects in association with I. M. Pei. The project to build the science center was conceived in 2001 and construction started in 2006. The center was completed in 2009 and opened by the Chinese President Hu Jintao. The main part of the building is a distinctive conical shape with a spiral walkway and large atrium inside, similar to that of the Solomon R. Guggenheim Museum in New York City. Galleries lead off the walkway, mainly consisting of interactive exhibits aimed at science education. The building is in a prominent position by the sea and is now a Macau landmark. Pei's career ended with his death in May 2019, at 102 years of age. Style and method Pei's style was described as thoroughly modernist, with significant cubist themes. He was known for combining traditional architectural principles with progressive designs based on simple geometric patterns—circles, squares, and triangles are common elements of his work in both plan and elevation. As one critic wrote: "Pei has been aptly described as combining a classical sense of form with a contemporary mastery of method." In 2000, biographer Carter Wiseman called Pei "the most distinguished member of his Late-Modernist generation still in practice". At the same time, Pei himself rejected simple dichotomies of architectural trends. He once said: "The talk about modernism versus post-modernism is unimportant. It's a side issue. An individual building, the style in which it is going to be designed and built, is not that important. The important thing, really, is the community. How does it affect life?" Pei's work is celebrated throughout the world of architecture. His colleague John Portman once told him: "Just once, I'd like to do something like the East Building." But this originality did not always bring large financial reward; as Pei replied to the successful architect: "Just once, I'd like to make the kind of money you do." His concepts, moreover, were too individualized and dependent on context to have given rise to a particular school of design. Pei referred to his own "analytical approach"
|
his work. In 1945 Eileen gave birth to a son, T'ing Chung; she withdrew from the landscape architecture program in order to care for him. Pei returned to Harvard in the autumn of 1945, and received a position as assistant professor of design. The GSD was developing into a hub of resistance to the Beaux-Arts orthodoxy. At the center were members of the Bauhaus, a European architectural movement that had advanced the cause of modernist design. The Nazi regime had condemned the Bauhaus school, and its leaders left Germany. Two of these, Walter Gropius and Marcel Breuer, took positions at the Harvard GSD. Their iconoclastic focus on modern architecture appealed to Pei, and he worked closely with both men. One of Pei's design projects at the GSD was a plan for an art museum in Shanghai. He wanted to create a mood of Chinese authenticity in the architecture without using traditional materials or styles. The design was based on straight modernist structures, organized around a central courtyard garden, with other similar natural settings arranged nearby. It was very well received; Gropius, in fact, called it "the best thing done in [my] master class." Pei received his M.Arch. degree in 1946, and taught at Harvard for another two years. Career 1948–1956: early career with Webb and Knapp In the spring of 1948, Pei was recruited by New York real estate magnate William Zeckendorf to join a staff of architects for his firm of Webb and Knapp to design buildings around the country. Pei found Zeckendorf's personality the opposite of his own; his new boss was known for his loud speech and gruff demeanor. Nevertheless, they became good friends and Pei found the experience personally enriching. Zeckendorf was well connected politically, and Pei enjoyed learning about the social world of New York's city planners. His first project for Webb and Knapp was an apartment building with funding from the Housing Act of 1949. Pei's design was based on a circular tower with concentric rings. The areas closest to the supporting pillar handled utilities and circulation; the apartments themselves were located toward the outer edge. Zeckendorf loved the design and even showed it off to Le Corbusier when they met. The cost of such an unusual design was too high, however, and the building never moved beyond the model stage. Pei finally saw his architecture come to life in 1949, when he designed a two-story corporate building for Gulf Oil in Atlanta, Georgia. The building was demolished in February 2013 although the front facade will be retained as part of an apartment development. His use of marble for the exterior curtain wall brought praise from the journal Architectural Forum. Pei's designs echoed the work of Mies van der Rohe in the beginning of his career as also shown in his own weekend-house in Katonah, New York in 1952. Soon Pei was so inundated with projects that he asked Zeckendorf for assistants, which he chose from his associates at the GSD, including Henry N. Cobb and Ulrich Franzen. They set to work on a variety of proposals, including the Roosevelt Field Shopping Mall on Long Island. The team also redesigned the Webb and Knapp office building, transforming Zeckendorf's office into a circular space with teak walls and a glass clerestory. They also installed a control panel into the desk that allowed their boss to control the lighting in his office. The project took one year and exceeded its budget, but Zeckendorf was delighted with the results. In 1952, Pei and his team began work on a series of projects in Denver, Colorado. The first of these was the Mile High Center, which compressed the core building into less than 25 percent of the total site; the rest is adorned with an exhibition hall and fountain-dotted plazas. One block away, Pei's team also redesigned Denver's Courthouse Square, which combined office spaces, commercial venues, and hotels. These projects helped Pei conceptualize architecture as part of the larger urban geography. "I learned the process of development," he said later, "and about the city as a living organism." These lessons, he said, became essential for later projects. Pei and his team also designed a united urban area for Washington, D.C., called L'Enfant Plaza (named for French-American architect Pierre Charles L'Enfant). Pei's associate Araldo Cossutta was the lead architect for the plaza's North Building (955 L'Enfant Plaza SW) and South Building (490 L'Enfant Plaza SW). Vlastimil Koubek was the architect for the East Building (L'Enfant Plaza Hotel, located at 480 L'Enfant Plaza SW), and for the Center Building (475 L'Enfant Plaza SW; now the United States Postal Service headquarters). The team set out with a broad vision that was praised by both The Washington Post and Washington Star (which rarely agreed on anything), but funding problems forced revisions and a significant reduction in scale. In 1955, Pei's group took a step toward institutional independence from Webb and Knapp by establishing a new firm called I. M. Pei & Associates. (The name changed later to I. M. Pei & Partners.) They gained the freedom to work with other companies, but continued working primarily with Zeckendorf. The new firm distinguished itself through the use of detailed architectural models. They took on the Kips Bay residential area on the East Side of Manhattan, where Pei set up Kips Bay Towers, two large long towers of apartments with recessed windows (to provide shade and privacy) in a neat grid, adorned with rows of trees. Pei involved himself in the construction process at Kips Bay, even inspecting the bags of cement to check for consistency of color. The company continued its urban focus with the Society Hill project in central Philadelphia. Pei designed the Society Hill Towers, a three-building residential block injecting cubist design into the 18th-century milieu of the neighborhood. As with previous projects, abundant green spaces were central to Pei's vision, which also added traditional townhouses to aid the transition from classical to modern design. From 1958 to 1963, Pei and Ray Affleck developed a key downtown block of Montreal in a phased process that involved one of Pei's most admired structures in the Commonwealth, the cruciform tower known as the Royal Bank Plaza (Place Ville Marie). According to The Canadian Encyclopedia "its grand plaza and lower office buildings, designed by internationally famous US architect I. M. Pei, helped to set new standards for architecture in Canada in the 1960s ... The tower's smooth aluminum and glass surface and crisp unadorned geometric form demonstrate Pei's adherence to the mainstream of 20th-century modern design." Although these projects were satisfying, Pei wanted to establish an independent name for himself. In 1959 he was approached by MIT to design a building for its Earth science program. The Green Building continued the grid design of Kips Bay and Society Hill. The pedestrian walkway at the ground floor, however, was prone to sudden gusts of wind, which embarrassed Pei. "Here I was from MIT," he said, "and I didn't know about wind-tunnel effects." At the same time, he designed the Luce Memorial Chapel in at Tunghai University in Taichung, Taiwan. The soaring structure, commissioned by the same organisation that had run his middle school in Shanghai, broke severely from the cubist grid patterns of his urban projects. The challenge of coordinating these projects took an artistic toll on Pei. He found himself responsible for acquiring new building contracts and supervising the plans for them. As a result, he felt disconnected from the actual creative work. "Design is something you have to put your hand to," he said. "While my people had the luxury of doing one job at a time, I had to keep track of the whole enterprise." Pei's dissatisfaction reached its peak at a time when financial problems began plaguing Zeckendorf's firm. I. M. Pei and Associates officially broke from Webb and Knapp in 1960, which benefited Pei creatively but pained him personally. He had developed a close friendship with Zeckendorf, and both men were sad to part ways. NCAR and related projects Pei was able to return to hands-on design when he was approached in 1961 by Walter Orr Roberts to design the new Mesa Laboratory for the National Center for Atmospheric Research outside Boulder, Colorado. The project differed from Pei's earlier urban work; it would rest in an open area in the foothills of the Rocky Mountains. He drove with his wife around the region, visiting assorted buildings and surveying the natural environs. He was impressed by the United States Air Force Academy in Colorado Springs, but felt it was "detached from nature". The conceptualization stages were important for Pei, presenting a need and an opportunity to break from the Bauhaus tradition. He later recalled the long periods of time he spent in the area: "I recalled the places I had seen with my mother when I was a little boy—the mountaintop Buddhist retreats. There in the Colorado mountains, I tried to listen to the silence again—just as my mother had taught me. The investigation of the place became a kind of religious experience for me." Pei also drew inspiration from the Mesa Verde cliff dwellings of the Ancestral Puebloans; he wanted the buildings to exist in harmony with their natural surroundings. To this end, he called for a rock-treatment process that could color the buildings to match the nearby mountains. He also set the complex back on the mesa overlooking the city, and designed the approaching road to be long, winding, and indirect. Roberts disliked Pei's initial designs, referring to them as "just a bunch of towers". Roberts intended his comments as typical of scientific experimentation, rather than artistic critique; still, Pei was frustrated. His second attempt, however, fit Roberts' vision perfectly: a spaced-out series of clustered buildings, joined by lower structures and complemented by two underground levels. The complex uses many elements of cubist design, and the walkways are arranged to increase the probability of casual encounters among colleagues. Once the laboratory was built, several problems with its construction became apparent. Leaks in the roof caused difficulties for researchers, and the shifting of clay soil beneath caused cracks in the buildings which were expensive to repair. Still, both architect and project manager were pleased with the final result. Pei referred to the NCAR complex as his "breakout building", and he remained a friend of Roberts until the scientist died in . The success of NCAR brought renewed attention to Pei's design acumen. He was recruited to work on a variety of projects, including the S. I. Newhouse School of Public Communications at Syracuse University, the Everson Museum of Art in Syracuse, New York, the Sundrome terminal at John F. Kennedy International Airport in New York City, and dormitories at New College of Florida. Kennedy Library After President John F. Kennedy was assassinated in , his family and friends discussed how to construct a library that would serve as a fitting memorial. A committee was formed to advise Kennedy's widow Jacqueline, who would make the final decision. The group deliberated for months and considered many famous architects. Eventually, Kennedy chose Pei to design the library, based on two considerations. First, she appreciated the variety of ideas he had used for earlier projects. "He didn't seem to have just one way to solve a problem," she said. "He seemed to approach each commission thinking only of it and then develop a way to make something beautiful." Ultimately, however, Kennedy made her choice based on her personal connection with Pei. Calling it "really an emotional decision", she explained: "He was so full of promise, like Jack; they were born in the same year. I decided it would be fun to take a great leap with him." The project was plagued with problems from the outset. The first was scope. President Kennedy had begun considering the structure of his library soon after taking office, and he wanted to include archives from his administration, a museum of personal items, and a political science institute. After the assassination, the list expanded to include a fitting memorial tribute to the slain president. The variety of necessary inclusions complicated the design process and caused significant delays. Pei's first proposed design included a large glass pyramid that would fill the interior with sunlight, meant to represent the optimism and hope that Kennedy's administration had symbolized for so many in the United States. Mrs. Kennedy liked the design, but resistance began in Cambridge, the first proposed site for the building, as soon as the project was announced. Many community members worried that the library would become a tourist attraction, causing particular problems with traffic congestion. Others worried that the design would clash with the architectural feel of nearby Harvard Square. By the mid-1970s, Pei tried proposing a new design, but the library's opponents resisted every effort. These events pained Pei, who had sent all three of his sons to Harvard, and although he rarely discussed his frustration, it was evident to his wife. "I could tell how tired he was by the way he opened the door at the end of the day," she said. "His footsteps were dragging. It was very hard for I. M. to see that so many people didn't want the building." Finally the project moved to Columbia Point, near the University of Massachusetts Boston. The new site was less than ideal; it was located on an old landfill, and just over a large sewage pipe. Pei's architectural team added more fill to cover the pipe and developed an elaborate ventilation system to conquer the odor. A new design was unveiled, combining a large square glass-enclosed atrium with a triangular tower and a circular walkway. The John F. Kennedy Presidential Library and Museum was dedicated on October 20, 1979. Critics generally liked the finished building, but the architect himself was unsatisfied. The years of conflict and compromise had changed the nature of the design, and Pei felt that the final result lacked its original passion. "I wanted to give something very special to the memory of President Kennedy," he said in 2000. "It could and should have been a great project." Pei's work on the Kennedy project boosted his reputation as an architect of note. "Pei Plan" in Oklahoma City The Pei Plan was a failed urban redevelopment initiative designed for downtown Oklahoma City, Oklahoma, in 1964. The plan called for the demolition of hundreds of old downtown structures in favor of renewed parking, office building, and retail developments, in addition to public projects such as the Myriad Convention Center and the Myriad Botanical Gardens. It was the dominant template for downtown development in Oklahoma City from its inception through the 1970s. The plan generated mixed results and opinion, largely succeeding in re-developing office building and parking infrastructure but failing to attract its anticipated retail and residential development. Significant public resentment also developed as a result of the destruction of multiple historic structures. As a result, Oklahoma City's leadership avoided large-scale urban planning for downtown throughout the 1980s and early 1990s, until the passage of the Metropolitan Area Projects (MAPS) initiative in 1993. Providence's Cathedral Square Another city which turned to Pei for urban renewal during this time was Providence, Rhode Island. In the late 1960s, Providence hired Pei to redesign Cathedral Square, a once-bustling civic center which had become neglected and empty, as part of an ambitious larger plan to redesign downtown. Pei's new plaza, modeled after the Greek Agora marketplace, opened in 1972. Unfortunately, the city ran out of money before Pei's vision could be fully realized. Also, recent construction of a low-income housing complex and Interstate 95 had changed the neighborhood's character permanently. In 1974, The Providence Evening Bulletin called Pei's new plaza a "conspicuous failure". By 2016, media reports characterized the plaza as a neglected, little-visited "hidden gem". Augusta, Georgia In 1974, the city of Augusta, Georgia turned to Pei and his firm for downtown revitalization. The Chamber of Commerce building and Bicentennial Park were completed from his plan. In 1976, Pei designed a distinctive modern penthouse that was added to the roof of architect William Lee Stoddart's historic Lamar Building, designed in 1916. In 1980, Pei and his company designed the Augusta Civic Center, now known as the James Brown Arena. Dallas City Hall Kennedy's assassination also led indirectly to another commission for Pei's firm. In 1964 the acting mayor of Dallas, Erik Jonsson, began working to change the community's image. Dallas was known and disliked as the city where the president had been killed, but Jonsson began a program designed to initiate a community renewal. One of the goals was a new city hall, which could be a "symbol of the people". Jonsson, a co-founder of Texas Instruments, learned about Pei from his associate Cecil Howard Green, who had recruited the architect for MIT's Earth Sciences building. Pei's approach to the new Dallas City Hall mirrored those of other projects; he surveyed the surrounding area and worked to make the building fit. In the case of Dallas, he spent days meeting with residents of the city and was impressed by their civic pride. He also found that the skyscrapers of the downtown business district dominated the skyline, and sought to create a building which could face the tall buildings and represent the importance of the public sector. He spoke of creating "a public-private dialogue with the commercial high-rises". Working with his associate Theodore Musho, Pei developed a design centered on a building with a top much wider than the bottom; the facade leans at an angle of 34 degrees, which shades the building from the Texas sun. A plaza stretches out before the building, and a series of support columns holds it up. It was influenced by Le Corbusier's High Court building in Chandigarh, India; Pei sought to use the significant overhang to unify the building and plaza. The project cost much more than initially expected, and took 11 years to complete. Revenue was secured in part by including a subterranean parking garage. The interior of the city hall is large and spacious; windows in the ceiling above the eighth floor fill the main space with light. The city of Dallas received the building well, and a local television news crew found unanimous approval of the new city hall when it officially opened to the public in 1978. Pei himself considered the project a success, even as he worried about the arrangement of its elements. He said: "It's perhaps stronger than I would have liked; it's got more strength than finesse." He felt that his relative lack of experience left him without the necessary design tools to refine his vision, but the community liked the city hall enough to invite him back. Over the years he went on to design five additional buildings in the Dallas area. Hancock Tower, Boston While Pei and Musho were coordinating the Dallas project, their associate Henry Cobb had taken the helm for a commission in Boston. John Hancock Insurance chairman Robert Slater hired I. M. Pei & Partners to design a building that could overshadow the Prudential Tower, erected by their rival. After the firm's first plan was discarded due to a need for more office space, Cobb developed a new plan around a towering parallelogram, slanted away from the Trinity Church and accented by a wedge cut into each narrow side. To minimize the visual impact, the building was covered in large reflective glass panels; Cobb said this would make the building a "background and foil" to the older structures around it. When the Hancock Tower was finished in 1976, it was the tallest building in New England. Serious issues of execution became evident in the tower almost immediately. Many glass panels fractured in a windstorm during construction in 1973. Some detached and fell to the ground, causing no injuries but sparking concern among Boston residents. In response, the entire tower was reglazed with smaller panels. This significantly increased the cost of the project. Hancock sued the glass manufacturers, Libbey-Owens-Ford, as well as I. M. Pei & Partners, for submitting plans that were "not good and workmanlike". LOF countersued Hancock for defamation, accusing Pei's firm of poor use of their materials; I. M. Pei & Partners sued LOF in return. All three companies settled out of court in 1981. The project became an albatross for Pei's firm. Pei himself refused to discuss it for many years. The pace of new commissions slowed and the firm's architects began looking overseas for opportunities. Cobb worked in Australia and Pei took on jobs in Singapore, Iran, and Kuwait. Although it was a difficult time for everyone involved, Pei later reflected with patience on the experience. "Going through this trial toughened us," he said. "It helped to cement us as partners; we did not give up on each other." National Gallery East Building, Washington, DC In the mid-1960s, directors of the National Gallery of Art in Washington, D.C., declared the need for a new building. Paul Mellon, a primary benefactor of the gallery and a member of its building committee, set to work with his assistant J. Carter Brown (who became gallery director in 1969) to find an architect. The new structure would be located to the east of the original building, and tasked with two functions: offer a large space for public appreciation of various popular collections; and house office space as well as archives for scholarship and research. They likened the scope of the new facility to the Library of Alexandria. After inspecting Pei's work at the Des Moines Art Center in Iowa and the Johnson Museum at Cornell University, they offered him the commission. Pei took to the project with vigor, and set to work with two young architects he had recently recruited to the firm, William Pedersen and Yann Weymouth. Their first obstacle was the unusual shape of the building site, a trapezoid of land at the intersection of Constitution and Pennsylvania Avenues. Inspiration struck Pei in 1968, when he scrawled a rough diagram of two triangles on a scrap of paper. The larger building would be the public gallery; the smaller would house offices and archives. This triangular shape became a singular vision for the architect. As the date for groundbreaking approached, Pedersen suggested to his boss that a slightly different approach would make construction easier. Pei simply smiled and said: "No compromises." The growing popularity of art museums presented unique challenges to the architecture. Mellon and Pei both expected large crowds of people to visit the new building, and they planned accordingly. To this end, Pei designed a large lobby roofed with enormous skylights. Individual galleries are located along the periphery, allowing visitors to return after viewing each exhibit to the spacious main room. A large mobile sculpture by American artist Alexander Calder was later added to the lobby. Pei hoped the lobby would be exciting to the public in the same way as the central room of the Guggenheim Museum is in New York City. The modern museum, he said later, "must pay greater attention to its educational responsibility, especially to the young". Materials for the building's exterior were chosen with careful precision. To match the look and texture of the original gallery's marble walls, builders re-opened the quarry in Knoxville, Tennessee, from which the first batch of stone had been harvested. The project even found and hired Malcolm Rice, a quarry supervisor who had overseen the original 1941 gallery project. The marble was cut into three-inch-thick blocks and arranged over the concrete foundation, with darker blocks at the bottom and lighter blocks on top. The East Building was honored on May 30, 1978, two days before its public unveiling, with a black-tie party attended by celebrities, politicians, benefactors, and artists. When the building opened, popular opinion was enthusiastic. Large crowds visited the new museum, and critics generally voiced their approval. Ada Louise Huxtable wrote in The New York Times that Pei's building was "a palatial statement of the creative accommodation of contemporary art and architecture". The sharp angle of the smaller building has been a particular note of praise for the public; over the years it has become stained and worn from the hands of visitors. Some critics disliked the unusual design, however, and criticized the reliance on triangles throughout the building. Others took issue with the large main lobby, particularly its attempt to lure casual visitors. In his review for Artforum, critic Richard Hennessy described a "shocking fun-house atmosphere" and "aura of ancient Roman patronage". One of the earliest and most vocal critics, however, came to appreciate the new gallery once he saw it in person. Allan Greenberg had scorned the design when it was first unveiled, but wrote later to J. Carter Brown: "I am forced to admit that you are right and I was wrong! The building is a masterpiece." Fragrant Hills, China After U.S. President Richard Nixon made his famous 1972 visit to China, a wave of exchanges took place between the two countries. One of these was a delegation of the American Institute of Architects in 1974, which Pei joined. It was his first trip back to China since leaving in 1935. He was favorably received, returned the welcome with positive comments, and a series of lectures ensued. Pei noted in one lecture that since the 1950s Chinese architects had been content to imitate Western styles; he urged his audience in one lecture to search China's native traditions for inspiration. In 1978, Pei was asked to initiate a project for his home country. After surveying a number of different locations,
|
Science and technology In-circuit debugger, in electronic hardware development Interface control document, in systems and software engineering MPLAB devices ICD (n-circuit debugger) Interatomic Coulombic decay, a relaxation process Medicine Immunogenic cell death Implantable cardioverter-defibrillator Impulse control disorder Isobaric counterdiffusion Other uses Doctor of Canon Law (Latin: Iuris Canonici Doctor) Incentive-centered design Inland container depot of Container Corporation of India See
|
Clothing Designs, UK clothing importer Science and technology In-circuit debugger, in electronic hardware development Interface control document, in systems and software engineering MPLAB devices ICD (n-circuit debugger) Interatomic Coulombic decay, a relaxation process Medicine Immunogenic cell death Implantable cardioverter-defibrillator Impulse control disorder Isobaric counterdiffusion Other uses Doctor of Canon Law (Latin: Iuris Canonici Doctor) Incentive-centered design Inland container depot of
|
Damascus) Islamic Jihad Organization, active mostly in Lebanon Islamic Jihad Union, active in Afghanistan
|
Jihad Movement in Palestine (headquartered in Damascus) Islamic Jihad Organization, active mostly in
|
|| i486DX2 (P24) || 40/20, 50/25 MHz66/33 MHz || 5 V || 8 KB WT || March 1992August 1992 || The internal processor clock runs at twice the clock rate of the external bus clock |- | || i486DX-S (P4S) || 33 MHz; 50 MHz || 5 V or 3.3 V || 8 KB WT || June 1993 || SL Enhanced 486DX |- | || i486DX2-S (P24S) || 40/20 MHz,50/25 MHz,(66/33 MHz) || 5 V or 3.3 V || 8 KB WT || June 1993 || |- | || i486SX-S (P23S)|| 25, 33 MHz || 5 V or 3.3 V || 8 KB WT || June 1993 || SL Enhanced 486SX |- | || i486SX2 || 50/25, 66/33 MHz || 5 V || 8 KB WT || March 1994 || i486DX2 with the FPU disabled |- | || IntelDX4 (P24C) || 75/25, 100/33 MHz || 3.3 V || 16 KB WT || March 1994 || Designed to run at triple clock rate (not quadruple, as often believed; the DX3, which was meant to run at 2.5× the clock speed, was never released). DX4 models that featured write-back cache were identified by an "&EW" laser-etched into their top surface, while the write-through models were identified by "&E". |- | || i486DX2WB (P24D)|| 50/25 MHz,66/33 MHz || 5 V || 8 KB WB || October 1994 || Enabled write-back cache. |- | || IntelDX4WB || 100/33 MHz || 3.3 V || 16 KB WB || October 1994 || |- | || i486DX2 (P24LM) || 90/30 MHz,100/33 MHz || 2.5–2.9 V || 8 KB WT || 1994 || |- | || i486GX || up to 33 MHz || 3.3 V || 8 KB WT || || Embedded ultra-low-power CPU with all features of the i486SX and 16-bit external data bus. This CPU is for embedded battery-operated and hand-held applications. |} *WT = write-through cache strategy, WB = write-back cache strategy Other makers of 486-like CPUs Processors compatible with the i486 were produced by companies such as IBM, Texas Instruments, AMD, Cyrix, UMC, and STMicroelectronics (formerly SGS-Thomson). Some were clones (identical at the microarchitectural level), others were clean room implementations of the Intel instruction set. (IBM's multiple-source requirement was one of the reasons behind its x86 manufacturing since the 80286.) The i486 was, however, covered by many Intel patents, including from the prior i386. Intel and IBM had broad cross-licenses of these patents, and AMD was granted rights to the relevant patents in the 1995 settlement of a lawsuit between the companies. AMD produced several clones using a 40 MHz bus (486DX-40, 486DX/2-80, and 486DX/4-120) which had no Intel equivalent, as well as a part specified for 90 MHz, using a 30 MHz external clock, that was sold only to OEMs. The fastest running i486-compatible CPU, the Am5x86, ran at 133 MHz and was released by AMD in 1995. 150 MHz and 160 MHz parts were planned but never officially released. Cyrix made a variety of i486-compatible processors, positioned at the cost-sensitive desktop and low-power (laptop) markets. Unlike AMD's 486 clones, the Cyrix processors were the result of clean-room reverse engineering. Cyrix's early offerings included the 486DLC and 486SLC, two hybrid chips that plugged into 386DX or SX sockets respectively, and offered 1 KB of cache (versus 8 KB for the then-current Intel/AMD parts). Cyrix also made "real" 486 processors, which plugged into the i486's socket and offered 2 or 8 KB of cache. Clock-for-clock, the Cyrix-made chips were generally slower than their Intel/AMD equivalents, though later products with 8 KB caches were more competitive, albeit late to market. The Motorola 68040, while not i486 compatible, was often positioned as its equivalent in features and performance. Clock-for-clock basis the Motorola 68040 could significantly outperform the Intel chip. However, the i486 had the ability to be clocked significantly faster without overheating. Motorola 68040 performance lagged behind the later production i486 systems. Motherboards and buses Early i486-based computers were equipped with several ISA slots (using an emulated PC/AT-bus) and sometimes one or two 8-bit-only slots (compatible with the PC/XT-bus). Many motherboards enabled overclocking of these from the default 6 or 8 MHz to perhaps 16.7 or 20 MHz (half the i486 bus clock) in several steps, often from within the BIOS setup. Especially older peripheral cards normally worked well at such speeds as they often used standard MSI chips instead of slower (at the time) custom VLSI designs. This could give significant performance gains (such as for old video cards moved from a 386 or 286 computer, for example). However, operation beyond 8 or 10 MHz could sometimes lead to stability problems, at least in systems equipped with SCSI or sound cards. Some motherboards came equipped with a 32-bit EISA bus that was backward compatible with the ISA-standard. EISA offered attractive features such as increased bandwidth, extended addressing, IRQ sharing, and card configuration through software (rather than through jumpers, DIP switches, etc.) However, EISA cards were expensive and therefore mostly employed in
|
V || 8 KB WT || June 1993 || SL Enhanced 486SX |- | || i486SX2 || 50/25, 66/33 MHz || 5 V || 8 KB WT || March 1994 || i486DX2 with the FPU disabled |- | || IntelDX4 (P24C) || 75/25, 100/33 MHz || 3.3 V || 16 KB WT || March 1994 || Designed to run at triple clock rate (not quadruple, as often believed; the DX3, which was meant to run at 2.5× the clock speed, was never released). DX4 models that featured write-back cache were identified by an "&EW" laser-etched into their top surface, while the write-through models were identified by "&E". |- | || i486DX2WB (P24D)|| 50/25 MHz,66/33 MHz || 5 V || 8 KB WB || October 1994 || Enabled write-back cache. |- | || IntelDX4WB || 100/33 MHz || 3.3 V || 16 KB WB || October 1994 || |- | || i486DX2 (P24LM) || 90/30 MHz,100/33 MHz || 2.5–2.9 V || 8 KB WT || 1994 || |- | || i486GX || up to 33 MHz || 3.3 V || 8 KB WT || || Embedded ultra-low-power CPU with all features of the i486SX and 16-bit external data bus. This CPU is for embedded battery-operated and hand-held applications. |} *WT = write-through cache strategy, WB = write-back cache strategy Other makers of 486-like CPUs Processors compatible with the i486 were produced by companies such as IBM, Texas Instruments, AMD, Cyrix, UMC, and STMicroelectronics (formerly SGS-Thomson). Some were clones (identical at the microarchitectural level), others were clean room implementations of the Intel instruction set. (IBM's multiple-source requirement was one of the reasons behind its x86 manufacturing since the 80286.) The i486 was, however, covered by many Intel patents, including from the prior i386. Intel and IBM had broad cross-licenses of these patents, and AMD was granted rights to the relevant patents in the 1995 settlement of a lawsuit between the companies. AMD produced several clones using a 40 MHz bus (486DX-40, 486DX/2-80, and 486DX/4-120) which had no Intel equivalent, as well as a part specified for 90 MHz, using a 30 MHz external clock, that was sold only to OEMs. The fastest running i486-compatible CPU, the Am5x86, ran at 133 MHz and was released by AMD in 1995. 150 MHz and 160 MHz parts were planned but never officially released. Cyrix made a variety of i486-compatible processors, positioned at the cost-sensitive desktop and low-power (laptop) markets. Unlike AMD's 486 clones, the Cyrix processors were the result of clean-room reverse engineering. Cyrix's early offerings included the 486DLC and 486SLC, two hybrid chips that plugged into 386DX or SX sockets respectively, and offered 1 KB of cache (versus 8 KB for the then-current Intel/AMD parts). Cyrix also made "real" 486 processors, which plugged into the i486's socket and offered 2 or 8 KB of cache. Clock-for-clock, the Cyrix-made chips were generally slower than their Intel/AMD equivalents, though later products with 8 KB caches were more competitive, albeit late to market. The Motorola 68040, while not i486 compatible, was often positioned as its equivalent in features and performance. Clock-for-clock basis the Motorola 68040 could significantly outperform the Intel chip. However, the i486 had the ability to be clocked significantly faster without overheating. Motorola 68040 performance lagged behind the later production i486 systems. Motherboards and buses Early i486-based computers were equipped with several ISA slots (using an emulated PC/AT-bus) and sometimes one or two 8-bit-only slots (compatible with the PC/XT-bus). Many motherboards enabled overclocking of these from the default 6 or 8 MHz to perhaps 16.7 or 20 MHz (half the i486 bus clock) in several steps, often from within the BIOS setup. Especially older peripheral cards normally worked well at such speeds as they often used standard MSI chips instead of slower (at the time) custom VLSI designs. This could give significant performance gains (such as for old video cards moved from a 386 or 286 computer, for example). However, operation beyond 8 or 10 MHz could sometimes lead to stability problems, at least in systems equipped with SCSI or sound cards. Some motherboards came equipped with a 32-bit EISA bus that was backward compatible with the ISA-standard. EISA offered attractive features such as increased bandwidth, extended addressing, IRQ sharing, and card configuration through software (rather than through jumpers, DIP switches, etc.) However, EISA cards were expensive and therefore mostly employed in servers and workstations. Consumer desktops often used the simpler, faster VESA Local Bus (VLB). Unfortunately prone to electrical and timing-based instability; typical consumer desktops had ISA slots combined with a single VLB slot for a video card. VLB was gradually replaced by PCI during the final years of the i486 period. Few Pentium class motherboards had VLB support as VLB was based directly on the i486 bus; much different from the P5 Pentium-bus. ISA persisted through the P5 Pentium generation and was not completely displaced by PCI until the Pentium III era. Late i486 boards were normally equipped with
|
in software, but benefited from a hardware floating point unit immensely. AMD had begun manufacturing its 386DX clone which was faster than Intel's. To respond to this new situation Intel wanted to provide a lower cost i486 CPU for system integrators, but without sacrificing the better profit margins of a "full" i486. This was accomplished through a debug feature called Disable Floating Point (DFP), by grounding a certain bond wire in the CPU package. The i486SX was introduced in mid-1991 at 20 MHz in a PGA package. Later (1992) versions of the i486SX had the FPU entirely removed for cost-cutting reasons and
|
margins of a "full" i486. This was accomplished through a debug feature called Disable Floating Point (DFP), by grounding a certain bond wire in the CPU package. The i486SX was introduced in mid-1991 at 20 MHz in a PGA package. Later (1992) versions of the i486SX had the FPU entirely removed for cost-cutting reasons and comes in surface-mount packages as well. Many systems allowed the user to upgrade the i486SX to a CPU with the FPU enabled. The upgrade was shipped as the
|
oppose this position, stating that renewed ivory trading puts their own elephant populations under greater threat from poachers reacting to demand. CITES allowed the sale of 49 tonnes of ivory from Zimbabwe, Namibia and Botswana in 1997 to Japan. In 2007, under pressure from the International Fund for Animal Welfare, eBay banned all international sales of elephant-ivory products. The decision came after several mass slaughters of African elephants, most notably the 2006 Zakouma elephant slaughter in Chad. The IFAW found that up to 90% of the elephant-ivory transactions on eBay violated their own wildlife policies and could potentially be illegal. In October 2008, eBay expanded the ban, disallowing any sales of ivory on eBay. A more recent sale in 2008 of 108 tonnes from the three countries and South Africa took place to Japan and China. The inclusion of China as an "approved" importing country created enormous controversy, despite being supported by CITES, the World Wide Fund for Nature and Traffic. They argued that China had controls in place and the sale might depress prices. However, the price of ivory in China has skyrocketed. Some believe this may be due to deliberate price fixing by those who bought the stockpile, echoing the warnings from the Japan Wildlife Conservation Society on price-fixing after sales to Japan in 1997, and monopoly given to traders who bought stockpiles from Burundi and Singapore in the 1980s. A 2019 peer-reviewed study reported that the rate of African elephant poaching was in decline, with the annual poaching mortality rate peaking at over 10% in 2011 and falling to below 4% by 2017. The study found that the "annual poaching rates in 53 sites strongly correlate with proxies of ivory demand in the main Chinese markets, whereas between-country and between-site variation is strongly associated with indicators of corruption and poverty." Based on these findings, the study authors recommended action to both reduce demand for ivory in China and other main markets and to decrease corruption and poverty in Africa. In 2006, nineteen African countries signed the "Accra Declaration" calling for a total ivory trade ban, and twenty range states attended a meeting in Kenya calling for a 20-year moratorium in 2007. Methods of obtaining ivory can be divided into: Shooting the elephant to take its tusks: this method is of concern here. Taking tusks from an elephant which has died of natural causes. Taking tusks from an elephant which has had to be put down for another reason, for example, severe arthritis, or if its last molar teeth are worn out and can no longer chew its food. Finding old tusks from elephants which died a long time before. Among working elephants which use their tusks to carry logs, there is a best length for their tusks. In former times in India, often their tusks were cut back to this length (and often the shortened tusk's end was bound in copper). This periodically freed pieces of ivory for the carving trade. Controversy and conservation issues The use and trade of elephant ivory have become controversial because they have contributed to seriously declining elephant populations in many countries. It is estimated that consumption in Great Britain alone in 1831 amounted to the deaths of nearly 4,000 elephants. In 1975, the Asian elephant was placed on Appendix I of the Convention on International Trade in Endangered Species (CITES), which prevents international trade between member states of species that are threatened by trade. The African elephant was placed on Appendix I in January 1990. Since then, some southern African countries have had their populations of elephants "downlisted" to Appendix II, allowing the domestic trade of non-ivory items; there have also been two "one off" sales of ivory stockpiles. In June 2015, more than a ton of confiscated ivory was crushed in New York City's Times Square by the Wildlife Conservation Society to send a message that the illegal trade will
|
the Indian elephant in their annual tribute caravans to China. Chinese craftsmen carved ivory to make everything from images of deities to the pipe stems and end pieces of opium pipes. In Japan, ivory carvings became popular in the 17th century during the Edo period, and many netsuke and kiseru, on which animals and legendary creatures were carved, and inro, on which ivory was inlaid, were made. From the mid-1800s, the new Meiji government's policy of promoting and exporting arts and crafts led to the frequent display of elaborate ivory crafts at World's fair. Among them, the best works were admired because they were purchased by Western museums, wealthy people, and the Japanese Imperial family. The Buddhist cultures of Southeast Asia, including Myanmar, Thailand, Laos and Cambodia, traditionally harvested ivory from their domesticated elephants. Ivory was prized for containers due to its ability to keep an airtight seal. It was also commonly carved into elaborate seals utilized by officials to "sign" documents and decrees by stamping them with their unique official seal. In Southeast Asian countries, where Muslim Malay peoples live, such as Malaysia, Indonesia and the Philippines, ivory was the material of choice for making the handles of kris daggers. In the Philippines, ivory was also used to craft the faces and hands of Catholic icons and images of saints prevalent in the Santero culture. Tooth and tusk ivory can be carved into a vast variety of shapes and objects. Examples of modern carved ivory objects are okimono, netsukes, jewelry, flatware handles, furniture inlays, and piano keys. Additionally, warthog tusks, and teeth from sperm whales, orcas and hippos can also be scrimshawed or superficially carved, thus retaining their morphologically recognizable shapes. Ivory usage in the last thirty years has moved towards mass production of souvenirs and jewelry. In Japan, the increase in wealth sparked consumption of solid ivory hanko – name seals – which before this time had been made of wood. These hanko can be carved out in a matter of seconds using machinery and were partly responsible for massive African elephant decline in the 1980s, when the African elephant population went from 1.3 million to around 600,000 in ten years. Consumption before plastics Before plastics were introduced, ivory had many ornamental and practical uses, mainly because of the white color it presents when processed. It was formerly used to make cutlery handles, billiard balls, piano keys, Scottish bagpipes, buttons and a wide range of ornamental items. Synthetic substitutes for ivory in the use of most of these items have been developed since 1800: the billiard industry challenged inventors to come up with an alternative material that could be manufactured; the piano industry abandoned ivory as a key covering material in the 1970s. Ivory can be taken from dead animals – however, most ivory came from elephants that were killed for their tusks. For example, in 1930 to acquire 40 tons of ivory required the killing of approximately 700 elephants. Other animals which are now endangered were also preyed upon, for example, hippos, which have very hard white ivory prized for making artificial teeth. In the first half of the 20th century, Kenyan elephant herds were devastated because of demand for ivory, to be used for piano keys. During the Art Deco era from 1912 to 1940, dozens (if not hundreds) of European artists used ivory in the production of chryselephantine statues. Two of the most frequent users of ivory in their sculptured artworks were Ferdinand Preiss and Claire Colinet. Availability Owing to the rapid decline in the populations of the animals that produce it, the importation and sale of ivory in many countries is banned or severely restricted. In the ten years preceding a decision in 1989 by CITES to ban international trade in African elephant ivory, the population of African elephants declined from 1.3 million to around 600,000. It was found by investigators from the Environmental Investigation Agency (EIA) that CITES sales of stockpiles from Singapore and Burundi (270 tonnes and 89.5 tonnes respectively) had created a system that increased the value of ivory on the international market, thus rewarding international smugglers and giving them the ability to control the trade and continue smuggling new ivory. Since the ivory ban, some Southern African countries have claimed their elephant populations are stable or increasing, and argued that ivory sales would support their conservation efforts. Other African countries oppose this position, stating that renewed ivory trading puts their own elephant populations under greater threat from poachers reacting to demand. CITES allowed the sale of 49 tonnes of ivory from Zimbabwe, Namibia and Botswana in 1997 to Japan. In 2007, under pressure from the International Fund for Animal Welfare, eBay banned all international sales of elephant-ivory products. The decision came after several mass slaughters of African elephants, most notably the 2006 Zakouma elephant slaughter in Chad. The IFAW found that up to 90% of the elephant-ivory transactions on eBay violated their own wildlife policies and could potentially be illegal.
|
with various anti-tank missile configurations. Late Cold War and post-Soviet period Wheeled IFVs did not begin appearing until 1976, when the Ratel was introduced in response to a South African Army specification for a wheeled combat vehicle suited to the demands of rapid offensives combining maximum firepower and strategic mobility. Unlike European IFVs, the Ratel was not designed to allow mounted infantrymen to fight in concert with tanks but rather to operate independently across vast distances. South African officials chose a very simple, economical design because it helped reduce the significant logistical commitment necessary to keep heavier combat vehicles operational in undeveloped areas. Excessive track wear was also an issue in the region's abrasive, sandy terrain, making the Ratel's wheeled configuration more attractive. The Ratel was typically armed with a 20 mm autocannon featuring what was then a unique twin-linked ammunition feed, allowing its gunner to rapidly switch between armor-piercing or high-explosive ammunition. Other variants were also fitted with mortars, a bank of anti-tank guided missiles, or a 90 mm cannon. Most notably, the Ratel was the first mine-protected IFV; it had a blastproof hull and was built to withstand the explosive force of anti-tank mines favored by local insurgents. Like the BMP-1, the Ratel proved to be a major watershed in IFV development, albeit for different reasons: until its debut wheeled IFV designs were evaluated unfavorably, since they lacked the weight-carrying capacity and off-road mobility of tracked vehicles, and their wheels were more vulnerable to hostile fire. However, during the 1970s improvements in power trains, suspension technology, and tires had increased their potential strategic mobility. Reduced production, operation, and maintenance costs also helped make wheeled IFVs attractive to several nations. During the late 1960s and early 1970s, the US Army had gradually abandoned its attempts to utilize the M113 as an IFV and refocused on creating a dedicated IFV design able to match the BMP. Although considered reliable, the M113 chassis did not meet the necessary requirements for protection or stealth. The US also considered the M113 too heavy and slow to serve as an IFV capable of keeping pace with tanks. Its MICV-65 program produced a number of unique prototypes, none of which were accepted for service owing to concerns about speed, armor protection, and weight. US Army evaluation staff were sent to Europe to review the AMX-10P and the Marder, both of which were rejected due to high cost, insufficient armor, or lackluster amphibious capabilities. In 1973, the FMC Corporation developed and tested the XM723, which was a 21-ton tracked chassis which could accommodate three crew members and eight passengers. It initially carried a single 20 mm autocannon in a one-man turret but in 1976 a two-man turret was introduced; this carried a 25 mm autocannon like M242 or Oerlikon KBA, a co-axial machine gun, and a TOW anti-tank missile launcher. The XM723 possessed amphibious capability, nine firing ports, and spaced laminate armor on its hull. It was accepted for service with the US Army in 1980 as the Bradley Fighting Vehicle. Successive variants have been retrofitted with improved missile systems, gas particulate filter systems, Kevlar spall liners, and increased stowage. The amount of space taken up by the hull and stowage modifications has reduced the number of passengers to six. By 1982 30,000 IFVs had entered service worldwide, and the IFV concept appeared in the doctrines of 30 national armies. The popularity of the IFV was increased by the growing trend on the part of many nations to mechanize armies previously dominated by light infantry. However, contrary to expectation the IFV did not render APCs obsolete. The US, Russian, French, and German armies have all retained large fleets of IFVs and APCs, finding the APC more suitable for multi-purpose or auxiliary roles. The British Army was one of the few Western armies which had neither recognized a niche for IFVs nor adopted a dedicated IFV design by the late 1970s. In 1980, it made the decision to adopt a new tracked armored vehicle, the FV510 Warrior. British doctrine is that a vehicle should carry troops under protection to the objective and then give firepower support when they have disembarked. While normally classified as an IFV, the Warrior fills the role of an APC in British service and infantrymen do not remain embarked during combat. Doctrine The role of the IFV is closely linked to mechanized infantry doctrine. While some IFVs are armed with an organic direct fire gun or anti-tank guided missiles for close infantry support, they are not intended to assault armored and mechanized forces with any type of infantry on their own, mounted or not. Rather, the IFV's role is to give an infantry unit battlefield, tactical, and operational mobility during combined arms operations. Most IFVs either complement tanks as part of an armored battalion, brigade, or division. Others perform traditional infantry missions supported by tanks. Early development of IFVs in a number of Western nations was promoted primarily by armor officers who wanted to integrate tanks with supporting infantry in armored divisions. There were a few exceptions to the rule: for
|
making it the first vehicle of this class to possess both firing ports and a turreted weapons-system. In the mid-1960s, the Swedish Army also adopted a variant of the Pansarbandvagn 302 APC which carried a 20 mm autocannon. Following the trend towards converting preexisting APCs into IFVs, the Dutch, US, and Belgian armies experimented with a variety of modified M113s during the late 1960s; these were collectively identified as the AIFV (Armored Infantry Fighting Vehicle). The first US M113-based IFV appeared in 1969; known as the XM765, it had a sharply angled hull, ten vision blocks, and a cupola-mounted 20 mm autocannon. The XM765 design, though rejected for service, later became the basis for the very similar Dutch YPR-765. The YPR-765 had five firing ports and a 25 mm autocannon with a co-axial machine gun. The Soviet Army fielded its first tracked APC, the BTR-50, in 1957. Its first wheeled APC, the BTR-152, had been designed as early as the late 1940s. Early versions of both these lightly-armored vehicles were open-topped and carried only general-purpose machine guns for armament. As Soviet strategists became more preoccupied with the possibility of a war involving weapons of mass destruction, they became convinced of the need to deliver mounted troops to a battlefield without exposing them to the radioactive fallout from an atomic weapon. The IFV concept was received favorably because it would enable a Soviet infantry squad to fight from inside their vehicles when operating in contaminated environments. Soviet design work on a new tracked IFV began in the late 1950s and the first prototype appeared as the Obyekt 765 in 1961. After evaluating and rejecting a number of other wheeled and tracked prototypes, the Soviet Army accepted the Obyekt 765 for service. It entered serial production as the BMP-1 in 1966. In addition to being amphibious and superior in cross-country mobility to its predecessors, the BMP-1 carried a 73mm smoothbore cannon, a co-axial PKT machine gun, and a launcher for 9M14 Malyutka anti-tank missiles. Its hull had sufficiently heavy armor to resist .50 caliber armor-piercing ammunition along its frontal arc. Eight firing ports and vision blocks allowed the embarked infantry squad to observe and engage targets with rifles or machine guns. The BMP-1 was so heavily armed and armored that it was widely regarded as having combined the qualities of a light tank with those of the traditional APC. Its use of a relatively large caliber main gun marked a notable departure from the Western trend of fitting IFVs with automatic cannon, which were more suitable for engaging low-flying aircraft, light armor, and dismounted personnel. The Soviet Union produced about 20,000 BMP-1s from 1966 to 1983, at which time it was regarded as the most ubiquitous IFV in the world. In Soviet service, the BMP-1 was ultimately superseded by the more sophisticated BMP-2 (in service from 1980) and by the BMP-3 (in service from 1987). A similar vehicle known as the BMD-1 was designed to accompany Soviet airborne infantry and for a number of years was the world's only airborne IFV. In 1971 the Bundeswehr adopted the Marder, which became increasingly heavily armored through its successive marks and - like the BMP - was later fitted as standard with a launcher for anti-tank guided missiles. Between 1973 and 1975 the French and Yugoslav armies developed the AMX-10P and BVP M-80, respectively - the first amphibious IFVs to appear outside the Soviet Union. The Marder, AMX-10P, and M-80 were all armed with similar 20 mm autocannon and carried seven to eight passengers. They could also be armed with various anti-tank missile configurations. Late Cold War and post-Soviet period Wheeled IFVs did not begin appearing until 1976, when the Ratel was introduced in response to a South African Army specification for a wheeled combat vehicle suited to the demands of rapid offensives combining maximum firepower and strategic mobility. Unlike European IFVs, the Ratel was not designed to allow mounted infantrymen to fight in concert with tanks but rather to operate independently across vast distances. South African officials chose a very simple, economical design because it helped reduce the significant logistical commitment necessary to keep heavier combat vehicles operational in undeveloped areas. Excessive track wear was also an issue in the region's abrasive, sandy terrain, making the Ratel's wheeled configuration more attractive. The Ratel was typically armed with a 20 mm autocannon featuring what was then a unique twin-linked ammunition feed, allowing its gunner to rapidly switch between armor-piercing or high-explosive ammunition. Other variants were also fitted with mortars, a bank of anti-tank guided missiles, or a 90 mm cannon. Most notably, the Ratel was the first mine-protected IFV; it had a blastproof hull and was built to withstand the explosive force of anti-tank mines favored by local insurgents. Like the BMP-1, the Ratel proved to be a major watershed in IFV development, albeit for different reasons: until its debut wheeled IFV designs were evaluated unfavorably, since they lacked the weight-carrying capacity and off-road mobility of tracked vehicles, and their wheels were more vulnerable to hostile fire. However, during the 1970s improvements in power trains, suspension technology, and tires had increased their potential strategic mobility. Reduced production, operation, and maintenance costs also helped make wheeled IFVs attractive to several nations. During the late 1960s and early 1970s, the US Army had gradually abandoned its attempts to utilize the M113 as an IFV and refocused on creating a dedicated IFV design able to match the BMP. Although considered reliable, the M113 chassis did not meet the necessary requirements for protection or stealth. The US also considered the M113 too heavy and slow to serve as an IFV capable of keeping pace with tanks. Its MICV-65 program produced a number of unique prototypes, none of which were accepted for service owing to concerns about speed, armor protection, and weight. US Army evaluation staff were sent to Europe to review the AMX-10P and the Marder, both of which were rejected due to high cost, insufficient armor, or lackluster amphibious capabilities. In 1973, the FMC Corporation developed and tested the XM723, which was a 21-ton tracked chassis which could accommodate three crew members and eight passengers. It initially carried a single 20 mm autocannon in a one-man turret but in 1976 a two-man turret was introduced; this carried a 25 mm autocannon like M242 or Oerlikon KBA, a co-axial machine gun, and a TOW anti-tank missile launcher. The XM723 possessed amphibious capability, nine firing ports, and spaced laminate armor on its hull. It was accepted for service with the US Army in 1980 as the Bradley Fighting Vehicle. Successive variants have been retrofitted with improved missile systems, gas particulate filter systems, Kevlar spall liners, and increased stowage. The amount of space taken up by the hull and stowage modifications has reduced the number of passengers to six. By 1982 30,000 IFVs had entered service worldwide, and the IFV concept appeared in the doctrines of 30 national armies. The popularity of the IFV was increased by the growing trend on the part of many nations to mechanize armies previously dominated by light infantry. However, contrary to expectation the IFV did not render APCs obsolete. The US, Russian, French, and German armies have all retained large fleets of IFVs and APCs, finding the APC more suitable for multi-purpose or auxiliary roles. The British Army was one of the few Western armies which had neither recognized a niche for IFVs nor adopted a dedicated IFV design by the late 1970s. In 1980, it made the decision to adopt a new tracked armored vehicle, the FV510 Warrior. British doctrine is that a vehicle should carry troops under protection to the objective and then give firepower support when they have disembarked. While normally classified as an IFV, the Warrior fills the role of an APC in British service and infantrymen do not remain embarked during combat. Doctrine The role of the IFV is closely linked to mechanized infantry doctrine. While some IFVs are armed with an organic direct fire gun or anti-tank guided missiles for close infantry support, they are not intended to assault armored and mechanized forces with any type of infantry on their own, mounted or not. Rather, the IFV's role is to give an infantry unit battlefield, tactical, and operational mobility during combined arms operations. Most IFVs either complement tanks as part of an armored battalion, brigade, or division. Others perform traditional infantry missions supported by tanks. Early development of IFVs in a number of Western nations was promoted primarily by armor officers who wanted to integrate tanks with supporting infantry in armored divisions. There were a few exceptions to the rule: for example, the Bundeswehr's decision to adopt the SPz 12-3 was largely due to the experiences of Wehrmacht panzergrenadiers who had been inappropriately ordered to undertake combat operations better suited for armor. Hence, the Bundeswehr concluded that infantry should only fight while mounted in their own armored vehicles, ideally supported by tanks. This doctrinal trend was later subsumed into the armies of other Western nations, including the US, leading to the widespread conclusion that IFVs should be confined largely to assisting the forward momentum of tanks. The Soviet Army granted more flexibility in this regard to its IFV doctrine, allowing for the mechanized infantry to occupy terrain that compromised an enemy defense, carry out flanking movements, or lure armor into ill-advised counterattacks. While they still performed an auxiliary role to tanks, the notion of using IFVs in these types of engagements dictated that they be heavily armed, which was reflected in the BMP-1 and its successors. Additionally, Soviet
|
difficult with the established user base from Hong Kong and Taiwan where traditional Chinese is the official language. ICQ 8, released on February 5, 2012 - "Meet the new generation of ICQ, Enjoy free video calls, messages and SMS, social networks support and more." ICQ 10.0, released January 18, 2016. Newest update is 10.0 Build 12393, released on November 8, 2018. Criticism AOL pursued an aggressive policy regarding alternative ("unauthorized") ICQ clients. In July 2008 changes were implemented on ICQ servers causing many unofficial clients to stop working. These users received an official notification from "ICQ System". On December 9, 2008, another change to the ICQ servers occurred: clients sending Client IDs not matching ICQ 5.1 or higher stopped working. On December 29, 2008, the ICQ press service distributed a statement characterizing alternative clients as dangerous. On January 21, 2009, ICQ servers started blocking all unofficial clients in Russia and Commonwealth of Independent States countries. Users in Russia and Ukraine received a message from UIN 1: "Системное сообщение ICQ не поддерживает используемую вами версию. Скачайте бесплатную авторизованную версию ICQ с официального web-сайта ICQ. System Message The version you are using is not supported by ICQ. Download a free authorized ICQ version from ICQ's official website." On icq.com there was an "important message" for Russian-speaking ICQ users: "ICQ осуществляет поддержку только авторизированных версий программ: ICQ Lite и ICQ 6.5." ("ICQ supports only authorized versions of programs: ICQ Lite and ICQ 6.5.") On February 3, 2009, the events of January 21 were repeated. On December 27, 2018, ICQ announced it was to stop supporting unofficial clients, affecting many users who prefer a compact size using Miranda and other clients. On December 28, 2018, ICQ stopped working on some unofficial clients. In late March, 2019, ICQ stopped working on the Pidgin client, as initiated in December 2018. Cooperation with Russian intelligence services According to a Novaya Gazeta article published in May 2018, Russian intelligence agencies have access to online reading of ICQ users' correspondence. The article examined 34 sentences of Russian courts, during the investigation of which the evidence of the defendants' guilt was obtained by reading correspondence on a PC or mobile devices. Of the fourteen cases in which ICQ was involved, in six cases the capturing of information occurred before the seizure of the device. The reason for the article was the blocking of the Telegram service and the recommendation of the Advisor to the President of the Russian Federation Herman Klimenko to use ICQ instead. Clients AOL's OSCAR network protocol used by ICQ is proprietary and using a third party client is a violation of ICQ Terms of Service. Nevertheless, a number of third-party clients have been created by using reverse-engineering and protocol descriptions. These clients include: Adium: supports ICQ, Yahoo!, AIM, MSN, Google Talk, XMPP, and others, for macOS Ayttm: supports ICQ, Yahoo!, AIM, MSN, IRC, and XMPP bitlbee: IRC gateway, supports ICQ, Yahoo!, AIM, MSN, Google Talk, and XMPP centericq: supports ICQ, Yahoo!, AIM, MSN, IRC and XMPP, text-based climm (formerly mICQ): text-based Fire: supports ICQ, Yahoo!, AIM, MSN, IRC, and XMPP, for macOS Jimm: supports ICQ, for Java ME mobile devices Kopete: supports AIM, ICQ, MSN, Yahoo, XMPP, Google Talk, IRC, Gadu-Gadu, Novell GroupWise Messenger and others, for Unix-like Meetro: IM and social networking combined with location; supports AIM, ICQ, MSN, Yahoo! Miranda IM: supports ICQ, Yahoo!, AIM, MSN, IRC, Google Talk, XMPP, Gadu-Gadu, BNet and others, for Windows Naim: ncurses-based Pidgin (formerly Gaim): supports ICQ, Yahoo!, AIM, Gtalk, MSN, IRC, XMPP, Gadu-Gadu, SILC, Meanwhile, (IBM Lotus Sametime) and others QIP: supports ICQ, AIM, XMPP and XIMSS stICQ: supports ICQ, for Symbian OS Trillian: supports ICQ, IRC, Google Talk, XMPP and others AOL supported clients include: AOL Instant Messenger (discontinued in 2017) Messages/iChat: uses ICQ's UIN as an AIM screenname, for macOS See also Comparison
|
interacts with the user. Bots can be used in a variety of ways ranging from entertainment to business services. Stickers (small images or photos expressing some form of emotion) are available to make communication via the application more emotive and personalized. Users can use the sticker library already available or upload their own. In addition, thanks to machine learning the software will recommend a sticker during communication by itself. Masks are images that are superimposed onto the camera in real-time. They can be used during video calls, superimposed onto photos and sent to other users. A nickname is a name made up by a user. It can replace a phone number when searching for and adding user contact. By using a nickname, users can share their contact details without providing a phone number. Smart answers are short phrases that appear above the message box which can be used to answer messages. ICQ NEW analyzes the contents of a conversation and suggests a few pre-set answers. ICQ NEW makes it possible to send audio messages. However, for people who do not want to or cannot listen to the audio, the audio can be automatically transcribed into text. All the user needs to do is click the relevant button and they will see the message in text form. Aside from text messaging, users can call each other as well as arrange audio or video calls for up to five people. During the video call, AR-masks can be used. UIN ICQ users are identified and distinguished from one another by UIN, or User Identification Numbers, distributed in sequential order. The UIN was invented by Mirabilis, as the user name assigned to each user upon registration. Issued UINs started at '10,000' (5 digits) and every user receives a UIN when first registering with ICQ. As of ICQ6 users are also able to log in using the specific e-mail address they associated with their UIN during the initial registration process. Unlike other instant messaging software or web applications, on ICQ the only permanent user info is the UIN, although it is possible to search for other users using their associated e-mail address or any other detail they have made public by updating it in their account's public profile. In addition the user can change all of his or her personal information, including screen name and e-mail address, without having to re-register. Since 2000 ICQ and AIM users were able to add each other to their contact list without the need for any external clients. (The AIM service has since been discontinued.) As a response to UIN theft or sale of attractive UINs, ICQ started to store email addresses previously associated with a UIN. As such UINs that are stolen can sometimes be reclaimed. This applies only if (since 1999 onwards) a valid primary email address was entered into the user profile. History The founding company of ICQ, Mirabilis, was established in June 1996 by five Israeli developers: Yair Goldfinger, Sefi Vigiser, Amnon Amir, Arik Vardi, and Arik's father Yossi Vardi. They recognized that many people were accessing the internet through non-UNIX operating systems, such as Microsoft Windows, and those users were unfamiliar with established chat technologies, e.g. IRC. ICQ was one of the first text-based messengers to reach a wide range of users. The technology Mirabilis developed for ICQ was distributed free of charge. The technology's success encouraged AOL to acquire Mirabilis on June 8, 1998, for $287 million up front and $120 million in additional payments over three years based on performance levels. In 2002 AOL successfully patented the technology. After the purchase the product was initially managed by Ariel Yarnitsky and Avi Shechter. ICQ's management changed at the end of 2003. Under the leadership of the new CEO, Orey Gilliam, who also assumed the responsibility for all of AOL's messaging business in 2007, ICQ resumed its growth; it was not only a highly profitable company, but one of AOL's most successful businesses. Eliav Moshe replaced Gilliam in 2009 and became ICQ's managing director. In April 2010, AOL sold ICQ to Digital Sky Technologies, headed by Alisher Usmanov, for $187.5 million. While ICQ was displaced by AOL Instant Messenger, Google Talk, and other competitors in the U.S. and many other countries over the 2000s, it remained the most popular instant messaging network in Russian-speaking countries, and an important part of online culture. Popular UINs demanded over 11,000₽ in 2010. In September of that year, Digital Sky Technologies changed its name to Mail.Ru Group. Since the acquisition, Mail.ru has invested in turning ICQ from a desktop client to a mobile messaging system. As of 2013, around half of ICQ's users were using its mobile apps, and in 2014, the number of users began growing for the first time since the purchase. In March 2016 the source code of the client was released under the Apache license on github.com. Development history ICQ 99a/b the first releases that were widely available. ICQ 2000 incorporated into Notes and Reminder features. ICQ 2001 included server-side storage of the contact list. This provided synchronization between multiple computers and enforced obtaining consent before adding UINs to the contact list by preventing clients from modifying the local contact list directly. On December 19, 2002, AOL Time Warner announced that ICQ had been issued a United States patent for instant messaging. ICQ 2002 was the last completely advertising-free ICQ version. ICQ Pro 2003b was the first ICQ version to use the ICQ protocol version 10. However, ICQ 5 and 5.1 use version 9 of the protocol. ICQ 2002 and 2003a used version 8 of the ICQ protocol. Earlier versions (ICQ 2001b and all ICQ clients before it) used ICQ protocol version 7. ICQ 4 and later ICQ 5 (released on Monday, February 7, 2005), were upgrades on ICQ Lite. One addition was Xtraz, which offers games and features intended to appeal to younger users of the Internet. ICQ Lite was originally an idea to offer the lighter users of instant messaging an alternative client which was a smaller download and less resource-hungry for relatively slow computers. ICQ 5 introduced skins support. There are few official skins available for the current ICQ 5.1 at the official website; however, a number of user-generated skins have been made available for download. ICQ 6, released on April 17, 2007, was the first
|
of a golden varnish. The Académie had an annual, juried art show, the Salon de Paris, and artists whose work was displayed in the show won prizes, garnered commissions, and enhanced their prestige. The standards of the juries represented the values of the Académie, represented by the works of such artists as Jean-Léon Gérôme and Alexandre Cabanel. In the early 1860s, four young painters—Claude Monet, Pierre-Auguste Renoir, Alfred Sisley, and Frédéric Bazille—met while studying under the academic artist Charles Gleyre. They discovered that they shared an interest in painting landscape and contemporary life rather than historical or mythological scenes. Following a practice that had become increasingly popular by mid-century, they often ventured into the countryside together to paint in the open air, but not for the purpose of making sketches to be developed into carefully finished works in the studio, as was the usual custom. By painting in sunlight directly from nature, and making bold use of the vivid synthetic pigments that had become available since the beginning of the century, they began to develop a lighter and brighter manner of painting that extended further the Realism of Gustave Courbet and the Barbizon school. A favourite meeting place for the artists was the Café Guerbois on Avenue de Clichy in Paris, where the discussions were often led by Édouard Manet, whom the younger artists greatly admired. They were soon joined by Camille Pissarro, Paul Cézanne, and Armand Guillaumin. During the 1860s, the Salon jury routinely rejected about half of the works submitted by Monet and his friends in favour of works by artists faithful to the approved style. In 1863, the Salon jury rejected Manet's The Luncheon on the Grass (Le déjeuner sur l'herbe) primarily because it depicted a nude woman with two clothed men at a picnic. While the Salon jury routinely accepted nudes in historical and allegorical paintings, they condemned Manet for placing a realistic nude in a contemporary setting. The jury's severely worded rejection of Manet's painting appalled his admirers, and the unusually large number of rejected works that year perturbed many French artists. After Emperor Napoleon III saw the rejected works of 1863, he decreed that the public be allowed to judge the work themselves, and the Salon des Refusés (Salon of the Refused) was organized. While many viewers came only to laugh, the Salon des Refusés drew attention to the existence of a new tendency in art and attracted more visitors than the regular Salon. Artists' petitions requesting a new Salon des Refusés in 1867, and again in 1872, were denied. In December 1873, Monet, Renoir, Pissarro, Sisley, Cézanne, Berthe Morisot, Edgar Degas and several other artists founded the Société Anonyme Coopérative des Artistes Peintres, Sculpteurs, Graveurs ("Cooperative and Anonymous Association of Painters, Sculptors, and Engravers") to exhibit their artworks independently. Members of the association were expected to forswear participation in the Salon. The organizers invited a number of other progressive artists to join them in their inaugural exhibition, including the older Eugène Boudin, whose example had first persuaded Monet to adopt plein air painting years before. Another painter who greatly influenced Monet and his friends, Johan Jongkind, declined to participate, as did Édouard Manet. In total, thirty artists participated in their first exhibition, held in April 1874 at the studio of the photographer Nadar. The critical response was mixed. Monet and Cézanne received the harshest attacks. Critic and humorist Louis Leroy wrote a scathing review in the newspaper Le Charivari in which, making wordplay with the title of Claude Monet's Impression, Sunrise (Impression, soleil levant), he gave the artists the name by which they became known. Derisively titling his article The Exhibition of the Impressionists, Leroy declared that Monet's painting was at most, a sketch, and could hardly be termed a finished work. He wrote, in the form of a dialogue between viewers, "Impression—I was certain of it. I was just telling myself that, since I was impressed, there had to be some impression in it ... and what freedom, what ease of workmanship! Wallpaper in its embryonic state is more finished than that seascape." The term Impressionist quickly gained favour with the public. It was also accepted by the artists themselves, even though they were a diverse group in style and temperament, unified primarily by their spirit of independence and rebellion. They exhibited together—albeit with shifting membership—eight times between 1874 and 1886. The Impressionists' style, with its loose, spontaneous brushstrokes, would soon become synonymous with modern life. Monet, Sisley, Morisot, and Pissarro may be considered the "purest" Impressionists, in their consistent pursuit of an art of spontaneity, sunlight, and colour. Degas rejected much of this, as he believed in the primacy of drawing over colour and belittled the practice of painting outdoors. Renoir turned away from Impressionism for a time during the 1880s, and never entirely regained his commitment to its ideas. Édouard Manet, although regarded by the Impressionists as their leader, never abandoned his liberal use of black as a colour (while Impressionists avoided its use and preferred to obtain darker colours by mixing), and never participated in the Impressionist exhibitions. He continued to submit his works to the Salon, where his painting Spanish Singer had won a 2nd class medal in 1861, and he urged the others to do likewise, arguing that "the Salon is the real field of battle" where a reputation could be made. Among the artists of the core group (minus Bazille, who had died in the Franco-Prussian War in 1870), defections occurred as Cézanne, followed later by Renoir, Sisley, and Monet, abstained from the group exhibitions so they could submit their works to the Salon. Disagreements arose from issues such as Guillaumin's membership in the group, championed by Pissarro and Cézanne against opposition from Monet and Degas, who thought him unworthy. Degas invited Mary Cassatt to display her work in the 1879 exhibition, but also insisted on the inclusion of Jean-François Raffaëlli, Ludovic Lepic, and other realists who did not represent Impressionist practices, causing Monet in 1880 to accuse the Impressionists of "opening doors to first-come daubers". The group divided over invitations to Paul Signac and Georges Seurat to exhibit with them in 1886. Pissarro was the only artist to show at all eight Impressionist exhibitions. The individual artists achieved few financial rewards from the Impressionist exhibitions, but their art gradually won a degree of public acceptance and support. Their dealer, Durand-Ruel, played a major role in this as he kept their work before the public and arranged shows for them in London and New York. Although Sisley died in poverty in 1899, Renoir had a great Salon success in 1879. Monet became secure financially during the early 1880s and so did Pissarro by the early 1890s. By this time the methods of Impressionist painting, in a diluted form, had become commonplace in Salon art. Impressionist techniques French painters who prepared the way for Impressionism include the Romantic colourist Eugène Delacroix, the leader of the realists Gustave Courbet, and painters of the Barbizon school such as Théodore Rousseau. The Impressionists learned much from the work of Johan Barthold Jongkind, Jean-Baptiste-Camille Corot and Eugène Boudin, who painted from nature in a direct and spontaneous style that prefigured Impressionism, and who befriended and advised the younger artists. A number of identifiable techniques and working habits contributed to the innovative style of the Impressionists. Although these methods had been used by previous artists—and are often conspicuous in the work of artists such as Frans Hals, Diego Velázquez, Peter Paul Rubens, John Constable, and J. M. W. Turner—the Impressionists were the first to use them all together, and with such consistency. These techniques include: Short, thick strokes of paint quickly capture the essence of the subject, rather than its details. The paint is often applied impasto. Colours are applied side by side with as little mixing as possible, a technique that exploits the principle of simultaneous contrast to make the colour appear more vivid to the viewer. Greys and dark tones are produced by mixing complementary colours. Pure impressionism avoids the use of black paint. Wet paint is placed into wet paint without waiting for successive applications to dry, producing softer edges and intermingling of colour. Impressionist paintings do not exploit the transparency of thin paint films (glazes), which earlier artists manipulated carefully to produce effects. The impressionist painting surface is typically opaque. The paint is applied to a white or light-coloured ground. Previously, painters often used dark grey or strongly coloured grounds. The play of natural light is emphasized. Close attention is paid to the reflection of colours from object to object. Painters often worked in the evening to produce effets de soir—the shadowy effects of evening or twilight. In paintings made en plein air (outdoors), shadows are boldly painted with the blue of the sky as it is reflected onto surfaces, giving a sense of freshness previously not represented in painting. (Blue shadows on snow inspired the technique.) New technology played a role in the development of the style. Impressionists took advantage of the mid-century introduction of premixed paints in tin tubes (resembling modern toothpaste tubes), which allowed artists to work more spontaneously, both outdoors and indoors. Previously, painters made their own paints individually, by grinding and mixing dry pigment powders with linseed oil, which were then stored in animal bladders. Many vivid synthetic pigments became commercially available to artists for
|
in it ... and what freedom, what ease of workmanship! Wallpaper in its embryonic state is more finished than that seascape." The term Impressionist quickly gained favour with the public. It was also accepted by the artists themselves, even though they were a diverse group in style and temperament, unified primarily by their spirit of independence and rebellion. They exhibited together—albeit with shifting membership—eight times between 1874 and 1886. The Impressionists' style, with its loose, spontaneous brushstrokes, would soon become synonymous with modern life. Monet, Sisley, Morisot, and Pissarro may be considered the "purest" Impressionists, in their consistent pursuit of an art of spontaneity, sunlight, and colour. Degas rejected much of this, as he believed in the primacy of drawing over colour and belittled the practice of painting outdoors. Renoir turned away from Impressionism for a time during the 1880s, and never entirely regained his commitment to its ideas. Édouard Manet, although regarded by the Impressionists as their leader, never abandoned his liberal use of black as a colour (while Impressionists avoided its use and preferred to obtain darker colours by mixing), and never participated in the Impressionist exhibitions. He continued to submit his works to the Salon, where his painting Spanish Singer had won a 2nd class medal in 1861, and he urged the others to do likewise, arguing that "the Salon is the real field of battle" where a reputation could be made. Among the artists of the core group (minus Bazille, who had died in the Franco-Prussian War in 1870), defections occurred as Cézanne, followed later by Renoir, Sisley, and Monet, abstained from the group exhibitions so they could submit their works to the Salon. Disagreements arose from issues such as Guillaumin's membership in the group, championed by Pissarro and Cézanne against opposition from Monet and Degas, who thought him unworthy. Degas invited Mary Cassatt to display her work in the 1879 exhibition, but also insisted on the inclusion of Jean-François Raffaëlli, Ludovic Lepic, and other realists who did not represent Impressionist practices, causing Monet in 1880 to accuse the Impressionists of "opening doors to first-come daubers". The group divided over invitations to Paul Signac and Georges Seurat to exhibit with them in 1886. Pissarro was the only artist to show at all eight Impressionist exhibitions. The individual artists achieved few financial rewards from the Impressionist exhibitions, but their art gradually won a degree of public acceptance and support. Their dealer, Durand-Ruel, played a major role in this as he kept their work before the public and arranged shows for them in London and New York. Although Sisley died in poverty in 1899, Renoir had a great Salon success in 1879. Monet became secure financially during the early 1880s and so did Pissarro by the early 1890s. By this time the methods of Impressionist painting, in a diluted form, had become commonplace in Salon art. Impressionist techniques French painters who prepared the way for Impressionism include the Romantic colourist Eugène Delacroix, the leader of the realists Gustave Courbet, and painters of the Barbizon school such as Théodore Rousseau. The Impressionists learned much from the work of Johan Barthold Jongkind, Jean-Baptiste-Camille Corot and Eugène Boudin, who painted from nature in a direct and spontaneous style that prefigured Impressionism, and who befriended and advised the younger artists. A number of identifiable techniques and working habits contributed to the innovative style of the Impressionists. Although these methods had been used by previous artists—and are often conspicuous in the work of artists such as Frans Hals, Diego Velázquez, Peter Paul Rubens, John Constable, and J. M. W. Turner—the Impressionists were the first to use them all together, and with such consistency. These techniques include: Short, thick strokes of paint quickly capture the essence of the subject, rather than its details. The paint is often applied impasto. Colours are applied side by side with as little mixing as possible, a technique that exploits the principle of simultaneous contrast to make the colour appear more vivid to the viewer. Greys and dark tones are produced by mixing complementary colours. Pure impressionism avoids the use of black paint. Wet paint is placed into wet paint without waiting for successive applications to dry, producing softer edges and intermingling of colour. Impressionist paintings do not exploit the transparency of thin paint films (glazes), which earlier artists manipulated carefully to produce effects. The impressionist painting surface is typically opaque. The paint is applied to a white or light-coloured ground. Previously, painters often used dark grey or strongly coloured grounds. The play of natural light is emphasized. Close attention is paid to the reflection of colours from object to object. Painters often worked in the evening to produce effets de soir—the shadowy effects of evening or twilight. In paintings made en plein air (outdoors), shadows are boldly painted with the blue of the sky as it is reflected onto surfaces, giving a sense of freshness previously not represented in painting. (Blue shadows on snow inspired the technique.) New technology played a role in the development of the style. Impressionists took advantage of the mid-century introduction of premixed paints in tin tubes (resembling modern toothpaste tubes), which allowed artists to work more spontaneously, both outdoors and indoors. Previously, painters made their own paints individually, by grinding and mixing dry pigment powders with linseed oil, which were then stored in animal bladders. Many vivid synthetic pigments became commercially available to artists for the first time during the 19th century. These included cobalt blue, viridian, cadmium yellow, and synthetic ultramarine blue, all of which were in use by the 1840s, before Impressionism. The Impressionists' manner of painting made bold use of these pigments, and of even newer colours such as cerulean blue, which became commercially available to artists in the 1860s. The Impressionists' progress toward a brighter style of painting was gradual. During the 1860s, Monet and Renoir sometimes painted on canvases prepared with the traditional red-brown or grey ground. By the 1870s, Monet, Renoir, and Pissarro usually chose to paint on grounds of a lighter grey or beige colour, which functioned as a middle tone in the finished painting. By the 1880s, some of the Impressionists had come to prefer white or slightly off-white grounds, and no longer allowed the ground colour a significant role in the finished painting. Content and composition Prior to the Impressionists, other painters, notably such 17th-century Dutch painters as Jan Steen, had emphasized common subjects, but their methods of composition were traditional. They arranged their compositions so that the main subject commanded the viewer's attention. J. M. W. Turner, while an artist of the Romantic era, anticipated the style of impressionism with his artwork. The Impressionists relaxed the boundary between subject and background so that the effect of an Impressionist painting often resembles a snapshot, a part of a larger reality captured as if by chance. Photography was gaining popularity, and as cameras became more portable, photographs became more candid. Photography inspired Impressionists to represent momentary action, not only in the fleeting lights of a landscape, but in the day-to-day lives of people. The development of Impressionism can be considered partly as a reaction by artists to the challenge presented by photography, which seemed to devalue the artist's skill in reproducing reality. Both portrait and landscape paintings were deemed somewhat deficient and lacking in truth as photography "produced lifelike images much more efficiently and reliably". In spite of this, photography actually inspired artists to pursue other means of creative expression, and rather than compete with photography to emulate reality, artists focused "on the one thing they could inevitably do better than the photograph—by further developing into an art form its very subjectivity in the conception of the image, the very subjectivity that photography eliminated". The Impressionists sought to express their perceptions of nature, rather than create exact representations. This allowed artists to depict subjectively what they saw with their "tacit imperatives of taste and conscience". Photography encouraged painters to exploit aspects of the painting medium, like colour, which photography then lacked: "The Impressionists were the first to consciously offer a subjective alternative to the photograph". Another major influence was Japanese ukiyo-e art prints (Japonism). The art of these prints contributed significantly to the "snapshot" angles and unconventional compositions that became characteristic of Impressionism. An example is Monet's Jardin à Sainte-Adresse, 1867, with its bold blocks of colour and composition on a strong diagonal slant showing the influence of Japanese prints. Edgar Degas was both an avid photographer and a collector of Japanese prints. His The Dance Class (La classe de danse) of 1874 shows both influences in its asymmetrical composition. The dancers are seemingly caught off guard in various awkward poses, leaving an expanse of empty floor space in the lower right quadrant. He also captured his dancers in sculpture, such as the Little Dancer of Fourteen Years. Women Impressionists Impressionists, in varying degrees, were looking for ways to depict visual experience and contemporary subjects. Women Impressionists were interested in these same ideals but had many social and career limitations compared to male Impressionists. In particular, they were excluded from the imagery of the bourgeois social sphere of the boulevard, cafe, and dance hall. As well as imagery, women were excluded from the formative discussions that resulted in meetings in those places; that was where male Impressionists were able to form and share ideas about Impressionism. In the academic realm, women were believed to be incapable of handling complex subjects which led teachers to restrict what they taught female students. It was also considered unladylike to excel in art since women's true talents were then believed to center on homemaking and mothering. Yet several women were able to find success during their lifetime, even though their careers were affected by personal circumstances – Bracquemond, for example, had a husband who was resentful of her work which caused her to give up painting. The four most well known, namely, Mary Cassatt, Eva Gonzalès, Marie Bracquemond, and Berthe Morisot, are,
|
is determined by the size and configuration of the screen. Additionally, both sender and receiver are constrained linguistically by the properties of the internet software, computer hardware, and networking hardware linking them. Electronic discourse refers to writing that is "very often reads as if it were being spoken – that is, as if the sender were writing talking". Types of slang Internet slang does not constitute a homogeneous language variety. Rather, it differs according to the user and type of Internet situation. Audience design occurs in online platforms, and therefore online communities can develop their own sociolects, or shared linguistic norms. Within the language of Internet slang, there is still an element of prescriptivism, as seen in style guides, for example Wired Style, which are specifically aimed at usage on the Internet. Even so, few users consciously heed these prescriptive recommendations on CMC, but rather adapt their styles based on what they encounter online. Although it is difficult to produce a clear definition of Internet slang, the following types of slang may be observed. This list is not exhaustive. Views Many debates about how the use of slang on the Internet influences language outside of the digital sphere go on. Even though the direct causal relationship between the Internet and language has yet to be proven by any scientific research, Internet slang has invited split views on its influence on the standard of language use in non-computer-mediated communications. Prescriptivists tend to have the widespread belief that the Internet has a negative influence on the future of language, and that it would lead to a degradation of standard. Some would even attribute any decline of standard formal English to the increase in usage of electronic communication. It has also been suggested that the linguistic differences between Standard English and CMC can have implications for literacy education. This is illustrated by the widely reported example of a school essay submitted by a Scottish teenager, which contained many abbreviations and acronyms likened to SMS language. There was great condemnation of this style by the mass media as well as educationists, who expressed that this showed diminishing literacy or linguistic abilities. On the other hand, descriptivists have counter-argued that the Internet allows better expressions of a language. Rather than established linguistic conventions, linguistic choices sometimes reflect personal taste. It has also been suggested that as opposed to intentionally flouting language conventions, Internet slang is a result of a lack of motivation to monitor speech online. Hale and Scanlon describe language in emails as being derived from "writing the way people talk", and that there is no need to insist on 'Standard' English. English users, in particular, have an extensive tradition of etiquette guides, instead of traditional prescriptive treatises, that offer pointers on linguistic appropriateness. Using and spreading Internet slang also adds onto the cultural currency of a language. It is important to the speakers of the language due to the foundation it provides for identifying within a group, and also for defining a person's individual linguistic and communicative competence. The result is a specialized subculture based on its use of slang. In scholarly research, attention has, for example, been drawn to the effect of the use of Internet slang in ethnography, and more importantly to how conversational relationships online change structurally because slang is used. In German, there is already considerable controversy regarding the use of anglicisms outside of CMC. This situation is even more problematic within CMC, since the jargon of the medium is dominated by English terms. An extreme example of an anti-anglicisms perspective can be observed from the chatroom rules of a Christian site, which bans all anglicisms ("" [Using anglicisms is strictly prohibited!]), and also translates even fundamental terms into German equivalents. Journalism In April 2014, Gawkers editor-in-chief Max Read instituted new writing style guidelines banning internet slang for his writing staff. Use beyond computer-mediated communication Internet slang has crossed from being mediated by the computer into other non-physical domains. Here, these domains are taken to refer to any domain of interaction where interlocutors need not be geographically proximate to one another, and where the Internet is not primarily used. Internet slang is now prevalent in telephony, mainly through short messages (SMS) communication. Abbreviations and interjections, especially, have been popularized in this medium, perhaps due to the limited character space for writing messages on mobile phones. Another possible reason for this spread is the convenience of transferring the existing mappings between expression and meaning into a similar
|
to monitor speech online. Hale and Scanlon describe language in emails as being derived from "writing the way people talk", and that there is no need to insist on 'Standard' English. English users, in particular, have an extensive tradition of etiquette guides, instead of traditional prescriptive treatises, that offer pointers on linguistic appropriateness. Using and spreading Internet slang also adds onto the cultural currency of a language. It is important to the speakers of the language due to the foundation it provides for identifying within a group, and also for defining a person's individual linguistic and communicative competence. The result is a specialized subculture based on its use of slang. In scholarly research, attention has, for example, been drawn to the effect of the use of Internet slang in ethnography, and more importantly to how conversational relationships online change structurally because slang is used. In German, there is already considerable controversy regarding the use of anglicisms outside of CMC. This situation is even more problematic within CMC, since the jargon of the medium is dominated by English terms. An extreme example of an anti-anglicisms perspective can be observed from the chatroom rules of a Christian site, which bans all anglicisms ("" [Using anglicisms is strictly prohibited!]), and also translates even fundamental terms into German equivalents. Journalism In April 2014, Gawkers editor-in-chief Max Read instituted new writing style guidelines banning internet slang for his writing staff. Use beyond computer-mediated communication Internet slang has crossed from being mediated by the computer into other non-physical domains. Here, these domains are taken to refer to any domain of interaction where interlocutors need not be geographically proximate to one another, and where the Internet is not primarily used. Internet slang is now prevalent in telephony, mainly through short messages (SMS) communication. Abbreviations and interjections, especially, have been popularized in this medium, perhaps due to the limited character space for writing messages on mobile phones. Another possible reason for this spread is the convenience of transferring the existing mappings between expression and meaning into a similar space of interaction. At the same time, Internet slang has also taken a place as part of everyday offline language, among those with digital access. The nature and content of online conversation is brought forward to direct offline communication through the telephone and direct talking, as well as through written language, such as in writing notes or letters. In the case of interjections, such as numerically based and abbreviated Internet slang, are not pronounced as they are written physically or replaced by any actual action. Rather, they become lexicalized and spoken like non-slang words in a "stage direction" like fashion, where the actual action is not carried out but substituted with a verbal signal. The notions of flaming and trolling have also extended outside the computer, and are used in the same circumstances of deliberate or unintentional implicatures. The expansion of Internet slang has been furthered through codification and the promotion of digital literacy. The subsequently existing and growing popularity of such references among those online as well as offline has thus advanced Internet slang literacy and globalized it. Awareness and proficiency in manipulating Internet slang in both online and offline communication indicates digital literacy and teaching materials have even been developed to further this knowledge. A South Korean publisher, for example, has published a textbook that details the meaning and context of use for common Internet slang instances and is targeted at young children who will soon be using the Internet. Similarly, Internet slang has been recommended as language teaching material in second language classrooms in order to raise communicative competence by imparting some of the cultural value attached to a language that is available only in slang. Meanwhile, well-known dictionaries such as the ODE and Merriam-Webster have been updated with a significant and growing body of slang jargon. Besides common examples, lesser known slang and slang with a non-English etymology have also found a place in standardized linguistic references. Along with these instances, literature in user-contributed dictionaries such as Urban Dictionary has also been added to. Codification seems to be qualified through frequency of use, and novel creations are often not accepted by other users of slang. Today Although Internet slang began as a means of "opposition" to mainstream language, its popularity with today's globalized digitally literate population has shifted it into a part of everyday language, where it also leaves a profound impact. Frequently used slang also have become conventionalised into memetic "unit[s] of cultural information". These memes in turn are further spread through their use on the Internet, prominently through websites. The Internet as an "information superhighway" is also catalysed through slang. The evolution of slang has also created a 'slang union' as part of a unique, specialised subculture. Such impacts are, however, limited and requires further discussion especially from the non-English world. This is because Internet slang is prevalent in languages more actively used on the Internet, like English, which is the Internet's lingua franca. Around the world In Japanese, the term moe has come into common use among slang users to mean something "preciously cute" and appealing. Aside from the more frequent abbreviations, acronyms, and emoticons, Internet slang also uses archaic words or the lesser-known meanings of mainstream terms. Regular words can also be altered into something with a similar pronunciation but altogether different meaning, or attributed new meanings altogether. Phonetic transcriptions are the transformation of words to how it sounds in a certain language, and are used as internet slang. In places where logographic languages are used, such as China, a visual Internet slang exists, giving characters dual meanings, one direct and one implied. The Internet has helped people from all over the world to become connected to one another, enabling "global" relationships to be formed. As such, it is important for the various types of slang used online to be recognizable for everyone. It is also important to do so because of how other languages are quickly catching up with English on the Internet, following the increase in Internet usage in predominantly non-English speaking countries. In fact, as of January 2020, only approximately 25.9% of the online population is made up of English
|
training seems to have continued after Shaka's death, although Zulu defeats by the Boers, and growing encroachment by British colonists, sharply curtailed raiding operations prior to the War of 1879. Morris (1965, 1982) records one such mission under King Mpande to give green warriors of the uThulwana regiment experience: a raid into Swaziland, dubbed "Fund' uThulwana" by the Zulu, or "Teach the uThulwana". Impi warriors were trained as early as age six, joining the army as udibi porters at first, being enrolled into same-age groups (intanga). Until they were butad, Zulu boys accompanied their fathers and brothers on campaign as servants. Eventually, they would go to the nearest ikhanda to kleza (literally, "to drink directly from the udder"), at which time the boys would become inkwebane, cadets. They would spend their time training until they were formally enlisted by the king. They would challenge each other to stick fights, which had to be accepted on pain of dishonor. In Shaka's day, warriors often wore elaborate plumes and cow tail regalia in battle, but by the Anglo-Zulu War of 1879, many warriors wore only a loin cloth and a minimal form of headdress. The later period Zulu soldier went into battle relatively simply dressed, painting his upper body and face with chalk and red ochre, despite the popular conception of elaborately panoplied warriors. Each ibutho had a singular arrangement of headdress and other adornments, so that the Zulu army could be said to have had regimental uniforms; latterly the 'full-dress' was only worn on festive occasions. The men of senior regiments would wear, in addition to their other headdress, the head-ring (isicoco) denoting their married state. A gradation of shield colour was found, junior regiments having largely dark shields the more senior ones having shields with more light colouring; Shaka's personal regiment Fasimba (The Haze) having white shields with only a small patch of darker colour. This shield uniformity was facilitated by the custom of separating the king's cattle into herds based on their coat colours. Certain adornments were awarded to individual warriors for conspicuous courage in action; these included a type of heavy brass arm-ring (ingxotha) and an intricate necklace composed of interlocking wooden pegs (iziqu). Tactics The Zulu typically took the offensive, deploying in the well-known "buffalo horns" formation (). It comprised three elements:the "horns", or flanking right and left wing elements, to encircle and pin the enemy. Generally the "horns" were made up of younger, greener troops.the "chest" sometimes referred to as "head" or central main force which delivered the coup de grace. The prime fighters made up the composition of the main force.the "loins" or reserves used to exploit success or reinforce elsewhere. Often these were older veterans. Sometimes these were positioned with their backs to the battle so as not to get unduly excited. Encirclement tactics are not unique in warfare, and historians note that attempts to surround an enemy were not unknown even in the ritualised battles. The use of separate manoeuvre elements to support a stronger central group is also well known in pre-mechanised tribal warfare, as is the use of reserve echelons farther back. What was unique about the Zulu was the degree of organisation, consistency with which they used these tactics, and the speed at which they executed them. Developments and refinements may have taken place after Shaka's death, as witnessed by the use of larger groupings of regiments by the Zulu against the British in 1879. Missions, available manpower and enemies varied, but whether facing native spear, or European bullet, the impis generally fought in and adhered to the classical buffalo horns pattern. Organisation and leadership of the Zulu forcesRegiments and corps. The Zulu forces were generally grouped into three levels: regiments, corps of several regiments, and "armies" or bigger formations, although the Zulu did not use these terms in the modern sense. Although size distinctions were taken account of, any grouping of men on a mission could collectively be called an impi, whether a raiding party of 100 or horde of 10,000. Numbers were not uniform but dependent on a variety of factors, including assignments by the king, or the manpower mustered by various clan chiefs or localities. A regiment might be 400 or 4000 men. These were grouped into corps that took their name from the military kraals where they were mustered, or sometimes the dominant regiment of that locality. There were 4 basic ranks: herdboy assistants, warriors, inDunas and higher ranked supremos for a particular mission.Higher command and unit leadership.''' Leadership was not a complicated affair. An inDuna guided each regiment, and he in turn answered to senior izinduna who controlled the corps grouping. Overall guidance of the host was furnished by elder izinduna usually with many years of experience. One or more of these elder chiefs might accompany a big force on an important mission, but there was no single "field marshal" in supreme command of all Zulu forces. Regimental izinduna, like the non-coms of today's army, and yesterday's Roman Centurions, were extremely important to morale and discipline. This was shown during the battle of Isandhlwana. Blanketed by a hail of British bullets, rockets and artillery, the advance of the Zulu faltered. Echoing from the mountain, however, were the shouted cadences and fiery exhortations of their regimental izinduna, who reminded the warriors that their king did not send them to run away. Thus encouraged, the encircling regiments remained in place, maintaining continual pressure, until weakened British dispositions enabled the host to make a final surge forward. (See Morris ref below—"The Washing of the Spears"). Summary of the Shakan reforms As noted above, Shaka was neither the originator of the impi, or the age grade structure, nor the concept of a bigger grouping than the small clan system. His major innovations were to blend these traditional elements in a new way, to systematise the approach to battle, and to standardise organization, methods and weapons, particularly in his adoption of the ilkwa – the Zulu thrusting spear, unique long-term regimental units, and the "buffalo horns" formation. Dingswayo's approach was of a loose federation of allies under his hegemony, combining to fight, each with their own contingents, under their own leaders. Shaka dispensed with this, insisting instead on a standardised organisation and weapons package that swept away and replaced old clan allegiances with loyalty to himself. This uniform approach also encouraged the loyalty and identification of warriors with their own distinctive military regiments. In time, these warriors, from many conquered tribes and clans came to regard themselves as one nation- the Zulu. The Marian reforms of Rome in the military sphere are referenced by some writers as similar. While other ancient powers such as the Carthaginians maintained a patchwork of force types, and the legions retained such phalanx-style holdovers like the triarii, Marius implemented one consistent standardised approach for all the infantry. This enabled more disciplined formations and efficient execution of tactics over time against a variety of enemies. As one military historian notes: Combined with Shaka's "buffalo horns" attack formation for surrounding and annihilating enemy forces, the Zulu combination of iklwa and shield—similar to the Roman legionaries' use of gladius and scutum—was devastating. By the time of Shaka's assassination in 1828, it had made the Zulu kingdom the greatest power in southern Africa and a force to be reckoned with, even against Britain's modern army in 1879.The Impi in battle To understand the full scope of the impi's performance in battle, military historians of the Zulu typically look to its early operations against internal African enemies, not merely the British interlude. In terms of numbers, the operations of the impi would change- from the Western equivalent of small company and battalion size forces, to manoeuvres in multi-divisional strength of between 10,000 and 40,000 men. The victory won by Zulu king Cetawasyo at Ndondakusuka, for example, two decades before the British invasion involved a deployment of 30,000 troops. These were sizeable formations in regional context but represented the bulk of prime Zulu fighting strength. Few impi-style formations were to routinely achieve this level of mobilisation for a single battle. By comparison, at Cannae, the Romans deployed 80,000 men, and generally could put tens of thousands more into smaller combat actions). The popular notion
|
Each ibutho had a singular arrangement of headdress and other adornments, so that the Zulu army could be said to have had regimental uniforms; latterly the 'full-dress' was only worn on festive occasions. The men of senior regiments would wear, in addition to their other headdress, the head-ring (isicoco) denoting their married state. A gradation of shield colour was found, junior regiments having largely dark shields the more senior ones having shields with more light colouring; Shaka's personal regiment Fasimba (The Haze) having white shields with only a small patch of darker colour. This shield uniformity was facilitated by the custom of separating the king's cattle into herds based on their coat colours. Certain adornments were awarded to individual warriors for conspicuous courage in action; these included a type of heavy brass arm-ring (ingxotha) and an intricate necklace composed of interlocking wooden pegs (iziqu). Tactics The Zulu typically took the offensive, deploying in the well-known "buffalo horns" formation (). It comprised three elements:the "horns", or flanking right and left wing elements, to encircle and pin the enemy. Generally the "horns" were made up of younger, greener troops.the "chest" sometimes referred to as "head" or central main force which delivered the coup de grace. The prime fighters made up the composition of the main force.the "loins" or reserves used to exploit success or reinforce elsewhere. Often these were older veterans. Sometimes these were positioned with their backs to the battle so as not to get unduly excited. Encirclement tactics are not unique in warfare, and historians note that attempts to surround an enemy were not unknown even in the ritualised battles. The use of separate manoeuvre elements to support a stronger central group is also well known in pre-mechanised tribal warfare, as is the use of reserve echelons farther back. What was unique about the Zulu was the degree of organisation, consistency with which they used these tactics, and the speed at which they executed them. Developments and refinements may have taken place after Shaka's death, as witnessed by the use of larger groupings of regiments by the Zulu against the British in 1879. Missions, available manpower and enemies varied, but whether facing native spear, or European bullet, the impis generally fought in and adhered to the classical buffalo horns pattern. Organisation and leadership of the Zulu forcesRegiments and corps. The Zulu forces were generally grouped into three levels: regiments, corps of several regiments, and "armies" or bigger formations, although the Zulu did not use these terms in the modern sense. Although size distinctions were taken account of, any grouping of men on a mission could collectively be called an impi, whether a raiding party of 100 or horde of 10,000. Numbers were not uniform but dependent on a variety of factors, including assignments by the king, or the manpower mustered by various clan chiefs or localities. A regiment might be 400 or 4000 men. These were grouped into corps that took their name from the military kraals where they were mustered, or sometimes the dominant regiment of that locality. There were 4 basic ranks: herdboy assistants, warriors, inDunas and higher ranked supremos for a particular mission.Higher command and unit leadership.''' Leadership was not a complicated affair. An inDuna guided each regiment, and he in turn answered to senior izinduna who controlled the corps grouping. Overall guidance of the host was furnished by elder izinduna usually with many years of experience. One or more of these elder chiefs might accompany a big force on an important mission, but there was no single "field marshal" in supreme command of all Zulu forces. Regimental izinduna, like the non-coms of today's army, and yesterday's Roman Centurions, were extremely important to morale and discipline. This was shown during the battle of Isandhlwana. Blanketed by a hail of British bullets, rockets and artillery, the advance of the Zulu faltered. Echoing from the mountain, however, were the shouted cadences and fiery exhortations of their regimental izinduna, who reminded the warriors that their king did not send them to run away. Thus encouraged, the encircling regiments remained in place, maintaining continual pressure, until weakened British dispositions enabled the host to make a final surge forward. (See Morris ref below—"The Washing of the Spears"). Summary of the Shakan reforms As noted above, Shaka was neither the originator of the impi, or the age grade structure, nor the concept of a bigger grouping than the small clan system. His major innovations were to blend these traditional elements in a new way, to systematise the approach to battle, and to standardise organization, methods and weapons, particularly in his adoption of the ilkwa – the Zulu thrusting spear, unique long-term regimental units, and the "buffalo horns" formation. Dingswayo's approach was of a loose federation of allies under his hegemony, combining to fight, each with their own contingents, under their own leaders. Shaka dispensed with this, insisting instead on a standardised organisation and weapons package that swept away and replaced old clan allegiances with loyalty to himself. This uniform approach also encouraged the loyalty and identification of warriors with their own distinctive military regiments. In time, these warriors, from many conquered tribes and clans came to regard themselves as one nation- the Zulu. The Marian reforms of Rome in the military sphere are referenced by some writers as similar. While other ancient powers such as the Carthaginians maintained a patchwork of force types, and the legions retained such phalanx-style holdovers like the triarii, Marius implemented one consistent standardised approach for all the infantry. This enabled more disciplined formations and efficient execution of tactics over time against a variety of enemies. As one military historian notes: Combined with Shaka's "buffalo horns" attack formation for surrounding and annihilating enemy forces, the Zulu combination of iklwa and shield—similar to the Roman legionaries' use of gladius and scutum—was devastating. By the time of Shaka's assassination in 1828, it had made the Zulu kingdom the greatest power in southern Africa and a force to be reckoned with, even against Britain's modern army in 1879.The Impi in battle To understand the full scope of the impi's performance in battle, military historians of the Zulu typically look to its early operations against internal African enemies, not merely the British interlude. In terms of numbers, the operations of the impi would change- from the Western equivalent of small company and battalion size forces, to manoeuvres in multi-divisional strength of between 10,000 and 40,000 men. The victory won by Zulu king Cetawasyo at Ndondakusuka, for example, two decades before the British invasion involved a deployment of 30,000 troops. These were sizeable formations in regional context but represented the bulk of prime Zulu fighting strength. Few impi-style formations were to routinely achieve this level of mobilisation for a single battle. By comparison, at Cannae, the Romans deployed 80,000 men, and generally could put tens of thousands more into smaller combat actions). The popular notion of countless attacking black spearmen is a distorted one. Manpower supplies on the continent were often limited. In the words of one historian: "The savage hordes of popular lore seldom materialized on African battlefields." This limited resource base would hurt the Zulu when they confronted technologically advanced world powers such as Britain. The advent of new weapons like firearms would also have a profound impact on the African battlefield, but as will be seen, the impi-style forces largely eschewed firearms, or used them in a minor way. Whether facing native spear or European bullet, impis largely fought as they had since the days of Shaka, from Zululand to Zimbabwe, and from Mozambique to Tanzania. Command and control Command and control of the impis was problematic at times. Indeed, the Zulu attacks on the British strongpoints at Rorke's Drift and at Kambula, (both bloody defeats) seemed to have been carried out by over-enthusiastic leaders and warriors despite contrary orders of the Zulu King, Cetshwayo. Popular film re-enactments display a grizzled izinduna directing the host from a promontory with elegant sweeps of the hand. This might have happened during the initial marshaling of forces from a jump off point, or the deployment of reserves, but once the great encircling sweep of frenzied warriors in the "horns" and "chest" was in motion, the izinduna could not generally exercise detailed control. Handling of reserve forces Although the "loins" or reserves were on hand to theoretically correct or adjust an unfavorable situation, a shattered attack could make the reserves irrelevant. Against the Boers at Blood River, massed gunfire broke the back of the Zulu assault, and the Boers were later able to mount a cavalry sweep in counterattack that became a turkey shoot against fleeing Zulu remnants. Perhaps the Zulu threw everything forward and had little left. In similar manner, after exhausting themselves against British firepower at Kambula and Ulindi, few of the Zulu reserves were available to do anything constructive, although the tribal warriors still remained dangerous at the guerrilla level when scattered. At Isandhlwana however, the "classical" Zulu system struck gold, and after liquidating the British position, it was a relatively fresh reserve force that swept down on Rorke's Drift. Comparison to contemporary armies The Zulu had greater numbers than their opponents, but greater numbers massed together in compact arrays simply presented easy targets in the age of modern firearms and artillery. African tribes that fought in smaller guerrilla detachments typically held out against European invaders for a much longer time, as witnessed by the 7-year resistance of the Lobi against the French in West Africa, or the operations of the Berbers in Algeria against the French. When the Zulu did acquire firearms, most notably captured stocks after the great victory at Isandhlwana, they lacked training and used them ineffectively, consistently firing high to give the bullets "strength." Southern Africa, including the areas near Natal, was teeming with bands like the Griquas who had learned to use guns. Indeed, one such group not only mastered the way of the gun, but became proficient horsemen as well, skills that helped build the Basotho tribe, in what is now the nation of Lesotho. In addition, numerous European renegades or adventurers (both Boer and non-Boer) skilled in firearms were known to the Zulu. Some had even led detachments for the Zulu kings on military missions. The Zulu thus had clear scope and opportunity to master and adapt the new weaponry. They also had already experienced defeat against the Boers, by concentrated firearms. They had had at least four decades to adjust their tactics to this new threat. A well-drilled corps of gunmen or grenadiers, or a battery of artillery operated by European mercenaries for example, might have provided much needed covering fire as the regiments manoeuvred into position. Throughout the 19th century they persisted in "human wave" attacks against well defended European positions where massed firepower devastated their ranks. The ministrations of an isAngoma (plural: izAngoma) Zulu diviner or "witch doctor", and the bravery of individual regiments were ultimately of little use against the volleys of modern rifles, Gatling guns and artillery at the Ineyzane River, Rorke's Drift, Kambula, Gingingdlovu and finally Ulindi. Demise of the Impi The demise of the impi finally came about with the success of European colonisation of Africa- first in southern Africa by the British, and finally in German East Africa as German colonialists defeated the last of the impi-style formations under Mkwawa, chief of the Hehe of Tanzania. The Boers, another major challenger to the impi, also saw defeat by imperial forces, in the Boer War of 1902. In its relatively brief history, the impi inspired both scorn (During the Anglo-Zulu War, British commander Lord Chelmsford complained that they did not 'fight fair') and admiration in its opponents, epitomised in Kipling's poem "Fuzzy Wuzzy":We took our chanst among the Khyber 'ills,The Boers knocked us silly at a mile,The Burman give us Irriwady Chills,'An' a Zulu Impi dished us up in style.The impi in popular culture Today the impi lives on in popular lore and culture, even in the West. While the term "impi" has become synonymous with the Zulu nation in international popular culture, it appears in various video games such as Civilization III, Civilization IV: Warlords, Civilization: Revolution, Civilization V: Brave New World, and Civilization VI, where the Impi is the unique unit for the Zulu faction with Shaka as their leader. 'Impi' is also the title of a very famous South Africa song by Johnny Clegg and the band Juluka which has become something of an unofficial national anthem, especially at major international sports events and especially when the opponent is England. Lyrics:Impi! O nans'impi iyeza (Impi! Oh here comes impi)Uban'obengathint'amabhubesi? (Who would
|
(Gods), the Children of Lir, Táin Bó Cúailnge & the Salmon of Knowledge. Divinity In Irish mythology Depending on the sources, the importance of gods and goddesses in Irish mythology varies. The geographical tales, Dindshenchas, emphasize the importance of female divinities and powerful ancestors, while the historical tradition focuses on the colonizers, inventors, or male warriors with the female characters only intervening in episodes. The primal and ancestral goddesses are connected to the land, the waters, and sovereignty, and are often seen as the oldest ancestors of the people in the region or nation. They are maternal figures caring for the earth itself as well as their descendants, but also fierce defenders, teachers and warriors. More personalized deities may be connected to cultural qualities such as, in the case of Brigid, poetry, smith craft, and healing. Some of the female figures associated with the druids are prophetic, especially when foretelling death and doom. Zoomorphism is an important feature for many Irish deities. Badb Catha, for instance, is "the Raven of Battle", and in the Táin Bó Cúailnge, The Morrígan changes into an eel, a wolf, and a cow. Goddesses The Celtic goddesses are not divided by singular qualities such as "love goddess", but are more of the nature of well-rounded humans, who have areas of special interests or skills. In this way, they do not correspond directly to other pantheons such as those of the Greeks or Romans. The mother of the Tuatha Dé Danann is generally considered to be Anu or Danu. A number of the goddesses are associated with sacred sites where seasonal festivals are held. They include Macha of Eamhain Mhacha, Carman, and Tailtiu, among others. Warrior Goddesses are often depicted as a triad, and connected with sovereignty and sacred animals. The animals may be associated with carnage, such as wolves and crows, or the abundance of the land, such as cattle. They guard the battlefield and those who do battle, and according to the stories in the Táin Bó Cúailnge, some of these goddesses may be the instigators and directors of the entire war themselves. The main goddesses of battle are The Morrígan, Macha, and Badb. Other warrior women are seen in the role of training warriors in the Fianna bands, such as Liath Luachra, one of the women who trained the hero Fionn mac Cumhaill. Gods The Irish Gods are divided into four main groups. Group one encompasses the older gods of Gaul and Britain. The second group is the main focus of much of the mythology and surrounds the native Irish gods with their homes in burial mounds (The Great Barrows of the Dead). The third group are the gods that dwell in the sea and the fourth group includes stories of the Otherworld. The gods that appear most often are Dagda and Lug. Some scholars have argued that the stories of these gods align with the Greek stories and gods. Druids An order of priests and philosophers highly revered in Celtic society. The root deru- implies solidarity, firmness as a tree is steadfast. The Indo-European root wid- means "to know." Druids could be male or female and were often compared to Roman flamines and Indian brahmins. Druids in Gaul had authority over divine worship, and also officiated sacrifices, exercised authority over legislation and judicial matters, and educated elite youth about their order. Heroes Heroes in Irish mythology can be found in two distinct groups. There is the lawful hero who exists within the boundaries of the community, protecting their people from outsiders. Within the kin-group or túath, heroes are human and gods are not. The Fianna warrior bands are seen as outsiders, connected with the wilderness, youth, and liminal states. They are considered outsiders who protect the community from other outsiders; though they may winter with a settled community, they spend the summers living wild, training adolescents and providing a space for war-damaged veterans. They live under the authority of their own leaders, or may be somewhat anarchic, and may follow other deities or spirits than the settled communities. Oilliphéist The Oilliphéist is a sea serpent-like monster in Irish mythology and folklore. These monsters were believed to inhabit many lakes and rivers in Ireland and there are many legends of saints and heroes fighting them. Sources for myths The three main manuscript sources for Irish mythology are the late 11th/early 12th century Lebor na hUidre (Book of the Dun Cow), which is in the library of the Royal Irish Academy, and is the oldest surviving manuscript written entirely in the Irish language; the early 12th-century Book of Leinster, which is in the Library of Trinity College Dublin; and Bodleian Library, MS Rawlinson B 502 (Rawl.), which is in the Bodleian Library at the University of Oxford. Despite the dates of these sources, most of the material they contain predates their composition. Other important sources include a group of manuscripts that originated in the West of Ireland in the late 14th century or the early 15th century: The Yellow Book of Lecan, The Great Book of Lecan and The Book of Ballymote. The first of these is in the Library of Trinity College and the others are in the Royal Irish Academy. The Yellow Book of Lecan is composed of sixteen parts and includes the legends of Fionn Mac Cumhail, selections of legends of Irish Saints, and the earliest known version of the Táin Bó Cúailnge ("The Cattle Raid of Cooley"). This is one of Europe's oldest epics written in a vernacular language. Other 15th-century manuscripts, such as The Book of Fermoy, also contain interesting materials, as do such later syncretic works such as Geoffrey Keating's Foras Feasa ar Éirinn (The History of Ireland) (). These later compilers and writers may well have had access to manuscript sources that have since disappeared. Most of these manuscripts were created by Christian monks, who may well have been torn between a desire to record their native culture and hostility to pagan beliefs, resulting in some of the gods being euhemerised. Many of the later sources may also have formed parts of a propaganda effort designed to create a history for the people of Ireland that could bear comparison with the mythological descent of their British invaders from the founders of Rome, as promulgated by Geoffrey of Monmouth and others. There was also a tendency to rework Irish genealogies to fit them into the schemas of Greek or biblical genealogy. Whether medieval Irish literature provides reliable evidence of oral tradition remains a matter for debate. Kenneth Jackson described the Ulster Cycle as a "window on the Iron Age", and Garret Olmsted has attempted to draw parallels between Táin Bó Cuailnge, the Ulster Cycle epic and the iconography of the Gundestrup Cauldron. However, these "nativist" claims have been challenged by "revisionist" scholars who believe that much of the literature was created, rather than merely recorded, in Christian times, more or less in imitation of the epics of classical literature that came with Latin learning. The revisionists point to passages apparently influenced by the Iliad in Táin Bó Cuailnge, and to the Togail Troí, an Irish adaptation of Dares Phrygius' De excidio Troiae historia, found in the Book of Leinster. They also argue that the material culture depicted in the stories is generally closer to that of the time of their composition than to that of the distant past. Mythological cycle The Mythological Cycle, comprising stories of the former gods and origins of the Irish, is the least well preserved of the four cycles. It is about the principal people who invaded and inhabited the island. The people include Cessair and her followers, the Formorians, the Partholinians, the Nemedians, the Firbolgs, the Tuatha Dé Danann, and the Milesians. The most important sources are the Metrical Dindshenchas or Lore of Places and the Lebor Gabála Érenn or Book of Invasions. Other manuscripts preserve such mythological tales as The Dream of Aengus, the Wooing Of Étain and Cath Maige Tuireadh, the (second) Battle of Magh Tuireadh. One of the best known of all Irish stories, Oidheadh Clainne Lir, or The Tragedy of the Children of Lir, is also part of this cycle. Lebor Gabála Érenn is a pseudo-history of Ireland, tracing the ancestry of the Irish back to before Noah. It tells of a series of invasions or "takings" of Ireland by a succession of peoples, the fifth of whom was the people known as the Tuatha Dé Danann ("Peoples of the Goddess Danu"), who were believed to have inhabited the island before the arrival of the Gaels, or Milesians. They faced opposition from their enemies, the Fomorians, led by Balor of the Evil Eye. Balor was eventually slain by Lugh Lámfada (Lugh of the Long Arm) at the second battle of Magh Tuireadh. With the arrival of the Gaels, the Tuatha Dé Danann retired underground to become the fairy people of later myth and legend. The Metrical Dindshenchas is the great onomastics work of early Ireland, giving the naming legends of significant places in a sequence of poems. It includes a lot of important information on Mythological Cycle figures and stories, including the Battle of Tailtiu, in which the Tuatha Dé Danann were defeated by the Milesians. It is important to note that by the Middle Ages the Tuatha Dé Danann were not viewed so much as gods as the shape-shifting magician population of an earlier Golden Age Ireland. Texts such as Lebor Gabála Érenn and Cath Maige Tuireadh present them as kings and heroes of the distant past, complete with death-tales. However, there
|
instigators and directors of the entire war themselves. The main goddesses of battle are The Morrígan, Macha, and Badb. Other warrior women are seen in the role of training warriors in the Fianna bands, such as Liath Luachra, one of the women who trained the hero Fionn mac Cumhaill. Gods The Irish Gods are divided into four main groups. Group one encompasses the older gods of Gaul and Britain. The second group is the main focus of much of the mythology and surrounds the native Irish gods with their homes in burial mounds (The Great Barrows of the Dead). The third group are the gods that dwell in the sea and the fourth group includes stories of the Otherworld. The gods that appear most often are Dagda and Lug. Some scholars have argued that the stories of these gods align with the Greek stories and gods. Druids An order of priests and philosophers highly revered in Celtic society. The root deru- implies solidarity, firmness as a tree is steadfast. The Indo-European root wid- means "to know." Druids could be male or female and were often compared to Roman flamines and Indian brahmins. Druids in Gaul had authority over divine worship, and also officiated sacrifices, exercised authority over legislation and judicial matters, and educated elite youth about their order. Heroes Heroes in Irish mythology can be found in two distinct groups. There is the lawful hero who exists within the boundaries of the community, protecting their people from outsiders. Within the kin-group or túath, heroes are human and gods are not. The Fianna warrior bands are seen as outsiders, connected with the wilderness, youth, and liminal states. They are considered outsiders who protect the community from other outsiders; though they may winter with a settled community, they spend the summers living wild, training adolescents and providing a space for war-damaged veterans. They live under the authority of their own leaders, or may be somewhat anarchic, and may follow other deities or spirits than the settled communities. Oilliphéist The Oilliphéist is a sea serpent-like monster in Irish mythology and folklore. These monsters were believed to inhabit many lakes and rivers in Ireland and there are many legends of saints and heroes fighting them. Sources for myths The three main manuscript sources for Irish mythology are the late 11th/early 12th century Lebor na hUidre (Book of the Dun Cow), which is in the library of the Royal Irish Academy, and is the oldest surviving manuscript written entirely in the Irish language; the early 12th-century Book of Leinster, which is in the Library of Trinity College Dublin; and Bodleian Library, MS Rawlinson B 502 (Rawl.), which is in the Bodleian Library at the University of Oxford. Despite the dates of these sources, most of the material they contain predates their composition. Other important sources include a group of manuscripts that originated in the West of Ireland in the late 14th century or the early 15th century: The Yellow Book of Lecan, The Great Book of Lecan and The Book of Ballymote. The first of these is in the Library of Trinity College and the others are in the Royal Irish Academy. The Yellow Book of Lecan is composed of sixteen parts and includes the legends of Fionn Mac Cumhail, selections of legends of Irish Saints, and the earliest known version of the Táin Bó Cúailnge ("The Cattle Raid of Cooley"). This is one of Europe's oldest epics written in a vernacular language. Other 15th-century manuscripts, such as The Book of Fermoy, also contain interesting materials, as do such later syncretic works such as Geoffrey Keating's Foras Feasa ar Éirinn (The History of Ireland) (). These later compilers and writers may well have had access to manuscript sources that have since disappeared. Most of these manuscripts were created by Christian monks, who may well have been torn between a desire to record their native culture and hostility to pagan beliefs, resulting in some of the gods being euhemerised. Many of the later sources may also have formed parts of a propaganda effort designed to create a history for the people of Ireland that could bear comparison with the mythological descent of their British invaders from the founders of Rome, as promulgated by Geoffrey of Monmouth and others. There was also a tendency to rework Irish genealogies to fit them into the schemas of Greek or biblical genealogy. Whether medieval Irish literature provides reliable evidence of oral tradition remains a matter for debate. Kenneth Jackson described the Ulster Cycle as a "window on the Iron Age", and Garret Olmsted has attempted to draw parallels between Táin Bó Cuailnge, the Ulster Cycle epic and the iconography of the Gundestrup Cauldron. However, these "nativist" claims have been challenged by "revisionist" scholars who believe that much of the literature was created, rather than merely recorded, in Christian times, more or less in imitation of the epics of classical literature that came with Latin learning. The revisionists point to passages apparently influenced by the Iliad in Táin Bó Cuailnge, and to the Togail Troí, an Irish adaptation of Dares Phrygius' De excidio Troiae historia, found in the Book of Leinster. They also argue that the material culture depicted in the stories is generally closer to that of the time of their composition than to that of the distant past. Mythological cycle The Mythological Cycle, comprising stories of the former gods and origins of the Irish, is the least well preserved of the four cycles. It is about the principal people who invaded and inhabited the island. The people include Cessair and her followers, the Formorians, the Partholinians, the Nemedians, the Firbolgs, the Tuatha Dé Danann, and the Milesians. The most important sources are the Metrical Dindshenchas or Lore of Places and the Lebor Gabála Érenn or Book of Invasions. Other manuscripts preserve such mythological tales as The Dream of Aengus, the Wooing Of Étain and Cath Maige Tuireadh, the (second) Battle of Magh Tuireadh. One of the best known of all Irish stories, Oidheadh Clainne Lir, or The Tragedy of the Children of Lir, is also part of this cycle. Lebor Gabála Érenn is a pseudo-history of Ireland, tracing the ancestry of the Irish back to before Noah. It tells of a series of invasions or "takings" of Ireland by a succession of peoples, the fifth of whom was the people known as the Tuatha Dé Danann ("Peoples of the Goddess Danu"), who were believed to have inhabited the island before the arrival of the Gaels, or Milesians. They faced opposition from their enemies, the Fomorians, led by Balor of
|
others for bodily injury or property damage Medical coverage, for the cost of treating injuries, rehabilitation and sometimes lost wages and funeral expenses Gap insurance Gap insurance covers the excess amount on your auto loan in an instance where your insurance company does not cover the entire loan. Depending on the company's specific policies it might or might not cover the deductible as well. This coverage is marketed for those who put low down payments, have high interest rates on their loans, and those with 60-month or longer terms. Gap insurance is typically offered by a finance company when the vehicle owner purchases their vehicle, but many auto insurance companies offer this coverage to consumers as well. Health insurance Health insurance policies cover the cost of medical treatments. Dental insurance, like medical insurance, protects policyholders for dental costs. In most developed countries, all citizens receive some health coverage from their governments, paid through taxation. In most countries, health insurance is often part of an employer's benefits. Income protection insurance Disability insurance policies provide financial support in the event of the policyholder becoming unable to work because of disabling illness or injury. It provides monthly support to help pay such obligations as mortgage loans and credit cards. Short-term and long-term disability policies are available to individuals, but considering the expense, long-term policies are generally obtained only by those with at least six-figure incomes, such as doctors, lawyers, etc. Short-term disability insurance covers a person for a period typically up to six months, paying a stipend each month to cover medical bills and other necessities. Long-term disability insurance covers an individual's expenses for the long term, up until such time as they are considered permanently disabled and thereafter Insurance companies will often try to encourage the person back into employment in preference to and before declaring them unable to work at all and therefore totally disabled. Disability overhead insurance allows business owners to cover the overhead expenses of their business while they are unable to work. Total permanent disability insurance provides benefits when a person is permanently disabled and can no longer work in their profession, often taken as an adjunct to life insurance. Workers' compensation insurance replaces all or part of a worker's wages lost and accompanying medical expenses incurred because of a job-related injury. Casualty insurance Casualty insurance insures against accidents, not necessarily tied to any specific property. It is a broad spectrum of insurance that a number of other types of insurance could be classified, such as auto, workers compensation, and some liability insurances. Crime insurance is a form of casualty insurance that covers the policyholder against losses arising from the criminal acts of third parties. For example, a company can obtain crime insurance to cover losses arising from theft or embezzlement. Terrorism insurance provides protection against any loss or damage caused by terrorist activities. In the United States in the wake of 9/11, the Terrorism Risk Insurance Act 2002 (TRIA) set up a federal program providing a transparent system of shared public and private compensation for insured losses resulting from acts of terrorism. The program was extended until the end of 2014 by the Terrorism Risk Insurance Program Reauthorization Act 2007 (TRIPRA). Kidnap and ransom insurance is designed to protect individuals and corporations operating in high-risk areas around the world against the perils of kidnap, extortion, wrongful detention and hijacking. Political risk insurance is a form of casualty insurance that can be taken out by businesses with operations in countries in which there is a risk that revolution or other political conditions could result in a loss. Life insurance Life insurance provides a monetary benefit to a decedent's family or other designated beneficiary, and may specifically provide for income to an insured person's family, burial, funeral and other final expenses. Life insurance policies often allow the option of having the proceeds paid to the beneficiary either in a lump sum cash payment or an annuity. In most states, a person cannot purchase a policy on another person without their knowledge. Annuities provide a stream of payments and are generally classified as insurance because they are issued by insurance companies, are regulated as insurance, and require the same kinds of actuarial and investment management expertise that life insurance requires. Annuities and pensions that pay a benefit for life are sometimes regarded as insurance against the possibility that a retiree will outlive his or her financial resources. In that sense, they are the complement of life insurance and, from an underwriting perspective, are the mirror image of life insurance. Certain life insurance contracts accumulate cash values, which may be taken by the insured if the policy is surrendered or which may be borrowed against. Some policies, such as annuities and endowment policies, are financial instruments to accumulate or liquidate wealth when it is needed. In many countries, such as the United States and the UK, the tax law provides that the interest on this cash value is not taxable under certain circumstances. This leads to widespread use of life insurance as a tax-efficient method of saving as well as protection in the event of early death. In the United States, the tax on interest income on life insurance policies and annuities is generally deferred. However, in some cases the benefit derived from tax deferral may be offset by a low return. This depends upon the insuring company, the type of policy and other variables (mortality, market return, etc.). Moreover, other income tax saving vehicles (e.g., IRAs, 401(k) plans, Roth IRAs) may be better alternatives for value accumulation. Burial insurance Burial insurance is a very old type of life insurance which is paid out upon death to cover final expenses, such as the cost of a funeral. The Greeks and Romans introduced burial insurance c. 600 CE when they organized guilds called "benevolent societies" which cared for the surviving families and paid funeral expenses of members upon death. Guilds in the Middle Ages served a similar purpose, as did friendly societies during Victorian times. Property Property insurance provides protection against risks to property, such as fire, theft or weather damage. This may include specialized forms of insurance such as fire insurance, flood insurance, earthquake insurance, home insurance, inland marine insurance or boiler insurance. The term property insurance may, like casualty insurance, be used as a broad category of various subtypes of insurance, some of which are listed below: Aviation insurance protects aircraft hulls and spares, and associated liability risks, such as passenger and third-party liability. Airports may also appear under this subcategory, including air traffic control and refuelling operations for international airports through to smaller domestic exposures. Boiler insurance (also known as boiler and machinery insurance, or equipment breakdown insurance) insures against accidental physical damage to boilers, equipment or machinery. Builder's risk insurance insures against the risk of physical loss or damage to property during construction. Builder's risk insurance is typically written on an "all risk" basis covering damage arising from any cause (including the negligence of the insured) not otherwise expressly excluded. Builder's risk insurance is coverage that protects a person's or organization's insurable interest in materials, fixtures or equipment being used in the construction or renovation of a building or structure should those items sustain physical loss or damage from an insured peril. Crop insurance may be purchased by farmers to reduce or manage various risks associated with growing crops. Such risks include crop loss or damage caused by weather, hail, drought, frost damage, pests (including especially insects), or disease - some of these being termed named perils. Index-based insurance uses models of how climate extremes affect crop production to define certain climate triggers that if surpassed have high probabilities of causing substantial crop loss. When harvest losses occur associated with exceeding the climate trigger threshold, the index-insured farmer is entitled to a compensation payment. Earthquake insurance is a form of property insurance that pays the policyholder in the event of an earthquake that causes damage to the property. Most ordinary home insurance policies do not cover earthquake damage. Earthquake insurance policies generally feature a high deductible. Rates depend on location and hence the likelihood of an earthquake, as well as the construction of the home. Fidelity bond is a form of casualty insurance that covers policyholders for losses incurred as a result of fraudulent acts by specified individuals. It usually insures a business for losses caused by the dishonest acts of its employees. Flood insurance protects against property loss due to flooding. Many U.S. insurers do not provide flood insurance in some parts of the country. In response to this, the federal government created the National Flood Insurance Program which serves as the insurer of last resort. Home insurance, also commonly called hazard insurance or homeowners insurance (often abbreviated in the real estate industry as HOI), provides coverage for damage or destruction of the policyholder's home. In some geographical areas, the policy may exclude certain types of risks, such as flood or earthquake, that require additional coverage. Maintenance-related issues are typically the homeowner's responsibility. The policy may include inventory, or this can be bought as a separate policy, especially for people who rent housing. In some countries, insurers offer a package which may include liability and legal responsibility for injuries and property damage caused by members of the household, including pets. Landlord insurance covers residential or commercial property that is rented to tenants. It also covers the landlord's liability for the occupants at the property. Most homeowners' insurance, meanwhile, cover only owner-occupied homes and not liability or damages related to tenants. Marine insurance and marine cargo insurance cover the loss or damage of vessels at sea or on inland waterways, and of cargo in transit, regardless of the method of transit. When the owner of the cargo and the carrier are separate corporations, marine cargo insurance typically compensates the owner of cargo for losses sustained from fire, shipwreck, etc., but excludes losses that can be recovered from the carrier or the carrier's insurance. Many marine insurance underwriters will include "time element" coverage in such policies, which extends the indemnity to cover loss of profit and other business expenses attributable to the delay caused by a covered loss. Renters' insurance, often called tenants' insurance, is an insurance policy that provides some of the benefits of homeowners' insurance, but does not include coverage for the dwelling, or structure, with the exception of small alterations that a tenant makes to the structure. Supplemental natural disaster insurance covers specified expenses after a natural disaster renders the policyholder's home uninhabitable. Periodic payments are made directly to the insured until the home is rebuilt or a specified time period has elapsed. Surety bond insurance is a three-party insurance guaranteeing the performance of the principal. Volcano insurance is a specialized insurance protecting against damage arising specifically from volcanic eruptions. Windstorm insurance is an insurance covering the damage that can be caused by wind events such as hurricanes. Liability Liability insurance is a very broad superset that covers legal claims against the insured. Many types of insurance include an aspect of liability coverage. For example, a homeowner's insurance policy will normally include liability coverage which protects the insured in the event of a claim brought by someone who slips and falls on the property; automobile insurance also includes an aspect of liability insurance that indemnifies against the harm that a crashing car can cause to others' lives, health, or property. The protection offered by a liability insurance policy is twofold: a legal defense in the event of a lawsuit commenced against the policyholder and indemnification (payment on behalf of the insured) with respect to a settlement or court verdict. Liability policies typically cover only the negligence of the insured, and will not apply to results of wilful or intentional acts by the insured. Public liability insurance or general liability insurance covers a business or organization against claims should its operations injure a member of the public or damage their property in some way. Directors and officers liability insurance (D&O) protects an organization (usually a corporation) from costs associated with litigation resulting from errors made by directors and officers for which they are liable. Environmental liability or environmental impairment insurance protects the insured from bodily injury, property damage and cleanup costs as a result of the dispersal, release or escape of pollutants. Errors and omissions insurance (E&O) is business liability insurance for professionals such as insurance agents, real estate agents and brokers, architects, third-party administrators (TPAs) and other business professionals. Prize indemnity insurance protects the insured from giving away a large prize at a specific event. Examples would include offering prizes to contestants who can make a half-court shot at a basketball game, or a hole-in-one at a golf tournament. Professional liability insurance, also called professional indemnity insurance (PI), protects insured professionals such as architectural corporations and medical practitioners against potential negligence claims made by their patients/clients. Professional liability insurance may take on different names depending on the profession. For example, professional liability insurance in reference to the medical profession may be called medical malpractice insurance. Often a commercial insured's liability insurance program consists of several layers. The first layer of insurance generally consists of primary insurance, which provides first dollar indemnity for judgments and settlements up to the limits of liability of the primary policy. Generally, primary insurance is subject to a deductible and obligates the insured to defend the insured against lawsuits, which is normally accomplished by assigning counsel to defend the insured. In many instances, a commercial insured may elect to self-insure. Above the primary insurance or self-insured retention, the insured may have one or more layers of excess insurance to provide coverage additional limits of indemnity protection. There are a variety of types of excess insurance, including "stand-alone" excess policies (policies that contain their own terms, conditions, and exclusions), "follow form" excess insurance (policies that follow the terms of the underlying policy except as specifically provided), and "umbrella" insurance policies (excess insurance that in some circumstances could provide coverage that is broader than the underlying insurance). Credit Credit insurance repays some or all of a loan when the borrower is insolvent. Mortgage insurance insures the lender against default by the borrower. Mortgage insurance is a form of credit insurance, although the name "credit insurance" more often is used to refer to policies that cover other kinds of debt. Many credit cards offer payment protection plans which are a form of credit insurance. Trade credit insurance is business insurance over the accounts receivable of the insured. The policy pays the policy holder for covered accounts receivable if the debtor defaults on payment. Collateral protection insurance (CPI) insures property (primarily vehicles) held as collateral for loans made by lending institutions. Cyber attack insurance Cyber-insurance is a business lines insurance product intended to provide coverage to corporations from Internet-based risks, and more generally from risks relating to information technology infrastructure, information privacy, information governance liability, and activities related thereto. Other types All-risk insurance is an insurance that covers a wide range of incidents and perils, except those noted in the policy. All-risk insurance is different from peril-specific insurance that cover losses from only those perils listed in the policy. In car insurance, all-risk policy includes also the damages caused by the own driver. Bloodstock insurance covers individual horses or a number of horses under common ownership. Coverage is typically for mortality as a result of accident, illness or disease but may extend to include infertility, in-transit loss, veterinary fees, and prospective foal. Business interruption insurance covers the loss of income, and the expenses incurred, after a covered peril interrupts normal business operations. Defense Base Act (DBA) insurance provides coverage for civilian workers hired by the government to perform contracts outside the United States and Canada. DBA is required for all U.S. citizens, U.S. residents, U.S. Green Card holders, and all employees or subcontractors hired on overseas government contracts. Depending on the country, foreign nationals must also be covered under DBA. This coverage typically includes expenses related to medical treatment and loss of wages, as well as disability and death benefits. Expatriate insurance provides individuals and organizations operating outside of their home country with protection for automobiles, property, health, liability and business pursuits. Hired-in Plant Insurance covers liability where, under a contract of hire, the customer is liable to pay for the cost of hired-in equipment and for any rental charges due to a plant hire firm, such as construction plant and machinery. Legal expenses insurance covers policyholders for the potential costs of legal action against an institution or an individual. When something happens which triggers the need for legal action, it is known as "the event". There are two main types of legal expenses insurance: before the event insurance and after the event insurance. Livestock insurance is a specialist policy provided to, for example, commercial or hobby farms, aquariums, fish farms or any other animal holding. Cover is available for mortality or economic slaughter as a result of accident, illness or disease but can extend to include destruction by government order. Media liability insurance is designed to cover professionals that engage in film and television production and print, against risks such as defamation. Nuclear incident insurance covers damages resulting from an incident involving radioactive materials and is generally arranged at the national level. (See the nuclear exclusion clause and, for the United States, the Price–Anderson Nuclear Industries Indemnity Act.) Pet insurance insures pets against accidents and illnesses; some companies cover routine/wellness care and burial, as well. Pollution insurance usually takes the form of first-party coverage for contamination of insured property either by external or on-site sources. Coverage is also afforded for liability to third parties arising from contamination of air, water, or land due to the sudden and accidental release of hazardous materials from the insured site. The policy usually covers the costs of cleanup and may include coverage for releases from underground storage tanks. Intentional acts are specifically excluded. Purchase insurance is aimed at providing protection on the products people purchase. Purchase insurance can cover individual purchase protection, warranties, guarantees, care plans and even mobile phone insurance. Such insurance is normally very limited in the scope of problems that are covered by the policy. Tax insurance is increasingly being used in corporate transactions to protect taxpayers in the event that a tax position it has taken is challenged by the IRS or a state, local, or foreign taxing authority Title insurance provides a guarantee that title to real property is vested in the purchaser or mortgagee, free and clear of liens or encumbrances. It is usually issued in conjunction with a search of the public records performed at the time of a real estate transaction. Travel insurance is an insurance cover taken by those who travel abroad, which covers certain losses such as medical expenses, loss of personal belongings, travel delay, and personal liabilities. Tuition insurance insures students against involuntary withdrawal from cost-intensive educational institutions Interest rate insurance protects the holder from adverse changes in interest rates, for instance for those with a variable rate loan or mortgage Divorce insurance is a form of contractual liability insurance that pays the insured a cash benefit if their marriage ends in divorce. Insurance financing vehicles Fraternal insurance is provided on a cooperative basis by fraternal benefit societies or other social organizations. No-fault insurance is a type of insurance policy (typically automobile insurance) where insureds are indemnified by their own insurer regardless of fault in the incident. Protected self-insurance is an alternative risk financing mechanism in which an organization retains the mathematically calculated cost of risk within the organization and transfers the catastrophic risk with specific and aggregate limits to an insurer so the maximum total cost of the program is known. A properly designed and underwritten Protected Self-Insurance Program reduces and stabilizes the cost of insurance and provides valuable risk management information. Retrospectively rated insurance is a method of establishing a premium on large commercial accounts. The final premium is based on the insured's actual loss experience during the policy term, sometimes subject to a minimum and maximum premium, with the final premium determined by a formula. Under this plan, the current year's premium is based partially (or wholly) on the current year's losses, although the premium adjustments may take months or years beyond the current year's expiration date. The rating formula is guaranteed in the insurance contract. Formula: retrospective premium = converted loss + basic premium × tax multiplier. Numerous variations of this formula have been developed and are in use. Formal self-insurance (active risk retention) is the deliberate decision to pay for otherwise insurable losses out of one's own money. This can be done on a formal basis by establishing a separate fund into which funds are deposited on a periodic basis, or by simply forgoing the purchase of available insurance and paying out-of-pocket. Self-insurance is usually used to pay for high-frequency, low-severity losses. Such losses, if covered by conventional insurance, mean having to pay a premium that includes loadings for the company's general expenses, cost of putting the policy on the books, acquisition expenses, premium taxes, and contingencies. While this is true for all insurance, for small, frequent losses the transaction costs may exceed the benefit of volatility reduction that insurance otherwise affords. Reinsurance is a type of insurance purchased by insurance companies or self-insured employers to protect against unexpected losses. Financial reinsurance is a form of reinsurance that is primarily used for capital management rather than to transfer insurance risk. Social insurance can be many things to many people in many countries. But a summary of its essence is that it is a collection of insurance coverages (including components of life insurance, disability income insurance, unemployment insurance, health insurance, and others), plus retirement savings, that requires participation by all citizens. By forcing everyone in society to be a policyholder and pay premiums, it ensures that everyone can become a claimant when or if they need to. Along the way, this inevitably becomes related to other concepts such as the justice system and the welfare state. This is a large, complicated topic that engenders tremendous debate, which can be further studied in the following articles (and others): National Insurance Social safety net Social security Social Security debate (United States) Social Security (United States) Social welfare provision Stop-loss insurance provides protection against catastrophic or unpredictable losses. It is purchased by organizations who do not want to assume 100% of the liability for losses arising from the plans. Under a stop-loss policy, the insurance company becomes liable for losses that exceed certain limits called deductibles. Closed community and governmental self-insurance Some communities prefer to create virtual insurance among themselves by other means than contractual risk transfer, which assigns explicit numerical values to risk. A number of religious groups, including the Amish and some Muslim groups, depend on support provided by their communities when disasters strike. The risk presented by any given person is assumed collectively by the community who all bear the cost of rebuilding lost property and supporting people whose needs are suddenly greater after a loss of some kind. In supportive communities where others can be trusted to follow community leaders, this tacit form of insurance can work. In this manner the community can even out the extreme differences in insurability that exist among its members. Some further justification is also provided by invoking the moral hazard of explicit insurance contracts. In the United Kingdom, The Crown (which, for practical purposes, meant the civil service) did not insure property such as government buildings. If a government building was damaged, the cost of repair would be met from public funds because, in the long run, this was cheaper than paying insurance premiums. Since many UK government buildings have been sold to property companies and rented back, this arrangement is now less common. In the United States, the most prevalent form of self-insurance is governmental risk management pools. They are self-funded cooperatives, operating as carriers of coverage for the majority of governmental entities today, such as county governments, municipalities, and school districts. Rather than these entities independently self-insure and risk bankruptcy from a large judgment or catastrophic loss, such governmental entities form a risk pool. Such pools begin their operations by capitalization through member deposits or bond issuance. Coverage (such as general liability, auto liability, professional liability, workers compensation, and property) is offered by the pool to its members, similar to coverage offered by insurance companies. However, self-insured pools offer members lower rates (due to not needing insurance brokers), increased benefits (such as loss prevention services) and subject matter expertise. Of approximately 91,000 distinct governmental entities operating in the United States, 75,000 are members of self-insured pools in various lines of coverage, forming approximately 500 pools. Although a relatively small corner of the insurance market, the annual contributions (self-insured premiums) to such pools have been estimated up to 17 billion dollars annually. Insurance companies Insurance companies may sell any combination of insurance types, but are often classified into three groups: Life insurance companies, which sell life insurance, annuities and pensions products and bear similarities to asset management businesses Non-life or property/casualty insurance companies, which sell other types of insurance. Health insurance companies, which sometimes sell life insurance or employee benefits as well General insurance companies can be further divided into these sub categories. Standard lines Excess lines In most countries, life and non-life insurers are subject to different regulatory regimes and different tax and accounting rules. The main reason for the distinction between the two types of company is that life, annuity, and pension business is very long-term in nature – coverage for life assurance or a pension can cover risks over many decades. By contrast, non-life insurance cover usually covers a shorter period, such as one year. Mutual versus proprietary Insurance companies are generally classified as either mutual or proprietary companies. Mutual companies are owned by the policyholders, while shareholders (who may or may not own policies) own proprietary insurance companies. Demutualization of mutual insurers to form stock companies, as well as the formation of a hybrid known as a mutual holding company, became common in some countries, such as the United States, in the late 20th century. However, not all states permit mutual holding companies. Reinsurance companies Reinsurance companies are insurance companies that sell policies to other insurance companies, allowing them to reduce their risks and protect themselves from substantial losses. The reinsurance market is dominated by a few very large companies, with huge reserves. A reinsurer may also be a direct writer of insurance risks as well. Captive insurance companies Captive insurance companies may be defined as limited-purpose insurance companies established with the specific objective of financing risks emanating from their parent group or groups. This definition can sometimes be extended to include some of the risks of the parent company's customers. In short, it is an in-house self-insurance vehicle. Captives may take the form of a "pure" entity, which is a 100% subsidiary of the self-insured parent company; of a "mutual" captive, which insures the collective risks of members of an industr); and of an "association" captive, which self-insures individual risks of the members of a professional, commercial or industrial association. Captives represent commercial, economic and tax advantages to their sponsors because of the reductions in costs they help create and for the ease of insurance risk management and the flexibility for cash flows they generate. Additionally, they may provide coverage of risks which is neither available nor offered in the traditional insurance market at reasonable prices. The types of risk that a captive can underwrite for their parents include property damage, public and product liability, professional indemnity, employee benefits, employers' liability, motor and medical aid expenses. The captive's exposure to such risks may be limited by the use of reinsurance. Captives are becoming an increasingly important component of the risk management and risk financing strategy of their parent. This can be understood against the following background: Heavy and increasing premium costs in almost every line of coverage Difficulties in insuring certain types of fortuitous risk Differential coverage standards in various parts of the world Rating structures which reflect market trends rather than individual loss experience Insufficient credit for deductibles or loss control efforts Other forms Other possible forms for an insurance company include reciprocals, in which policyholders reciprocate in sharing risks, and Lloyd's organizations. Admitted versus non-admitted Admitted insurance companies are those in the United States that have been admitted or licensed by the state licensing agency. The insurance they sell is called admitted insurance. Non-admitted companies have not been approved by the state licensing agency, but are allowed to sell insurance under special circumstances when they meet an insurance need that admitted companies cannot or will not meet. Insurance consultants There are also companies known as "insurance consultants". Like a mortgage broker, these companies are paid a fee by the customer to shop around for the best insurance policy among many companies. Similar to an insurance consultant, an "insurance broker" also shops around for the best insurance policy among many companies. However, with insurance brokers, the fee is usually paid in the form of commission from the insurer that is selected rather than directly from the client. Neither insurance consultants nor insurance brokers are insurance companies and no risks are transferred to them in insurance transactions. Third party administrators are companies that perform underwriting and sometimes claims handling services for insurance companies. These companies often have special expertise that the insurance companies do not have. Financial stability and rating The financial stability and strength of an insurance company should be a major consideration when buying an insurance contract. An insurance premium paid currently provides coverage for losses that might arise many years in the future. For that reason, the viability of the insurance carrier is very important. In recent years, a number of insurance companies have become insolvent, leaving their policyholders with no coverage (or coverage only from a government-backed insurance pool or other arrangements with less attractive payouts for losses). A number of independent rating agencies provide information and rate the financial viability of insurance companies. Insurance companies are rated by various agencies such as A. M. Best. The ratings include the company's financial strength, which measures its ability to pay claims. It also rates financial instruments issued by the insurance company, such as bonds, notes, and securitization products. Across the world Advanced economies account for the bulk of the global insurance industry. According to Swiss Re, the global insurance market wrote $6.287 trillion in direct premiums in 2020. ("Direct premiums" means premiums written directly by insurers before accounting for ceding of risk to reinsurers.) As usual, the United States was the country with the largest insurance market with $2.530 trillion (40.3%) of direct premiums written, with the People's Republic of China coming in second at only $574 billion (9.3%), Japan coming in third at $438 billion (7.1%), and the United Kingdom coming in fourth at $380 billion (6.2%). However, the European Union's single market is the actual second largest market, with 18 percent market share. Regulatory differences In the United States, insurance is regulated by the states under the McCarran-Ferguson Act, with "periodic proposals for federal intervention", and a nonprofit coalition of state insurance agencies called the National Association of Insurance Commissioners works to harmonize the country's different laws and regulations. The National Conference of Insurance Legislators (NCOIL) also works to harmonize the different state laws. In the European Union, the Third Non-Life Directive and the Third Life Directive, both passed in 1992 and effective 1994, created a single insurance market in Europe and allowed insurance companies to offer insurance anywhere in the EU (subject to permission from authority in
|
model, collecting premium payments periodically in return for on-going and/or compounding benefits offered to policyholders. Underwriting and investing Insurers' business model aims to collect more in premium and investment income than is paid out in losses, and to also offer a competitive price which consumers will accept. Profit can be reduced to a simple equation: Profit = earned premium + investment income – incurred loss – underwriting expenses. Insurers make money in two ways: Through underwriting, the process by which insurers select the risks to insure and decide how much in premiums to charge for accepting those risks, and taking the brunt of the risk should it come to fruition. By investing the premiums they collect from insured parties The most complicated aspect of insuring is the actuarial science of ratemaking (price-setting) of policies, which uses statistics and probability to approximate the rate of future claims based on a given risk. After producing rates, the insurer will use discretion to reject or accept risks through the underwriting process. At the most basic level, initial rate-making involves looking at the frequency and severity of insured perils and the expected average payout resulting from these perils. Thereafter an insurance company will collect historical loss-data, bring the loss data to present value, and compare these prior losses to the premium collected in order to assess rate adequacy. Loss ratios and expense loads are also used. Rating for different risk characteristics involves - at the most basic level - comparing the losses with "loss relativities"—a policy with twice as many losses would, therefore, be charged twice as much. More complex multivariate analyses are sometimes used when multiple characteristics are involved and a univariate analysis could produce confounded results. Other statistical methods may be used in assessing the probability of future losses. Upon termination of a given policy, the amount of premium collected minus the amount paid out in claims is the insurer's underwriting profit on that policy. Underwriting performance is measured by something called the "combined ratio", which is the ratio of expenses/losses to premiums. A combined ratio of less than 100% indicates an underwriting profit, while anything over 100 indicates an underwriting loss. A company with a combined ratio over 100% may nevertheless remain profitable due to investment earnings. Insurance companies earn investment profits on "float". Float, or available reserve, is the amount of money on hand at any given moment that an insurer has collected in insurance premiums but has not paid out in claims. Insurers start investing insurance premiums as soon as they are collected and continue to earn interest or other income on them until claims are paid out. The Association of British Insurers (grouping together 400 insurance companies and 94% of UK insurance services) has almost 20% of the investments in the London Stock Exchange. In 2007, U.S. industry profits from float totaled $58 billion. In a 2009 letter to investors, Warren Buffett wrote, "we were paid $2.8 billion to hold our float in 2008". In the United States, the underwriting loss of property and casualty insurance companies was $142.3 billion in the five years ending 2003. But overall profit for the same period was $68.4 billion, as the result of float. Some insurance-industry insiders, most notably Hank Greenberg, do not believe that it is possible to sustain a profit from float forever without an underwriting profit as well, but this opinion is not universally held. Reliance on float for profit has led some industry experts to call insurance companies "investment companies that raise the money for their investments by selling insurance". Naturally, the float method is difficult to carry out in an economically depressed period. Bear markets do cause insurers to shift away from investments and to toughen up their underwriting standards, so a poor economy generally means high insurance-premiums. This tendency to swing between profitable and unprofitable periods over time is commonly known as the underwriting, or insurance, cycle. Claims Claims and loss handling is the materialized utility of insurance; it is the actual "product" paid for. Claims may be filed by insureds directly with the insurer or through brokers or agents. The insurer may require that the claim be filed on its own proprietary forms, or may accept claims on a standard industry form, such as those produced by ACORD. Insurance company claims departments employ a large number of claims adjusters supported by a staff of records management and data entry clerks. Incoming claims are classified based on severity and are assigned to adjusters whose settlement authority varies with their knowledge and experience. The adjuster undertakes an investigation of each claim, usually in close cooperation with the insured, determines if coverage is available under the terms of the insurance contract, and if so, the reasonable monetary value of the claim, and authorizes payment. The policyholder may hire their own public adjuster to negotiate the settlement with the insurance company on their behalf. For policies that are complicated, where claims may be complex, the insured may take out a separate insurance policy add-on, called loss recovery insurance, which covers the cost of a public adjuster in the case of a claim. Adjusting liability insurance claims is particularly difficult because there is a third party involved, the plaintiff, who is under no contractual obligation to cooperate with the insurer and may in fact regard the insurer as a deep pocket. The adjuster must obtain legal counsel for the insured (either inside "house" counsel or outside "panel" counsel), monitor litigation that may take years to complete, and appear in person or over the telephone with settlement authority at a mandatory settlement conference when requested by the judge. If a claims adjuster suspects under-insurance, the condition of average may come into play to limit the insurance company's exposure. In managing the claims handling function, insurers seek to balance the elements of customer satisfaction, administrative handling expenses, and claims overpayment leakages. As part of this balancing act, fraudulent insurance practices are a major business risk that must be managed and overcome. Disputes between insurers and insureds over the validity of claims or claims handling practices occasionally escalate into litigation (see insurance bad faith). Marketing Insurers will often use insurance agents to initially market or underwrite their customers. Agents can be captive, meaning they write only for one company, or independent, meaning that they can issue policies from several companies. The existence and success of companies using insurance agents is likely due to the availability of improved and personalised services. Companies also use Broking firms, Banks and other corporate entities (like Self Help Groups, Microfinance Institutions, NGOs, etc.) to market their products. Types Any risk that can be quantified can potentially be insured. Specific kinds of risk that may give rise to claims are known as perils. An insurance policy will set out in detail which perils are covered by the policy and which are not. Below are non-exhaustive lists of the many different types of insurance that exist. A single policy may cover risks in one or more of the categories set out below. For example, vehicle insurance would typically cover both the property risk (theft or damage to the vehicle) and the liability risk (legal claims arising from an accident). A home insurance policy in the United States typically includes coverage for damage to the home and the owner's belongings, certain legal claims against the owner, and even a small amount of coverage for medical expenses of guests who are injured on the owner's property. Business insurance can take a number of different forms, such as the various kinds of professional liability insurance, also called professional indemnity (PI), which are discussed below under that name; and the business owner's policy (BOP), which packages into one policy many of the kinds of coverage that a business owner needs, in a way analogous to how homeowners' insurance packages the coverages that a homeowner needs. Vehicle insurance Vehicle insurance protects the policyholder against financial loss in the event of an incident involving a vehicle they own, such as in a traffic collision. Coverage typically includes: Property coverage, for damage to or theft of the car Liability coverage, for the legal responsibility to others for bodily injury or property damage Medical coverage, for the cost of treating injuries, rehabilitation and sometimes lost wages and funeral expenses Gap insurance Gap insurance covers the excess amount on your auto loan in an instance where your insurance company does not cover the entire loan. Depending on the company's specific policies it might or might not cover the deductible as well. This coverage is marketed for those who put low down payments, have high interest rates on their loans, and those with 60-month or longer terms. Gap insurance is typically offered by a finance company when the vehicle owner purchases their vehicle, but many auto insurance companies offer this coverage to consumers as well. Health insurance Health insurance policies cover the cost of medical treatments. Dental insurance, like medical insurance, protects policyholders for dental costs. In most developed countries, all citizens receive some health coverage from their governments, paid through taxation. In most countries, health insurance is often part of an employer's benefits. Income protection insurance Disability insurance policies provide financial support in the event of the policyholder becoming unable to work because of disabling illness or injury. It provides monthly support to help pay such obligations as mortgage loans and credit cards. Short-term and long-term disability policies are available to individuals, but considering the expense, long-term policies are generally obtained only by those with at least six-figure incomes, such as doctors, lawyers, etc. Short-term disability insurance covers a person for a period typically up to six months, paying a stipend each month to cover medical bills and other necessities. Long-term disability insurance covers an individual's expenses for the long term, up until such time as they are considered permanently disabled and thereafter Insurance companies will often try to encourage the person back into employment in preference to and before declaring them unable to work at all and therefore totally disabled. Disability overhead insurance allows business owners to cover the overhead expenses of their business while they are unable to work. Total permanent disability insurance provides benefits when a person is permanently disabled and can no longer work in their profession, often taken as an adjunct to life insurance. Workers' compensation insurance replaces all or part of a worker's wages lost and accompanying medical expenses incurred because of a job-related injury. Casualty insurance Casualty insurance insures against accidents, not necessarily tied to any specific property. It is a broad spectrum of insurance that a number of other types of insurance could be classified, such as auto, workers compensation, and some liability insurances. Crime insurance is a form of casualty insurance that covers the policyholder against losses arising from the criminal acts of third parties. For example, a company can obtain crime insurance to cover losses arising from theft or embezzlement. Terrorism insurance provides protection against any loss or damage caused by terrorist activities. In the United States in the wake of 9/11, the Terrorism Risk Insurance Act 2002 (TRIA) set up a federal program providing a transparent system of shared public and private compensation for insured losses resulting from acts of terrorism. The program was extended until the end of 2014 by the Terrorism Risk Insurance Program Reauthorization Act 2007 (TRIPRA). Kidnap and ransom insurance is designed to protect individuals and corporations operating in high-risk areas around the world against the perils of kidnap, extortion, wrongful detention and hijacking. Political risk insurance is a form of casualty insurance that can be taken out by businesses with operations in countries in which there is a risk that revolution or other political conditions could result in a loss. Life insurance Life insurance provides a monetary benefit to a decedent's family or other designated beneficiary, and may specifically provide for income to an insured person's family, burial, funeral and other final expenses. Life insurance policies often allow the option of having the proceeds paid to the beneficiary either in a lump sum cash payment or an annuity. In most states, a person cannot purchase a policy on another person without their knowledge. Annuities provide a stream of payments and are generally classified as insurance because they are issued by insurance companies, are regulated as insurance, and require the same kinds of actuarial and investment management expertise that life insurance requires. Annuities and pensions that pay a benefit for life are sometimes regarded as insurance against the possibility that a retiree will outlive his or her financial resources. In that sense, they are the complement of life insurance and, from an underwriting perspective, are the mirror image of life insurance. Certain life insurance contracts accumulate cash values, which may be taken by the insured if the policy is surrendered or which may be borrowed against. Some policies, such as annuities and endowment policies, are financial instruments to accumulate or liquidate wealth when it is needed. In many countries, such as the United States and the UK, the tax law provides that the interest on this cash value is not taxable under certain circumstances. This leads to widespread use of life insurance as a tax-efficient method of saving as well as protection in the event of early death. In the United States, the tax on interest income on life insurance policies and annuities is generally deferred. However, in some cases the benefit derived from tax deferral may be offset by a low return. This depends upon the insuring company, the type of policy and other variables (mortality, market return, etc.). Moreover, other income tax saving vehicles (e.g., IRAs, 401(k) plans, Roth IRAs) may be better alternatives for value accumulation. Burial insurance Burial insurance is a very old type of life insurance which is paid out upon death to cover final expenses, such as the cost of a funeral. The Greeks and Romans introduced burial insurance c. 600 CE when they organized guilds called "benevolent societies" which cared for the surviving families and paid funeral expenses of members upon death. Guilds in the Middle Ages served a similar purpose, as did friendly societies during Victorian times. Property Property insurance provides protection against risks to property, such as fire, theft or weather damage. This may include specialized forms of insurance such as fire insurance, flood insurance, earthquake insurance, home insurance, inland marine insurance or boiler insurance. The term property insurance may, like casualty insurance, be used as a broad category of various subtypes of insurance, some of which are listed below: Aviation insurance protects aircraft hulls and spares, and associated liability risks, such as passenger and third-party liability. Airports may also appear under this subcategory, including air traffic control and refuelling operations for international airports through to smaller domestic exposures. Boiler insurance (also known as boiler and machinery insurance, or equipment breakdown insurance) insures against accidental physical damage to boilers, equipment or machinery. Builder's risk insurance insures against the risk of physical loss or damage to property during construction. Builder's risk insurance is typically written on an "all risk" basis covering damage arising from any cause (including the negligence of the insured) not otherwise expressly excluded. Builder's risk insurance is coverage that protects a person's or organization's insurable interest in materials, fixtures or equipment being used in the construction or renovation of a building or structure should those items sustain physical loss or damage from an insured peril. Crop insurance may be purchased by farmers to reduce or manage various risks associated with growing crops. Such risks include crop loss or damage caused by weather, hail, drought, frost damage, pests (including especially insects), or disease - some of these being termed named perils. Index-based insurance uses models of how climate extremes affect crop production to define certain climate triggers that if surpassed have high probabilities of causing substantial crop loss. When harvest losses occur associated with exceeding the climate trigger threshold, the index-insured farmer is entitled to a compensation payment. Earthquake insurance is a form of property insurance that pays the policyholder in the event of an earthquake that causes damage to the property. Most ordinary home insurance policies do not cover earthquake damage. Earthquake insurance policies generally feature a high deductible. Rates depend on location and hence the likelihood of an earthquake, as well as the construction of the home. Fidelity bond is a form of casualty insurance that covers policyholders for losses incurred as a result of fraudulent acts by specified individuals. It usually insures a business for losses caused by the dishonest acts of its employees. Flood insurance protects against property loss due to flooding. Many U.S. insurers do not provide flood insurance in some parts of the country. In response to this, the federal government created the National Flood Insurance Program which serves as the insurer of last resort. Home insurance, also commonly called hazard insurance or homeowners insurance (often abbreviated in the real estate industry as HOI), provides coverage for damage or destruction of the policyholder's home. In some geographical areas, the policy may exclude certain types of risks, such as flood or earthquake, that require additional coverage. Maintenance-related issues are typically the homeowner's responsibility. The policy may include inventory, or this can be bought as a separate policy, especially for people who rent housing. In some countries, insurers offer a package which may include liability and legal responsibility for injuries and property damage caused by members of the household, including pets. Landlord insurance covers residential or commercial property that is rented to tenants. It also covers the landlord's liability for the occupants at the property. Most homeowners' insurance, meanwhile, cover only owner-occupied homes and not liability or damages related to tenants. Marine insurance and marine cargo insurance cover the loss or damage of vessels at sea or on inland waterways, and of cargo in transit, regardless of the method of transit. When the owner of the cargo and the carrier are separate corporations, marine cargo insurance typically compensates the owner of cargo for losses sustained from fire, shipwreck, etc., but excludes losses that can be recovered from the carrier or the carrier's insurance. Many marine insurance underwriters will include "time element" coverage in such policies, which extends the indemnity to cover loss of profit and other business expenses attributable to the delay caused by a covered loss. Renters' insurance, often called tenants' insurance, is an insurance policy that provides some of the benefits of homeowners' insurance, but does not include coverage for the dwelling, or structure, with the exception of small alterations that a tenant makes to the structure. Supplemental natural disaster insurance covers specified expenses after a natural disaster renders the policyholder's home uninhabitable. Periodic payments are made directly to the insured until the home is rebuilt or a specified time period has elapsed. Surety bond insurance is a three-party insurance guaranteeing the performance of the principal. Volcano insurance is a specialized insurance protecting against damage arising specifically from volcanic eruptions. Windstorm insurance is an insurance covering the damage that can be caused by wind events such as hurricanes. Liability Liability insurance is a very broad superset that covers legal claims against the insured. Many types of insurance include an aspect of liability coverage. For example, a homeowner's insurance policy will normally include liability coverage which protects the insured in the event of a claim brought by someone who slips and falls on the property; automobile insurance also includes an aspect of liability insurance that indemnifies against the harm that a crashing car can cause to others' lives, health, or property. The protection offered by a liability insurance policy is twofold: a legal defense in the event of a lawsuit commenced against the policyholder and indemnification (payment on behalf of the insured) with respect to a settlement or court verdict. Liability policies typically cover only the negligence of the insured, and will not apply to results of wilful or intentional acts by the insured. Public liability insurance or general liability insurance covers a business or organization against claims should its operations injure a member of the public or damage their property in some way. Directors and officers liability insurance (D&O) protects an organization (usually a corporation) from costs associated with litigation resulting from errors made by directors and officers for which they are liable. Environmental liability or environmental impairment insurance protects the insured from bodily injury, property damage and cleanup costs as a result of the dispersal, release or escape of pollutants. Errors and omissions insurance (E&O) is business liability insurance for professionals such as insurance agents, real estate agents and brokers, architects, third-party administrators (TPAs) and other business professionals. Prize indemnity insurance protects the insured from giving away a large prize at a specific event. Examples would include offering prizes to contestants who can make a half-court shot at a basketball game, or a hole-in-one at a golf tournament. Professional liability insurance, also called professional indemnity insurance (PI), protects insured professionals such as architectural corporations and medical practitioners against potential negligence claims made by their patients/clients. Professional liability insurance may take on different names depending on the profession. For example, professional liability insurance in reference to the medical profession may be called medical malpractice insurance. Often a commercial insured's liability insurance program consists of several layers. The first layer of insurance generally consists of primary insurance, which provides first dollar indemnity for judgments and settlements up to the limits of liability of the primary policy. Generally, primary insurance is subject to a deductible and obligates the insured to defend the insured against lawsuits, which is normally accomplished by assigning counsel to defend the insured. In many instances, a commercial insured may elect to self-insure. Above the primary insurance or self-insured retention, the insured may have one or more layers of excess insurance to provide coverage additional limits of indemnity protection. There are a variety of types of excess insurance, including "stand-alone" excess policies (policies that contain their own terms, conditions, and exclusions), "follow form" excess insurance (policies that follow the terms of the underlying policy except as specifically provided), and "umbrella" insurance policies (excess insurance that in some circumstances could provide coverage that is broader than the underlying insurance). Credit Credit insurance repays some or all of a loan when the borrower is insolvent. Mortgage insurance insures the lender against default by the borrower. Mortgage insurance is a form of credit insurance, although the name "credit insurance" more often is used to refer to policies that cover other kinds of debt. Many credit cards offer payment protection plans which are a form of credit insurance. Trade credit insurance is business insurance over the accounts receivable of the insured. The policy pays the policy holder for covered accounts receivable if the debtor defaults on payment. Collateral protection insurance (CPI) insures property (primarily vehicles) held as collateral for loans made by lending institutions. Cyber attack insurance Cyber-insurance is a business lines insurance product intended to provide coverage to corporations from Internet-based risks, and more generally from risks relating to information technology infrastructure, information privacy, information governance liability, and activities related thereto. Other types All-risk insurance is an insurance that covers a wide range of incidents and perils, except those noted in the policy. All-risk insurance is different from peril-specific insurance that cover losses from only those perils listed in the policy. In car insurance, all-risk policy includes also the damages caused by the own driver. Bloodstock insurance covers individual horses or a number of horses under common ownership. Coverage is typically for mortality as a result of accident, illness or disease but may extend to include infertility, in-transit loss, veterinary fees, and prospective foal. Business interruption insurance covers the loss of income, and the expenses incurred, after a covered peril interrupts normal business operations. Defense Base Act (DBA) insurance provides coverage for civilian workers hired by the government to perform contracts outside the United States and Canada. DBA is required for all U.S. citizens, U.S. residents, U.S. Green Card holders, and all employees or subcontractors hired on overseas government contracts. Depending on the country, foreign nationals must also be covered under DBA. This coverage typically includes expenses related to medical treatment and loss of wages, as well as disability and death benefits. Expatriate insurance provides individuals and organizations operating outside of their home country with protection for automobiles, property, health, liability and business pursuits. Hired-in Plant Insurance covers liability where, under a contract of hire, the customer is liable to pay for the cost of hired-in equipment and for any rental charges due to a plant hire firm, such as construction plant and machinery. Legal expenses insurance covers policyholders for the potential costs of legal action against an institution or an individual. When something happens which triggers the need for legal action, it is known as "the event". There are two main types of legal expenses insurance: before the event insurance and after the event insurance. Livestock insurance is a specialist policy provided to, for example, commercial or hobby farms, aquariums, fish farms or any other animal holding. Cover is available for mortality
|
the Sikhs, Gandhi's Congress Party helped to bring the orthodox religious leader Jarnail Singh Bhindranwale to prominence in Punjab politics. Later, Bhindranwale's organisation, Damdami Taksal, became embroiled in violence with another religious sect called the Sant Nirankari Mission, and he was accused of instigating the murder of Jagat Narain, the owner of the Punjab Kesari newspaper. After being arrested over this matter, Bhindranwale disassociated himself from the Congress Party and joined Akali Dal. In July 1982, he led the campaign for the implementation of the Anandpur Resolution, which demanded greater autonomy for the Sikh-majority state. Meanwhile, a small group of Sikhs, including some of Bhindranwale's followers, turned to militancy after being targeted by government officials and police for supporting the Anandpur Resolution. In 1982, Bhindranwale and approximately 200 armed followers moved into a guest house called the Guru Nanak Niwas near the Golden Temple. By 1983, the Temple complex had become a fort for many militants. The Statesman later reported that light machine guns and semi-automatic rifles were known to have been brought into the compound. On 23 April 1983, the Punjab Police Deputy Inspector General A. S. Atwal was shot dead as he left the Temple compound. The following day, Harchand Singh Longowal (then president of Shiromani Akali Dal) confirmed the involvement of Bhindranwale in the murder. After several futile negotiations, in June 1984, Gandhi ordered the Indian army to enter the Golden Temple to remove Bhindranwale and his supporters from the complex. The army used heavy artillery, including tanks, in the action code-named Operation Blue Star. The operation badly damaged or destroyed parts of the Temple complex, including the Akal Takht shrine and the Sikh library. It also led to the deaths of many Sikh fighters and innocent pilgrims. The number of casualties remains disputed with estimates ranging from many hundreds to many thousands. Gandhi was accused of using the attack for political ends. Harjinder Singh Dilgeer stated that she attacked the temple complex to present herself as a great hero in order to win the general elections planned towards the end of 1984. There was fierce criticism of the action by Sikhs in India and overseas. There were also incidents of mutiny by Sikh soldiers in the aftermath of the attack. Assassination On 31 October 1984, two of Gandhi's Sikh bodyguards, Satwant Singh and Beant Singh, shot her with their service weapons in the garden of the prime minister's residence at 1 Safdarjung Road, New Delhi, allegedly in revenge for Operation Blue Star. The shooting occurred as she was walking past a wicket gate guarded by the two men. She was to be interviewed by the British filmmaker Peter Ustinov, who was filming a documentary for Irish television. Beant shot her three times using his side-arm; Satwant fired 30 rounds. The men dropped their weapons and surrendered. Afterwards, they were taken away by other guards into a closed room where Beant was shot dead. Kehar Singh was later arrested for conspiracy in the attack. Both Satwant and Kehar were sentenced to death and hanged in Delhi's Tihar Jail. Gandhi was taken to the All India Institutes of Medical Sciences at 9:30 AM where doctors operated on her. She was declared dead at 2:20 PM. The post-mortem examination was conducted by a team of doctors headed by Tirath Das Dogra. Dogra stated that Gandhi had sustained as many as 30 bullet wounds, from two sources: a Sten submachine gun and a .38 Special revolver. The assailants had fired 31 bullets at her, of which 30 hit her; 23 had passed through her body while seven remained inside her. Dogra extracted bullets to establish the make of the weapons used and to match each weapon with the bullets recovered by ballistic examination. The bullets were matched with their respective weapons at the Central Forensic Science Laboratory (CFSL) Delhi. Subsequently, Dogra appeared in Shri Mahesh Chandra's court as an expert witness (PW-5); his testimony took several sessions. The cross examination was conducted by Shri Pran Nath Lekhi, the defence counsel. Salma Sultan provided the first news of her assassination on Doordarshan's evening news on 31 October 1984, more than 10 hours after she was shot. Gandhi was cremated in accordance with Hindu tradition on 3 November near Raj Ghat. The site where she was cremated is known today as Shakti Sthal. In order to pay homage, Gandhi's body lay in state at Teen Murti House. Thousands of followers strained for a glimpse of the cremation. Her funeral was televised live on domestic and international stations, including the BBC. After her death, the Parade Ground was converted to the Indira Gandhi Park which was inaugurated by her son, Rajiv Gandhi. Gandhi's assassination dramatically changed the political landscape. Rajiv succeeded his mother as Prime Minister within hours of her murder and anti-Sikh riots erupted, lasting for several days and killing more than 3,000 Sikhs in New Delhi and an estimated 8,000 across India. Many Congress leaders were believed to be behind the anti-Sikh massacre. International reaction Gandhi's death was mourned worldwide. World leaders condemned the assassination and said her death would leave a 'big emptiness' in international affairs. In Moscow, Soviet President Konstantin Chernenko sent condolences stating, "The Soviet people learned with pain and sorrow about the untimely death in a villainous assassination of the glorious daughter of the great Indian people, a fiery fighter for peace and security of peoples and a great friend of the Soviet Union". President Ronald Reagan, along with secretary of state George Shultz, visited the Indian Embassy to sign a book of condolences and expressed his 'shock, revulsion, and grief' over the assassination. 42nd vice president of the United States Walter Mondale called Gandhi 'a great leader of a great democracy' and deplored 'this shocking act of violence'. Asian, African and European leaders mourned Gandhi as a great champion of democracy and leader of the Non-Aligned Movement expressed its 'deepest grief' and called the killing a 'terrorist' act. South Korean President Chun Doo-hwan, said Gandhi's death meant the 'loss of a great leader to the whole world.' Yugoslav President Veselin Đuranović, Pakistani President Mohammad Zia ul-Haq, Italian President Sandro Pertini, Pope John Paul II at the Vatican, French President Francois Mitterrand condemned the killing. At the United Nations, the General Assembly paused in its work as shocked delegates mourned the death. Assembly President Paul Lusaka of Zambia postponed a scheduled debate and hastily organized a memorial meeting. Foreign relations Gandhi is remembered for her ability to effectively promote Indian foreign policy measures. South Asia In early 1971, disputed elections in Pakistan led then East Pakistan to declare independence as Bangladesh. Repression and violence by the Pakistani army led to 10 million refugees crossing the border into India over the following months. Finally, in December 1971, Gandhi intervened directly in the conflict to liberate Bangladesh. India emerged victorious following the war with Pakistan to become the dominant power of South Asia. India had signed a treaty with the Soviet Union promising mutual assistance in the case of war, while Pakistan received active support from the United States during the conflict. U.S. President Richard Nixon disliked Gandhi personally, referring to her as a "bitch" and a "clever fox" in his private communication with Secretary of State Henry Kissinger. Nixon later wrote of the war: "[Gandhi] suckered [America]. Suckered us ... this woman suckered us." Relations with the U.S. became distant as Gandhi developed closer ties with the Soviet Union after the war. The latter grew to become India's largest trading partner and its biggest arms supplier for much of Gandhi's premiership. India's new hegemonic position, as articulated under the "Indira Doctrine", led to attempts to bring the Himalayan states under India's sphere of influence. Nepal and Bhutan remained aligned with India, while in 1975, after years of building up support, Gandhi incorporated Sikkim into India, after a referendum in which a majority of Sikkimese voted to join India. This was denounced as a "despicable act" by China. India maintained close ties with neighbouring Bangladesh (formerly East Pakistan) following the Liberation War. Prime Minister Sheikh Mujibur Rahman recognised Gandhi's contributions to the independence of Bangladesh. However, Mujibur Rahman's pro-India policies antagonised many in Bangladeshi politics and the military, which feared that Bangladesh had become a client state of India. The Assassination of Mujibur Rahman in 1975 led to the establishment of Islamist military regimes that sought to distance the country from India. Gandhi's relationship with the military regimes was strained because of her alleged support of anti-Islamist leftist guerrilla forces in Bangladesh. Generally, however, there was a rapprochement between Gandhi and the Bangladeshi regimes, although issues such as border disputes and the Farakka Dam remained an irritant to bilateral ties. In 2011, the Government of Bangladesh conferred its highest state award for non-nationals, the Bangladesh Freedom Honour posthumously on Gandhi for her "outstanding contribution" to the country's independence. Gandhi's approach to dealing with Sri Lanka's ethnic problems was initially accommodating. She enjoyed cordial relations with Prime Minister Sirimavo Bandaranaike. In 1974, India ceded the tiny islet of Katchatheevu to Sri Lanka to save Bandaranaike's socialist government from a political disaster. However, relations soured over Sri Lanka's movement away from socialism under J. R. Jayewardene, whom Gandhi despised as a "western puppet". India under Gandhi was alleged to have supported the Liberation Tigers of Tamil Eelam (LTTE) militants in the 1980s to put pressure on Jayewardene to abide by Indian interests. Nevertheless, Gandhi rejected demands to invade Sri Lanka in the aftermath of Black July 1983, an anti-Tamil pogrom carried out by Sinhalese mobs. Gandhi made a statement emphasising that she stood for the territorial integrity of Sri Lanka, although she also stated that India cannot "remain a silent spectator to any injustice done to the Tamil community." India's relationship with Pakistan remained strained following the Shimla Accord in 1972. Gandhi's authorisation of the detonation of a nuclear device at Pokhran in 1974 was viewed by Pakistani leader Zulfikar Ali Bhutto as an attempt to intimidate Pakistan into accepting India's hegemony in the subcontinent. However, in May 1976, Gandhi and Bhutto both agreed to reopen diplomatic establishments and normalise relations. Following the rise to power of General Muhammad Zia-ul-Haq in Pakistan in 1978, India's relations with its neighbour reached a nadir. Gandhi accused General Zia of supporting Khalistani militants in Punjab. Military hostilities recommenced in 1984 following Gandhi's authorisation of Operation Meghdoot. India was victorious in the resulting Siachen conflict against Pakistan. In order to keep the Soviet Union and the United States out of South Asia, Gandhi was instrumental in establishing the South Asian Association for Regional Cooperation (SAARC) in 1983 Middle East Gandhi remained a staunch supporter of the Palestinians in the Arab–Israeli conflict and was critical of the Middle East diplomacy sponsored by the United States. Israel was viewed as a religious state, and thus an analogue to India's archrival Pakistan. Indian diplomats hoped to win Arab support in countering Pakistan in Kashmir. Nevertheless, Gandhi authorised the development of a secret channel of contact and security assistance with Israel in the late 1960s. Her lieutenant, P. V. Narasimha Rao, later became prime minister and approved full diplomatic ties with Israel in 1992. India's pro-Arab policy had mixed success. Establishment of close ties with the socialist and secular Baathist regimes to some extent neutralised Pakistani propaganda against India. However, the Indo-Pakistani War of 1971 presented a dilemma for the Arab and Muslim states of the Middle East as the war was fought by two states both friendly to the Arabs. The progressive Arab regimes in Egypt, Syria, and Algeria chose to remain neutral, while the conservative pro-American Arab monarchies in Jordan, Saudi Arabia, Kuwait, and United Arab Emirates openly supported Pakistan. Egypt's stance was met with dismay by the Indians, who had come to expect close co-operation with the Baathist regimes. But, the death of Nasser in 1970 and Sadat's growing friendship with Riyadh, and his mounting differences with Moscow, constrained Egypt to a policy of neutrality. Gandhi's overtures to Muammar Gaddafi were rebuffed. Libya agreed with the Arab monarchies in believing that Gandhi's intervention in East Pakistan was an attack against Islam. The 1971 war became a temporary stumbling block in growing Indo-Iranian ties. Although Iran had earlier characterized the Indo-Pakistani war in 1965 as Indian aggression, the Shah had launched an effort at rapprochement with India in 1969 as part of his effort to secure support for a larger Iranian role in the Persian Gulf. Gandhi's tilt towards Moscow and her dismemberment of Pakistan was perceived by the Shah as part of a larger anti-Iran conspiracy involving India, Iraq, and the Soviet Union. Nevertheless, Iran had resisted Pakistani pressure to activate the Baghdad Pact and draw the Central Treaty Organisation (CENTO) into the conflict. Gradually, Indian and Iranian disillusionment with their respective regional allies led to a renewed partnership between the nations. Gandhi was unhappy with the lack of support from India's Arab allies during the war with Pakistan, while the Shah was apprehensive at the growing friendship between Pakistan and Arab states of the Persian Gulf, especially Saudi Arabia, and the growing influence of Islam in Pakistani society. There was an increase in Indian economic and military co-operation with Iran during the 1970s. The 1974 India-Iranian agreement led to Iran supplying nearly 75 percent of India's crude oil demands. Gandhi appreciated the Shah's disregard of Pan-Islamism in diplomacy. Asia-Pacific One of the major developments in Southeast Asia during Gandhi's premiership was the formation of the Association of Southeast Asian Nations (ASEAN) in 1967. Relations between ASEAN and India were mutually antagonistic. India perceived ASEAN to be linked to the Southeast Asia Treaty Organization (SEATO) and, therefore, it was seen as a pro-American organisation. On their part, the ASEAN nations were unhappy with Gandhi's sympathy for the Viet Cong and India's strong links with the USSR. Furthermore, they were also apprehensions in the region about Gandhi's plans, particularly after India played a big role in breaking up Pakistan and facilitating the emergence of Bangladesh as a sovereign country in 1971. India's entry into the nuclear weapons club in 1974 also contributed to tensions in Southeast Asia. Relations only began to improve following Gandhi's endorsement of the ZOPFAN declaration and the disintegration of the SEATO alliance in the aftermath of Pakistani and American defeats in the region. Nevertheless, Gandhi's close relations with reunified Vietnam and her decision to recognize the Vietnam-installed Government of Cambodia in 1980 meant that India and ASEAN were unable to develop a viable partnership. On 26 September 1981, Gandhi was conferred with the honorary degree of Doctor at the Laucala Graduation at the University of the South Pacific in Fiji. Africa Although independent India was initially viewed as a champion of various African independence movements, its cordial relationship with the Commonwealth of Nations and its liberal views of British policies in East Africa had harmed its image as a staunch supporter of various independence movements in the third world. Indian condemnation of militant struggles in Kenya and Algeria was in sharp contrast to China, who had supported armed struggle to win African independence. After reaching a high diplomatic point in the aftermath of Nehru's role in the Suez Crisis, India's isolation from Africa was complete when only four nations—Ethiopia, Kenya, Nigeria and Libya—supported her during the Sino-Indian War in 1962. After Gandhi became prime minister, diplomatic and economic relations with the states which had sided with India during the Sino-Indian War were expanded. Gandhi began negotiations with the Kenyan government to establish the Africa-India Development Cooperation. The Indian government also started considering the possibility of bringing Indians settled in Africa within the framework of its policy goals to help recover its declining geo-strategic influence. Gandhi declared the people of Indian origin settled in Africa as "Ambassadors of India". Efforts to rope in the Asian community to join Indian diplomacy, however, came to naught, in part because of the unwillingness of Indians to remain in politically insecure surroundings, and because of the exodus of African Indians to Britain with the passing of the Commonwealth Immigrants Act in 1968. In Uganda, the African Indian community suffered persecution and eventually expulsion under the government of Idi Amin. Foreign and domestic policy successes in the 1970s enabled Gandhi to rebuild India's image in the eyes of African states. Victory over Pakistan and India's possession of nuclear weapons showed the degree of India's progress. Furthermore, the conclusion of the Indo-Soviet treaty in 1971, and threatening gestures by the United States, to send its nuclear armed Task Force 74 into the Bay of Bengal at the height of the East Pakistan crisis had enabled India to regain its anti-imperialist image. Gandhi firmly tied Indian anti-imperialist interests in Africa to those of the Soviet Union. Unlike Nehru, she openly and enthusiastically supported liberation struggles in Africa. At the same time, Chinese influence in Africa had declined owing to its incessant quarrels with the Soviet Union. These developments permanently halted India's decline in Africa and helped to reestablish its geo-strategic presence. The Commonwealth The Commonwealth is a voluntary association of mainly former British colonies. India maintained cordial relations with most of the members during Gandhi's time in power. In the 1980s, she, along with Canadian prime minister Pierre Trudeau, Zambia's president Kenneth Kaunda, Australian prime minister Malcolm Fraser and Singapore prime minister Lee Kuan Yew was regarded as one of the pillars of the Commonwealth. India under Gandhi also hosted the 1983 Commonwealth Heads of Government summit in New Delhi. Gandhi used these meetings as a forum to put pressure on member countries to cut economic, sports, and cultural ties with Apartheid South Africa. The Non-aligned Movement In the early 1980s under Gandhi, India attempted to reassert its prominent role in the Non-Aligned Movement by focusing on the relationship between disarmament and economic development. By appealing to the economic grievances of developing countries, Gandhi and her successors exercised a moderating influence on the Non-aligned movement, diverting it from some of the Cold War issues that marred the controversial 1979 Havana meeting where Cuban leader Fidel Castro attempted to steer the movement towards the Soviet Union. Although hosting the 1983 summit at Delhi boosted Indian prestige within the movement, its close relations with the Soviet Union and its pro-Soviet positions on Afghanistan and Cambodia limited its influence. Western Europe Gandhi spent a number of years in Europe during her youth and had formed many friendships there. During her premiership she formed friendships with many leaders such as West German chancellor, Willy Brandt and Austrian chancellor Bruno Kreisky. She also enjoyed a close working relationship with many British leaders including conservative premiers, Edward Heath and Margaret Thatcher. Soviet Union and Eastern block countries The relationship between India and the Soviet Union deepened during Gandhi's rule. The main reason was the perceived bias of the United States and China, rivals of the USSR, towards Pakistan. The support of the Soviets with arms supplies and the casting of a veto at the United Nations helped in winning and consolidating the victory over Pakistan in the 1971 Bangladesh liberation war. Before the war, Gandhi signed a treaty of friendship with the Soviets. They were unhappy with the 1974 nuclear test conducted by India but did not support further action because of the ensuing Cold War with the United States. Gandhi was unhappy with the Soviet invasion of Afghanistan, but once again calculations involving relations with Pakistan and China kept her from criticising the Soviet Union harshly. The Soviets became the main arms supplier during the Gandhi years by offering cheap credit and transactions in rupees rather than in dollars. The easy trade deals also applied to non-military goods. Under Gandhi, by the early 1980s, the Soviets had become India's largest trading partner. United States When Gandhi came to power in 1966, Lyndon Johnson was the US president. At the time, India was reliant on the US for food aid. Gandhi resented the US policy of food aid being used as a tool to force India to adopt policies favoured by the US. She also resolutely refused to sign the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). Relations with the US were strained badly under President Richard Nixon and his favouring of Pakistan during the Bangladesh liberation war. Nixon despised Gandhi politically and personally. In 1981, Gandhi met President Ronald Reagan for the first time at the North–South Summit held to discuss global poverty. She had been described to him as an 'Ogre', but he found her charming and easy to work with and they formed a close working relationship during her premiership in the 1980s. Economic policy Gandhi presided over three Five-Year Plans as prime minister, two of which succeeded in meeting their targeted growth. There is considerable debate whether Gandhi was a socialist on principle or out of political expediency. Sunanda K. Datta-Ray described her as "a master of rhetoric ... often more posture than policy", while The Times journalist, Peter Hazelhurst, famously quipped that Gandhi's socialism was "slightly left of self-interest." Critics have focused on the contradictions in the evolution of her stance towards communism. Gandhi was known for her anti-communist stance in the 1950s, with Meghnad Desai even describing her as "the scourge of [India's] Communist Party." Yet, she later forged close relations with Indian communists even while using the army to break the Naxalites. In this context, Gandhi was accused of formulating populist policies to suit her political needs. She was seemingly against the rich and big business while preserving the status quo to manipulate the support of the left in times of political insecurity, such as the late 1960s. Although in time Gandhi came to be viewed as the scourge of the right-wing and reactionary political elements of India, leftist opposition to her policies emerged. As early as 1969, critics had begun accusing her of insincerity and machiavellianism. The Indian Libertarian wrote that: "it would be difficult to find a more machiavellian leftist than Mrs Indira Gandhi ... for here is Machiavelli at its best in the person of a suave, charming and astute politician." J. Barkley Rosser Jr. wrote that "some have even seen the declaration of emergency rule in 1975 as a move to suppress [leftist] dissent against Gandhi's policy shift to the right." In the 1980s, Gandhi was accused of "betraying socialism" after the beginning of Operation Forward, an attempt at economic reform. Nevertheless, others were more convinced of Gandhi's sincerity and devotion to socialism. Pankaj Vohra noted that "even the late prime minister's critics would concede that the maximum number of legislations of social significance was brought about during her tenure ... [and that] she lives in the hearts of millions of Indians who shared her concern for the poor and weaker sections and who supported her politics." In summarising the biographical works on Gandhi, Blema S. Steinberg concludes she was decidedly non-ideological. Only 7.4% (24) of the total 330 biographical extractions posit ideology as a reason for her policy choices. Steinberg notes Gandhi's association with socialism was superficial. She had only a general and traditional commitment to the ideology by way of her political and family ties. Gandhi personally had a fuzzy concept of socialism. In one of the early interviews she gave as prime minister, Gandhi had ruminated: "I suppose you could call me a socialist, but you have understand what we mean by that term ... we used the word [socialism] because it came closest to what we wanted to do here – which is to eradicate poverty. You can call it socialism; but if by using that word we arouse controversy, I don't see why we should use it. I don't believe in words at all." Regardless of the debate over her ideology or lack thereof, Gandhi remains a left-wing icon. She has been described by Hindustan Times columnist, Pankaj Vohra, as "arguably the greatest mass leader of the last century." Her campaign slogan, Garibi Hatao ('Remove Poverty'), has become an often used motto of the Indian National Congress Party. To the rural and urban poor, untouchables, minorities and women in India, Gandhi was "Indira Amma or Mother Indira." Green Revolution and the Fourth Five-Year Plan Gandhi inherited a weak and troubled economy. Fiscal
|
(CFSL) Delhi. Subsequently, Dogra appeared in Shri Mahesh Chandra's court as an expert witness (PW-5); his testimony took several sessions. The cross examination was conducted by Shri Pran Nath Lekhi, the defence counsel. Salma Sultan provided the first news of her assassination on Doordarshan's evening news on 31 October 1984, more than 10 hours after she was shot. Gandhi was cremated in accordance with Hindu tradition on 3 November near Raj Ghat. The site where she was cremated is known today as Shakti Sthal. In order to pay homage, Gandhi's body lay in state at Teen Murti House. Thousands of followers strained for a glimpse of the cremation. Her funeral was televised live on domestic and international stations, including the BBC. After her death, the Parade Ground was converted to the Indira Gandhi Park which was inaugurated by her son, Rajiv Gandhi. Gandhi's assassination dramatically changed the political landscape. Rajiv succeeded his mother as Prime Minister within hours of her murder and anti-Sikh riots erupted, lasting for several days and killing more than 3,000 Sikhs in New Delhi and an estimated 8,000 across India. Many Congress leaders were believed to be behind the anti-Sikh massacre. International reaction Gandhi's death was mourned worldwide. World leaders condemned the assassination and said her death would leave a 'big emptiness' in international affairs. In Moscow, Soviet President Konstantin Chernenko sent condolences stating, "The Soviet people learned with pain and sorrow about the untimely death in a villainous assassination of the glorious daughter of the great Indian people, a fiery fighter for peace and security of peoples and a great friend of the Soviet Union". President Ronald Reagan, along with secretary of state George Shultz, visited the Indian Embassy to sign a book of condolences and expressed his 'shock, revulsion, and grief' over the assassination. 42nd vice president of the United States Walter Mondale called Gandhi 'a great leader of a great democracy' and deplored 'this shocking act of violence'. Asian, African and European leaders mourned Gandhi as a great champion of democracy and leader of the Non-Aligned Movement expressed its 'deepest grief' and called the killing a 'terrorist' act. South Korean President Chun Doo-hwan, said Gandhi's death meant the 'loss of a great leader to the whole world.' Yugoslav President Veselin Đuranović, Pakistani President Mohammad Zia ul-Haq, Italian President Sandro Pertini, Pope John Paul II at the Vatican, French President Francois Mitterrand condemned the killing. At the United Nations, the General Assembly paused in its work as shocked delegates mourned the death. Assembly President Paul Lusaka of Zambia postponed a scheduled debate and hastily organized a memorial meeting. Foreign relations Gandhi is remembered for her ability to effectively promote Indian foreign policy measures. South Asia In early 1971, disputed elections in Pakistan led then East Pakistan to declare independence as Bangladesh. Repression and violence by the Pakistani army led to 10 million refugees crossing the border into India over the following months. Finally, in December 1971, Gandhi intervened directly in the conflict to liberate Bangladesh. India emerged victorious following the war with Pakistan to become the dominant power of South Asia. India had signed a treaty with the Soviet Union promising mutual assistance in the case of war, while Pakistan received active support from the United States during the conflict. U.S. President Richard Nixon disliked Gandhi personally, referring to her as a "bitch" and a "clever fox" in his private communication with Secretary of State Henry Kissinger. Nixon later wrote of the war: "[Gandhi] suckered [America]. Suckered us ... this woman suckered us." Relations with the U.S. became distant as Gandhi developed closer ties with the Soviet Union after the war. The latter grew to become India's largest trading partner and its biggest arms supplier for much of Gandhi's premiership. India's new hegemonic position, as articulated under the "Indira Doctrine", led to attempts to bring the Himalayan states under India's sphere of influence. Nepal and Bhutan remained aligned with India, while in 1975, after years of building up support, Gandhi incorporated Sikkim into India, after a referendum in which a majority of Sikkimese voted to join India. This was denounced as a "despicable act" by China. India maintained close ties with neighbouring Bangladesh (formerly East Pakistan) following the Liberation War. Prime Minister Sheikh Mujibur Rahman recognised Gandhi's contributions to the independence of Bangladesh. However, Mujibur Rahman's pro-India policies antagonised many in Bangladeshi politics and the military, which feared that Bangladesh had become a client state of India. The Assassination of Mujibur Rahman in 1975 led to the establishment of Islamist military regimes that sought to distance the country from India. Gandhi's relationship with the military regimes was strained because of her alleged support of anti-Islamist leftist guerrilla forces in Bangladesh. Generally, however, there was a rapprochement between Gandhi and the Bangladeshi regimes, although issues such as border disputes and the Farakka Dam remained an irritant to bilateral ties. In 2011, the Government of Bangladesh conferred its highest state award for non-nationals, the Bangladesh Freedom Honour posthumously on Gandhi for her "outstanding contribution" to the country's independence. Gandhi's approach to dealing with Sri Lanka's ethnic problems was initially accommodating. She enjoyed cordial relations with Prime Minister Sirimavo Bandaranaike. In 1974, India ceded the tiny islet of Katchatheevu to Sri Lanka to save Bandaranaike's socialist government from a political disaster. However, relations soured over Sri Lanka's movement away from socialism under J. R. Jayewardene, whom Gandhi despised as a "western puppet". India under Gandhi was alleged to have supported the Liberation Tigers of Tamil Eelam (LTTE) militants in the 1980s to put pressure on Jayewardene to abide by Indian interests. Nevertheless, Gandhi rejected demands to invade Sri Lanka in the aftermath of Black July 1983, an anti-Tamil pogrom carried out by Sinhalese mobs. Gandhi made a statement emphasising that she stood for the territorial integrity of Sri Lanka, although she also stated that India cannot "remain a silent spectator to any injustice done to the Tamil community." India's relationship with Pakistan remained strained following the Shimla Accord in 1972. Gandhi's authorisation of the detonation of a nuclear device at Pokhran in 1974 was viewed by Pakistani leader Zulfikar Ali Bhutto as an attempt to intimidate Pakistan into accepting India's hegemony in the subcontinent. However, in May 1976, Gandhi and Bhutto both agreed to reopen diplomatic establishments and normalise relations. Following the rise to power of General Muhammad Zia-ul-Haq in Pakistan in 1978, India's relations with its neighbour reached a nadir. Gandhi accused General Zia of supporting Khalistani militants in Punjab. Military hostilities recommenced in 1984 following Gandhi's authorisation of Operation Meghdoot. India was victorious in the resulting Siachen conflict against Pakistan. In order to keep the Soviet Union and the United States out of South Asia, Gandhi was instrumental in establishing the South Asian Association for Regional Cooperation (SAARC) in 1983 Middle East Gandhi remained a staunch supporter of the Palestinians in the Arab–Israeli conflict and was critical of the Middle East diplomacy sponsored by the United States. Israel was viewed as a religious state, and thus an analogue to India's archrival Pakistan. Indian diplomats hoped to win Arab support in countering Pakistan in Kashmir. Nevertheless, Gandhi authorised the development of a secret channel of contact and security assistance with Israel in the late 1960s. Her lieutenant, P. V. Narasimha Rao, later became prime minister and approved full diplomatic ties with Israel in 1992. India's pro-Arab policy had mixed success. Establishment of close ties with the socialist and secular Baathist regimes to some extent neutralised Pakistani propaganda against India. However, the Indo-Pakistani War of 1971 presented a dilemma for the Arab and Muslim states of the Middle East as the war was fought by two states both friendly to the Arabs. The progressive Arab regimes in Egypt, Syria, and Algeria chose to remain neutral, while the conservative pro-American Arab monarchies in Jordan, Saudi Arabia, Kuwait, and United Arab Emirates openly supported Pakistan. Egypt's stance was met with dismay by the Indians, who had come to expect close co-operation with the Baathist regimes. But, the death of Nasser in 1970 and Sadat's growing friendship with Riyadh, and his mounting differences with Moscow, constrained Egypt to a policy of neutrality. Gandhi's overtures to Muammar Gaddafi were rebuffed. Libya agreed with the Arab monarchies in believing that Gandhi's intervention in East Pakistan was an attack against Islam. The 1971 war became a temporary stumbling block in growing Indo-Iranian ties. Although Iran had earlier characterized the Indo-Pakistani war in 1965 as Indian aggression, the Shah had launched an effort at rapprochement with India in 1969 as part of his effort to secure support for a larger Iranian role in the Persian Gulf. Gandhi's tilt towards Moscow and her dismemberment of Pakistan was perceived by the Shah as part of a larger anti-Iran conspiracy involving India, Iraq, and the Soviet Union. Nevertheless, Iran had resisted Pakistani pressure to activate the Baghdad Pact and draw the Central Treaty Organisation (CENTO) into the conflict. Gradually, Indian and Iranian disillusionment with their respective regional allies led to a renewed partnership between the nations. Gandhi was unhappy with the lack of support from India's Arab allies during the war with Pakistan, while the Shah was apprehensive at the growing friendship between Pakistan and Arab states of the Persian Gulf, especially Saudi Arabia, and the growing influence of Islam in Pakistani society. There was an increase in Indian economic and military co-operation with Iran during the 1970s. The 1974 India-Iranian agreement led to Iran supplying nearly 75 percent of India's crude oil demands. Gandhi appreciated the Shah's disregard of Pan-Islamism in diplomacy. Asia-Pacific One of the major developments in Southeast Asia during Gandhi's premiership was the formation of the Association of Southeast Asian Nations (ASEAN) in 1967. Relations between ASEAN and India were mutually antagonistic. India perceived ASEAN to be linked to the Southeast Asia Treaty Organization (SEATO) and, therefore, it was seen as a pro-American organisation. On their part, the ASEAN nations were unhappy with Gandhi's sympathy for the Viet Cong and India's strong links with the USSR. Furthermore, they were also apprehensions in the region about Gandhi's plans, particularly after India played a big role in breaking up Pakistan and facilitating the emergence of Bangladesh as a sovereign country in 1971. India's entry into the nuclear weapons club in 1974 also contributed to tensions in Southeast Asia. Relations only began to improve following Gandhi's endorsement of the ZOPFAN declaration and the disintegration of the SEATO alliance in the aftermath of Pakistani and American defeats in the region. Nevertheless, Gandhi's close relations with reunified Vietnam and her decision to recognize the Vietnam-installed Government of Cambodia in 1980 meant that India and ASEAN were unable to develop a viable partnership. On 26 September 1981, Gandhi was conferred with the honorary degree of Doctor at the Laucala Graduation at the University of the South Pacific in Fiji. Africa Although independent India was initially viewed as a champion of various African independence movements, its cordial relationship with the Commonwealth of Nations and its liberal views of British policies in East Africa had harmed its image as a staunch supporter of various independence movements in the third world. Indian condemnation of militant struggles in Kenya and Algeria was in sharp contrast to China, who had supported armed struggle to win African independence. After reaching a high diplomatic point in the aftermath of Nehru's role in the Suez Crisis, India's isolation from Africa was complete when only four nations—Ethiopia, Kenya, Nigeria and Libya—supported her during the Sino-Indian War in 1962. After Gandhi became prime minister, diplomatic and economic relations with the states which had sided with India during the Sino-Indian War were expanded. Gandhi began negotiations with the Kenyan government to establish the Africa-India Development Cooperation. The Indian government also started considering the possibility of bringing Indians settled in Africa within the framework of its policy goals to help recover its declining geo-strategic influence. Gandhi declared the people of Indian origin settled in Africa as "Ambassadors of India". Efforts to rope in the Asian community to join Indian diplomacy, however, came to naught, in part because of the unwillingness of Indians to remain in politically insecure surroundings, and because of the exodus of African Indians to Britain with the passing of the Commonwealth Immigrants Act in 1968. In Uganda, the African Indian community suffered persecution and eventually expulsion under the government of Idi Amin. Foreign and domestic policy successes in the 1970s enabled Gandhi to rebuild India's image in the eyes of African states. Victory over Pakistan and India's possession of nuclear weapons showed the degree of India's progress. Furthermore, the conclusion of the Indo-Soviet treaty in 1971, and threatening gestures by the United States, to send its nuclear armed Task Force 74 into the Bay of Bengal at the height of the East Pakistan crisis had enabled India to regain its anti-imperialist image. Gandhi firmly tied Indian anti-imperialist interests in Africa to those of the Soviet Union. Unlike Nehru, she openly and enthusiastically supported liberation struggles in Africa. At the same time, Chinese influence in Africa had declined owing to its incessant quarrels with the Soviet Union. These developments permanently halted India's decline in Africa and helped to reestablish its geo-strategic presence. The Commonwealth The Commonwealth is a voluntary association of mainly former British colonies. India maintained cordial relations with most of the members during Gandhi's time in power. In the 1980s, she, along with Canadian prime minister Pierre Trudeau, Zambia's president Kenneth Kaunda, Australian prime minister Malcolm Fraser and Singapore prime minister Lee Kuan Yew was regarded as one of the pillars of the Commonwealth. India under Gandhi also hosted the 1983 Commonwealth Heads of Government summit in New Delhi. Gandhi used these meetings as a forum to put pressure on member countries to cut economic, sports, and cultural ties with Apartheid South Africa. The Non-aligned Movement In the early 1980s under Gandhi, India attempted to reassert its prominent role in the Non-Aligned Movement by focusing on the relationship between disarmament and economic development. By appealing to the economic grievances of developing countries, Gandhi and her successors exercised a moderating influence on the Non-aligned movement, diverting it from some of the Cold War issues that marred the controversial 1979 Havana meeting where Cuban leader Fidel Castro attempted to steer the movement towards the Soviet Union. Although hosting the 1983 summit at Delhi boosted Indian prestige within the movement, its close relations with the Soviet Union and its pro-Soviet positions on Afghanistan and Cambodia limited its influence. Western Europe Gandhi spent a number of years in Europe during her youth and had formed many friendships there. During her premiership she formed friendships with many leaders such as West German chancellor, Willy Brandt and Austrian chancellor Bruno Kreisky. She also enjoyed a close working relationship with many British leaders including conservative premiers, Edward Heath and Margaret Thatcher. Soviet Union and Eastern block countries The relationship between India and the Soviet Union deepened during Gandhi's rule. The main reason was the perceived bias of the United States and China, rivals of the USSR, towards Pakistan. The support of the Soviets with arms supplies and the casting of a veto at the United Nations helped in winning and consolidating the victory over Pakistan in the 1971 Bangladesh liberation war. Before the war, Gandhi signed a treaty of friendship with the Soviets. They were unhappy with the 1974 nuclear test conducted by India but did not support further action because of the ensuing Cold War with the United States. Gandhi was unhappy with the Soviet invasion of Afghanistan, but once again calculations involving relations with Pakistan and China kept her from criticising the Soviet Union harshly. The Soviets became the main arms supplier during the Gandhi years by offering cheap credit and transactions in rupees rather than in dollars. The easy trade deals also applied to non-military goods. Under Gandhi, by the early 1980s, the Soviets had become India's largest trading partner. United States When Gandhi came to power in 1966, Lyndon Johnson was the US president. At the time, India was reliant on the US for food aid. Gandhi resented the US policy of food aid being used as a tool to force India to adopt policies favoured by the US. She also resolutely refused to sign the Treaty on the Non-Proliferation of Nuclear Weapons (NPT). Relations with the US were strained badly under President Richard Nixon and his favouring of Pakistan during the Bangladesh liberation war. Nixon despised Gandhi politically and personally. In 1981, Gandhi met President Ronald Reagan for the first time at the North–South Summit held to discuss global poverty. She had been described to him as an 'Ogre', but he found her charming and easy to work with and they formed a close working relationship during her premiership in the 1980s. Economic policy Gandhi presided over three Five-Year Plans as prime minister, two of which succeeded in meeting their targeted growth. There is considerable debate whether Gandhi was a socialist on principle or out of political expediency. Sunanda K. Datta-Ray described her as "a master of rhetoric ... often more posture than policy", while The Times journalist, Peter Hazelhurst, famously quipped that Gandhi's socialism was "slightly left of self-interest." Critics have focused on the contradictions in the evolution of her stance towards communism. Gandhi was known for her anti-communist stance in the 1950s, with Meghnad Desai even describing her as "the scourge of [India's] Communist Party." Yet, she later forged close relations with Indian communists even while using the army to break the Naxalites. In this context, Gandhi was accused of formulating populist policies to suit her political needs. She was seemingly against the rich and big business while preserving the status quo to manipulate the support of the left in times of political insecurity, such as the late 1960s. Although in time Gandhi came to be viewed as the scourge of the right-wing and reactionary political elements of India, leftist opposition to her policies emerged. As early as 1969, critics had begun accusing her of insincerity and machiavellianism. The Indian Libertarian wrote that: "it would be difficult to find a more machiavellian leftist than Mrs Indira Gandhi ... for here is Machiavelli at its best in the person of a suave, charming and astute politician." J. Barkley Rosser Jr. wrote that "some have even seen the declaration of emergency rule in 1975 as a move to suppress [leftist] dissent against Gandhi's policy shift to the right." In the 1980s, Gandhi was accused of "betraying socialism" after the beginning of Operation Forward, an attempt at economic reform. Nevertheless, others were more convinced of Gandhi's sincerity and devotion to socialism. Pankaj Vohra noted that "even the late prime minister's critics would concede that the maximum number of legislations of social significance was brought about during her tenure ... [and that] she lives in the hearts of millions of Indians who shared her concern for the poor and weaker sections and who supported her politics." In summarising the biographical works on Gandhi, Blema S. Steinberg concludes she was decidedly non-ideological. Only 7.4% (24) of the total 330 biographical extractions posit ideology as a reason for her policy choices. Steinberg notes Gandhi's association with socialism was superficial. She had only a general and traditional commitment to the ideology by way of her political and family ties. Gandhi personally had a fuzzy concept of socialism. In one of the early interviews she gave as prime minister, Gandhi had ruminated: "I suppose you could call me a socialist, but you have understand what we mean by that term ... we used the word [socialism] because it came closest to what we wanted to do here – which is to eradicate poverty. You can call it socialism; but if by using that word we arouse controversy, I don't see why we should use it. I don't believe in words at all." Regardless of the debate over her ideology or lack thereof, Gandhi remains a left-wing icon. She has been described by Hindustan Times columnist, Pankaj Vohra, as "arguably the greatest mass leader of the last century." Her campaign slogan, Garibi Hatao ('Remove Poverty'), has become an often used motto of the Indian National Congress Party. To the rural and urban poor, untouchables, minorities and women in India, Gandhi was "Indira Amma or Mother Indira." Green Revolution and the Fourth Five-Year Plan Gandhi inherited a weak and troubled economy. Fiscal problems associated with the war with Pakistan in 1965, along with a drought-induced food crisis that spawned famines, had plunged India into the sharpest recession since independence. The government responded by taking steps to liberalise the economy and agreeing to the devaluation of the currency in return for the restoration of foreign aid. The economy managed to recover in 1966 and ended up growing at 4.1% over 1966–1969. Much of that growth, however, was offset by the fact that the external aid promised by the United States government and the International Bank for Reconstruction and Development (IBRD), meant to ease the short-run costs of adjustment to a liberalised economy, never materialised. American policy makers had complained of continued restrictions imposed on the economy. At the same time, Indo-US relations were strained because of Gandhi's criticism of the American bombing campaign in Vietnam. While it was thought at the time, and for decades after, that President Johnson's policy of withholding food grain shipments was to coerce Indian support for the war, in fact, it was to offer India rainmaking technology that he wanted to use as a counterweight to China's possession of the atomic bomb. In light of the circumstances, liberalisation became politically suspect and was soon abandoned. Grain diplomacy and currency devaluation became matters of intense national pride in India. After the bitter experience with Johnson, Gandhi decided not to request food aid in the future. Moreover, her government resolved never again to become "so vulnerably dependent" on aid, and painstakingly began building up substantial foreign exchange reserves. When food stocks slumped after poor harvests in 1972, the government made it a point to use foreign exchange to buy US wheat commercially rather than seek resumption of food aid. The period of 1967–75 was characterised by socialist ascendency in India, which culminated in 1976 with the official declaration of state socialism. Gandhi not only abandoned the short-lived liberalisation programme but also aggressively expanded the public sector with new licensing requirements and other restrictions for industry. She began a new course by launching the Fourth Five-Year Plan in 1969. The government targeted growth at 5.7% while stating as its goals, "growth with stability and progressive achievement of self-reliance." The rationale behind the overall plan was Gandhi's Ten-Point Programme of 1967. This had been her first economic policy formulation, six months after coming to office. The programme emphasised greater state control of the economy with the understanding that government control assured greater welfare than private control. Related to this point were a set of policies which were meant to regulate the private sector. By the end of the 1960s, the reversal of the liberalisation process was complete, and India's policies were characterised as "protectionist as ever." To deal with India's food problems, Gandhi expanded the emphasis on production of inputs to agriculture that had already been initiated by her father, Jawaharlal Nehru. The Green Revolution in India subsequently culminated under her government in the 1970s. It transformed the country from a nation heavily reliant on imported grains, and prone to famine, to one largely able to feed itself, and becoming successful in achieving its goal of food security. Gandhi had a personal motive in pursuing agricultural self-sufficiency, having found India's dependency on the U.S. for shipments of grains humiliating. The economic period of 1967–75 became significant for its major wave of nationalisation amidst increased regulation of the private sector. Some other objectives of the economic plan for the period were to provide for the minimum needs of the community through a rural works program and the removal of the privy purses of the nobility. Both these, and many other goals of the 1967 programme, were accomplished by 1974–75. Nevertheless, the success of the overall economic plan was tempered by the fact that annual growth at 3.3–3.4% over 1969–74 fell short of the targeted figure. The Fifth Five-Year Plan The Fifth Five-Year Plan (1974–79) was enacted against the backdrop of the state of emergency and the Twenty Point Program of 1975. It was the economic rationale of the emergency, a political act which has often been justified on economic grounds. In contrast to the reception of Gandhi's earlier economic plan, this one was criticised for being a "hastily thrown together wish list." Gandhi promised to reduce poverty by targeting the consumption levels of the poor and enact wide-ranging social and economic reforms. In addition, the government targeted an annual growth rate of 4.4% over the period of the plan. The measures of the emergency regime was able to halt the economic trouble of the early to mid-1970s, which had been marred by harvest failures, fiscal contraction, and the breakdown of the Bretton Woods system of fixed exchanged rates. The resulting turbulence in the foreign exchange markets was accentuated further by the oil shock of 1973. The government was able to exceed the targeted growth figure with an annual growth rate of 5.0–5.2% over the five-year period of the plan (1974–79). The economy grew at the rate of 9% in 1975–76 alone, and the Fifth Plan, became the first plan during which the per capita income of the economy grew by over 5%. Operation Forward and the Sixth Five-Year Plan Gandhi inherited a weak economy when she became prime minister again in 1980. The preceding year—1979–80—under the Janata Party government saw the strongest recession (−5.2%) in the history of modern India with inflation rampant at 18.2%. Gandhi proceeded to abrogate the Janata Party government's Five-Year Plan in 1980 and launched the Sixth Five-Year Plan (1980–85). Her government targeted an average growth rate of 5.2% over the period of the plan. Measures to check inflation were also taken; by the early 1980s it was under control at an annual rate of about 5%. Although Gandhi continued professing socialist beliefs, the Sixth Five-Year Plan was markedly different from the years of Garibi Hatao. Populist programmes and policies were replaced by pragmatism. There was an emphasis on tightening public expenditures, greater efficiency of the state-owned enterprises (SOE), which Gandhi qualified as a "sad thing", and on stimulating the private sector through deregulation and liberation of the capital market. The government subsequently launched Operation Forward in 1982, the first cautious attempt at reform. The Sixth Plan went on to become the most successful of the Five-Year Plans yet; showing an average growth rate of 5.7% over 1980–85. Inflation and unemployment During Lal Bahadur Shastri's last full year in office (1965), inflation averaged 7.7%, compared to 5.2% at the end of Gandhi's first term in office (1977). On average, inflation in India had remained below 7% through the 1950s and 1960s. It then accelerated sharply in the 1970s, from 5.5% in 1970–71 to over 20% by 1973–74, due to the international oil crisis. Gandhi declared inflation the gravest of problems in 1974 (at 25.2%) and devised a severe anti-inflation program. The government was successful in bringing down inflation during the emergency; achieving negative figures of −1.1% by the end of 1975–76. Gandhi inherited a tattered economy in her second term; harvest failures and a second oil shock in the late 1970s had caused inflation to rise again. During Charan Singh's short time in office in the second half of 1979, inflation averaged 18.2%, compared to 6.5% during Gandhi's last year in office (1984). General economic recovery under Gandhi led to an average inflation rate of 6.5% from 1981–82 to 1985–86—the lowest since the beginning of India's inflation problems in the 1960s. The unemployment rate remained constant at 9% over a nine-year period (1971–80) before declining to 8.3% in 1983. Domestic policy Nationalisation Despite the provisions, control and regulations of the Reserve Bank of India, most banks in India had continued to be owned and operated by private persons. Businessmen who owned the banks were often accused of channeling the deposits into their own companies and ignoring priority sector lending. Furthermore, there was a great resentment against class banking in India, which had left the poor (the majority of the population) unbanked. After becoming prime minister, Gandhi expressed her intention of nationalising the banks to alleviate poverty in a paper titled, "Stray thoughts on Bank Nationalisation". The paper received overwhelming public support. In 1969, Gandhi moved to nationalise fourteen major commercial banks. After this, public sector bank branch deposits increased by approximately 800 percent; advances took a huge jump by 11,000 percent. Nationalisation also resulted in significant growth in the geographic coverage of banks; the number of bank branches rose from 8,200 to over 62,000, most of which were opened in unbanked, rural areas. The nationalisation drive not only helped to increase household savings, but it also provided considerable investments in the informal sector, in small- and medium-sized enterprises, and in agriculture, and contributed significantly to regional development and to the expansion of India's industrial and agricultural base. Jayaprakash Narayan, who became famous for leading the opposition to Gandhi in the 1970s, solidly praised her nationalisation of banks. Having been re-elected in 1971 on a nationalisation platform, Gandhi proceeded to nationalise the coal, steel, copper, refining, cotton textiles, and insurance industries. Most of this was done to protect employment and the interests of organised labour. The remaining private sector industries were placed under strict regulatory control. During the Indo-Pakistani War of 1971, foreign-owned private oil companies had refused to supply fuel to the Indian Navy and the Indian Air Force. In response, Gandhi nationalised some oil companies in 1973. However, major nationalisations also occurred in 1974 and 1976, forming the oil majors. After nationalisation, the oil majors such as the Indian Oil Corporation (IOC), the Hindustan Petroleum Corporation (HPCL) and the Bharat Petroleum Corporation (BPCL) had to keep a minimum stock level of oil, to be supplied to the military when needed. Administration In 1966, Gandhi accepted the demands of the Akalis to reorganise Punjab on linguistic lines. The Hindi-speaking southern half of Punjab became a separate state, Haryana, while the Pahari speaking hilly areas in the northeast were joined to Himachal Pradesh. By doing this she had hoped to ward off the growing political conflict between Hindu and Sikh
|
Institutions of the EU include the European Commission, the Council of the European Union, the European Council, the Court of Justice of the European Union, the European Central Bank, the Court of Auditors, and the European Parliament. The European Parliament is elected every five years by EU citizens. The EU's de facto capital is Brussels. The EU has developed a single market through a standardised system of laws that apply in all member states. Within the Schengen Area (which includes 22 EU and 4 non-EU European states) passport controls have been abolished. EU policies favour the free movement of people, goods, services, and capital within its boundaries, enact legislation in justice and home affairs, and maintain common policies on trade, agriculture, fisheries and regional development. A monetary union, the eurozone, was established in 1999 and is composed of 17 member states. Through the Common Foreign and Security Policy the EU has developed a role in external relations and defence. Permanent diplomatic missions have been established around the world. The EU is represented at the United Nations, the World Trade
|
states. Within the Schengen Area (which includes 22 EU and 4 non-EU European states) passport controls have been abolished. EU policies favour the free movement of people, goods, services, and capital within its boundaries, enact legislation in justice and home affairs, and maintain common policies on trade, agriculture, fisheries and regional development. A monetary union, the eurozone, was established in 1999 and is composed of 17 member states. Through the Common Foreign and Security Policy the EU has developed a role in external relations and defence. Permanent diplomatic missions have been established around the world. The EU is represented at the United Nations, the World Trade Organization, the G8 and the G-20. Intergovernmentalism represents a way for limiting the conferral of powers upon supranational institutions, halting the emergence of common policies. In the current institutional system of the EU, the European Council and the Council play the role of the institutions which have the last word about decisions and policies of the EU, institutionalizing a de facto intergovernmental control over the EU as a whole, with the possibility to
|
individual, but differ in varying degrees on how one achieves and what constitutes a fulfilling life, what obstacles must be overcome, and what external and internal factors are involved, including the potential consequences of the existenceMartin, Clancy. Religious Existentialism in Companion to Phenomenology and Existentialism (Blackwell, 2006, pp. 188–205) or non-existence of God.D.E. Cooper Existentialism: A Reconstruction (Basil Blackwell, 1999, p. 8). Many existentialists have also regarded traditional systematic or academic philosophy in both style and content as too abstract and remote from concrete human experience.Walter Kaufmann, Existentialism: From Dostoevesky to Sartre, New York (1956), p. 12 Existentialism became fashionable after World War II as a way to reassert the importance of human individuality and freedom. Freethought Freethought holds that individuals should not accept ideas proposed as truth without recourse to knowledge and reason. Thus, freethinkers strive to build their opinions on the basis of facts, scientific inquiry and logical principles, independent of any logical fallacies or intellectually limiting effects of authority, confirmation bias, cognitive bias, conventional wisdom, popular culture, prejudice, sectarianism, tradition, urban legend and all other dogmas. Regarding religion, freethinkers hold that there is insufficient evidence to scientifically validate the existence of supernatural phenomena. Humanism Humanism is a perspective common to a wide range of ethical stances that attaches importance to human dignity, concerns, and capabilities, particularly rationality. Although the word has many senses, its meaning comes into focus when contrasted to the supernatural or to appeals to authority. Since the 19th century, humanism has been associated with an anti-clericalism inherited from the 18th-century Enlightenment philosophes. 21st century Humanism tends to strongly endorse human rights, including reproductive rights, gender equality, social justice, and the separation of church and state. The term covers organized non-theistic religions, secular humanism, and a humanistic life stance. Hedonism Philosophical hedonism is a meta-ethical theory of value which argues that pleasure is the only intrinsic good and pain is the only intrinsic bad. The basic idea behind hedonistic thought is that pleasure (an umbrella term for all inherently likable emotions) is the only thing that is good in and of itself or by its very nature. This implies evaluating the moral worth of character or behavior according to the extent that the pleasure it produces exceeds the pain it entails. Libertinism A libertine is one devoid of most moral restraints, which are seen as unnecessary or undesirable, especially one who ignores or even spurns accepted morals and forms of behaviour sanctified by the larger society. Libertines place value on physical pleasures, meaning those experienced through the senses. As a philosophy, libertinism gained new-found adherents in the 17th, 18th, and 19th centuries, particularly in France and Great Britain. Notable among these were John Wilmot, 2nd Earl of Rochester and the Marquis de Sade. During the Baroque era in France, there existed a freethinking circle of philosophers and intellectuals who were collectively known as libertinage érudit and which included Gabriel Naudé, Élie Diodati and François de La Mothe Le Vayer. The critic Vivian de Sola Pinto linked John Wilmot, 2nd Earl of Rochester's libertinism to Hobbesian materialism. Objectivism Objectivism is a system of philosophy created by philosopher and novelist Ayn Rand which holds that reality exists independent of consciousness; human beings gain knowledge rationally from perception through the process of concept formation and inductive and deductive logic; the moral purpose of one's life is the pursuit of one's own happiness or rational self-interest. Rand thinks the only social system consistent with this morality is full respect for individual rights, embodied in pure laissez-faire capitalism; and the role of art in human life is to transform man's widest metaphysical ideas, by selective reproduction of reality, into a physical form—a work of art—that he can comprehend and to which he can respond emotionally. Objectivism celebrates man as his own hero, "with his own happiness as the moral purpose of his life, with productive achievement as his noblest activity, and reason as his only absolute." Philosophical anarchism Philosophical anarchism is an anarchist school of thought which contends that the state lacks moral legitimacy. In contrast to revolutionary anarchism, philosophical anarchism does not advocate violent revolution to eliminate it but advocates peaceful evolution to superate it. Although philosophical anarchism does not necessarily imply any action or desire for the elimination of the state, philosophical anarchists do not believe that they have an obligation or duty to obey the state, or conversely that the state has a right to command. Philosophical anarchism is a component especially of individualist anarchism. Philosophical anarchists of historical note include Mohandas Gandhi, William Godwin, Pierre-Joseph Proudhon, Max Stirner, Benjamin Tucker and Henry David Thoreau. Contemporary philosophical anarchists include A. John Simmons and Robert Paul Wolff. Subjectivism Subjectivism is a philosophical tenet that accords primacy to subjective experience as fundamental of all measure and law. In extreme forms such as solipsism, it may hold that the nature and existence of every object depends solely on someone's subjective awareness of it. In the proposition 5.632 of the Tractatus Logico-Philosophicus, Ludwig Wittgenstein wrote: "The subject doesn't belong to the world, but it is a limit of the world". Metaphysical subjectivism is the theory that reality is what we perceive to be real, and that there is no underlying true reality that exists independently of perception. One can also hold that it is consciousness rather than perception that is reality (subjective idealism). In probability, a subjectivism stands for the belief that probabilities are simply degrees-of-belief by rational agents in a certain proposition and which have no objective reality in and of themselves. Ethical subjectivism stands in opposition to moral realism, which claims that moral propositions refer to objective facts, independent of human opinion; to error theory, which denies that any moral propositions are true in any sense; and to non-cognitivism, which denies that moral sentences express propositions at all. The most common forms of ethical subjectivism are also forms of moral relativism, with moral standards held to be relative to each culture or society, i.e. cultural relativism, or even to every individual. The latter view, as put forward by Protagoras, holds that there are as many distinct scales of good and evil as there are subjects in the world. Moral subjectivism is that species of moral relativism that relativizes moral value to the individual subject. Horst Matthai Quelle was a Spanish language German anarchist philosopher influenced by Max Stirner. Quelle argued that since the individual gives form to the world, he is those objects, the others and the whole universe. One of his main views was a "theory of infinite worlds" which for him was developed by pre-socratic philosophers. Solipsism Solipsism is the philosophical idea that only one's own mind is sure to exist. The term comes from Latin solus ("alone") and ipse ("self"). Solipsism as an epistemological position holds that knowledge of anything outside one's own mind is unsure. The external world and other minds cannot be known, and might not exist outside the mind. As a metaphysical position, solipsism goes further to the conclusion that the world and other minds do not exist. Solipsism is the only epistemological position that, by its own postulate, is both irrefutable and yet indefensible in the same manner. Although the number of individuals sincerely espousing solipsism has been small, it is not uncommon for one philosopher to accuse another's arguments of entailing solipsism as an unwanted consequence, in a kind of reductio ad absurdum. In the history of philosophy, solipsism has served as a skeptical hypothesis. Economic individualism The doctrine of economic individualism holds that each individual should be allowed autonomy in making his or her own economic decisions as opposed to those decisions being made by the community, the corporation or the state for him or her. Classical liberalism Liberalism is a political ideology that developed in the 19th century in the Americas, England and Western Europe. It followed earlier forms of liberalism in its commitment to personal freedom and popular government, but differed from earlier forms of liberalism in its commitment to classical economics and free markets. Notable liberals in the 19th century include Jean-Baptiste Say, Thomas Malthus and David Ricardo. Classical liberalism, sometimes also used as a label to refer to all forms of liberalism before the 20th century, was revived in the 20th century by Ludwig von Mises and Friedrich Hayek and further developed by Milton Friedman, Robert Nozick, Loren Lomasky and Jan Narveson. Libertarianism Libertarianism upholds liberty as a core principle. Libertarians seek to maximize autonomy and political freedom, emphasizing free association, freedom of choice, individualism and voluntary association. Libertarianism shares a skepticism of authority and state power, but libertarians diverge on the scope of their opposition to existing economic and political systems. Various schools of libertarian thought offer a range of views regarding the legitimate functions of state and private power, often calling for the restriction or dissolution of coercive social institutions. Different categorizations have been used to distinguish various forms of libertarianism.Carlson, Jennifer D. (2012). "Libertarianism". In Miller, Wilburn R., ed. The Social History of Crime and Punishment in America. London: SAGE Publications. p. 1006. . "There exist three major camps in libertarian thought: right-libertarianism, socialist libertariaism, and left-lbertarianism; the extent to which these represent distinct ideologies as opposed to variations on a theme is contrasted by scholars. Regardless, these factions differ most pronouncedly with respect to private property." This is done to distinguish libertarian views on the nature of property and capital, usually along left–right or socialist–capitalist lines. Left-libertarianism Left-libertarianism represents several related yet distinct approaches to politics, society, culture and political and social theory which stress both individual and political freedom alongside social justice. Unlike right-libertarians, left-libertarians believe that neither claiming nor mixing one's labor with natural resources is enough to generate full private property rights, and maintain that natural resources (land, oil, gold, trees) ought to be held in some egalitarian manner, either unowned or owned collectively. Those left-libertarians who support property do so under different property normsByas, Jason Lee (25 November 2015). "The Moral Irrelevance of Rent". Center for a Stateless Society. Retrieved 21 March 2020.Gillis, William (29 November 2015). "The Organic Emergence of Property from Reputation". Center for a Stateless Society. Retrieved 8 April 2020. and theories, or under the condition that recompense is offered to the local or global community. Related terms include egalitarian libertarianism,Sullivan, Mark A. (July 2003). "Why the Georgist Movement Has Not Succeeded: A Personal Response to the Question Raised by Warren J. Samuels". American Journal of Economics and Sociology. 62 (3): 612. left-wing libertarianism, libertarianism, libertarian socialism,Long, Roderick T. (2012). "The Rise of Social Anarchism". In Gaus, Gerald F.; D'Agostino, Fred, eds. The Routledge Companion to Social and Political Philosophy. p. 223. social libertarianism and socialist libertarianism. Left-libertarianism can refer generally to these related and overlapping schools of thought: Anti-authoritarian varieties of left-wing politics, in particular within the socialist movement, usually known as libertarian socialism. Geolibertarianism, an American synthesis of libertarianism and Georgism.DeCoster, Karen (19 April 2006). "Henry George and the Tariff Question". LewRockwell.com. Retrieved 23 September 2020. Left-wing market anarchism, stressing the socially transformative potential of non-aggression and anti-capitalist freed markets.Chartier, Gary; Johnson, Charles W. (2011). Markets Not Capitalism: Individualist Anarchism Against Bosses, Inequality, Corporate Power, and Structural Poverty. Brooklyn: Minor Compositions/Autonomedia. pp. 1–11. . Steiner–Vallentyne school, named after Hillel Steiner and Peter Vallentyne, whose proponents draw conclusions from classical liberal or market liberal premises. Right-libertarianism Right-libertarianism represents either non-collectivist forms of libertarianism or a variety of different libertarian views that scholars label to the right of libertarianism such as libertarian conservatism. Related terms include conservative libertarianism,Narveson, Jan (2001). The Libertarian Idea (revised ed.). Peterborough, Ontario: Broadview Press. p. 8. . libertarian capitalism and right-wing libertarianism.Goodway, David (2006). Anarchist Seeds Beneath the Snow: Left-Libertarian Thought and British Writers from William Morris to Colin Ward. Liverpool: Liverpool University Press. p. 4. "'Libertarian' and 'libertarianism' are frequently employed by anarchists as synonyms for 'anarchist' and 'anarchism', largely as an attempt to distance themselves from the negative connotations of 'anarchy' and its derivatives. The situation has been vastly complicated in recent decades with the rise of anarcho-capitalism, 'minimal statism' and an extreme right-wing laissez-faire philosophy advocated by such theorists as Rothbard and Nozick and their adoption of the words 'libertarian' and 'libertarianism'. It has therefore now become necessary to distinguish between their right libertarianism and the left libertarianism of the anarchist tradition". In the mid-20th century, right-libertarian ideologies such as anarcho-capitalism and minarchism co-opted the term libertarian to advocate laissez-faire capitalism and strong private property rights such as in land, infrastructure and natural resources. The latter is the dominant form of libertarianism in the United States, where it advocates civil liberties, natural law, free-market capitalism and a major reversal of the modern welfare state. In the Stanford Encyclopedia of Philosophy, Peter Vallentyne calls it right libertarianism, but he further states: "Libertarianism is often thought of as 'right-wing' doctrine. This, however, is mistaken for at least two reasons. First, on social—rather than economic—issues, libertarianism tends to be 'left-wing'. It opposes laws that restrict consensual and private sexual relationships between adults (e.g., gay sex, non-marital sex, and deviant sex), laws
|
Ted Honderich, New York (1995), p. 259. that the focus of philosophical thought should be to deal with the conditions of existence of the individual person and his or her emotions, actions, responsibilities, and thoughts.Cooper, D. E. Existentialism: A Reconstruction (Basil Blackwell, 1999, p. 8) The early 19th century philosopher Søren Kierkegaard, posthumously regarded as the father of existentialism,Stanford Encyclopedia of Philosophy http://plato.stanford.edu/entries/kierkegaard/ maintained that the individual solely has the responsibilities of giving one's own life meaning and living that life passionately and sincerely,Lowrie, Walter. Kierkegaard's attack upon "Christendom" (Princeton, 1968, pp. 37–40) in spite of many existential obstacles and distractions including despair, angst, absurdity, alienation and boredom. Subsequent existential philosophers retain the emphasis on the individual, but differ in varying degrees on how one achieves and what constitutes a fulfilling life, what obstacles must be overcome, and what external and internal factors are involved, including the potential consequences of the existenceMartin, Clancy. Religious Existentialism in Companion to Phenomenology and Existentialism (Blackwell, 2006, pp. 188–205) or non-existence of God.D.E. Cooper Existentialism: A Reconstruction (Basil Blackwell, 1999, p. 8). Many existentialists have also regarded traditional systematic or academic philosophy in both style and content as too abstract and remote from concrete human experience.Walter Kaufmann, Existentialism: From Dostoevesky to Sartre, New York (1956), p. 12 Existentialism became fashionable after World War II as a way to reassert the importance of human individuality and freedom. Freethought Freethought holds that individuals should not accept ideas proposed as truth without recourse to knowledge and reason. Thus, freethinkers strive to build their opinions on the basis of facts, scientific inquiry and logical principles, independent of any logical fallacies or intellectually limiting effects of authority, confirmation bias, cognitive bias, conventional wisdom, popular culture, prejudice, sectarianism, tradition, urban legend and all other dogmas. Regarding religion, freethinkers hold that there is insufficient evidence to scientifically validate the existence of supernatural phenomena. Humanism Humanism is a perspective common to a wide range of ethical stances that attaches importance to human dignity, concerns, and capabilities, particularly rationality. Although the word has many senses, its meaning comes into focus when contrasted to the supernatural or to appeals to authority. Since the 19th century, humanism has been associated with an anti-clericalism inherited from the 18th-century Enlightenment philosophes. 21st century Humanism tends to strongly endorse human rights, including reproductive rights, gender equality, social justice, and the separation of church and state. The term covers organized non-theistic religions, secular humanism, and a humanistic life stance. Hedonism Philosophical hedonism is a meta-ethical theory of value which argues that pleasure is the only intrinsic good and pain is the only intrinsic bad. The basic idea behind hedonistic thought is that pleasure (an umbrella term for all inherently likable emotions) is the only thing that is good in and of itself or by its very nature. This implies evaluating the moral worth of character or behavior according to the extent that the pleasure it produces exceeds the pain it entails. Libertinism A libertine is one devoid of most moral restraints, which are seen as unnecessary or undesirable, especially one who ignores or even spurns accepted morals and forms of behaviour sanctified by the larger society. Libertines place value on physical pleasures, meaning those experienced through the senses. As a philosophy, libertinism gained new-found adherents in the 17th, 18th, and 19th centuries, particularly in France and Great Britain. Notable among these were John Wilmot, 2nd Earl of Rochester and the Marquis de Sade. During the Baroque era in France, there existed a freethinking circle of philosophers and intellectuals who were collectively known as libertinage érudit and which included Gabriel Naudé, Élie Diodati and François de La Mothe Le Vayer. The critic Vivian de Sola Pinto linked John Wilmot, 2nd Earl of Rochester's libertinism to Hobbesian materialism. Objectivism Objectivism is a system of philosophy created by philosopher and novelist Ayn Rand which holds that reality exists independent of consciousness; human beings gain knowledge rationally from perception through the process of concept formation and inductive and deductive logic; the moral purpose of one's life is the pursuit of one's own happiness or rational self-interest. Rand thinks the only social system consistent with this morality is full respect for individual rights, embodied in pure laissez-faire capitalism; and the role of art in human life is to transform man's widest metaphysical ideas, by selective reproduction of reality, into a physical form—a work of art—that he can comprehend and to which he can respond emotionally. Objectivism celebrates man as his own hero, "with his own happiness as the moral purpose of his life, with productive achievement as his noblest activity, and reason as his only absolute." Philosophical anarchism Philosophical anarchism is an anarchist school of thought which contends that the state lacks moral legitimacy. In contrast to revolutionary anarchism, philosophical anarchism does not advocate violent revolution to eliminate it but advocates peaceful evolution to superate it. Although philosophical anarchism does not necessarily imply any action or desire for the elimination of the state, philosophical anarchists do not believe that they have an obligation or duty to obey the state, or conversely that the state has a right to command. Philosophical anarchism is a component especially of individualist anarchism. Philosophical anarchists of historical note include Mohandas Gandhi, William Godwin, Pierre-Joseph Proudhon, Max Stirner, Benjamin Tucker and Henry David Thoreau. Contemporary philosophical anarchists include A. John Simmons and Robert Paul Wolff. Subjectivism Subjectivism is a philosophical tenet that accords primacy to subjective experience as fundamental of all measure and law. In extreme forms such as solipsism, it may hold that the nature and existence of every object depends solely on someone's subjective awareness of it. In the proposition 5.632 of the Tractatus Logico-Philosophicus, Ludwig Wittgenstein wrote: "The subject doesn't belong to the world, but it is a limit of the world". Metaphysical subjectivism is the theory that reality is what we perceive to be real, and that there is no underlying true reality that exists independently of perception. One can also hold that it is consciousness rather than perception that is reality (subjective idealism). In probability, a subjectivism stands for the belief that probabilities are simply degrees-of-belief by rational agents in a certain proposition and which have no objective reality in and of themselves. Ethical subjectivism stands in opposition to moral realism, which claims that moral propositions refer to objective facts, independent of human opinion; to error theory, which denies that any moral propositions are true in any sense; and to non-cognitivism, which denies that moral sentences express propositions at all. The most common forms of ethical subjectivism are also forms of moral relativism, with moral standards held to be relative to each culture or society, i.e. cultural relativism, or even to every individual. The latter view, as put forward by Protagoras, holds that there are as many distinct scales of good and evil as there are subjects in the world. Moral subjectivism is that species of moral relativism that relativizes moral value to the individual subject. Horst Matthai Quelle was a Spanish language German anarchist philosopher influenced by Max Stirner. Quelle argued that since the individual gives form to the world, he is those objects, the others and the whole universe. One of his main views was a "theory of infinite worlds" which for him was developed by pre-socratic philosophers. Solipsism Solipsism is the philosophical idea that only one's own mind is sure to exist. The term comes from Latin solus ("alone") and ipse ("self"). Solipsism as an epistemological position holds that knowledge of anything outside one's own mind is unsure. The external world and other minds cannot be known, and might not exist outside the mind. As a metaphysical position, solipsism goes further to the conclusion that the world and other minds do not exist. Solipsism is the only epistemological position that, by its own postulate, is both irrefutable and yet indefensible in the same manner. Although the number of individuals sincerely espousing solipsism has been small, it is not uncommon for one philosopher to accuse another's arguments of entailing solipsism as an unwanted consequence, in a kind of reductio ad absurdum. In the history of philosophy, solipsism has served as a skeptical hypothesis. Economic individualism The doctrine of economic individualism holds that each individual should be allowed autonomy in making his or her own economic decisions as opposed to those decisions being made by the community, the corporation or the state for him or her. Classical liberalism Liberalism is a political ideology that developed in the 19th century in the Americas, England and Western Europe. It followed earlier forms of liberalism in its commitment to personal freedom and popular government, but differed from earlier forms of liberalism in its commitment to classical economics and free markets. Notable liberals in the 19th century include Jean-Baptiste Say, Thomas Malthus and David Ricardo. Classical liberalism, sometimes also used as a label to refer to all forms of liberalism before the 20th century, was revived in the 20th century by Ludwig von Mises and Friedrich Hayek and further developed by Milton Friedman, Robert Nozick, Loren Lomasky and Jan Narveson. Libertarianism Libertarianism upholds liberty as a core principle. Libertarians seek to maximize autonomy and political freedom, emphasizing free association, freedom of choice, individualism and voluntary association. Libertarianism shares a skepticism of authority and state power, but libertarians diverge on the scope of their opposition to existing economic and political systems. Various schools of libertarian thought offer a range of views regarding the legitimate functions of state and private power, often calling for the restriction or dissolution of coercive social institutions. Different categorizations have been used to distinguish various forms of libertarianism.Carlson, Jennifer D. (2012). "Libertarianism". In Miller, Wilburn R., ed. The Social History of Crime and Punishment in America. London: SAGE Publications. p. 1006. . "There exist three major camps in libertarian thought: right-libertarianism, socialist libertariaism, and left-lbertarianism; the extent to which these represent distinct ideologies as opposed to variations on a theme is contrasted by scholars. Regardless, these factions differ most pronouncedly with respect to private property." This is done to distinguish libertarian views on the nature of property and capital, usually along left–right or socialist–capitalist lines. Left-libertarianism Left-libertarianism represents several related yet distinct approaches to politics, society, culture and political and social theory which stress both individual and political freedom alongside social justice. Unlike right-libertarians, left-libertarians believe that neither claiming nor mixing one's labor with natural resources is enough to generate full private property rights, and maintain that natural resources (land, oil, gold, trees) ought to be held in some egalitarian manner, either unowned or owned collectively. Those left-libertarians who support property do so under different property normsByas, Jason Lee (25 November 2015). "The Moral Irrelevance of Rent". Center for a Stateless Society. Retrieved 21 March 2020.Gillis, William (29 November 2015). "The Organic Emergence of Property from Reputation". Center for a Stateless Society. Retrieved 8 April 2020. and theories, or under the condition that recompense is offered to the local or global community. Related terms include egalitarian libertarianism,Sullivan, Mark A. (July 2003). "Why the Georgist Movement Has Not Succeeded: A Personal Response to the Question Raised by Warren J. Samuels". American Journal of Economics and Sociology. 62 (3): 612. left-wing libertarianism, libertarianism, libertarian socialism,Long, Roderick T. (2012). "The Rise of Social Anarchism". In Gaus, Gerald F.; D'Agostino, Fred, eds. The Routledge Companion to Social and Political Philosophy. p. 223. social libertarianism and socialist libertarianism. Left-libertarianism can refer generally to these related and overlapping schools of thought: Anti-authoritarian varieties of left-wing politics, in particular within the socialist movement, usually known as libertarian socialism. Geolibertarianism, an American synthesis of libertarianism and Georgism.DeCoster, Karen (19 April 2006). "Henry George and the Tariff Question". LewRockwell.com. Retrieved 23 September 2020. Left-wing market anarchism, stressing the socially transformative potential of non-aggression and anti-capitalist freed markets.Chartier, Gary; Johnson, Charles W. (2011). Markets Not Capitalism: Individualist Anarchism Against Bosses, Inequality, Corporate Power, and Structural Poverty. Brooklyn: Minor Compositions/Autonomedia. pp. 1–11. . Steiner–Vallentyne school, named after Hillel Steiner and Peter Vallentyne, whose proponents draw conclusions from classical liberal or market liberal premises. Right-libertarianism Right-libertarianism represents either non-collectivist forms of libertarianism or a variety of different libertarian views that scholars label to the right of libertarianism such as libertarian conservatism. Related terms include conservative libertarianism,Narveson, Jan (2001). The Libertarian Idea (revised ed.). Peterborough, Ontario: Broadview Press. p. 8. . libertarian capitalism and right-wing libertarianism.Goodway, David (2006). Anarchist Seeds Beneath the Snow: Left-Libertarian Thought and British Writers from William Morris to Colin Ward. Liverpool: Liverpool University Press. p. 4. "'Libertarian' and 'libertarianism' are frequently employed by anarchists as synonyms for 'anarchist' and 'anarchism', largely as an attempt to distance themselves from the negative connotations of 'anarchy' and its derivatives. The situation has been vastly complicated in recent decades with the rise of anarcho-capitalism, 'minimal statism' and an extreme right-wing laissez-faire philosophy advocated by such theorists as Rothbard and Nozick and their adoption of the words 'libertarian' and 'libertarianism'. It has therefore now become necessary to distinguish between their right libertarianism and the left libertarianism of the anarchist tradition". In the mid-20th century, right-libertarian ideologies such as anarcho-capitalism and minarchism co-opted the term libertarian to advocate laissez-faire capitalism and strong private property rights such as in land, infrastructure and natural resources. The latter is the dominant form of libertarianism in the United States, where it advocates civil liberties, natural law, free-market capitalism and a major reversal of the modern welfare state. In the Stanford Encyclopedia of Philosophy, Peter Vallentyne calls it right libertarianism, but he further states: "Libertarianism is often thought of as 'right-wing' doctrine. This, however, is mistaken for at least two reasons. First, on social—rather than economic—issues, libertarianism tends to be 'left-wing'. It opposes laws that restrict consensual and private sexual relationships between adults (e.g., gay sex, non-marital sex, and deviant sex), laws that restrict drug use, laws that impose religious views or practices on individuals, and compulsory military service. Second, in addition to the better-known version of libertarianism—right-libertarianism—there is also a version known as 'left-libertarianism'. Both endorse full self-ownership, but they differ with respect to the powers agents have to appropriate unappropriated natural resources (land, air, water, etc.)." Socialism With regard to economic questions within individualist socialist schools such as individualist anarchism, there are adherents to mutualism (Pierre Joseph Proudhon, Émile Armand and early Benjamin Tucker); natural rights positions (early Benjamin Tucker, Lysander Spooner and Josiah Warren); and egoistic disrespect for "ghosts" such as private property and markets (Max Stirner, John Henry Mackay, Lev Chernyi, later Benjamin Tucker, Renzo Novatore and illegalism). Contemporary individualist anarchist Kevin Carson characterizes American individualist anarchism saying that "[u]nlike the rest of the socialist movement, the individualist anarchists believed that the natural wage of labor in a free market was its product, and that economic exploitation could only take place when capitalists and landlords harnessed the power of the state in their interests. Thus, individualist anarchism was an alternative both to the increasing statism of the mainstream socialist movement, and to a classical liberal movement that was moving toward a mere apologetic for the power of big business." Libertarian socialism Libertarian socialism, sometimes dubbed left-libertarianismHicks, Steven V. and Daniel E. Shannon. The American journal of economics and sociology. Blackwell Pub, 2003. p. 612 and socialist libertarianism, is an anti-authoritarian, anti-statist and libertarian tradition within the socialist movement that rejects the state socialist conception of socialism as a statist form where the state retains centralized control of the economy."So, libertarian socialism rejects the idea of state ownership and control of the economy, along with the state as such. Through workers' self-management it proposes to bring an end to authority, exploitation, and hierarchy in production." "I1. Isn't libertarian socialism an oxymoron" in An Anarchist FAQ Libertarian socialists criticize wage slavery relationships within the workplace, emphasizing workers' self-management of the workplace and decentralized structures of political organization." ...preferringa system of popular self governance via networks of decentralized, local voluntary, participatory, cooperative associations. Roderick T. Long. "Toward a libertarian theory of class." Social Philosophy and Policy. Volume 15. Issue 02. Summer 1998. Pg. 305 Libertarian socialism asserts that a society based on freedom and justice can be achieved through abolishing authoritarian institutions that control certain means of production and subordinate the majority to an owning class or political and economic elite. Libertarian socialists advocate for decentralized structures based on direct democracy and federal or confederal associations such as libertarian municipalism, citizens' assemblies, trade unions and workers' councils. All of this is generally done within a general call for liberty"...what categorizes libertarian socialism is a focus on forms of social organization to further the freedom of the individual combined with an advocacy of non-state means for achieving this." Matt Dawson. Late modernity, individualization and socialism: An Associational Critique of Neoliberalism. Palgrave MacMillan. 2013. pg. 64 and free association through the identification, criticism and practical dismantling of illegitimate authority in all aspects of human life."Authority is defined in terms of the right to exercise social control (as explored in the "sociology of power") and the correlative duty to obey (as explred in the "philosophy of practical reason"). Anarchism is distinguished, philosophically, by its scepticism towards such moral relations – by its questioning of the claims made for such normative power – and, practically, by its challenge to those "authoritative" powers which cannot justify their claims and which are therefore deemed illegitimate or without moral foundation."Anarchism and Authority: A Philosophical Introduction to Classical Anarchism by Paul McLaughlin. AshGate. 2007. p. 1Individualist anarchist Benjamin Tucker defined anarchism as opposition to authority as follows "They found that they must turn either to the right or to the left, — follow either the path of Authority or the path of Liberty. Marx went one way; Warren and Proudhon the other. Thus were born State Socialism and Anarchism...Authority, takes many shapes, but, broadly speaking, her enemies divide themselves into three classes: first, those who abhor her both as a means and as an end of progress, opposing her openly, avowedly, sincerely, consistently, universally; second, those who profess to believe in her as a means of progress, but who accept her only so far as they think she will subserve their own selfish interests, denying her and her blessings to the rest of the world; third, those who distrust her as a means of progress, believing in her only as an end to be obtained by first trampling upon, violating, and outraging her. These three phases of opposition to Liberty are met in almost every sphere of thought and human activity. Good representatives of the first are seen in the Catholic Church and the Russian autocracy; of the second, in the Protestant Church and the Manchester school of politics and political economy; of the third, in the atheism of Gambetta and the socialism of Karl Marx." Benjamin Tucker. Individual Liberty. Within the larger socialist movement, libertarian socialism seeks to distinguish itself from Leninism and social democracy."In some ways, it is perhaps fair to say that if Left communism is an intellectual- political formation, it is so, first and foremost, negatively – as opposed to other socialist traditions. I have labelled this negative pole 'socialist orthodoxy', composed of both Leninists and social democrats...What I suggested was that these Left communist thinkers differentiated their own understandings of communism from a strand of socialism that came to follow a largely electoral road in the West, pursuing a kind of social capitalism, and a path to socialism that predominated in the peripheral and semi- peripheral countries, which sought revolutionary conquest of power and led to something like state capitalism. Generally, the Left communist thinkers were to find these paths locked within the horizons of capitalism (the law of value, money, private property, class, the state), and they were to characterize these solutions as statist, substitutionist and authoritarian." Chamsy el- Ojeili. Beyond post-socialism. Dialogues with the far-left. Palgrave Macmillan. 2015. pg 8 Past and present currents and movements commonly described as libertarian socialist include anarchism (especially anarchist schools of thought such as anarcho-communism, anarcho-syndicalism, collectivist anarchism, green anarchism, individualist anarchism,Armand, Émile (1907). "Anarchist Individualism as a Life and Activity". French individualist anarchist Émile Armand shows clearly opposition to capitalism and centralized economies when he said that the individualist anarchist "inwardly he remains refractory – fatally refractory – morally, intellectually, economically (The capitalist economy and the directed economy, the speculators and the fabricators of single are equally repugnant to him.)"Chartier, Gary; Johnson, Charles W. (2011). Markets Not Capitalism: Individualist Anarchism Against Bosses, Inequality, Corporate Power, and Structural Poverty. Brooklyn: Minor Compositions/Autonomedia. Back cover. "It introduces an eye-opening approach to radical social thought, rooted equally in libertarian socialism and market anarchism." mutualism, and social anarchism) as well as communalism, some forms of democratic socialism, guild socialism, libertarian Marxism (autonomism, council communism, left communism, and Luxemburgism, among others),Graham, Robert. "The General Idea of Proudhon's Revolution". participism, revolutionary syndicalism and some versions of utopian socialism. Mutualism Mutualism is an anarchist school of thought which can be traced to the writings of Pierre-Joseph Proudhon, who envisioned a socialist society where each person possess a means of production, either individually or collectively, with trade representing equivalent amounts of labor in the free market. Integral to the scheme was the establishment of a mutual-credit bank which would lend to producers at a minimal interest rate only high enough to cover the costs of administration. Mutualism is based on a labor theory of value which holds that when labor or its product is sold, it ought to receive goods or services in exchange embodying "the amount of labor necessary to produce an article of exactly similar and equal utility" and that receiving anything less would be considered exploitation, theft of labor, or usury. Criticisms Plato emphasized that individuals must adhere to laws and perform duties while declining to grant individuals rights to limit or reject state interference in their lives. Fascists believe that the liberal emphasis on individual freedom produces national divisiveness. Other views As creative independent lifestyle The anarchist writer and bohemian Oscar Wilde wrote in his famous essay The Soul of Man under Socialism that "Art is individualism, and individualism is a disturbing and disintegrating force. There lies its immense value. For what it seeks is to disturb monotony of type, slavery of custom, tyranny of habit, and the reduction of man to the level of a machine." For anarchist historian George Woodcock, "Wilde's aim in The Soul of Man under Socialism is to seek the society most favorable to the artist, [...] for Wilde art is the supreme end, containing within itself enlightenment and regeneration, to which all else in society must be subordinated. [...] Wilde represents the anarchist as aesthete." In this way, individualism has been used to denote a personality with a strong tendency towards self-creation and experimentation as opposed to tradition or popular mass opinions and behaviors.
|
living"; often not italicized in English) are those in which the effects of various biological entities are tested on whole, living organisms or cells, usually animals, including humans, and plants, as opposed to a tissue extract or dead organism. This is not to be confused with experiments done in vitro ("within the glass"), i.e., in a laboratory environment using test tubes, Petri dishes, etc. Examples of investigations in vivo include: the pathogenesis of disease by comparing the effects of bacterial infection with the effects of purified bacterial toxins; the development of non-antibiotics, antiviral drugs, and new drugs generally; and new surgical procedures. Consequently, animal testing and clinical trials are major elements of in vivo research. In vivo testing is often employed over in vitro because it is better suited for observing the overall effects of an experiment on a living subject. In drug discovery,
|
from the same organism grown in vitro were not. This discovery of anthrax toxin through the use of in vivo experiments had a major impact on studies of the pathogenesis of infectious disease. The maxim in vivo veritas ("in a living thing [there is] truth") is used to describe this type of testing and is a play on in vino veritas, ("in wine [there is] truth"), a well-known proverb. In vivo vs. ex vivo research In microbiology, in vivo is often used to refer to experimentation done in a whole organism, rather than in live isolated cells, for example, cultured cells derived from biopsies. In this situation, the more specific term is ex vivo. Once cells are disrupted and individual parts are tested or analyzed, this is known as in vitro. Methods of use According to Christopher Lipinski and Andrew Hopkins, "Whether the aim is to discover drugs or to gain knowledge of biological systems, the nature and properties of a chemical tool cannot be considered independently of the system it is to be tested in. Compounds that bind to isolated recombinant proteins are one thing; chemical tools that can perturb cell function another; and pharmacological agents that can be tolerated by a live organism and perturb its systems are yet another. If it were simple to ascertain the properties required to develop a lead discovered in vitro to one that is active in vivo, drug discovery would be as reliable as drug manufacturing." Studies
|
the resulting embryo or embryos into the uterus of the prospective mother. In vitro diagnostics refers to a wide range of medical and veterinary laboratory tests that are used to diagnose diseases and monitor the clinical status of patients using samples of blood, cells, or other tissues obtained from a patient. In vitro testing has been used to characterize specific adsorption, distribution, metabolism, and excretion processes of drugs or general chemicals inside a living organism; for example, Caco-2 cell experiments can be performed to estimate the absorption of compounds through the lining of the gastrointestinal tract; The partitioning of the compounds between organs can be determined to study distribution mechanisms; Suspension or plated cultures of primary hepatocytes or hepatocyte-like cell lines (HepG2, HepaRG) can be used to study and quantify metabolism of chemicals. These ADME process parameters can then be integrated into so called "physiologically based pharmacokinetic models" or PBPK. Advantages In vitro studies permit a species-specific, simpler, more convenient, and more detailed analysis than can be done with the whole organism. Just as studies in whole animals more and more replace human trials, so are in vitro studies replacing studies in whole animals. Simplicity Living organisms are extremely complex functional systems that are made up of, at a minimum, many tens of thousands of genes, protein molecules, RNA molecules, small organic compounds, inorganic ions, and complexes in an environment that is spatially organized by membranes, and in the case of multicellular organisms, organ systems. These myriad components interact with each other and with their environment in a way that processes food, removes waste, moves components to the correct location, and is responsive to signalling molecules, other organisms, light, sound, heat, taste, touch, and balance. This complexity makes it difficult to identify the interactions between individual components and to explore their basic biological functions. In vitro work simplifies the system under study, so the investigator can focus on a small number of components. For example, the identity of proteins of the immune system (e.g. antibodies), and the mechanism by which they recognize and bind to foreign antigens would remain very obscure if not for the extensive use of in vitro work to isolate the proteins,
|
culture dish before implanting the resulting embryo or embryos into the uterus of the prospective mother. In vitro diagnostics refers to a wide range of medical and veterinary laboratory tests that are used to diagnose diseases and monitor the clinical status of patients using samples of blood, cells, or other tissues obtained from a patient. In vitro testing has been used to characterize specific adsorption, distribution, metabolism, and excretion processes of drugs or general chemicals inside a living organism; for example, Caco-2 cell experiments can be performed to estimate the absorption of compounds through the lining of the gastrointestinal tract; The partitioning of the compounds between organs can be determined to study distribution mechanisms; Suspension or plated cultures of primary hepatocytes or hepatocyte-like cell lines (HepG2, HepaRG) can be used to study and quantify metabolism of chemicals. These ADME process parameters can then be integrated into so called "physiologically based pharmacokinetic models" or PBPK. Advantages In vitro studies permit a species-specific, simpler, more convenient, and more detailed analysis than can be done with the whole organism. Just as studies in whole animals more and more replace human trials, so are in vitro studies replacing studies in whole animals. Simplicity Living organisms are extremely complex functional systems that are made up of, at a minimum, many tens of thousands of genes, protein molecules, RNA molecules, small organic compounds, inorganic ions, and complexes in an environment that is spatially organized by membranes, and in the case of multicellular organisms, organ systems. These myriad components interact with each other and with their environment in a way that processes food, removes waste, moves components to the correct location, and is responsive to signalling molecules, other organisms, light, sound, heat, taste, touch, and balance. This complexity makes it difficult to identify the interactions between individual components and to explore their basic biological functions. In vitro work simplifies the system under study, so the investigator can focus on a small number of components. For example, the identity of proteins of the immune system (e.g. antibodies), and the mechanism by which they recognize and bind to foreign antigens would remain very obscure if not for the extensive use of in vitro work to isolate the proteins, identify the cells and genes that produce them, study the physical properties of their interaction with antigens, and identify how those interactions lead
|
for negative zero and positive zero, which sometimes require special attention (see below). The binary representation has the special property that, excluding NaNs, any two numbers can be compared as sign and magnitude integers (endianness issues apply). When comparing as 2's-complement integers: If the sign bits differ, the negative number precedes the positive number, so 2's complement gives the correct result (except that negative zero and positive zero should be considered equal). If both values are positive, the 2's complement comparison again gives the correct result. Otherwise (two negative numbers), the correct FP ordering is the opposite of the 2's complement ordering. Rounding errors inherent to floating point calculations may limit the use of comparisons for checking the exact equality of results. Choosing an acceptable range is a complex topic. A common technique is to use a comparison epsilon value to perform approximate comparisons. Depending on how lenient the comparisons are, common values include 1e-6 or 1e-5 for single-precision, and 1e-14 for double-precision. Another common technique is ULP, which checks what the difference is in the last place digits, effectively checking how many steps away the two values are. Although negative zero and positive zero are generally considered equal for comparison purposes, some programming language relational operators and similar constructs treat them as distinct. According to the Java Language Specification, comparison and equality operators treat them as equal, but Math.min() and Math.max() distinguish them (officially starting with Java version 1.1 but actually with 1.1.1), as do the comparison methods equals(), compareTo() and even compare() of classes Float and Double. Rounding floating-point numbers The IEEE standard has four different rounding modes; the first is the default; the others are called directed roundings. Round to Nearest – rounds to the nearest value; if the number falls midway it is rounded to the nearest value with an even (zero) least significant bit, which means it is rounded up 50% of the time (in IEEE 754-2008 this mode is called roundTiesToEven to distinguish it from another round-to-nearest mode) Round toward 0 – directed rounding towards zero Round toward +∞ – directed rounding towards positive infinity Round toward −∞ – directed rounding towards negative infinity. Extending the real numbers The IEEE standard employs (and extends) the affinely extended real number system, with separate positive and negative infinities. During drafting, there was a proposal for the standard to incorporate the projectively extended real number system, with a single unsigned infinity, by providing programmers with a mode selection option. In the interest of reducing the complexity of the final standard, the projective mode was dropped, however. The Intel 8087 and Intel 80287 floating point co-processors both support this projective mode. Functions and predicates Standard operations The following functions must be provided: Add, subtract, multiply, divide Square root Floating point remainder. This is not like a normal modulo operation, it can be negative for two positive numbers. It returns the exact value of . Round to nearest integer. For undirected rounding when halfway between two integers the even integer is chosen. Comparison operations. Besides the more obvious results, IEEE 754 defines that −∞ = −∞, +∞ = +∞ and x ≠ NaN for any x (including NaN). Recommended functions and predicates copysign(x,y) returns x with the sign of y, so abs(x) equals copysign(x,1.0). This is one of the few operations which operates on a NaN in a way resembling arithmetic. The function copysign is new in the C99 standard. −x returns x with the sign reversed. This is different from 0−x in some cases, notably when x is 0. So −(0) is −0, but the sign of 0−0 depends on the rounding mode. scalb(y, N) logb(x) finite(x) a predicate for "x is a finite value", equivalent to −Inf < x < Inf isnan(x) a predicate for "x is a NaN", equivalent to "x ≠ x" x <> y, which turns out to have different behavior than NOT(x = y) due to NaN. unordered(x, y) is true when "x is unordered with y", i.e., either x or y is a NaN. class(x) nextafter(x,y) returns the next representable value from x in the direction towards y History In 1976, Intel was starting the development of a floating-point coprocessor. Intel hoped to be able to sell a chip containing good implementations of all the operations found in the widely varying maths software libraries. John Palmer, who managed the project, believed the effort should be backed by a standard unifying floating point operations across disparate processors. He contacted William Kahan of the University of California, who had helped improve the accuracy of Hewlett-Packard's calculators. Kahan suggested that Intel use the floating point of Digital Equipment Corporation's (DEC) VAX. The first VAX, the VAX-11/780 had just come out in late 1977, and its floating point was highly regarded. However, seeking to market their chip to the broadest possible market, Intel wanted the best floating point possible, and Kahan went on to draw up specifications. Kahan initially recommended that the floating point base be decimal but the hardware design of the coprocessor was too far along to make that change. The work within Intel worried other vendors, who set up a standardization effort to ensure a "level playing field". Kahan attended the second IEEE 754 standards working group meeting, held in November 1977. He subsequently received permission from Intel to put forward a draft proposal based on his work for their coprocessor; he was allowed to explain details of the format and its rationale, but not anything related to Intel's implementation architecture. The draft was co-written with Jerome Coonen and Harold Stone, and was initially known as the "Kahan-Coonen-Stone proposal" or "K-C-S format". As an 8-bit exponent was not wide enough for some operations desired for double-precision numbers, e.g. to store the product of two 32-bit numbers, both Kahan's proposal and a counter-proposal by DEC therefore used 11 bits, like the time-tested 60-bit floating-point format of the CDC 6600 from 1965. Kahan's proposal also provided for infinities, which are useful when dealing with division-by-zero conditions; not-a-number values, which are useful when dealing with invalid operations; denormal numbers, which help mitigate problems caused by underflow; and a better balanced exponent bias, which can help avoid overflow and underflow when taking the reciprocal of a number. Even before it was approved, the draft standard had been implemented by a number of manufacturers. The Intel 8087, which was announced in 1980, was the first chip to implement the draft standard. In 1980, the Intel 8087 chip was already released, but DEC remained opposed, to denormal numbers in particular, because of performance concerns and since it would give DEC a competitive advantage to standardise on DEC's format. The arguments over gradual underflow lasted until 1981 when an expert hired by DEC to assess it sided against the dissenters. DEC had the study done in order to demonstrate that gradual underflow was a bad idea, but the study concluded the opposite, and DEC gave in. In 1985, the standard was ratified, but it had already become
|
× 2−1022 ≈ ±2.22507 The finite positive and finite negative numbers furthest from zero (represented by the value with 2046 in the Exp field and all 1s in the fraction field) are ±(2−2−52) × 21023 ≈ ±1.79769 Some example range and gap values for given exponents in double precision: Extended formats The standard also recommends extended format(s) to be used to perform internal computations at a higher precision than that required for the final result, to minimise round-off errors: the standard only specifies minimum precision and exponent requirements for such formats. The x87 80-bit extended format is the most commonly implemented extended format that meets these requirements. Examples Here are some examples of single-precision IEEE 754 representations: Comparing floating-point numbers Every possible bit combination is either a NaN or a number with a unique value in the affinely extended real number system with its associated order, except for the two combinations of bits for negative zero and positive zero, which sometimes require special attention (see below). The binary representation has the special property that, excluding NaNs, any two numbers can be compared as sign and magnitude integers (endianness issues apply). When comparing as 2's-complement integers: If the sign bits differ, the negative number precedes the positive number, so 2's complement gives the correct result (except that negative zero and positive zero should be considered equal). If both values are positive, the 2's complement comparison again gives the correct result. Otherwise (two negative numbers), the correct FP ordering is the opposite of the 2's complement ordering. Rounding errors inherent to floating point calculations may limit the use of comparisons for checking the exact equality of results. Choosing an acceptable range is a complex topic. A common technique is to use a comparison epsilon value to perform approximate comparisons. Depending on how lenient the comparisons are, common values include 1e-6 or 1e-5 for single-precision, and 1e-14 for double-precision. Another common technique is ULP, which checks what the difference is in the last place digits, effectively checking how many steps away the two values are. Although negative zero and positive zero are generally considered equal for comparison purposes, some programming language relational operators and similar constructs treat them as distinct. According to the Java Language Specification, comparison and equality operators treat them as equal, but Math.min() and Math.max() distinguish them (officially starting with Java version 1.1 but actually with 1.1.1), as do the comparison methods equals(), compareTo() and even compare() of classes Float and Double. Rounding floating-point numbers The IEEE standard has four different rounding modes; the first is the default; the others are called directed roundings. Round to Nearest – rounds to the nearest value; if the number falls midway it is rounded to the nearest value with an even (zero) least significant bit, which means it is rounded up 50% of the time (in IEEE 754-2008 this mode is called roundTiesToEven to distinguish it from another round-to-nearest mode) Round toward 0 – directed rounding towards zero Round toward +∞ – directed rounding towards positive infinity Round toward −∞ – directed rounding towards negative infinity. Extending the real numbers The IEEE standard employs (and extends) the affinely extended real number system, with separate positive and negative infinities. During drafting, there was a proposal for the standard to incorporate the projectively extended real number system, with a single unsigned infinity, by providing programmers with a mode selection option. In the interest of reducing the complexity of the final standard, the projective mode was dropped, however. The Intel 8087 and Intel 80287 floating point co-processors both support this projective mode. Functions and predicates Standard operations The following functions must be provided: Add, subtract, multiply, divide Square root Floating point remainder. This is not like a normal modulo operation, it can be negative for two positive numbers. It returns the exact value of . Round to nearest integer. For undirected rounding when halfway between two integers the even integer is chosen. Comparison operations. Besides the more obvious results, IEEE 754 defines that −∞ = −∞, +∞ = +∞ and x ≠ NaN for any x (including NaN). Recommended functions and predicates copysign(x,y) returns x with the sign of y, so abs(x) equals copysign(x,1.0). This is one of the few operations which operates on a NaN in a way resembling arithmetic. The function copysign is new in the C99 standard. −x returns x with the sign reversed. This is different from 0−x in some cases, notably when x is 0. So −(0) is −0, but the sign of 0−0 depends on the rounding mode. scalb(y, N) logb(x) finite(x) a predicate for "x is a finite value", equivalent to −Inf < x < Inf isnan(x) a predicate for "x is a NaN", equivalent to "x ≠ x" x <> y, which turns out to have different behavior than NOT(x = y) due to NaN. unordered(x, y) is true when "x is unordered with y", i.e., either x or y is a NaN. class(x) nextafter(x,y) returns the next representable value from x in the direction towards y History In 1976, Intel was starting the development of a floating-point coprocessor. Intel hoped to be able to sell a chip containing good implementations of all the operations found in
|
available. Description The 80186 series was generally intended for embedded systems, as microcontrollers with external memory. Therefore, to reduce the number of integrated circuits required, it included features such as clock generator, interrupt controller, timers, wait state generator, DMA channels, and external chip select lines. The initial clock rate of the 80186 was 6 MHz, but due to more hardware available for the microcode to use, especially for address calculation, many individual instructions ran faster than on an 8086 at the same clock frequency. For instance, the common register+immediate addressing mode was significantly faster than on the 8086, especially when a memory location was both (one of) the operand(s) and the destination. Multiply and divide also showed great improvement being several times as fast as on the original 8086 and multi-bit shifts were done almost four times as quickly as in the 8086. A few new instructions were introduced with the 80186 (referred to as the 8086-2 instruction set in some datasheets): enter/leave (replacing several instructions when handling stack frames), pusha/popa (push/pop all general registers), bound (check array index against bounds), and ins/outs (input/output of string). A useful immediate mode was added for the push, imul,
|
or just 186, is a microprocessor and microcontroller introduced in 1982. It was based on the Intel 8086 and, like it, had a 16-bit external data bus multiplexed with a 20-bit address bus. The 80188 variant, with an 8-bit external data bus was also available. Description The 80186 series was generally intended for embedded systems, as microcontrollers with external memory. Therefore, to reduce the number of integrated circuits required, it included features such as clock generator, interrupt controller, timers, wait state generator, DMA channels, and external chip select lines. The initial clock rate of the 80186 was 6 MHz, but due to more hardware available for the microcode to use, especially for address calculation, many individual instructions ran faster than on an 8086 at the same clock frequency. For instance, the common register+immediate addressing mode was significantly faster than on the 8086, especially when a memory location was both (one of) the operand(s) and the destination. Multiply and divide also showed great improvement being several times as fast as on the original 8086 and multi-bit shifts were done almost four times as quickly as in the 8086. A few new instructions were introduced with the 80186 (referred to as the 8086-2 instruction set in some datasheets): enter/leave (replacing several instructions when handling stack frames), pusha/popa (push/pop all general registers), bound (check array index against bounds), and ins/outs (input/output of string). A useful immediate mode was added for the push, imul, and multi-bit shift instructions. These instructions
|
social group appeared and were referred to as conversos or New Christians. King Ferdinand II of Aragon and Queen Isabella I of Castile established the Spanish Inquisition in 1478. In contrast to the previous inquisitions, it operated completely under royal Christian authority, though staffed by clergy and orders, and independently of the Holy See. It operated in Spain and in most Spanish colonies and territories, which included the Canary Islands, the Kingdom of Sicily, and all Spanish possessions in North, Central, and South America. It primarily focused upon forced converts from Islam (Moriscos, Conversos and secret Moors) and from Judaism (Conversos, Crypto-Jews and Marranos)—both groups still resided in Spain after the end of the Islamic control of Spain—who came under suspicion of either continuing to adhere to their old religion or of having fallen back into it. In 1492 all Jews who had not converted were expelled from Spain; those who converted became nominal Catholics and thus subject to the Inquisition. Inquisition in the Spanish overseas empire In the Americas, King Philip II set up three tribunals (each formally titled Tribunal del Santo Oficio de la Inquisición) in 1569, one in Mexico, Cartagena de Indias (in modern-day Colombia) and Peru. The Mexican office administered Mexico (central and southeastern Mexico), Nueva Galicia (northern and western Mexico), the Audiencias of Guatemala (Guatemala, Chiapas, El Salvador, Honduras, Nicaragua, Costa Rica), and the Spanish East Indies. The Peruvian Inquisition, based in Lima, administered all the Spanish territories in South America and Panama. Portuguese Inquisition The Portuguese Inquisition formally started in Portugal in 1536 at the request of King João III. Manuel I had asked Pope Leo X for the installation of the Inquisition in 1515, but only after his death in 1521 did Pope Paul III acquiesce. At its head stood a Grande Inquisidor, or General Inquisitor, named by the Pope but selected by the Crown, and always from within the royal family. The Portuguese Inquisition principally focused upon the Sephardi Jews, whom the state forced to convert to Christianity. Spain had expelled its Sephardi population in 1492; many of these Spanish Jews left Spain for Portugal but eventually were subject to inquisition there as well. The Portuguese Inquisition held its first auto-da-fé in 1540. The Portuguese inquisitors mostly focused upon the Jewish New Christians (i.e. conversos or marranos). The Portuguese Inquisition expanded its scope of operations from Portugal to its colonial possessions, including Brazil, Cape Verde, and Goa. In the colonies, it continued as a religious court, investigating and trying cases of breaches of the tenets of orthodox Roman Catholicism until 1821. King João III (reigned 1521–57) extended the activity of the courts to cover censorship, divination, witchcraft, and bigamy. Originally oriented for a religious action, the Inquisition exerted an influence over almost every aspect of Portuguese society: political, cultural, and social. According to Henry Charles Lea, between 1540 and 1794, tribunals in Lisbon, Porto, Coimbra, and Évora resulted in the burning of 1,175 persons, the burning of another 633 in effigy, and the penancing of 29,590. But documentation of 15 out of 689 autos-da-fé has disappeared, so these numbers may slightly understate the activity. Inquisition in the Portuguese overseas empire Goa Inquisition The Goa Inquisition began in 1560 at the order of John III of Portugal. It had originally been requested in a letter in the 1540s by Jesuit priest Francis Xavier, because of the New Christians who had arrived in Goa and then reverted to Judaism. The Goa Inquisition also focused upon Catholic converts from Hinduism or Islam who were thought to have returned to their original ways. In addition, this inquisition prosecuted non-converts who broke prohibitions against the public observance of Hindu or Muslim rites or interfered with Portuguese attempts to convert non-Christians to Catholicism. Aleixo Dias Falcão and Francisco Marques set it up in the palace of the Sabaio Adil Khan. Brazilian Inquisition The inquisition was active in colonial Brazil. The religious mystic and formerly enslaved prostitute, Rosa Egipcíaca was arrested, interrogated and imprisoned, both in the colony and in Lisbon. Egipcíaca was the first black woman in Brazil to write a book - this work detailed her visions and was entitled Sagrada Teologia do Amor Divino das Almas Peregrinas. Roman Inquisition With the Protestant Reformation, Catholic authorities became much more ready to suspect heresy in any new ideas, including those of Renaissance humanism, previously strongly supported by many at the top of the Church hierarchy. The extirpation of heretics became a much broader and more complex enterprise, complicated by the politics of territorial Protestant powers, especially in northern Europe. The Catholic Church could no longer exercise direct influence in the politics and justice-systems of lands that officially adopted Protestantism. Thus war (the French Wars of Religion, the Thirty Years' War), massacre (the St. Bartholomew's Day massacre) and the missional and propaganda work (by the Sacra congregatio de propaganda fide) of the Counter-Reformation came to play larger roles in these circumstances, and the Roman law type of a "judicial" approach to heresy represented by the Inquisition became less important overall. In 1542 Pope Paul III established the Congregation of the Holy Office of the Inquisition as a permanent congregation staffed with cardinals and other officials. It had the tasks of maintaining and defending the integrity of the faith and of examining and proscribing errors and false doctrines; it thus became the supervisory body of local Inquisitions. Arguably the most famous case tried by the Roman Inquisition was that of Galileo Galilei in 1633. The penances and sentences for those who confessed or were found guilty were pronounced together in a public ceremony at the end of all the processes. This was the sermo generalis or auto-da-fé. Penances (not matters for the civil authorities) might consist of a pilgrimage, a public scourging, a fine, or the wearing of a cross. The wearing of two tongues of red or other brightly colored cloth, sewn onto an outer garment in an "X" pattern, marked those who were under investigation. The penalties in serious cases were confiscation of property by the Inquisition or imprisonment. This led to the possibility of false charges to enable confiscation being made against those over
|
have anything to do with bishops who had sent heretics to their death". In the 12th century, to counter the spread of Catharism, prosecution of heretics became more frequent. The Church charged councils composed of bishops and archbishops with establishing inquisitions (the Episcopal Inquisition). The first Inquisition was temporarily established in Languedoc (south of France) in 1184. The murder of Pope Innocent's papal legate Pierre de Castelnau in 1208 sparked the Albigensian Crusade (1209–1229). The Inquisition was permanently established in 1229 (Council of Toulouse), run largely by the Dominicans in Rome and later at Carcassonne in Languedoc. Medieval Inquisition Historians use the term "Medieval Inquisition" to describe the various inquisitions that started around 1184, including the Episcopal Inquisition (1184–1230s) and later the Papal Inquisition (1230s). These inquisitions responded to large popular movements throughout Europe considered apostate or heretical to Christianity, in particular the Cathars in southern France and the Waldensians in both southern France and northern Italy. Other Inquisitions followed after these first inquisition movements. The legal basis for some inquisitorial activity came from Pope Innocent IV's papal bull Ad extirpanda of 1252, which explicitly authorized (and defined the appropriate circumstances for) the use of torture by the Inquisition for eliciting confessions from heretics. However, Nicholas Eymerich, the inquisitor who wrote the "Directorium Inquisitorum", stated: 'Quaestiones sunt fallaces et ineficaces' ("interrogations via torture are misleading and futile"). By 1256 inquisitors were given absolution if they used instruments of torture. In the 13th century, Pope Gregory IX (reigned 1227–1241) assigned the duty of carrying out inquisitions to the Dominican Order and Franciscan Order. By the end of the Middle Ages, England and Castile were the only large western nations without a papal inquisition. Most inquisitors were friars who taught theology and/or law in the universities. They used inquisitorial procedures, a common legal practice adapted from the earlier Ancient Roman court procedures. They judged heresy along with bishops and groups of "assessors" (clergy serving in a role that was roughly analogous to a jury or legal advisers), using the local authorities to establish a tribunal and to prosecute heretics. After 1200, a Grand Inquisitor headed each Inquisition. Grand Inquisitions persisted until the mid 19th century. Early Modern European history With the sharpening of debate and of conflict between the Protestant Reformation and the Catholic Counter-Reformation, Protestant societies came to see/use the Inquisition as a terrifying "Other", while staunch Catholics regarded the Holy Office as a necessary bulwark against the spread of reprehensible heresies. Witch-trials While belief in witchcraft, and persecutions directed at or excused by it, were widespread in pre-Christian Europe, and reflected in Germanic law, the influence of the Church in the early medieval era resulted in the revocation of these laws in many places, bringing an end to traditional pagan witch hunts. Throughout the medieval era, mainstream Christian teaching had denied the existence of witches and witchcraft, condemning it as pagan superstition. However, Christian influence on popular beliefs in witches and maleficium (harm committed by magic) failed to entirely eradicate folk belief in witches. The fierce denunciation and persecution of supposed sorceresses that characterized the cruel witchhunts of a later age were not generally found in the first thirteen hundred years of the Christian era. The medieval Church distinguished between "white" and "black" magic. Local folk practice often mixed chants, incantations, and prayers to the appropriate patron saint to ward off storms, to protect cattle, or ensure a good harvest. Bonfires on Midsummer's Eve were intended to deflect natural catastrophes or the influence of fairies, ghosts, and witches. Plants, often harvested under particular conditions, were deemed effective in healing. Black magic was that which was used for a malevolent purpose. This was generally dealt with through confession, repentance, and charitable work assigned as penance. Early Irish canons treated sorcery as a crime to be visited with excommunication until adequate penance had been performed. In 1258, Pope Alexander IV ruled that inquisitors should limit their involvement to those cases in which there was some clear presumption of heretical belief. The prosecution of witchcraft generally became more prominent in the late medieval and Renaissance era, perhaps driven partly by the upheavals of the era – the Black Death, the Hundred Years War, and a gradual cooling of the climate that modern scientists call the Little Ice Age (between about the 15th and 19th centuries). Witches were sometimes blamed. Since the years of most intense witch-hunting largely coincide with the age of the Reformation, some historians point to the influence of the Reformation on the European witch-hunt. Dominican priest Heinrich Kramer was assistant to the Archbishop of Salzburg. In 1484 Kramer requested that Pope Innocent VIII clarify his authority to prosecute witchcraft in Germany, where he had been refused assistance by the local ecclesiastical authorities. They maintained that Kramer could not legally function in their areas. The papal bull Summis desiderantes affectibus sought to remedy this jurisdictional dispute by specifically identifying the dioceses of Mainz, Köln, Trier, Salzburg, and Bremen. Some scholars view the bull as "clearly political". The bull failed to ensure that Kramer obtained the support he had hoped for. In fact he was subsequently expelled from the city of Innsbruck by the local bishop, George Golzer, who ordered Kramer to stop making false accusations. Golzer described Kramer as senile in letters written shortly after the incident. This rebuke led Kramer to write a justification of his views on witchcraft in his 1486 book Malleus Maleficarum ("Hammer against witches"). In the book, Kramer stated his view that witchcraft was to blame for bad weather. The book is also noted for its animus against women. Despite Kramer's claim that the book gained acceptance from the clergy at the University of Cologne, it was in fact condemned by the clergy at Cologne for advocating views that violated Catholic doctrine and standard inquisitorial procedure. In 1538 the Spanish Inquisition cautioned its members not to believe everything the Malleus said. Spanish Inquisition Portugal and Spain in the late Middle Ages consisted largely of multicultural territories of Muslim and Jewish influence, reconquered from Islamic control, and the new Christian authorities could not assume that all their subjects would suddenly become and remain orthodox Roman Catholics. So the Inquisition in Iberia, in the lands of the Reconquista counties and kingdoms like León, Castile, and Aragon, had a special socio-political basis as well as more fundamental religious motives. In some parts of Spain towards the end of the 14th century, there was a wave of violent anti-Judaism, encouraged by the preaching of Ferrand Martinez, Archdeacon of Écija. In the pogroms of June 1391 in Seville, hundreds of Jews were killed, and the synagogue was completely destroyed. The number of people killed was also high in other cities, such as Córdoba, Valencia, and Barcelona. One of the consequences of these pogroms was the mass conversion of thousands of surviving Jews. Forced baptism was contrary to the law of the Catholic Church, and theoretically anybody who had been forcibly baptized could legally return to Judaism. However, this was very narrowly interpreted. Legal definitions of the time theoretically acknowledged that a forced baptism was not a valid sacrament, but confined this to cases where it was literally administered by physical force. A person who had consented to baptism under threat of death or serious injury was still regarded as a voluntary convert, and accordingly forbidden to revert to Judaism. After the public violence, many of the converted "felt it safer to remain in their new religion". Thus, after 1391, a new social group appeared and were referred to as conversos or New Christians. King Ferdinand II of Aragon and Queen Isabella I of Castile established the Spanish Inquisition in 1478. In contrast to the previous inquisitions, it operated completely under royal Christian authority, though staffed by clergy and orders, and independently of the Holy See. It operated in Spain and in most Spanish colonies and territories, which included the Canary Islands, the Kingdom of Sicily, and all Spanish possessions in North, Central, and South America. It primarily focused upon forced converts from Islam (Moriscos, Conversos and secret Moors) and from Judaism (Conversos, Crypto-Jews and Marranos)—both groups still resided in Spain after the end of the Islamic control of Spain—who came under suspicion of either continuing to adhere to their old religion or of having fallen back into it. In 1492 all Jews who had not converted were expelled from Spain; those who converted became nominal Catholics and thus subject to the Inquisition. Inquisition in the Spanish overseas empire In the Americas, King Philip II set up three tribunals (each formally titled Tribunal del Santo Oficio de la Inquisición) in 1569, one in Mexico, Cartagena de Indias (in modern-day Colombia) and Peru. The Mexican office administered Mexico (central and southeastern Mexico), Nueva Galicia (northern and western Mexico), the Audiencias of Guatemala (Guatemala, Chiapas, El Salvador, Honduras, Nicaragua, Costa Rica), and the Spanish East Indies. The Peruvian Inquisition, based in Lima, administered all the Spanish territories in South America and Panama. Portuguese Inquisition The Portuguese Inquisition formally started in Portugal in 1536 at the request of King João III. Manuel I had asked Pope Leo X for the installation of the Inquisition in 1515, but only after his death in 1521 did Pope Paul III acquiesce. At its head stood a Grande Inquisidor, or General Inquisitor, named by the Pope but selected by the Crown, and always from within the royal family. The Portuguese Inquisition principally focused upon the Sephardi Jews, whom the state forced to convert to Christianity. Spain had expelled its Sephardi population in 1492; many of these Spanish Jews left Spain for Portugal but eventually were subject to inquisition there as well. The Portuguese Inquisition held its first auto-da-fé in 1540. The Portuguese inquisitors mostly focused upon the Jewish New Christians (i.e. conversos or marranos). The Portuguese Inquisition expanded its scope of operations from Portugal to its colonial possessions, including Brazil, Cape Verde, and Goa. In the colonies, it continued as a religious court, investigating and trying cases of breaches of the tenets of orthodox Roman Catholicism until 1821. King João III (reigned 1521–57) extended the activity of the courts to cover censorship, divination, witchcraft, and bigamy. Originally oriented for a religious action, the Inquisition exerted an influence over almost every aspect of Portuguese society: political, cultural, and social. According to Henry Charles Lea, between 1540 and 1794, tribunals in Lisbon, Porto, Coimbra, and Évora resulted in the burning of 1,175 persons, the burning of another 633 in effigy, and the penancing of 29,590. But documentation of 15 out of 689 autos-da-fé has disappeared, so these numbers may slightly understate the activity. Inquisition in the Portuguese overseas empire Goa Inquisition The Goa Inquisition began in 1560 at the order of John III of Portugal. It had originally been requested in a letter in the 1540s by Jesuit priest Francis Xavier, because of the New Christians who had arrived in Goa and then reverted to Judaism. The Goa Inquisition also focused upon Catholic converts from Hinduism or Islam who were thought to have returned to their original ways. In addition, this inquisition prosecuted non-converts who broke prohibitions against the public observance of Hindu or Muslim rites or interfered with Portuguese attempts to convert non-Christians to Catholicism. Aleixo Dias Falcão and Francisco Marques set it up in the palace of the Sabaio Adil Khan. Brazilian Inquisition The inquisition was active in colonial Brazil. The religious mystic and formerly enslaved prostitute, Rosa Egipcíaca was arrested, interrogated and imprisoned, both in the colony and in Lisbon. Egipcíaca was the first black woman in Brazil to
|
Abraham sent Eliezer, his steward, into Mesopotamia to find a wife for Isaac, from his nephew Bethuel's family. Eliezer chose the Aramean Rebekah for Isaac. After many years of marriage to Isaac, Rebekah had still not given birth to a child and was believed to be barren. Isaac prayed for her and she conceived. Rebekah gave birth to twin boys, Esau and Jacob. Isaac was 60 years old when his two sons were born. Isaac favored Esau, and Rebekah favored Jacob. The narratives about Isaac do not mention him having concubines. Migration Isaac moved to Beer-lahai-roi after his father died. When the land experienced famine, he moved to the Philistine land of Gerar where his father once lived. This land was still under the control of King Abimelech as it was in the days of Abraham. Like his father, Isaac also deceived Abimelech about his wife and also got into the well business. He had gone back to all of the wells that his father dug and saw that they were all stopped up with earth. The Philistines did this after Abraham died. So, Isaac unearthed them and began to dig for more wells all the way to Beersheba, where he made a pact with Abimelech, just like in the day of his father. Birthright Isaac grew old and became blind. He called his son Esau and directed him to procure some venison for him, in order to receive Isaac's blessing. While Esau was hunting, Jacob, after listening to his mother's advice, deceived his blind father by misrepresenting himself as Esau and thereby obtained his father's blessing, such that Jacob became Isaac's primary heir and Esau was left in an inferior position. According to Genesis 25:29–34, Esau had previously sold his birthright to Jacob for "bread and stew of lentils". Thereafter, Isaac sent Jacob into Mesopotamia to take a wife of his mother's brother's house. After 20 years working for his uncle Laban, Jacob returned home. He reconciled with his twin brother Esau, then he and Esau buried their father, Isaac, in Hebron after he died at the age of 180. Family tree Burial site According to local tradition, the graves of Isaac and Rebekah, along with the graves of Abraham and Sarah and Jacob and Leah, are in the Cave of the Patriarchs. Jewish views In rabbinical tradition, the age of Isaac at the time of binding is taken to be 37, which contrasts with common portrayals of Isaac as a child. The rabbis also thought that the reason for the death of Sarah was the news of the intended sacrifice of Isaac. The sacrifice of Isaac is cited in appeals for the mercy of God in later Jewish traditions. The post-biblical Jewish interpretations often elaborate the role of Isaac beyond the biblical description and primarily focus on Abraham's intended sacrifice of Isaac, called the aqedah ("binding"). According to a version of these interpretations, Isaac died in the sacrifice and was revived. According to many accounts of Aggadah, unlike the Bible, it is Satan who is testing Isaac as an agent of God. Isaac's willingness to follow God's command at the cost of his death has been a model for many Jews who preferred martyrdom to violation of the Jewish law. According to the Jewish tradition, Isaac instituted the afternoon prayer. This tradition is based on Genesis chapter 24, verse 63 ("Isaac went out to meditate in the field at the eventide"). Isaac was the only patriarch who stayed in Canaan during his whole life and though once he tried to leave, God told him not to do so. Rabbinic tradition gave the explanation that Isaac was almost sacrificed and anything dedicated as a sacrifice may not leave the Land of Israel. Isaac was the oldest of the biblical patriarchs at the time of his death, and the only patriarch whose name was not changed. Rabbinic literature also linked Isaac's blindness in old age, as stated in the Bible, to the sacrificial binding: Isaac's eyes went blind because the tears of angels present at the time of his sacrifice fell on Isaac's eyes. Christian views The early Christian church continued and developed the New Testament theme of Isaac as a type of Christ and the Church being both "the son of the promise" and the "father of the faithful". Tertullian draws a parallel between Isaac's bearing the wood for the sacrificial fire with Christ's carrying his cross. and there was a general agreement that, while all the sacrifices of the Old Law were anticipations of that on Calvary, the sacrifice of Isaac was so "in a pre-eminent way". The Eastern Orthodox Church and the Roman Catholic Church consider Isaac as a saint along with other biblical patriarchs. Along with those of other patriarchs and the Old Testament Righteous, his feast day is celebrated in the Eastern Orthodox Church and the Byzantine rite of the Catholic Church on the Second Sunday before Christmas (December 11–17), under the title the Sunday of the Forefathers. New Testament The New Testament states Isaac was "offered up" by his father Abraham, and that Isaac blessed his sons. Paul contrasted Isaac, symbolizing Christian liberty, with the rejected older son Ishmael, symbolizing slavery; Hagar is associated with the Sinai covenant, while Sarah is associated with the covenant of grace, into which her son Isaac enters. The Epistle of James chapter 2, verses 21–24, states that the sacrifice of Isaac shows that justification (in the Johannine sense) requires both faith and works. In the Epistle to the Hebrews, Abraham's willingness to follow God's command to sacrifice Isaac is used as an example of faith as is Isaac's action in blessing Jacob and Esau with reference to the future promised by God to Abraham. In verse 19, the author views the release of Isaac from sacrifice as analogous to the resurrection of Jesus, the idea of the sacrifice of Isaac being a prefigurement of the sacrifice of Jesus on the cross. Islamic views Islam considers Isaac (Arabic:اسحاق Ishaaq) a prophet of Islam, and describes him as the father of the Israelites and a righteous servant of God. Isaac, along with Ishmael, is highly important for Muslims for continuing to preach the message of monotheism after his father Abraham. Among Isaac's children was the follow-up Israelite patriarch Jacob, who is also venerated as an Islamic prophet. Isaac is mentioned seventeen times by name in the Quran, often with his father and his son, Jacob. The Quran states that Abraham received "good tidings of Isaac, a prophet, of the righteous", and that God blessed them both (37: 112). In a fuller description, when angels came to Abraham to tell him of the future punishment to be imposed on Sodom and Gomorrah, his wife, Sarah, "laughed, and We gave her good tidings of Isaac, and after Isaac of (a grandson) Jacob" (11: 71–74); and it is further explained that this event will take place
|
child-bearing age. Some time later, three men who Abraham identifies as messengers of God visit him and Sarah, and Abraham treats them to food and nuptials. They repeat the prophecy that Sarah would bear a child, promising Isaac's birth within a year's time, at which point Sarah laughs in disbelief. God questions why the pair laughed in disbelief at his words, and if it is because they believe such things were not within his power. Now afraid, they futilely deny ever having laughed at God's words. Time passes as Isaac is born. Although this was Abraham's second son (Abraham's first son was Ishmael, with Hagar) it was Sarah's first and only child. On the eighth day from his birth, Isaac was circumcised, as was necessary for all males of Abraham's household, in order to be in compliance with Yahweh's covenant. After Isaac had been weaned, Sarah saw Ishmael mocking, and urged her husband to cast out Hagar the bondservant and her son, so that Isaac would be Abraham's sole heir. Abraham was hesitant, but at God's order he listened to his wife's request. Binding At some point in Isaac's youth, his father Abraham took him to Mount Moriah. At God's command, Abraham was to build a sacrificial altar and sacrifice his son Isaac upon it. After he had bound his son to the altar and drawn his knife to kill him, at the last moment an angel of God prevented Abraham from proceeding. Instead, he was directed to sacrifice a nearby ram that was stuck in thickets. Family life Before Isaac was 40 (Gen 25:20) Abraham sent Eliezer, his steward, into Mesopotamia to find a wife for Isaac, from his nephew Bethuel's family. Eliezer chose the Aramean Rebekah for Isaac. After many years of marriage to Isaac, Rebekah had still not given birth to a child and was believed to be barren. Isaac prayed for her and she conceived. Rebekah gave birth to twin boys, Esau and Jacob. Isaac was 60 years old when his two sons were born. Isaac favored Esau, and Rebekah favored Jacob. The narratives about Isaac do not mention him having concubines. Migration Isaac moved to Beer-lahai-roi after his father died. When the land experienced famine, he moved to the Philistine land of Gerar where his father once lived. This land was still under the control of King Abimelech as it was in the days of Abraham. Like his father, Isaac also deceived Abimelech about his wife and also got into the well business. He had gone back to all of the wells that his father dug and saw that they were all stopped up with earth. The Philistines did this after Abraham died. So, Isaac unearthed them and began to dig for more wells all the way to Beersheba, where he made a pact with Abimelech, just like in the day of his father. Birthright Isaac grew old and became blind. He called his son Esau and directed him to procure some venison for him, in order to receive Isaac's blessing. While Esau was hunting, Jacob, after listening to his mother's advice, deceived his blind father by misrepresenting himself as Esau and thereby obtained his father's blessing, such that Jacob became Isaac's primary heir and Esau was left in an inferior position. According to Genesis 25:29–34, Esau had previously sold his birthright to Jacob for "bread and stew of lentils". Thereafter, Isaac sent Jacob into Mesopotamia to take a wife of his mother's brother's house. After 20 years working for his uncle Laban, Jacob returned home. He reconciled with his twin brother Esau, then he and Esau buried their father, Isaac, in Hebron after he died at the age of 180. Family tree Burial site According to local tradition, the graves of Isaac and Rebekah, along with the graves of Abraham and Sarah and Jacob and Leah, are in the Cave of the Patriarchs. Jewish views In rabbinical tradition, the age of Isaac at the time of binding is taken to be 37, which contrasts with common portrayals of Isaac as a child. The rabbis also thought that the reason for the death of Sarah was the news of the intended sacrifice of Isaac. The sacrifice of Isaac is cited in appeals for the mercy of God in later Jewish traditions. The post-biblical Jewish interpretations often elaborate the role of Isaac beyond the biblical description and primarily focus on Abraham's intended sacrifice of Isaac, called the aqedah ("binding"). According to a version of these interpretations, Isaac died in the sacrifice and was revived. According to many accounts of Aggadah, unlike the Bible, it is Satan who is testing Isaac as an agent of God. Isaac's willingness to follow God's command at the cost of his death has been a model for many Jews who preferred martyrdom to violation of the Jewish law. According to the Jewish tradition, Isaac instituted the afternoon prayer. This tradition is based on Genesis chapter 24, verse 63 ("Isaac went out to meditate in the field at the eventide"). Isaac was the only patriarch who stayed in Canaan during his whole life and though
|
1980. In 1980 the first American football league in Italy was established and crowned a champion. The Italian league (Series A) in the early 1980's was one of the first leagues in Europe to sign professional import players and coaches from the USA. The league had good popularity in the early years especially the late 1980's and early 1990's with reported attendance of 30,000 fans for a Series A league final championship game in that time period. American Football in Italy has had ups and downs since that time but has always had a competitive league with different lower levels playing below the Italian Football League (IFL). History The new IFL was founded in 2008, taking over previous league's significance called (National Football League Italy). The league was born as a result of the escape of several of the best clubs of the old championship organized by the Italian federation, such as Milano Rhinos, Parma Panthers, Bologna Doves and Bolzano Giants. However some of the historic Italian clubs have not joined the new league and continue to participate in different tournaments organized by other federations. This is the case of Legnano Frogs, Torino Giaguari, etc. In the following years a lot of teams moved to the Federazione Italiana di American Football (the federation the IFL belongs to) and most of the biggest teams are now part of the IFL that is
|
Grizzlies (2015–2018) Torino Giaguari (2014–present) † defunct ♦ due to league expansion the Napoli team can play the 2015 IFL season and is not relegated to the second division ‡ Roma Grizzlies won the second division championship and earned the right to play the 2015 IFL season Italian Bowl From 2008 to 2014 the championship game was named Italian Super Bowl MVP Italian Bowl Until 2014 the championship game was called Superbowl italiano. 2008 MVP Reggie Green (RB, Giants Bolzano) 2009 MVP Reggie Green (RB, Giants Bolzano) 2010 MVP Greg Hay (RB, Panthers Parma) 2011 MVP Tanyon Bissell (WR, Panthers Parma), MVP Ita Tommaso Monardi (QB, Panthers Parma), MVP Def Michele Canali (DL, Panthers Parma) 2012 MVP Kevin Grayson (WR, Panthers Parma) 2013 MVP Alessandro Malpeli Avalli (RB, Panthers Parma), MVP Usa Ryan Christian (RB, Panthers Parma), MVP Def Simone Bernardoni (DL, Panthers Parma) 2014 MVP Mattia Binda (RB, Milano Seamen), MVP Usa Jonathan Dally (QB, Milano Seamen), MVP def
|
of the Norse goddess Iðunn 176 Iduna, an asteroid named after the goddess Iduna (bird), a genus of tree warblers Iduna (literature society) Iduna, Wisconsin, an unincorporated community,
|
of several modern anglicizations of the name of the Norse goddess Iðunn 176 Iduna, an asteroid named after the goddess Iduna (bird), a genus of tree warblers Iduna (literature society) Iduna, Wisconsin, an unincorporated
|
religions, also known as the Dharmic faiths Other things related to the Indian subcontinent
|
Indian and other Asian languages Kharoshthi (extinct) Indian numerals Indian religions, also known as the Dharmic faiths
|
through the New York Agreement in 1962 that the administration of Western New Guinea would be temporarily transferred from the Netherlands to Indonesia and that by 1969 the United Nations should oversee a referendum of the Papuan people, in which they would be given two options: to remain part of Indonesia or to become an independent nation. For a period of time, Dutch New Guinea were under the United Nations Temporary Executive Authority, before being transferred to Indonesia in 1963. A referendum was held in 1969, which was referred to as the Act of Free Choice. The referendum was recognized by the international community and the region became the Indonesian province of Irian Jaya. The province has been renamed as Papua since 2002. Under Indonesian rule Following the Act of Free Choice plebiscite in 1969, Western New Guinea was formally integrated into the Republic of Indonesia. Instead of a referendum of the 816,000 Papuans, only 1,022 Papuan tribal representatives were allowed to vote, and they were coerced into voting in favor of integration. While several international observers including journalists and diplomats criticized the referendum as being rigged, the U.S. and Australia support Indonesia's efforts to secure acceptance in the United Nations for the pro-integration vote. That same year, 84 member states voted in favor for the United Nations to accept the result, with 30 others abstaining. Due to the Netherlands' efforts to promote a West Papuan national identity, a significant number of Papuans refused to accept the territory's integration into Indonesia. These formed the separatist Organisasi Papua Merdeka (Free Papua Movement) and have waged an insurgency against the Indonesian authorities, which continues to this day. In January 2003 President Megawati Sukarnoputri signed an order dividing Papua into three provinces: Central Irian Jaya (Irian Jaya Tengah), Papua (or East Irian Jaya, Irian Jaya Timur), and West Papua (Irian Jaya Barat). The formality of installing a local government for Jakarta in Irian Jaya Barat (West) took place in February 2003 and a governor was appointed in November; a government for Irian Jaya Tengah (Central Irian Jaya) was delayed from August 2003 due to violent local protests. The creation of this separate Central Irian Jaya Province was blocked by Indonesian courts, who declared it to be unconstitutional and in contravention of the Papua's special autonomy agreement. The previous division into two provinces was allowed to stand as an established fact. Following his election in 2014, Indonesian president, Joko Widodo, embarked on reforms intended to alleviate grievances of Native Papuans, such as stopping transmigration program and starting massive infrastructure spending in Papua, including building Trans-Papua roads network. The Joko Widodo administration has prioritized infrastructure and human resource development as a great framework for solving the conflict in Papua. The Jokowi administration has implemented a one-price fuel policy in Papua. Jokowi assessed that one price fuel policy is a form of "justice" for all Papuans. Another infrastructure that Jokowi is also building is the Palapa Ring fiber optic. In 2020, Jokowi targets that the internet can be enjoyed by all people up to West Papua. Protests against Indonesian rule in Papua happens frequently, the most recent being the 2019 Papua protests, which is also by far one of the largest. Politics Government The province of Papua is governed by a directly elected governor (currently Lukas Enembe) and a regional legislature, People's Representative Council of Papua (Dewan Perwakilan Rakyat Papua, abbreviated as DPRP or DPR Papua). A unique government organization in the province is the Papuan People's Assembly (Majelis Rakyat Papua), which was formed by the Indonesian government in 2005 as a coalition of Papuan tribal chiefs, tasked with arbitration and speaking on behalf of Papuan tribal customs. It is one of the only such institutions in the country, the other being West Papuan People's Assembly in West Papua province. Since 2014, the DPRP has 55 members who are elected through General elections every five years and 14 people who are appointed through the special autonomy, bringing the total number of DPRP members to 69 people. The DPRP leadership consists of 1 Chairperson and 3 Deputy Chairmen who come from political parties that have the most seats and votes. The current DPRP members are the results of the 2019 General Election which was sworn in on 31 October 2019 by the Chairperson of the Jayapura High Court at the Papua DPR Building. The composition of DPRP members for the 2019–2024 period consists of 13 political parties where the Nasdem Party is the political party with the most seats, with 8 seats, followed by the Democratic Party which also won 8 seats and the Indonesian Democratic Party of Struggle which won 7 seats. The province of Papua is one of three provinces to have obtained special autonomy status, the others being Aceh and West Papua. According to Law 21/2001 on Special Autonomy Status (UU Nomor 21 Tahun 2001 tentang Otonomi khusus Papua), the provincial government of Papua is provided with authority within all sectors of administration, except for the five strategic areas of foreign affairs, security and defense, monetary and fiscal affairs, religion and justice. The provincial government is authorized to issue local regulations to further stipulate the implementation of the special autonomy, including regulating the authority of districts and municipalities within the province. Due to its special autonomy status, Papua province is provided with significant amount of special autonomy funds, which can be used to benefit its indigenous peoples. But the province has low fiscal capacity and it is highly dependent on unconditional transfers and the above-mentioned special autonomy fund, which accounted for about 55% of total revenues in 2008. After obtaining its special autonomy status, to allow the local population access to timber production benefits, the Papuan provincial government issued a number of decrees, enabling: a Timber Logging Permit for Customary Communities, which enabled local people to carry out timber extraction in small concessions (250 to 1,000 hectares) for one year through a community-based or participatory community cooperative; a Permit to Manage Customary Forests, which was a timber extraction permit for larger concessions (up to 2,000 hectares) for a maximum of 20 years; logging companies had to pay compensations to local communities in addition to all other fees and taxes collected by the national government. Administrative divisions As of 2010 (following the separation of West Papua Province in 2003), the residual Papua Province consisted of 28 regencies (kabupaten) and one autonomous city (kota); these regencies and the city are together subdivided as at 2021 into 576 districts (distrik), and thence into 5,555 "villages" (kelurahan and desa). With the release of the Act Number 21 of 2001 concerning the Special Autonomous of Papua Province, the term distrik was used instead of kecamatan in the entire Western New Guinea (Papua and West Papua). The difference between the two is merely the terminology, with kepala distrik being the district head. The regencies (kabupaten) and the city (kota) are listed below with their areas and their populations at the 2020 census, together with the 2020 Human Development Index of each administrative divisions. Environment Geography and Climate The island of New Guinea lies to the east of the Malay Archipelago, with which it is sometimes included as part of a greater Indo-Australian Archipelago. Geologically it is a part of the same tectonic plate as Australia. When world sea levels were low, the two shared shorelines (which now lie 100 to 140 metres below sea level), and combined with lands now inundated into the tectonic continent of Sahul, also known as Greater Australia. The two landmasses became separated when the area now known as the Torres Strait flooded after the end of the Last Glacial Period. The province of Papua is located between 2 ° 25'LU – 9 ° S and 130 ° – 141 ° East. The total area of Papua is 317,062 km2 (122,418 sq. miles) or 19.33% of the total area of the Indonesian archipelago. Papua Province is the province that has the largest area in Indonesia. The boundaries of Papua are: Pacific Ocean (North), Arafura Sea (South), West Papua (West) and Papua New Guinea (East). Papua, like most parts of Indonesia, has two seasons, the dry season and the rainy season. From June to September the wind flows from Australia and does not contain much water vapor resulting in a dry season. On the other hand, from December to March, the wind currents contain a lot of water vapor originating from Asia and the Pacific Ocean so that the rainy season occurs. The average temperature in Papua ranges from 19 °C to 28 °C and humidity is between 80% to 89%. The average annual rainfall is between 1,500 mm to 7,500 mm. Snowfalls sometime occurs in the mountainous areas of the province, especially the central highlands region. The New Guinea Highlands, which is located at the central east–west of the province, dominates the geography of the island of New Guinea, over in total length. The western section is around long and across. The province contains the highest mountains between the Himalayas and the Andes, rising up to high, and ensuring a steady supply of rain from the tropical atmosphere. The tree line is around elevation and the tallest peaks contain permanent equatorial glaciers, increasingly melting due to a changing climate. Various other smaller mountain ranges occur both north and west of the central ranges. Except in high elevations, most areas possess a hot, humid climate throughout the year, with some seasonal variation associated with the northeast monsoon season. Another major habitat feature is the vast southern and northern lowlands. Stretching for hundreds of kilometers, these include lowland rainforests, extensive wetlands, savanna grasslands, and some of the largest expanses of mangrove forest in the world. The southern lowlands are the site of Lorentz National Park, a UNESCO World Heritage Site. The northern lowlands are drained principally by the Mamberamo River and its tributaries on the western side, and by the Sepik on the eastern side. The more extensive southern lowlands are drained by a larger number of rivers, principally the Digul in the west and the Fly in the east. The largest island offshore, Dolak (also called Yos Sudarso), lies near the Digul estuary, separated by the narrow Muli Strait that is so narrow it has been named a "creek". The island is administered as part of the Merauke Regency. The province's largest river is the Mamberamo located in the northern part of the province. The result is a large area of lakes and rivers known as the Lakes Plains region. The Baliem Valley, home of the Dani people, is a tableland above sea level in the midst of the central mountain range. Puncak Jaya, also known by its Dutch colonial name, "Carstensz Pyramid", is a limestone mountain peak above sea level. It is the highest peak of Oceania. Ecology Anthropologically, New Guinea is considered part of Melanesia. Botanically, New Guinea is considered part of Malesia, a floristic region that extends from the Malay Peninsula across Indonesia to New Guinea and the East Melanesian Islands. The flora of New Guinea is a mixture of many tropical rainforest species with origins in Asia, together with typically Australasian flora. Typical Southern Hemisphere flora include the Conifers Podocarpus and the rainforest emergents Araucaria and Agathis, as well as Tree ferns and several species of Eucalyptus. New Guinea is differentiated from its drier, flatter, and less fertile southern counterpart, Australia, by its much higher rainfall and its active volcanic geology. Yet the two land masses share a similar animal fauna, with marsupials, including wallabies and possums, and the egg-laying monotreme, the echidna. Other than bats and some two dozen indigenous rodent genera, there are no pre-human indigenous placental mammals. Pigs, several additional species of rats, and the ancestor of the New Guinea singing dog were introduced with human colonization. The island has an estimated 16,000 species of plant, 124 genera of which are endemic. Papua's known forest fauna includes; marsupials (including possums, wallabies, tree-kangaroos, cuscuses); other mammals (including the endangered long-beaked echidna); bird species such as birds-of-paradise, cassowaries, parrots, and cockatoos; the world's longest lizards (Papua monitor); and the world's largest butterflies. The waterways and wetlands of Papua are also home to salt and freshwater crocodile, tree monitors, flying foxes, osprey, bats and other animals; while the equatorial glacier fields remain largely unexplored. Protected areas within Papua province include the World Heritage Lorentz National Park, and the Wasur National Park, a Ramsar wetland of international importance. Birdlife International has called Lorentz Park "probably the single most important reserve in New Guinea". It contains five of World Wildlife Fund's "Global 200" ecoregions: Southern New Guinea Lowland Forests; New Guinea Montane Forests; New Guinea Central Range Subalpine Grasslands; New Guinea mangroves; and New Guinea Rivers and Streams. Lorentz Park contains many unmapped and unexplored areas, and is certain to contain many species of plants and animals as yet unknown to Western science. Local communities' ethnobotanical and ethnozoological knowledge of the Lorentz biota is also very poorly documented. On the other hand, Wasur National Park has a very high value biodiversity has led to the park being dubbed the "Serengeti of Papua". About 70% of the total area of the park consists of savanna (see Trans-Fly savanna and grasslands), while the remaining vegetation is swamp forest, monsoon forest, coastal forest, bamboo forest, grassy plains and large stretches of sago swamp forest. The dominant plants include Mangroves, Terminalia, and Melaleuca species. The park provides habitat for a large variety of up to 358 bird species of which some 80 species are endemic to the island of New Guinea. Fish diversity is also high in the region with some 111 species found in the eco-region and a large number of these are recorded from Wasur. The park's wetland provides habitat for various species of lobster and crab as well. Several parts of the province remains unexplored due to steep terrain, leaving a high possibility that there are still many undiscovered floras and faunas that is yet to be discovered. In February 2006, a team of scientists exploring the Foja Mountains, Sarmi, discovered new species of birds, butterflies, amphibians, and plants, including possibly the largest-flowered species of rhododendron. In December 2007, a second scientific expedition was taken to the mountain range. The expedition led to the discovery of two new species: the first being a 1.4 kg giant rat (Mallomys sp.) approximately five times the size of a regular brown rat, the second a pygmy possum (Cercartetus sp.) described by scientists as "one of the world's smallest marsupials." An expedition late in 2008, backed by the Indonesian Institute of Sciences, National Geographic Society and Smithsonian Institution, was made in order to assess the area's biodiversity. New types of animals recorded include a frog with a long erectile nose, a large woolly rat, an imperial-pigeon with rust, grey and white plumage, a 25 cm gecko with claws rather than pads on its toes, and a small, 30 cm high, black forest wallaby (a member of the genus Dorcopsis). Ecological threats include logging-induced deforestation, forest conversion for plantation agriculture (including oil palm), smallholder agricultural conversion, the introduction and potential spread of alien species such as the crab-eating macaque which preys on and competes with indigenous species, the illegal species trade, and water pollution from oil and mining operations. Economy Papua has large natural resources and a very large area. However, this province has weaknesses, namely limited infrastructure and less skilled human resources. So far, Papua has had a fairly good economic development due to the support of economic sources, especially mining, forest, agriculture and fisheries products. Economic development has been uneven in Papua, and poverty in the region remains high by Indonesian standards. Part of the problem has been neglect of the poor—too little or the wrong kind of government support from Jakarta and Jayapura. A major factor in this is the extraordinarily high cost of delivering goods and services to large numbers of isolated communities, in the absence of a developed road or river network (the latter in contrast to Kalimantan) providing access to the interior and the highlands. Intermittent political and military conflict and tight security controls have also contributed to the problem but with the exception of some border regions and a few pockets in the highlands, this has not been the main factor contributing to underdevelopment. Papua's gross domestic product grew at a faster rate than the national average until, and throughout the financial crisis of 1997–98. However, the differences are much smaller if mining is excluded from the provincial GDP. Given that most mining revenues were commandeered by the central government until the Special Autonomy Law was passed in 2001, provincial GDP without mining is most likely a better measure of Papuan GDP during the pre- and immediate post-crisis periods. On a per capita basis, the GDP growth rates for both Papua and Indonesia are lower than those for total GDP. However, the gap between per capita GDP and total GDP is larger for Papua than for Indonesia as a whole, reflecting Papua's high population growth rates. Although Papua has experienced almost no growth in GDP, the situation is not as serious as one might think. It is true that the mining sector, dominated by Freeport Indonesia, has been declining over the last decade or so, leading to a fall in the value of exports. On the other hand, government spending and fixed capital investment have both grown, by well over 10 per cent per year, contributing to growth in sectors such as finance, construction, transport and communications, and trade, hotels and restaurants. With so many sectors still experiencing respectable levels of growth, the impact of the stagnant economy on the welfare of the population will probably be limited. It should also be remembered that mining is typically an enclave activity; its impact on the general public is fairly limited, regardless of whether it is booming or contracting. Papua has depended heavily on natural resources, especially the mining, oil and gas sectors, since the mid-1970s. Although this is still the case, there have been some structural changes in the two provincial economies since the split in 2003. The contribution of mining to the economy of Papua province declined from 62 per cent in 2003 to 47 per cent in 2012. The shares of agriculture and manufacturing also fell, but that of utilities remained the same. A few other sectors, notably construction and services, increased their shares during the period. Despite these structural changes, the economy of Papua province continues to be dominated by the mining sector, and in particular by a single company, Freeport indonesia. Mining is still and remains one of the dominant economic sector in Papua. The Grasberg Mine, the world's largest gold mine and second-largest copper mine, is located in the highlands near Puncak Jaya, the highest mountain in Papua and whole Indonesia. Grasberg Mine producing 1.063 billion pounds of copper, 1.061 million ounces gold and 2.9 million ounces silver. It has 19,500 employees operated by PT Freeport Indonesia (PT-FI) which used to be 90.64% owned by Freeport-McMoran (FCX). In August 2017, FCX announced that it will divest its ownership in PT-FI so that Indonesia owns 51%. In return the CoW will be replaced by a special license (IUPK) with mining rights to 2041 and FCX will build a new smelter by 2022. Besides mining, there are at least three other important economic sectors (excluding the government sector) in the Papuan economy. The first is agriculture, particularly food crops, forestry and fisheries. Agriculture made up 10.4 per cent of provincial GDP in 2005 but grew at an average rate of only 0.1 per cent per annum in 2000–05. The second important sector is trade, hotels and restaurants, which contributed 4.0 per cent of provincial GDP in 2005. Within this sector, trade contributed most to provincial GDP. However, the subsector with the highest growth rate was hotels, which grew at 13.2 per cent per annum in 2000–05. The third important sector is transport and Communications, which contributed 3.4 per cent of provincial GDP in 2005. The sector grew at an average annual rate of 5.3 percent in 2000–05, slightly below the national level. Within the sector, sea transport, air transport and communications performed particularly well. The role of private enterprise in developing communications and air transport has become increasingly significant. Since private enterprise will only expand if businesspeople see good prospects to make a profit, this is certainly an encouraging development. At current rates of growth, the transport and communications sector could support the development of agriculture in Papua. However, so far, most of the growth in communications has been between the rapidly expanding urban areas of Jayapura, Timika, Merauke, and between them and the rest of Indonesia. Nevertheless, in the medium term, improved communication networks may create opportunities for Papua to shift from heavy dependence on the mining sector to greater reliance on the agricultural sector. With good international demand for palm oil anticipated in the medium term, production of this commodity could be expanded. However, the negative effects of deforestation on the local environment should be a major consideration in the selection of new areas for this and any other plantation crop. In 2011, Papuan caretaker governor Syamsul Arief Rivai claimed Papua's forests cover 42 million hectares with an estimated worth of Rp 700 trillion ($78 billion) and that if the forests were managed properly and sustainably, they could produce over 500 million cubic meters of logs per annum. Manufacturing and banking make up a tiny proportion of the regional economy and experienced negative growth in 2000–05. Poor infrastructure and lack of human capital are the most likely reasons for the poor performance of manufacturing. In addition, the costs of manufacturing are typically very high in Papua, as they are in many other outer island regions of Indonesia. Both within Indonesia and in the world economy, Papua's comparative advantage will continue to lie in agriculture and natural resource-based industries for a long time to come. A more significant role for manufacturing is unlikely given the far lower cost of labor and better infrastructure in Java. But provided that there are substantial improvements in infrastructure and communications, over the longer term manufacturing can be expected to cluster around activities related to agriculture—for example, food processing. Infrastructure Compared to other parts of Indonesia, the infrastructure in Papua is one of the most least developed, owing to its distance from the national capital Jakarta. Nevertheless, for the past few years, the central government has invested significant sums of money to build and improve the current infrastructure in the province. The infrastructure development efforts of the Ministry of Public Works and Housing in Papua have been very massive in the last 10 years. This effort is carried out to accelerate equitable development and support regional development in Papua. The main focus of infrastructure development in Papua is to improve regional connectivity, improve the quality of life through the provision of basic infrastructure and increase food security through the development of water resources infrastructure. The achievements and conditions of infrastructure development in Papua until 2017 have shown significant progress. Energy and water resources Electricity distribution in the province as well as the whole country is operated and managed by the Perusahaan Listrik Negara (PLN). Originally, most Papuan villages do not have access to electricity. The Indonesia government through the Ministry of Energy and Mineral Resources, in the beginning of year 2016, introduced a program named "Indonesia Terang" or Bright Indonesia. The aimed of this program is to speed up Electrification Rate (ER) with priority to the six provinces at Eastern area of Indonesia including Papua Province. The target of Indonesian's ER by 2019 is 97%. While the Indonesian's national ER already high (88.30%) in 2015, Papua still the lowest ER (45.93%) among the provinces. The scenario to boost up ER in the Eastern area by connected the consumers at villages which not electrified yet to the new Renewable Energy sources. The percentage of household that were connected to the electricity in Papua (Electrification ratio/ER) is the lowest one among the provinces in Indonesia. Data from the Ministry of Energy and Mineral Resources shows that only Papua Province has ER level below 50% (45.93%) with the national average RE was 88.30%. High ER of more than 85% can be found in the rest of west area of the country. The main reason of lowest RE in Papua is a huge area with landlocked and mountain situation and low density population. Energy consumption in residential sector, 457 GWh in year 2014, contributes the electrification rate in Papua Province. But again, geographic and demographic obstacle made the electrical energy not well dispersed in Papua. The ER level are usually higher in the coastal area but become low in the mountain area. The ongoing project of 35GW and Bright Indonesia proves that the government is focusing on improving electricity infrastructure in Papua. The target is 2.114 unelectrified villages in Papua and energy consumption each household will be 0.6 kWh/day. If they use Solar system to meet this consumption of energy, then each household should have been installed with at least 150 Wp solar home system (assuming the efficiency is 0.85 and minimum insulation is 5 hours/day). As of 2019, there are still 1,724 villages in Papua and West Papua that have not received electricity, mostly in the inland regions. Nevertheless, the Bright Indonesia program is considered to be a success, as more and more villages are receiving electricity for the first time. All pipes water supply in the province is managed by the Papua Municipal Waterworks (Indonesian: Perusahaan Daerah Air Minum Papua – PDAM Papua ). The supply of clean water is one of the main problem faced by the province, especially during drought seasons. Papua has been named as the province with the worst sanitation in Indonesia, garnering a score of 45 while the national average is 75, due to unhealthy lifestyle habits and a lack of clean water. In response, the government has invested money to build the sufficient infrastructure to hold clean water. Several new dams are also being built by the government throughout the province. Achieving universal access to drinking water, sanitation and hygiene is essential to accelerating progress in the fields of health, education and poverty alleviation. In 2015, about a quarter of the population used basic sanitation facilities at home, while a third still practiced open defecation. The coverage of improved drinking water sources is much higher, both in households and schools. Inequality based on income and residence levels is stark, demonstrating the importance of integrating equity principles into policy and practice and expanding the coverage of community-based total sanitation programs. Internet and telecommunication Papua is the largest province in Indonesia, but it has the least amount of telecommunications services due to geographic isolation. The deployment of service to the district and to the sub district is still not evenly distributed. The distribution of telecommunication services in Papua is still very uneven. This is indicated by the percentage of the number of telecommunication services and infrastructure whose distribution is centralized in certain areas such as Jayapura. Based on data, the Human Development Index in Papua increases every year but is not accompanied by an increase adequate number of telecommunication facilities. The Ministry of Communication and Information Technology through the Information Technology Accessibility Agency (BAKTI) has built around 9 base transceiver stations in remote areas of Papua, namely Puncak Jaya Regency and Mamberamo Raya Regency, to connect to internet access. In the early stages, the internet was prioritized to support the continuity of education, health and better public services. To realize connectivity in accordance with government priorities, the Ministry of Communication and Information is determined to reach all districts in the Papua region with high-speed internet networks by 2020. It is planned that all districts in Papua and West Papua will build a fast internet backbone network. There are 31 regencies that have new high-speed internet access to be built. In late 2019, the government announced the completion of the Palapa Ring project – a priority infrastructure project that aimed to provide access to 4G internet services to more than 500 regencies across Indonesia, Papua included. The project is estimated to have cost US$1.5 billion and comprises 35,000 km (21,747 miles) of undersea fiber-optic cables
|
that were connected to the electricity in Papua (Electrification ratio/ER) is the lowest one among the provinces in Indonesia. Data from the Ministry of Energy and Mineral Resources shows that only Papua Province has ER level below 50% (45.93%) with the national average RE was 88.30%. High ER of more than 85% can be found in the rest of west area of the country. The main reason of lowest RE in Papua is a huge area with landlocked and mountain situation and low density population. Energy consumption in residential sector, 457 GWh in year 2014, contributes the electrification rate in Papua Province. But again, geographic and demographic obstacle made the electrical energy not well dispersed in Papua. The ER level are usually higher in the coastal area but become low in the mountain area. The ongoing project of 35GW and Bright Indonesia proves that the government is focusing on improving electricity infrastructure in Papua. The target is 2.114 unelectrified villages in Papua and energy consumption each household will be 0.6 kWh/day. If they use Solar system to meet this consumption of energy, then each household should have been installed with at least 150 Wp solar home system (assuming the efficiency is 0.85 and minimum insulation is 5 hours/day). As of 2019, there are still 1,724 villages in Papua and West Papua that have not received electricity, mostly in the inland regions. Nevertheless, the Bright Indonesia program is considered to be a success, as more and more villages are receiving electricity for the first time. All pipes water supply in the province is managed by the Papua Municipal Waterworks (Indonesian: Perusahaan Daerah Air Minum Papua – PDAM Papua ). The supply of clean water is one of the main problem faced by the province, especially during drought seasons. Papua has been named as the province with the worst sanitation in Indonesia, garnering a score of 45 while the national average is 75, due to unhealthy lifestyle habits and a lack of clean water. In response, the government has invested money to build the sufficient infrastructure to hold clean water. Several new dams are also being built by the government throughout the province. Achieving universal access to drinking water, sanitation and hygiene is essential to accelerating progress in the fields of health, education and poverty alleviation. In 2015, about a quarter of the population used basic sanitation facilities at home, while a third still practiced open defecation. The coverage of improved drinking water sources is much higher, both in households and schools. Inequality based on income and residence levels is stark, demonstrating the importance of integrating equity principles into policy and practice and expanding the coverage of community-based total sanitation programs. Internet and telecommunication Papua is the largest province in Indonesia, but it has the least amount of telecommunications services due to geographic isolation. The deployment of service to the district and to the sub district is still not evenly distributed. The distribution of telecommunication services in Papua is still very uneven. This is indicated by the percentage of the number of telecommunication services and infrastructure whose distribution is centralized in certain areas such as Jayapura. Based on data, the Human Development Index in Papua increases every year but is not accompanied by an increase adequate number of telecommunication facilities. The Ministry of Communication and Information Technology through the Information Technology Accessibility Agency (BAKTI) has built around 9 base transceiver stations in remote areas of Papua, namely Puncak Jaya Regency and Mamberamo Raya Regency, to connect to internet access. In the early stages, the internet was prioritized to support the continuity of education, health and better public services. To realize connectivity in accordance with government priorities, the Ministry of Communication and Information is determined to reach all districts in the Papua region with high-speed internet networks by 2020. It is planned that all districts in Papua and West Papua will build a fast internet backbone network. There are 31 regencies that have new high-speed internet access to be built. In late 2019, the government announced the completion of the Palapa Ring project – a priority infrastructure project that aimed to provide access to 4G internet services to more than 500 regencies across Indonesia, Papua included. The project is estimated to have cost US$1.5 billion and comprises 35,000 km (21,747 miles) of undersea fiber-optic cables and 21,000 km (13,000 miles) of land cables, stretching from the westernmost city in Indonesia, Sabang to the easternmost town, Merauke, which is located in Papua. Additionally, the cables also transverse every district from the northernmost island Miangas to the southernmost island, Rote. Through the Palapa Ring, the government can facilitate a network capacity of up to 100 Gbit/s in even the most outlying regions of the country. Transportation Land So far, air routes have been a mainstay in Papua and West Papua provinces as a means of transporting people and goods, including basic necessities, due to inadequate road infrastructure conditions. This has resulted in high distribution costs which have also increased the prices of various staple goods, especially in rural areas. Therefore, the government is trying to reduce distribution costs by building the Trans-Papua Highway. As of 2016, the Trans-Papua highway that has been connected has reached 3,498 kilometers, with asphalt roads for 2,075 kilometers, while the rest are still dirt roads, and roads that have not been connected have reached 827 km. The development of the Trans-Papua highway will create connectivity between regions so that it can have an impact on the acceleration of economic growth in Papua and West Papua in the long term. Apart from the construction of the Trans-Papua highway, the government is also preparing for the first railway development project in Papua, which is currently entering the feasibility study phase. The said infrastructure funding for Papua is not insignificant. The need to connect all roads in Papua and West Papua is estimated at Rp. 12.5 trillion (US$870 million). In the 2016 State Budget, the government has also budgeted an additional infrastructure development fund of Rp. 1.8 trillion (US$126 million). Data from the Ministry of Public Works and Housing (KPUPR) states, the length of the Trans-Papua highway in Papua reaches 2,902 km. These include Merauke-Tanahmerah-Waropko (543 km), Waropko-Oksibil (136 km), Dekai-Oksibil (225 km), and Kenyam-Dekai (180 km). Then, Wamena-Habema-Kenyam-Mamug (295 km), Jayapura-Elelim-Wamena (585 km), Wamena-Mulia-Ilaga-Enarotali (466 km), Wagete-Timika (196 km), and Enarotali-Wagete-Nabire (285 km). As of 2020, only about 200–300 kilometers of the Trans-Papua highwat have not been connected. As in other provinces in Indonesia, Papua uses a dual carriageway with the left-hand traffic rule, and cities and towns such as Jayapura and Merauke provide public transportation services such as buses and taxis along with Gojek and Grab services. Currently, the Youtefa Bridge in Jayapura is the longest bridge in the province, with a total length of 732 metres (2,402 ft). The bridge cut the distance and travel time from Jayapura city center to Muara Tami district as well as Skouw State Border Post at Indonesia–Papua New Guinea border. The bridge construction was carried out by consortium of state-owned construction companies PT Pembangunan Perumahan Tbk, PT Hutama Karya (Persero), and PT Nindya Karya (Persero), with a total construction cost of IDR 1.87 trillion and support from the Ministry of Public Works and Housing worth IDR 1.3 trillion. The main span assembly of the Youtefa Bridge was not carried out at the bridge site, but at PAL Indonesia shipyard in Surabaya, East Java. Its production in Surabaya aims to improve safety aspects, improve welding quality, and speed up the implementation time to 3 months. This is the first time where the arch bridge is made elsewhere and then brought to the location. From Surabaya the bridge span, weighing 2000 tons and 112.5 m long, was sent by ship with a 3,200 kilometers journey in 19 days. Installation of the first span was carried out on 21 February 2018, while the second span was installed on 15 March 2018 with an installation time of approximately 6 hours. The bridge was inaugurated on 28 October 2019 by President Joko Widodo. A railway with a length of 205 km is being planned, which would connect the provincial capital Jayapura and Sarmi to the east. Further plans include connecting the railway to Sorong and Manokwari in West Papua. In total, the railway would have a length of 595 km, forming part of the Trans-Papua Railway. Construction of the railway is still in the planning stage. A Light Rapid Transport (LRT) connecting Jayapura and Sentani is also being planned. Air The geographical conditions of Papua which are hilly and have dense forests and do not have adequate road infrastructure, such as in Java or Sumatra, make transportation a major obstacle for local communities. Air transportation using airplanes is by far the most effective means of transportation and is needed most by the inhabitants of the island, although it is not cheap for it. A number of airlines are also scrambling to take advantage of the geographical conditions of the island by opening busy routes to and from a number of cities, both district and provincial capitals. If seen from the sufficient condition of the airport infrastructure, there are not a few airports that can be landed by jets like Boeing and Airbus as well as propeller planes such as ATR and Cessna. Sentani International Airport in Jayapura is the largest airport in the province, serving as the main gateway to the province from other parts of Indonesia. The air traffic is roughly divided between flights connecting to destinations within the Papua province and flights linking Papua to other parts of Indonesia. The airport connects Jayapura with other Indonesian cities such as Manado, Makassar, Surabaya and Jakarta, as well as towns within the province such as Biak, Timika and Merauke. Sentani International Airport is also the main base for several aviation organizations, including Associated Mission Aviation, Mission Aviation Fellowship, YAJASI and Tariku Aviation. The airport currently does not have any international flights, although there are plans to open new airline routes to neighboring Papua New Guinea in the future. Other medium-sized airports in the province are Mozes Kilangin Airport in Timika, Mopah International Airport in Merauke, Frans Kaisiepo International Airport in Biak, and Wamena Airport in Wamena. There are over 300 documented airstrips in Papua, consists of mostly small airstrips that can only be landed by small airplanes. The government is planning to open more airports in the future to connect isolated regions in the province. Water Water transportation, which includes sea and river transportation, is also one of the most crucial form of transportation in the province, after air transportation. The number of passengers departing by sea in Papua in October 2019 decreased by 16.03 percent, from 18,785 people in September 2019 to 15,773 people. The number of passengers arriving by sea in October 2019 decreased by 12.32 percent, from 11,108 people in September 2019 to 9,739 people. The volume of goods loaded in October 2019 was recorded at 17,043 tons, an increase of 30.57 percent compared to the volume in September 2019 which amounted to 13,053 tons. The volume of goods unloaded in October 2019 was recorded at 117,906 tons or a decrease of 2.03 percent compared to the volume in September 2019 which amounted to 120,349 tons. There are several ports in the province, with the Port of Depapre in Jayapura being the largest, which started operation in 2021. There are also small to medium-sized ports in Biak, Timika, Merauke and Agats, which serves passenger and cargo ships within the province, as well as from other Indonesian provinces. Healthcare Health-related matters in the Papua is administered by the Papua Provincial Health Agency (Indonesian: Dinas Kesehatan Provinsi Papua). According to the Indonesian Central Agency on Statistics, as of 2015, there are around 13,554 hospitals in Papua which consists of 226 state-owned hospitals and 13,328 private hospitals. Furthermore, there are 394 clinics spread throughout the province. Lack of good healthcare infrastructure is one of the main issues in Papua as of today, especially in the remote regions, as most hospitals that have adequate facilities are only located at major cities and towns.. A measles outbreak and famine killed at least 72 people in Asmat regency in early 2018, during which 652 children were affected by measles and 223 suffered from malnutrition. The most prominent hospital is the Papua Regional General Hospital (Indonesian: Rumah Sakit Umum Daerah Papua) in Jayapura, which is the largest state-owned hospital in the province. Education Education in Papua, as well as Indonesia in a whole, falls under the responsibility of the Ministry of Education and Culture (Kementerian Pendidikan dan Kebudayaan or Kemdikbud) and the Ministry of Religious Affairs (Kementerian Agama or Kemenag). In Indonesia, all citizens must undertake twelve years of compulsory education which consists of six years at elementary level and three each at middle and high school levels. Islamic schools are under the responsibility of the Ministry of Religious Affairs. The Constitution also notes that there are two types of education in Indonesia: formal and non-formal. Formal education is further divided into three levels: primary, secondary and tertiary education. Indonesians are required to attend 12 years of school, which consists of three years of primary school, three years of secondary school and three years of high school. As of 2015, there are 3 public universities and 40 private universities in Papua. Public universities in Papua falls under the responsibility of the Ministry of Research and Technology (Kementerian Riset dan Teknologi) as well as the Ministry of Education and Culture. The most famous university in the province is the Cenderawasih University in Jayapura. The university has faculties in economics, law, teacher training and education, medical, engineering, and social and political science. Until 2002 the university had a faculty of agricultural sciences at Manokwari, which was then separated to form the Universitas Negeri Papua. Demographics While the Papuan branch of the Central Agency on Statistics had earlier projected the 2020 population of the province to be 3,435,430 people the actual Census in 2020 revealed a total population of 4,303,707, spread throughout 28 regencies and 1 administrative city. The city of Jayapura is the most populated administrative division in the province, with a total of 398,478 people in 2020, while Supiori Regency, which comprises mainly the island of Supiori, one of the Schouten Islands within Cenderawasih Bay off the north coast of Papua, is the least populated administrative division in the province, with just 22,547 people. Most of the population in the province are concentrated in coastal regions, especially around the city of Jayapura and its suburbs. Papua is also home to many migrants from other parts of Indonesia, of which an overwhelming percentage of these migrants came as part of a government-sponsored transmigration program. The transmigration program in Papua was only formally halted by President Joko Widodo in June 2015. Ethnicity In contrast to other Indonesian provinces, which are mostly dominated by Austronesian peoples, Papua and West Papua as well as some part of Maluku are home to the Melanesians. The indigenous Papuans which are part of the Melanesians forms the majority of the population in the province. Many believe human habitation on the island dates to as early as 50,000 BC, and first settlement possibly dating back to 60,000 years ago has been proposed. The island of New Guinea is presently populated by almost a thousand different tribal groups and a near-equivalent number of separate languages, which makes it the most linguistically diverse area in the world. Current evidence indicates that the Papuans (who constitute the majority of the island's peoples) are descended from the earliest human inhabitants of New Guinea. These original inhabitants first arrived in New Guinea at a time (either side of the Last Glacial Maximum, approx 21,000 years ago) when the island was connected to the Australian continent via a land bridge, forming the landmass of Sahul. These peoples had made the (shortened) sea-crossing from the islands of Wallacea and Sundaland (the present Malay Archipelago) by at least 40,000 years ago. Notable Papuan tribes include the Asmat people who inhabits the Asmat Swamp as well as some part of the Lorentz National Park in the Asmat Regency. The Asmat inhabit a region on the island's southwestern coast bordering the Arafura Sea, with lands totaling approximately 18,000 km2 (7,336 mi2) and consisting of mangrove, tidal swamp, freshwater swamp, and lowland rainforest. The Dani people who inhabits the Baliem Valley in the highlands, including the town of Wamena and are considered to be one of the most populated tribes of the province. The Marind people of Southern Papua occupies a vast territory, which is situated on either side of the Bian River, from about 20 miles to the east of Merauke, up to the mouth of the Moeli River in the west (between Frederik Hendrik Island and the mainland; east of Yos Sudarso Island, mainly west of the Maro River (a small area goes beyond the Maro at its lower part, including Merauke). The ancestral Austronesian peoples are believed to have arrived considerably later, approximately 3,500 years ago, as part of a gradual seafaring migration from Southeast Asia, possibly originating in Taiwan. Austronesian-speaking peoples colonized many of the offshore islands to the north and east of New Guinea, such as New Ireland and New Britain, with settlements also on the coastal fringes of the main island in places. Human habitation of New Guinea over tens of thousands of years has led to a great deal of diversity, which was further increased by the later arrival of the Austronesians and the more recent history of European and Asian settlement. Papuan is also home to ethnic groups from other part of Indonesia, including the Javanese, Sundanese, Balinese, Batak, etc. Most of these migrants came as part of the transmigration program, which was an initiative of the Dutch colonial government and later continued by the Indonesian government to move landless people from densely populated areas of Indonesia to less populous areas of the country. The program was criticized by human rights activists, claiming that the program is part of "an attempt to wipe out the Papuans in a slow-motion genocide". There is open conflict between migrants, the state, and indigenous groups due to differences in culture—particularly in administration, and cultural topics such as nudity, food and sex. The transmigration program in Papua was stopped in 2015 due to the controversies it had caused. Language Papua, the easternmost region of the Indonesian archipelago, exhibits a very complex linguistic network. The diversity of languages and the situation of multilingualism is very real. There are many language families scattered in this wide area, namely the Austronesian language family and numerous non-Austronesian languages known collectively as Papuan languages. Speakers of different Austronesian languages are found in coastal communities, such as Biak, Wandamen, Waropen and Ma'ya. On the other hand, Papuan languages are spoken in the interior and Central Highlands, starting from the Bird's Head Peninsula in the west to the eastern tip of the island of New Guinea, for example Meybrat, Dani, Ekari, Asmat, Muyu and Sentani language. At this time, research efforts to find out how many indigenous languages in Papua are still being pursued. Important efforts regarding documentation and inventory of languages in Papua have also been carried out by two main agencies, namely SIL International and the Language and Book Development Agency in Jakarta. The results of the research that have been published by the two institutions show that there are differences in the number of regional languages in Papua. The Language and Book Development Agency as the official Indonesian government agency has announced or published that there are 207 different regional languages in Papua, while SIL International has stated that there are 271 regional languages in the region. Some of the regional languages of Papua are spoken by a large number of speakers and a wide spread area, some are supported by a small number of speakers and are scattered in a limited environment. However, until now it is estimated that there are still a number of regional languages in Papua that have not been properly studied so that it is not known what the form of the language is. In addition to local languages that have been listed by the two main institutions above, there are also dozens more languages from other islands due to population migration that is not included in the list of local languages in Papua, for example languages from Sulawesi (Bugis, Makassar, Toraja, Minahasa), Javanese from Java, and local languages from Maluku. So-called Papuan languages comprise hundreds of different languages, most of which are not related. As in other provinces, Indonesian is the official language of the state, as well as the province. Indonesian is used in inter-ethnic communication, usually between native Papuans and non-Papuan migrants who came from other parts of Indonesia. Most formal education, and nearly all national mass media, governance, administration, judiciary, and other forms of communication in Papua, are conducted in Indonesian. A Malay-based creole language called Papuan Malay is used as the lingua franca in the province. It emerged as a contact language among tribes in Indonesian New Guinea for trading and daily communication. Nowadays, it has a growing number of native speakers. More recently, the vernacular of Indonesian Papuans has been influenced by Standard Indonesian, the national standard dialect. Some linguists have suggested that Papuan Malay has its roots in North Moluccan Malay, as evidenced by the number of Ternate loanwords in its lexicon. Others have proposed that it is derived from Ambonese Malay. A large number of local languages are spoken in the province, and the need for a common lingua franca has been underlined by the centuries-old traditions of inter-group interaction in the form of slave-hunting, adoption, and intermarriage. It is likely that Malay was first introduced by the Biak people, who had contacts with the Sultanate of Tidore, and later, in the 19th century, by traders from China and South Sulawesi. However, Malay was probably not widespread until the adoption of the language by the Dutch missionaries who arrived in the early 20th century and were then followed in this practice by the Dutch administrators. The spread of Malay into the more distant areas was further facilitated by the ('Education for village teacher') program during the Dutch colonial era. There are four varieties of Papuan Malay that can be identified, including Serui Malay. A variety of Papuan Malay is spoken in Vanimo, Papua New Guinea near the Indonesian border. Religion According to the 2018 national census, 84.42% of the Papuans identified themselves as Christians, with 69.02% being Protestants and 15.4% being Catholics. 15.29% of the population are Muslims and less than 1% were Buddhists or Hindus. There is also substantial practice of animism, the traditional religion for many Papuans, with many blending animistic beliefs with other religions such as Christianity. Christianity, including Protestantism and Roman Catholic are mostly adhered by native Papuans and migrants from Maluku, East Nusa Tenggara and North Sulawesi. Islam are mostly adhered by migrants from western Indonesia, some Moluccans and some native Papuans. Lastly Hinduism and Buddhism are mostly adhered by Balinese migrants and Chinese-Indonesians respectively. Missionaries Carl Ottow and Johann Geisler, under the initiative of Ottho Gerhard Heldring and permission from Tidore Sultanate, are the first Christian missionaries that reached Papua. They entered Papua at Mansinam Island, near Manokwari on 5 February 1855. Since 2001, the fifth of February has been a Papuan public holiday, recognizing this first landing. In 1863, sponsored by the Dutch colonial government, the Utrecht Mission Society (UZV) started a Christian-based education system as well as regular church services in Western New Guinea. Initially the Papuans' attendance was encouraged using bribes of betel nut and tobacco, but subsequently this was stopped. In addition, slaves were bought to be raised as step children and then freed. By 1880, only 20 Papuans had been baptized, including many freed slaves. The Dutch government established posts in Netherlands New Guinea in 1898, a move welcomed by the missionaries, who saw orderly Dutch rule as the essential antidote to Papua paganism. Subsequently, the UZV mission had more success, with a mass conversion near Cenderawasih Bay in 1907 and the evangelization of the Sentani people by Pamai, a native Papuan in the late 1920s. Due to the Great Depression, the mission suffered a funding shortfall, and switched to native evangelists, who had the advantage of speaking the local language (rather than Malay), but were often poorly trained. The mission extended in the 1930s to Yos Sudarso Bay, and the UZV mission by 1934 had over 50,000 Christians, 90% of them in North Papua, the remainder in West Papua. By 1942 the mission had expanded to 300 schools in 300 congregations. The first Catholic presence in Papua was in Fakfak, a Jesuit mission in 1894. In 1902 the Vicariate of Netherlands New Guinea was established. Despite the earlier activity in Fakfak, the Dutch restricted the Catholic Church to the southern part of the island, where they were active especially around Merauke. The mission campaigned against promiscuity and the destructive practices of headhunting among the Marind-anim. Following the 1918 flu pandemic, which killed one in five in the area, the Dutch government agreed to the establishment of model villages, based on European conditions, including wearing European clothes, but which the people would submit to only by violence. In 1925 the Catholics sought to re-establish their mission in Fakfak; permission was granted in 1927. This brought the Catholics into conflict with the Protestants in North Papua, who suggested expanding to South Papua in retaliation. Culture The native Papuan people has a distinct culture and traditions that cannot be found in other parts of Indonesia. Coastal Papuans are usually more willing to accept modern influence into their daily lives, which in turn diminishes their original culture and traditions. Meanwhile, most inland Papuans still preserves their original culture and traditions, although their way of life over the past century are tied to the encroachment of modernity and globalization. Each Papuan tribe usually practices their own tradition and culture, which may differ greatly from one tribe to another. One of the most well-known Papuan tradition is the stone burning tradition (Indonesian: Tradisi Bakar Batu), which is practiced by most Papuan tribes in the province. The stone burning tradition is an important tradition for all indigenous Papuans. For them, is a form of gratitude and a gathering place between residents of the village. This tradition is usually held when there are births, traditional marriages, the coronation of tribal chiefs, and the gathering of soldiers. It is usually carried out by indigenous Papuan people who live in the interior, such as in the Baliem Valley, Panaiai, Nabire, Pegunungan Bintang, and others. other. The name of this tradition varies in each region. In Paniai, the stone burning tradition is called Gapiia. Meanwhile, in Wamena it is called Kit Oba Isogoa, while in Jayawijaya it is called Barapen. It is called the stone burning tradition because the stone is actually burned until it is hot. The function of the hot stone is to cook meat, Sweet potatoes, and vegetables on the basis of banana leaves which will be eaten by all residents at the ongoing event. In some remote Papuan communities who are Muslim or when welcoming Muslim guests, pork can be replaced with chicken or beef or mutton or can be cooked separately with pork. This is, for example, practiced by the Walesi community in Jayawijaya Regency to welcome the holy month of Ramadan. The finger cutting tradition (Indonesian: Tradisi Potong Jari) is practiced among the Dani people of the Baliem Valley in central Papua. The tradition of cutting fingers on the Dani people has existed since ancient times and is still being carried out today. This tradition symbolizes harmony, unity, and strength that comes from within a person and within a family. According to the culture of the Dani people, family is the most valuable pedestal that a human has, fingers are believed to symbolize the existence and function of a family itself. So that the tradition of cutting is carried out when someone loses a family member or relative such as husband, wife, children, younger siblings and older siblings forever. For Dani people, sadness and grief due to adversity and the loss of a family member are not only appreciated by crying, but also cutting fingers. The Dani people believes that cutting off a finger is a symbol of the sadness and pain of losing a family member. The finger-cutting tradition is also seen as a way to prevent the recurrence of a catastrophe that claimed the life of a grieving family member. The Ararem tradition is the tradition of delivering the dowry of a future husband to the family of the prospective wife in the Biak custom. In the Biak language, the word "Ararem" means dowry. In this procession, the bride and groom will be escorted on foot in a procession, accompanied by songs and dances accompanied by music and. The amount of the dowry is determined by the woman's family as agreed by her relatives. The date of submission of the dowry must be agreed upon by the family of the woman or the family of the prospective wife and the family of the man or family of the prospective husband. In the tradition of the Biak people, the payment of the dowry is a tradition that must be obeyed because it involves the consequences of a marriage. Arts and Performance There are a lot of traditional dances that are native to the province of Papua. Each Papuan tribes would usually have their own unique traditional dances. The Yospan dance (Indonesian: Tarian Yospan) is a type of social association dance in Papua which is a traditional dance originating from the coastal regions of Papua, namely Biak, Yapen and Waropen, which are often played by the younger people as a form of friendship. Initially, the Yospan dance originated from two dances called Yosim and Pancar, which were eventually combined into one. Hence, Yospan is an acronym of Yosim and Pancar. When performing the Yosim dance, which originated from Yapen and Waropen, the dancers invited other residents to be immersed in the songs sung by a group of singers and music instrument holders. The musical instruments used are simple, which consists of ukulele and guitar, musical instruments that are not native to Papua. There is also a tool that functions as a bass with three ropes. The rope is usually made from rolled fibers, a type of pandanus leaf, which can be found in the forests of the coastal areas of Papua. A music instrument called Kalabasa is also played during the dance, it is made of dried pumpkin, then filled with beads or small stones that are played by simply shaking it. The women dancers wear woven sarongs to cover their chests, decorative heads with flowers and bird feathers. Meanwhile, the male dancers would usually wear shorts, open chest, head also decorated with bird feathers. The Pancar dance that originated from Biak is only accompanied by a tifa, which is the traditional musical instrument of the coastal tribes in Papua. The Isosolo dance is a type of dance performed by the inhabitants who lives around Lake Sentani in Jayapura. The Isosolo dance is performed to symbolize the harmony between different tribes in Papua. The art of boat dancing is a tradition of the Papuan people, especially among the Sentani people, where the dance is performed from one village to another. According to the Sentani language, Isosolo or Isolo dance is a traditional art of the Sentani people who dance on a boat on Lake Sentani. The word Isosolo consists of two words, iso and solo (or holo). Iso means to rejoice and dance to express feelings of the heart, while holo means a group or herd from all age groups who dance. Hence, isosolo means a group of people who dance with joy to express their feelings. The Isosolo dance in Sentani is usually performed by ondofolo (traditional leaders) and the village community to present a gift to other ondofolo. Items that are offered are items that are considered valuable, such as large wild boar, garden products, delivering ondofolo girls to be married, and several other traditional gifts. However, at this time, apart from being a form of respect for ondoafi, isosolo is considered more as a performance of the Sentani people's pride which is one of the popular attractions at the Lake Sentani Festival, which is held annually. Each Papuan tribe usually has their own war dance. The Papuan war dance is one of the oldest dances of the Papuan people because this classical dance has been around for thousands of years and is even one of the legacies of Indonesia's prehistoric times. In Papuan culture, this dance is a symbol of how strong and brave the Papuan people are. Allegedly, this dance was once a part of traditional ceremonies when fighting other tribes. The dancers who perform this dance are a group of men, the number starts from seven people or more. They danced to the sound of drums and war songs. Their movements were characteristically excited as if they were warriors heading for battle. The Papuan war dance is very unique, varied and energetic to indicate the heroism and courage of the Papuan people. Apart from the dancers movements in playing the weapons they carry, the uniqueness of this dance is also seen in the dancers' clothes. Another traditional dance that is common to most if not all Papuan tribes is called musyoh. The emergence of the musyoh dance is based on a certain history. In ancient times, when a Papuan tribe member died due to an accident or something unexpected, the Papuan people believed that the spirit of the person who died was still roaming and unsettled. To overcome this, the Papuan tribesmen created a ritual in the form of the musyoh dance. Thus, this traditional dance is often referred to as a spirit exorcism dance. Generally, the musyoh dance is performed by men. However, besides the purpose of exorcising spirits, the musyoh dance is also used by the Papuan people for another purpose, such as welcoming guests. The musyoh dance is a symbol of respect, gratitude, and an expression of happiness in welcoming guests. If it is for the purpose of expelling the spirit, this musyoh dance is performed by men. In the case for welcoming guests, this dance is performed by men and women. The costumes worn by the dancers can be said to be very simple costumes. This simplicity can be seen from its very natural ingredients, namely processed tree bark and plant roots. The material is then used as a head covering, tops and bottoms, bracelets and necklaces. There are also unique scribbles on the dancers' bodies that show the uniqueness of the dance. Architecture Papua is famous for its varieties of traditional houses, one of which is a traditional house called honai. Honai is a traditional Papuan house, especially in the mountainous region. The basic shape of the honai is a circle with a wooden frame and woven walls and a conical roof made of straw. The honai is spread across almost all corners of the Baliem Valley which covers an area of 1,200 square kilometers. The distance from the surface of the house to the ceiling is only about 1 meter. Within the honai, there is a fireplace which is located right in the middle. The thatched roof and wooden walls of the Honai actually bring cool air inside If the air is too cold, the whole house will be warmed by the smoke from the fireplace. For the Dani people, smoke from firewood is no longer unusual for being smoked for a long time. As long as the door is still open, oxygen can still flow inside. The honai is supported by 4 main poles called heseke, which are stuck in the ground at a certain distance (about 1 meter) so that they are square. In the middle of this main pillar is placed a fireplace called a round wulikin. An honai is made in an attic so that it is divided into two rooms, at the top it is called henaepu as a bed and the bottom is called agarowa as a place to rest, tell stories or chat, and eat. The upper part of the attic or floor is made of fruit wood and covered with woven lokop wood (a kind of very small bamboo) and can be covered again with straw or dry grass. There is usually only one door in the honai, which is small and short so that people come out and enter on all fours. To the left or right of the entrance is a door leading to the attic. The kariwari is one of the traditional Papuan houses, more precisely the traditional house of the Tobati-Enggros people who live around Yotefa Bay and Lake Sentani near Jayapura. Unlike other forms of Papuan traditional houses, such as the round honai, the kariwari is usually constructed in the shape of an octagonal pyramid. Kariwari are usually made of, bamboo, iron wood and forest sago leaves. The Kariwari house consists of two floors and three rooms or three rooms, each with different functions. The kariwari is not like a honai that can be lived in by anyone, it cannot even be the residence of a tribal chief – unlike the honai which has political and legal functions. The kariwari is more specific as a place of education and worship, therefore the position of the Kariwari in the community of the Tobati-Enggros people is considered a sacred and holy place. Like traditional houses in general, the kariwari also has a design that is full of decorative details that make it unique, of course, the decorations are related to Papuan culture. especially from the Tobati-Enggros. The decorations found in the kariwari are usually in the form of works of art, among others; paintings, carvings and also sculptures. Apart from being decorated with works of art, the kariwari is also decorated with various weapons, such as; bow and arrow. There are also some skeletons of prey animals, usually in the form of wild boar fangs, kangaroo skeletons, turtle or turtle shells, birds-of-paradise, and so on. Rumsram is the traditional house of the Biak Numfor people on the northern coast of Papua. This house was originally intended for men, while women were prohibited from entering or approaching it. Its function is similar to the kariwari, namely as a place for activities in teaching and educating men who are starting to be teenagers, in seeking life experiences. The building is square with a roof in the shape of an upside down boat because of the background of the Biak Numfor tribe who work as sailors. The materials used are bark for floors, split and chopped water bamboo for walls, while the roof is made of dried sago leaves. The walls are made of sago leaves. The original rumsram wall only had a few windows and its position was at the front and back. A rumsram usually has a height of approximately 6–8 m and is divided into two parts, differentiated by floor levels. The first floor is open and without walls. Only the building columns were visible. In this place, men are educated to learn sculpting, shielding, boat building, and war techniques. In a traditional ceremony called Wor Kapanaknik, which in the Biak language means "to shave a child's hair", a traditional ritual is usually carried out when boys are 6–8 years old. The age when a child is considered to be able to think and the child has started to get education in the search for life experiences, as well as how to become a strong and responsible man as the head of the family later. The children would then enter a rumsram, hence the rite of passage is also called rumsram, because the ritual are carried out in the rumsram. The Korowai people from the Mappi Regency in southern Papua is one of the indigenous tribes in Papua that still adheres to the traditions of their ancestors, one of which is to build houses on top of trees. The Korowai people is one of the indigenous tribes in the interior of Papua that still maintains firmly the traditions of their ancestors, one of which is to build a house on a tall tree called Rumah Tinggi (lit. 'high house'). Some of the Korowai people's tree houses can even reach a height of 50 m above the ground. The Korowai people builds houses on top of trees to avoid wild animals and evil spirits. The Korowai people still believes in the myth of Laleo, a cruel demon who often attacks suddenly. Laleo is depicted as an undead that roams at night. According to the Korowai people, the higher the house, the safer it will be from Laleo's attacks. The rumah tinggi is built on big and sturdy trees as the foundation for its foundation. The tops of the trees are then deforested and used as houses. All materials come from nature, logs and boards are used for the roof and floor, while the walls are made of sago bark and wide leaves. The building process for a rumah tinggi usually takes seven days and lasts up to three years. Traditional Weapon The cuscus bone skewer is a traditional Papuan weapon used by one of the indigenous Papuan tribes, namely the Bauzi people. The Bauzi people still maintains their tradition of hunting and gathering. The weapon they use to hunt animals while waiting for the harvest to arrive is a piercing tool made of cuscus bones. The use of cuscus bones as a traditional weapon is very environmentally friendly. This happens because in its manufacture, it does not require the help of industrial equipment that pollutes the environment. This traditional weapon is made from cleaned cuscus bone (before the meat is eaten and separated from the bone), sharpened by rubbing it with a whetstone, and repeated so that the desired sharpness is formed. Papuan knife blades are usually used for slashing or cutting when hunting animals in the forest. Even though the animals they face are large mammals and crocodiles, the Papuan people still adhere to prevailing customs. The custom is that it is not permissible to use any kind of firearm when hunting. Papuan Daggers are knives made of unique materials and are difficult to obtain in other areas, namely the bones of an endemic animal to Papua, the cassowary. Cassowary bones are used by local culture to become a tool that has beneficial values for life. Apart from that, the feathers attached to the blade's handle are also the feathers of the cassowary. The Papuan spear is referred to by the local community as "Tul". The spear was a weapon that could be used for both fighting and hunting. In addition, Papuan culture often uses the spear as a property in dances. The weapons mentioned above are made from basic materials that are easily found in nature. Wood to make the handle, and a river stone that was sharpened as a spearhead. For that reason, the spear is able to survive as a weapon that must be present in hunting and fighting activities. What makes this traditional Papuan weapon feel special is that there is a rule not to use a spear other than for hunting and fighting purposes. For example, it is forbidden to cut young tree shoots with a spear, or to use a spear to carry garden produce. If this rule was broken, the person who wielded this spear would have bad luck. Meanwhile, in the manufacturing process, this spear frame takes a long time. Starting from the wood taken from the tree, then cut to the size of 3 m in a state that has been dried in the sun. After drying it in the sun, the wood for the handle is shaped in such a way, then rubbed with sea snail powder until it is sharp, which takes about 1 week. In traditional Papuan customs, the spear is interpreted as a symbol of a man's prowess. Therefore, the spears must always be properly stored. Usually hung from the ceiling or placed on a house wall support. The bow and arrow is a traditional Papuan weapon that has uses for hunting wild boar and other animals. In addition, the Papuan bow and arrow were tools that were always carried side by side with the spear. Another use of the arrow is a tool for warfare. The difference lies in the material used in the arrowheads. If the aim is to hunt animals, then the arrowheads used are made of bamboo. Meanwhile, when going to war, the indigenous tribes in Papua have rules that require that the spearhead used is made of animal bones. In addition, arrows also function as property for home decoration in several areas in Papua, including Jayapura, Wamena, and Kurulu. In these areas, arrows are only intended for house collections. The collection of bows and arrows is also not allowed to be placed carelessly, that is, they are placed on the wall of the house to still respect the culture of the services of the arrow. The Papuan parang is a symbol of the strength and tenacity of a man in the household. Parang by the local community is called by the name "jalowy". In the manufacturing process, this Papuan machete takes a lot of time. Derived from a split stone, then sharpened to form a machete that has sharpness. To increase the level of hardness and durability, machete craftsmen always add pork oil and pork blood before sharpening it until it is smooth and sharp. This Papuan parang basically has many uses. For household purposes, namely cooking, cutting meat, and cutting down sago. In addition, Papuan machetes are also used in the agricultural industry, and can even be used as a tool to propose to a potential partner. Furthermore, parang can also be used as a collection. Papuan Chisels are traditional Papuan weapons that have various uses, such as cutting rattan for weaving, tools for punching holes in wood, as well as emergency tools for stabbing enemies in the event of war. However, most of their functions have now shifted to tools used in the carpentry field. Historically, in ancient times a chisel was a tool used to trim the fingers of a dead family member. Unfortunately, this culture has been banned by the government and can only be used as a tool in industry. The chisel-making process is not complicated. All it takes is carefulness so as not to rub the edges too thin. To add comfort when worn, craftsmen usually add thin wooden twists. Music and handicrafts Tifa is a traditional Papuan musical instrument that is played by beating. Unlike those from Maluku, this musical instrument from Papua is usually longer and has a handle on one part of the instrument. Meanwhile, the tifa from Maluku has a wide size and there is no handle on the side. The material used also comes from the strongest wood, usually the type of Lenggua wood (Pterocarpus indicus) with animal skin as the upper membrane. The animal's skin is tied with rattan in a circle so that it is tight and can produce a beautiful sound. In addition, on the body part of the musical instrument there is a typical Papuan carving. Tifa is usually used to accompany guest welcoming events, traditional parties, dances, etc. The size of the sound that comes out of the drum depends on the size of the instrument. Apart from being a means of accompanying the dance, the tifa also has a social meaning based on the function and shape of the carved ornaments on the body of the tifa. In the culture of the Marind-Anim people in Merauke, each clan has its own shape and motif as well as a name for each tifa. The same goes for the Biak and Waropen people. Pikon is a traditional wind instrument typical of the Hubala tribe of the Dani people inhabiting the Baliem Valley which is made of bamboo. Pikon comes from the word Pikonane in the Dani languages, which means a sound musical instrument. The icon is oval-shaped. Pikon is made of bamboo, in which a vibrating stick is attached with a rope in the middle, so that it is able to produce a variety of sounds. This musical instrument is generally played by men in the Dani people. They play pikon as a fatigue reliever, even though the resulting sound tends not to be melodious because it is just like the sound of birds chirping without tone. However, with the development of the times, now the sounds made by Pikon can be heard as do, mi and sol tones. Pikon is also played in the Baliem Jayawijaya Valley Cultural Festival commemorating Indonesia's Independence Day. The length of the picon in general is 5.2 cm. The way to play pikon is to blow the center of the bamboo that has been given a hole while pulling the rope that joins the stick. Pikon can also be formed using a hite, which is the bark of an arrow. The triton is a traditional Papuan musical instrument that is played by blowing it. This musical instrument is found throughout the coast, especially in the Biak, Yapen, Waropen and Nabire. Initially, this tool was
|
SMPTE Interplanetary magnetic field, in space Intramuscular fat, in anatomy Other uses International Myeloma Foundation, a non-profit serving patients with a cancer of plasma cells in the bone marrow International Metalworkers' Federation, a global union federation Internationale Maifestspiele Wiesbaden, International May Festival Fédération Internationale de
|
Impossible television and film series International Music Feed, a music video television network Internationale Medien und Film, see Intermedia (company) Science and technology Immunofluorescence Labeling, a method used in immunology and cytology Individual Master File, the system used by the IRS to process tax transactions Inframammary fold, in anatomy Intern in Marriage and Family Therapy Initial mass function, in stellar astronomy Intelligent Message Filter, a Microsoft
|
the study of interdisciplinarity, which involves a much smaller group of researchers. The former is instantiated in thousands of research centers across the US and the world. The latter has one US organization, the Association for Interdisciplinary Studies (founded in 1979), two international organizations, the International Network of Inter- and Transdisciplinarity (founded in 2010) and the Philosophy of/as Interdisciplinarity Network (founded in 2009), and one research institute devoted to the theory and practice of interdisciplinarity, the Center for the Study of Interdisciplinarity at the University of North Texas (founded in 2008). As of 1 September 2014, the Center for the Study of Interdisciplinarity has ceased to exist. This is the result of administrative decisions at the University of North Texas. An interdisciplinary study is an academic program or process seeking to synthesize broad perspectives, knowledge, skills, interconnections, and epistemology in an educational setting. Interdisciplinary programs may be founded in order to facilitate the study of subjects which have some coherence, but which cannot be adequately understood from a single disciplinary perspective (for example, women's studies or medieval studies). More rarely, and at a more advanced level, interdisciplinarity may itself become the focus of study, in a critique of institutionalized disciplines' ways of segmenting knowledge. In contrast, studies of interdisciplinarity raise to self-consciousness questions about how interdisciplinarity works, the nature and history of disciplinarity, and the future of knowledge in post-industrial society. Researchers at the Center for the Study of Interdisciplinarity have made the distinction between philosophy 'of' and 'as' interdisciplinarity, the former identifying a new, discrete area within philosophy that raises epistemological and metaphysical questions about the status of interdisciplinary thinking, with the latter pointing toward a philosophical practice that is sometimes called 'field philosophy'. Perhaps the most common complaint regarding interdisciplinary programs, by supporters and detractors alike, is the lack of synthesis—that is, students are provided with multiple disciplinary perspectives, but are not given effective guidance in resolving the conflicts and achieving a coherent view of the subject. Others have argued that the very idea of synthesis or integration of disciplines presupposes questionable politico-epistemic commitments. Critics of interdisciplinary programs feel that the ambition is simply unrealistic, given the knowledge and intellectual maturity of all but the exceptional undergraduate; some defenders concede the difficulty, but insist that cultivating interdisciplinarity as a habit of mind, even at that level, is both possible and essential to the education of informed and engaged citizens and leaders capable of analyzing, evaluating, and synthesizing information from multiple sources in order to render reasoned decisions. While much has been written on the philosophy and promise of interdisciplinarity in academic programs and professional practice, social scientists are increasingly interrogating academic discourses on interdisciplinarity, as well as how interdisciplinarity actually works—and does not—in practice. Some have shown, for example, that some interdisciplinary enterprises that aim to serve society can produce deleterious outcomes for which no one can be held to account. Politics of interdisciplinary studies Since 1998, there has been an ascendancy in the value of interdisciplinary research and teaching and a growth in the number of bachelor's degrees awarded at U.S. universities classified as multi- or interdisciplinary studies. The number of interdisciplinary bachelor's degrees awarded annually rose from 7,000 in 1973 to 30,000 a year by 2005 according to data from the National Center of Educational Statistics (NECS). In addition, educational leaders from the Boyer Commission to Carnegie's President Vartan Gregorian to Alan I. Leshner, CEO of the American Association for the Advancement of Science have advocated for interdisciplinary rather than disciplinary approaches to problem-solving in the 21st century. This has been echoed by federal funding agencies, particularly the National Institutes of Health under the direction of Elias Zerhouni, who has advocated that grant proposals be framed more as interdisciplinary collaborative projects than single-researcher, single-discipline ones. At the same time, many thriving longstanding bachelor's in interdisciplinary studies programs in existence for 30 or more years, have been closed down, in spite of healthy enrollment. Examples include Arizona International (formerly part of the University of Arizona), the School of Interdisciplinary Studies at Miami University, and the Department of Interdisciplinary Studies at Wayne State University; others such as the Department of Interdisciplinary Studies at Appalachian State University, and George Mason University's New Century College, have been cut back. Stuart Henry has seen this trend as part of the hegemony of the disciplines in their attempt to recolonize the experimental knowledge production of otherwise marginalized fields of inquiry. This is due to threat perceptions seemingly based on the ascendancy of interdisciplinary studies against traditional academia. Historical examples There are many examples of when a particular idea, almost on the same period, arises in different disciplines. One case is the shift from the approach of focusing on "specialized segments of attention" (adopting one particular perspective), to the idea of "instant sensory awareness of the whole", an attention to the "total field", a "sense of the whole pattern, of form and function as a unity", an "integral idea of structure and configuration". This has happened in painting (with cubism), physics, poetry, communication and educational theory. According to Marshall McLuhan, this paradigm shift was due to the passage from an era shaped by mechanization, which brought sequentiality, to the era shaped by the instant speed of electricity, which brought simultaneity. Efforts to simplify and defend the concept An article in the Social Science Journal attempts to provide a simple, common-sense, definition of interdisciplinarity, bypassing the difficulties of defining that concept and obviating the need for such related concepts as transdisciplinarity, pluridisciplinarity, and multidisciplinary: In turn, interdisciplinary richness of any two instances of knowledge, research, or education can be ranked by weighing four variables: number of disciplines involved, the "distance" between them, the novelty of any particular combination, and their extent of integration. Interdisciplinary knowledge and research are important because: "Creativity often requires interdisciplinary knowledge. Immigrants often make important contributions to their new field. Disciplinarians often commit errors which can be best detected by people familiar with two or more disciplines. Some worthwhile topics of research fall in the interstices among the traditional disciplines. Many intellectual, social, and practical problems require interdisciplinary approaches. Interdisciplinary knowledge and research serve to remind us of the unity-of-knowledge ideal. Interdisciplinarians enjoy greater flexibility in their research. More so than narrow disciplinarians, interdisciplinarians often treat themselves to the intellectual equivalent of traveling in new lands. Interdisciplinarians may help breach communication gaps in the modern academy, thereby helping to mobilize its enormous intellectual resources in the cause of greater social rationality and justice. By bridging fragmented disciplines, interdisciplinarians might play a role in the defense of academic freedom." Quotations See also Commensurability (philosophy of science) Domon group Encyclopedism Holism Holism in science Integrative learning Interdiscipline Interdisciplinary arts Interdisciplinary teaching Interprofessional education Methodology Polymath Science of team science Social ecological model Science and technology studies (STS) Synoptic philosophy Systems theory Thematic learning Periodic table of human sciences
|
interdisciplinarians may be seen in complementary relation to one another. Barriers Because most participants in interdisciplinary ventures were trained in traditional disciplines, they must learn to appreciate differences of perspectives and methods. For example, a discipline that places more emphasis on quantitative rigor may produce practitioners who are more scientific in their training than others; in turn, colleagues in "softer" disciplines who may associate quantitative approaches with difficulty grasp the broader dimensions of a problem and lower rigor in theoretical and qualitative argumentation. An interdisciplinary program may not succeed if its members remain stuck in their disciplines (and in disciplinary attitudes). Those who lack experience in interdisciplinary collaborations may also not fully appreciate the intellectual contribution of colleagues from those discipline. From the disciplinary perspective, however, much interdisciplinary work may be seen as "soft", lacking in rigor, or ideologically motivated; these beliefs place barriers in the career paths of those who choose interdisciplinary work. For example, interdisciplinary grant applications are often refereed by peer reviewers drawn from established disciplines; not surprisingly, interdisciplinary researchers may experience difficulty getting funding for their research. In addition, untenured researchers know that, when they seek promotion and tenure, it is likely that some of the evaluators will lack commitment to interdisciplinarity. They may fear that making a commitment to interdisciplinary research will increase the risk of being denied tenure. Interdisciplinary programs may also fail if they are not given sufficient autonomy. For example, interdisciplinary faculty are usually recruited to a joint appointment, with responsibilities in both an interdisciplinary program (such as women's studies) and a traditional discipline (such as history). If the traditional discipline makes the tenure decisions, new interdisciplinary faculty will be hesitant to commit themselves fully to interdisciplinary work. Other barriers include the generally disciplinary orientation of most scholarly journals, leading to the perception, if not the fact, that interdisciplinary research is hard to publish. In addition, since traditional budgetary practices at most universities channel resources through the disciplines, it becomes difficult to account for a given scholar or teacher's salary and time. During periods of budgetary contraction, the natural tendency to serve the primary constituency (i.e., students majoring in the traditional discipline) makes resources scarce for teaching and research comparatively far from the center of the discipline as traditionally understood. For these same reasons, the introduction of new interdisciplinary programs is often resisted because it is perceived as a competition for diminishing funds. Due to these and other barriers, interdisciplinary research areas are strongly motivated to become disciplines themselves. If they succeed, they can establish their own research funding programs and make their own tenure and promotion decisions. In so doing, they lower the risk of entry. Examples of former interdisciplinary research areas that have become disciplines, many of them named for their parent disciplines, include neuroscience, cybernetics, biochemistry and biomedical engineering. These new fields are occasionally referred to as "interdisciplines". On the other hand, even though interdisciplinary activities are now a focus of attention for institutions promoting learning and teaching, as well as organizational and social entities concerned with education, they are practically facing complex barriers, serious challenges and criticism. The most important obstacles and challenges faced by interdisciplinary activities in the past two decades can be divided into "professional", "organizational", and "cultural" obstacles. Interdisciplinary studies and studies of interdisciplinarity An initial distinction should be made between interdisciplinary studies, which can be found spread across the academy today, and the study of interdisciplinarity, which involves a much smaller group of researchers. The former is instantiated in thousands of research centers across the US and the world. The latter has one US organization, the Association for Interdisciplinary Studies (founded in 1979), two international organizations, the International Network of Inter- and Transdisciplinarity (founded in 2010) and the Philosophy of/as Interdisciplinarity Network (founded in 2009), and one research institute devoted to the theory and practice of interdisciplinarity, the Center for the Study of Interdisciplinarity at the University of North Texas (founded in 2008). As of 1 September 2014, the Center for the Study of Interdisciplinarity has ceased to exist. This is the result of administrative decisions at the University of North Texas. An interdisciplinary study is an academic program or process seeking to synthesize broad perspectives, knowledge, skills, interconnections, and epistemology in an educational setting. Interdisciplinary programs may be founded in order to facilitate the study of subjects which have some coherence, but which cannot be adequately understood from a single disciplinary perspective (for example, women's studies or medieval studies). More rarely, and at a more advanced level, interdisciplinarity may itself become the focus of study, in a critique of institutionalized disciplines' ways of segmenting knowledge. In contrast, studies of interdisciplinarity raise to self-consciousness questions about how interdisciplinarity works, the nature and history of disciplinarity, and the future of knowledge in post-industrial society. Researchers at the Center for the Study of Interdisciplinarity have made the distinction between philosophy 'of' and 'as' interdisciplinarity, the former identifying a new, discrete area within philosophy that raises epistemological and metaphysical questions about the status of interdisciplinary thinking, with the latter pointing toward a philosophical practice that is sometimes called 'field philosophy'. Perhaps the most common complaint regarding interdisciplinary programs, by supporters and detractors alike, is the lack of synthesis—that is, students are provided with multiple disciplinary perspectives, but are not given effective guidance in resolving the conflicts and achieving a coherent view of the subject. Others have argued that the very idea of synthesis or integration of disciplines presupposes
|
smallest element in the unsorted portion of the list, while insertion sort requires only a single comparison when the (k + 1)-st element is greater than the k-th element; when this is frequently true (such as if the input array is already sorted or partially sorted), insertion sort is distinctly more efficient compared to selection sort. On average (assuming the rank of the (k + 1)-st element rank is random), insertion sort will require comparing and shifting half of the previous k elements, meaning that insertion sort will perform about half as many comparisons as selection sort on average. In the worst case for insertion sort (when the input array is reverse-sorted), insertion sort performs just as many comparisons as selection sort. However, a disadvantage of insertion sort over selection sort is that it requires more writes due to the fact that, on each iteration, inserting the (k + 1)-st element into the sorted portion of the array requires many element swaps to shift all of the following elements, while only a single swap is required for each iteration of selection sort. In general, insertion sort will write to the array O(n2) times, whereas selection sort will write only O() times. For this reason selection sort may be preferable in cases where writing to memory is significantly more expensive than reading, such as with EEPROM or flash memory. While some divide-and-conquer algorithms such as quicksort and mergesort outperform insertion sort for larger arrays, non-recursive sorting algorithms such as insertion sort or selection sort are generally faster for very small arrays (the exact size varies by environment and implementation, but is typically between 7 and 50 elements). Therefore, a useful optimization in the implementation of those algorithms is a hybrid approach, using the simpler algorithm when the array has been divided to a small size. Variants D.L. Shell made substantial improvements to the algorithm; the modified version is called Shell sort. The sorting algorithm compares elements separated by a distance that decreases on each pass. Shell sort has distinctly improved running times in practical work, with two simple variants requiring O(n3/2) and O(n4/3) running time. If the cost of comparisons exceeds the cost of swaps, as is the case for example with string keys stored by reference or with human interaction (such as choosing one of a pair displayed side-by-side), then using binary insertion sort may yield better performance. Binary insertion sort employs a binary search to determine the correct location to insert new elements, and therefore performs ⌈log2 n⌉ comparisons in the worst case. When each element in the array is searched for and inserted this is O(n log n). The algorithm as a whole still has a running time of O(n2) on average because of the series of swaps required for each insertion. The number of swaps can be reduced by calculating the position of multiple elements before moving them. For example, if the target position of two elements is calculated before they are moved into the proper position, the number of swaps can be reduced by about 25% for random data. In the extreme case, this variant works similar to merge sort. A variant named binary merge sort uses a binary insertion sort to sort groups of 32 elements, followed by a final sort using merge sort. It combines the speed of insertion sort on small data sets with the speed of merge sort on large data sets. To avoid having to make a series of swaps for each insertion, the input could be stored in a linked list, which allows elements to be spliced into or out of the list in constant time when the position in the list is known. However, searching a linked list requires sequentially following the links to the desired position: a linked list does not have random access, so it cannot use a faster method such as binary search. Therefore, the running time required for searching is O(n), and the
|
A[j-1] > A[j] (i.e. accessing A[-1] fails). After expanding the swap operation in-place as x ← A[j]; A[j] ← A[j-1]; A[j-1] ← x (where x is a temporary variable), a slightly faster version can be produced that moves A[i] to its position in one go and only performs one assignment in the inner loop body: i ← 1 while i < length(A) x ← A[i] j ← i - 1 while j >= 0 and A[j] > x A[j+1] ← A[j] j ← j - 1 end while A[j+1] ← x i ← i + 1 end while The new inner loop shifts elements to the right to clear a spot for x = A[i]. The algorithm can also be implemented in a recursive way. The recursion just replaces the outer loop, calling itself and storing successively smaller values of n on the stack until n equals 0, where the function then returns up the call chain to execute the code after each recursive call starting with n equal to 1, with n increasing by 1 as each instance of the function returns to the prior instance. The initial call would be insertionSortR(A, length(A)-1). function insertionSortR(array A, int n) if n > 0 insertionSortR(A, n-1) x ← A[n] j ← n-1 while j >= 0 and A[j] > x A[j+1] ← A[j] j ← j-1 end while A[j+1] ← x end if end function It does not make the code any shorter, it also doesn't reduce the execution time, but it increases the additional memory consumption from to (at the deepest level of recursion the stack contains references to the array, each with accompanying value of variable from down to 1). Best, worst, and average cases The best case input is an array that is already sorted. In this case insertion sort has a linear running time (i.e., O(n)). During each iteration, the first remaining element of the input is only compared with the right-most element of the sorted subsection of the array. The simplest worst case input is an array sorted in reverse order. The set of all worst case inputs consists of all arrays where each element is the smallest or second-smallest of the elements before it. In these cases every iteration of the inner loop will scan and shift the entire sorted subsection of the array before inserting the next element. This gives insertion sort a quadratic running time (i.e., O(n2)). The average case is also quadratic, which makes insertion sort impractical for sorting large arrays. However, insertion sort is one of the fastest algorithms for sorting very small arrays, even faster than quicksort; indeed, good quicksort implementations use insertion sort for arrays smaller than a certain threshold, also when arising as subproblems; the exact threshold must be determined experimentally and depends on the machine, but is commonly around ten. Example: The following table shows the steps for sorting the sequence {3, 7, 4, 9, 5, 2, 6, 1}. In each step, the key under consideration is underlined. The key that was moved (or left in place because it was the biggest yet considered) in the previous step is marked with an asterisk. 3 7 4 9 5 2 6 1 3* 7 4 9 5 2 6 1 3 7* 4 9 5 2 6 1 3 4* 7 9 5 2 6 1 3 4 7 9* 5 2 6 1 3 4 5* 7 9 2 6 1 2* 3 4 5 7 9 6 1 2 3 4 5 6* 7 9 1 1* 2 3 4 5 6 7 9 Relation to other sorting algorithms Insertion sort is very similar to selection sort. As in selection sort, after k passes through the array, the first k elements are in sorted order. However, the fundamental difference between the two algorithms is that insertion sort scans backwards from the current key, while selection sort scans forwards. This results in selection sort making the first k elements the k smallest elements of the unsorted input, while in insertion sort they are simply the first k elements of the input. The primary advantage of insertion sort over selection sort is that selection sort must always scan all remaining elements to find the absolute smallest element in the unsorted portion of the list, while insertion sort requires only a single comparison when the (k + 1)-st element is greater than the k-th element; when this is frequently true (such as if the input array is already sorted or partially sorted), insertion sort is distinctly more efficient compared to selection sort. On average (assuming the rank of the (k + 1)-st element rank is random), insertion sort will require comparing and shifting half of the previous k elements, meaning that insertion sort will perform about half as many comparisons as selection sort on average. In the worst case for insertion sort (when the input array is reverse-sorted), insertion sort performs just as many comparisons as selection sort. However, a disadvantage of insertion sort over selection sort is that it requires more writes due to the fact that, on each iteration, inserting the (k + 1)-st element into the sorted portion of the array requires many element swaps
|
of ceremonies at all awards ceremonies. Awards were presented at that time for discoveries "that cannot, or should not, be reproduced". Ten prizes are awarded each year in many categories, including the Nobel Prize categories of physics, chemistry, physiology/medicine, literature, and peace, but also other categories such as public health, engineering, biology, and interdisciplinary research. The Ig Nobel Prizes recognize genuine achievements, with the exception of three prizes awarded in the first year to fictitious scientists Josiah S. Carberry, Paul DeFanti, and Thomas Kyle. The awards are sometimes criticism via satire, as in the two awards given for homeopathy research, prizes in "science education" to the Kansas State Department of Education and Colorado State Board of Education for their stance regarding the teaching of evolution, and the prize awarded to Social Text after the Sokal affair. Most often, however, they draw attention to scientific articles that have some humorous or unexpected aspect. Examples range from the discovery that the presence of humans tends to sexually arouse ostriches, to the statement that black holes fulfill all the technical requirements for being the location of Hell, to research on the "five-second rule", a tongue-in-cheek belief that food dropped on the floor will not become contaminated if it is picked up within five seconds. Sir Andre Geim, who had been awarded an Ig Nobel Prize in 2000 for levitating a frog by magnetism, was awarded a Nobel Prize in physics in 2010 for his work with the electromagnetic properties of graphene. He is the only individual, as of 2021, to have received both a Nobel and an Ig Nobel. Ceremony The prizes are mostly presented by Nobel laureates, originally at a ceremony in a lecture hall at MIT but since 1994 in the Sanders Theater at Harvard University. Due to the COVID-19 pandemic, 2020 and 2021's event was held fully online. The event contains a number of running jokes, including Miss Sweetie Poo, a little girl who repeatedly cries out, "Please stop: I'm bored", in a high-pitched voice if speakers go on too long. The awards ceremony is traditionally closed with the words: "If you didn't win a prize—and especially if you did—better luck next year!" The ceremony is co-sponsored by the Harvard Computer Society, the Harvard–Radcliffe Science Fiction Association and the Harvard–Radcliffe Society of Physics Students. Throwing paper planes onto the stage is a long-standing tradition. For many years Professor Roy J. Glauber swept the stage clean of the airplanes as the official "Keeper of the Broom." Glauber could not attend
|
ceremony is recorded and broadcast on National Public Radio in the US and is shown live over the Internet. The recording is broadcast each year, on the Friday after US Thanksgiving, on the public radio program Science Friday. In recognition of this, the audience chants the name of the radio show's host, Ira Flatow. Two books have been published with write-ups on some winners: The Ig Nobel Prize, and The Ig Nobel Prize 2 which was later retitled The Man Who Tried to Clone Himself. An Ig Nobel Tour has been an annual part of National Science week in the United Kingdom since 2003. The tour has also traveled to Australia several times, Aarhus University in Denmark in April 2009, Italy and The Netherlands. Reception A September 2009 article in The National titled "A noble side to Ig Nobels" says that, although the Ig Nobel Awards are veiled criticism of trivial research, history shows that trivial research sometimes leads to important breakthroughs. For instance, in 2006, a study showing that one of the malaria mosquitoes (Anopheles gambiae) is attracted equally to the smell of Limburger cheese and the smell of human feet earned the Ig Nobel Prize in the area of biology. As a direct result of these findings, traps baited with this cheese have been placed in strategic locations in some parts of Africa to combat the epidemic of malaria. And Andre Geim, before sharing the 2010 Nobel Prize in Physics for his research on graphene, shared the Physics Ig Nobel in 2000 with Michael Berry for the magnetic levitation of a frog, which by 2022 was reportedly part of the inspiration for China's lunar gravity research facility. See also List of Ig Nobel Prize winners Darwin Awards – an award for enriching the human gene pool by idiotic self-destruction Golden Raspberry Awards – awards for bad movies Bulwer-Lytton Fiction Contest – an award for bad writing Bookseller/Diagram Prize for Oddest Title of the Year – a book prize Pigasus Award – exposing parapsychological, paranormal, or psychic frauds Golden Fleece Award – award for waste of government funds; often awarded for government-paid research considered frivolous or wasteful "British scientists" - Russian joke regarding absurd news reports about scientific discoveries References External links Index to list of past winners 1991 establishments in the United States Awards established in 1991 Harvard University Ironic and humorous awards Humour in science
|
50 piano pieces. Albéniz biographer Walter A. Clark says that pieces from this period received enthusiastic reception in the composer's many concerts. Chase describes music from this period, Taking the guitar as his instrumental model, and drawing his inspiration largely from the peculiar traits of Andalusian folk music—but without using actual folk themes—Albéniz achieves a stylization of Spanish traditional idioms that while thoroughly artistic, gives a captivating impression of spontaneous improvisation... Córdoba is the piece that best represents the style of Albéniz in this period, with its hauntingly beautiful melody, set against the acrid dissonances of the plucked accompaniment imitating the notes of the Moorish guslas. Here is the heady scent of jasmines amid the swaying palm trees, the dream fantasy of an Andalusian "Arabian Nights" in which Albéniz loved to let his imagination dwell. Later period While Albéniz's crowning achievement, Iberia, was written in the last years of his life in France, many of its preceding works are well-known and of great interest. The five pieces in Chants d'Espagne, (Songs of Spain, published in 1892) are a solid example of the compositional ideas he was exploring in the "middle period" of his life. The suite shows what Albéniz biographer Walter Aaron Clark describes as the "first flowering of his unique creative genius", and the beginnings of compositional exploration that became the hallmark of his later works. This period also includes his operatic works—Merlin, Henry Clifford, and Pepita Jiménez. His orchestral works of this period include Spanish Rhapsody (1887) and Catalonia (1899), dedicated to Ramon Casas, who had painted his full-length portrait in 1894. Impact As one of the leading composers of his era, Albéniz's influences on both contemporary composers and on the future of Spanish music are profound. As a result of his extended stay in France and the friendship he formed with numerous composers there, his composition technique and harmonic language has influenced aspiring younger composers such as Claude Debussy and Maurice Ravel. His activities as conductor, performer and composer significantly raised the profile of Spanish music abroad and encouraged Spanish music and musicians in his own country. Albéniz's works have become an important part of the repertoire of the classical guitar, many of which have been transcribed by Francisco Tárrega, Miguel Llobet and others. Asturias (Leyenda) in particular is heard most often on the guitar, as are Granada, Sevilla, Cadiz, Cataluña, Córdoba, Mallorca, and Tango in D. Gordon Crosskey and Cuban-born guitarist Manuel Barrueco have both made solo guitar arrangements of all the eight-movements in Suite española. Selections from Iberia have rarely been attempted on solo guitar but have been very effectively performed by guitar ensembles, such as the performance by John Williams and Julian Bream of Iberia's opening "Evocation". The Doors incorporated "Asturias" into their song "Spanish Caravan"; also, Iron Maiden's "To Tame a Land" uses the introduction of the piece for the song bridge. More recently, a guitar version of Granada functions as something of a love theme in Woody Allen's 2008 film Vicky Cristina Barcelona. The theme from Asturias was incorporated or adapted in several soundtracks including the 2008 horror film Mirrors, composed by Javier Navarrete, or the Netflix TV show Godless, composed by Carlos Rafael Rivera. In 1997 the Fundación Isaac Albéniz was founded to promote Spanish music and musicians and to act as a research centre for Albéniz and Spanish music in general. A street in Quito, Ecuador, is named after him. In film A film about his life entitled Albéniz was made in 1947. It was produced in Argentina. References and sources References Sources Further reading Alarcón Hernández, Joana; et al. Isaac Albéniz, artistes i mecenes. Barcelona: Museu Diocesà de Barcelona, 2009. Albéniz, Isaac. Chants d'Espagne, G. Henle Verlag, Berlin, 2004. Albéniz, Isaac. Impresiones y diarios de viaje. [Madrid]: Fundación Isaac Albéniz, DL 1990. Amat Cortes, Joan. Isaac Albéniz, un català universal. [Barcelona]: Cevagraf, DL 1998. Aviñoa, Xosé. Albéniz. Madrid; Barcelona [etc.]: Daimon, cop. 1986. Aviñoa, Xosé. La música i el Modernisme. Barcelona: Curial, 1985. (Biblioteca de cultura catalana (Curial Edicions Catalanes); 58). Aviñoa, Xosé. Modernisme i Modernistes – Musica i Modernisme: Definició i Període. Lunwerg editores, 2001. Baytelman, Pola. Isaac Albéniz: Chronological List and Thematic Catalog of His Piano Works, Harmonie Park Press, Michigan 1993. Clark, Walter Aaron. Isaac Albéniz: A Guide to Research, Garland Publishing Inc. New York & London, 1998. Ericourt, Daniel; Erickson, Robert. P. MasterClasses in Spanish Piano Music, Hinshaw Music, Chapel Hill North Carolina, 1984. Gauthier, André. Albéniz. Madrid: Espasa Calpe, 1978. (Clásicos de la música). Guerra y Alarcón, Antonio. Isaac Albéniz. Notas crítico-biográficas de tan eminente pianista. [S.l.]: Fundación Isaac Albéniz, DL 1990. Heras, Antonio de las. Vida de Albéniz. Barcelona: Ediciones Patria, [1942]. Iglesias, Antonio. Isaac Albéniz : su obra para piano. 2 vols. Madrid: Alpuerto, DL 1987. Jean-Aubry, G. "Isaac Albéniz 1860–1909", in The Musical Times, vol 58, no. 898, December 1917 pp. 535–538. Kalfa, Jacqueline. Isaac Albéniz (1860–1909) : la vocation de l'Espagne. Paris: Séguier, 2000. (Carré Musique; 4). Marco, Thomas. Spanish Music in the Twentieth Century. 1993. Martorell, Oriol; Valls, Manuel. Síntesi històrica
|
the 1890s Albéniz lived in London and Paris. For London he wrote some musical comedies which brought him to the attention of the wealthy Francis Money-Coutts, 5th Baron Latymer. Money-Coutts commissioned and provided him with librettos for the opera Henry Clifford and for a projected trilogy of Arthurian operas. The first of these, Merlin (1898–1902), was thought to have been lost but has recently been reconstructed and performed. Albéniz never completed Lancelot (only the first act is finished, as a vocal and piano score), and he never began Guinevere, the final part. In 1900 he started to suffer from Bright's disease and returned to writing piano music. Between 1905 and 1908 he composed his final masterpiece, Iberia (1908), a suite of twelve piano "impressions". In 1883 the composer married his student Rosina Jordana. They had two children who lived into adulthood: Laura (a painter) and Alfonso (who played for Real Madrid in the early 1900s before embarking on a career as a diplomat). Another child, Blanca, died in 1886, and two other children died in infancy. His great-granddaughter is Cécilia Attias, former wife of Nicolas Sarkozy. Albéniz died from his kidney disease on 18 May 1909 at age 48 in Cambo-les-Bains, in Labourd, south-western France. Only a few weeks before his death, the French Government bestowed upon Albéniz the Legion of Honour, its highest honour. He is buried at the Montjuïc Cemetery, Barcelona. Music Early works Albéniz's early works were mostly "salon style" music. Albéniz's first published composition, Marcha Militar, appeared in 1868. A number of works written before this are now lost. He continued composing in traditional styles ranging from Jean-Philippe Rameau, Johann Sebastian Bach, Ludwig van Beethoven, Frédéric Chopin and Franz Liszt until the mid-1880s. He also wrote at least five zarzuelas, of which all but two are now lost. Perhaps the best source on the works is Albéniz himself. He is quoted as commenting on his earlier period works as:There are among them a few things that are not completely worthless. The music is a bit infantile, plain, spirited; but in the end, the people, our Spanish people, are something of all that. I believe that the people are right when they continue to be moved by Córdoba, Mallorca, by the copla of the Sevillanas, by the Serenata, and Granada. In all of them I now note that there is less musical science, less of the grand idea, but more colour, sunlight, flavour of olives. That music of youth, with its little sins and absurdities that almost point out the sentimental affectation ... appears to me like the carvings in the Alhambra, those peculiar arabesques that say nothing with their turns and shapes, but which are like the air, like the sun, like the blackbirds or like the nightingales of its gardens. They are more valuable than all else of Moorish Spain, which though we may not like it, is the true Spain. Middle period During the late 1880s, the strong influence of Spanish style is evident in Albéniz's music. In 1883 Albéniz met the teacher and composer Felipe Pedrell. Pedrell was a leading figure in the development of nationalist Spanish music. In his book The Music of Spain, Gilbert Chase describes Pedrell's influence on Albéniz: "What Albéniz derived from Pedrell was above all a spiritual orientation, the realization of the wonderful values inherent in Spanish music." Felipe Pedrell inspired Albéniz to write Spanish music such as the Suite española, Op. 47, noted for its delicate, intricate melody and abrupt dynamic changes. In addition to the Spanish spirit infused in Albéniz's music, he incorporated other qualities as well. In her biography of Albéniz, Pola Baytelman discerns four characteristics of the music from the middle period as follows: 1. The dance rhythms of Spain, of which there are a wide variety. 2. The use of cante jondo, which means deep or profound singing. It is the most serious and moving variety of flamenco or Spanish gypsy song, often dealing with themes of death, anguish, or religion. 3. The use of exotic scales also associated with flamenco music. The Phrygian mode is the most prominent in Albéniz's music, although he also used the Aeolian and Mixolydian modes as well as the whole-tone scale. 4. The transfer of guitar idioms into piano writing. Following his marriage, Albéniz settled in Madrid, Spain and produced a substantial quantity of music in a relatively short period. By 1886 he had written over 50 piano pieces. Albéniz biographer Walter A. Clark says that pieces from this period received enthusiastic reception in the composer's many concerts. Chase describes music from this period, Taking the guitar as his instrumental model, and drawing his inspiration largely from the peculiar traits of Andalusian folk music—but without using actual folk themes—Albéniz achieves a stylization of Spanish traditional idioms that while thoroughly artistic, gives a captivating impression of spontaneous improvisation... Córdoba is the piece that best represents the style of Albéniz in this period, with its hauntingly beautiful melody, set against the acrid dissonances of the plucked accompaniment imitating the notes of the Moorish guslas. Here is the heady scent of jasmines amid the swaying palm trees, the dream fantasy of an Andalusian "Arabian Nights" in which Albéniz loved to let his imagination dwell. Later period While Albéniz's crowning achievement, Iberia, was written in the last years of his life in France, many of its preceding works are well-known and of great interest. The five pieces in Chants d'Espagne, (Songs of Spain, published in 1892) are a solid example of the compositional ideas he was exploring in the "middle period" of his life. The suite shows what Albéniz biographer Walter Aaron Clark describes as the "first flowering of his unique creative genius", and the beginnings of compositional exploration that became the hallmark of his later works. This period also includes his operatic works—Merlin, Henry Clifford, and Pepita Jiménez. His orchestral works of this period include Spanish Rhapsody (1887) and Catalonia (1899), dedicated to Ramon Casas, who had painted his full-length portrait in 1894. Impact As one of the leading composers of his era, Albéniz's influences on both contemporary composers and on the future of Spanish music are profound. As a result of his extended stay in France and the friendship he formed with numerous composers there, his composition technique and harmonic language has influenced aspiring younger composers such as Claude Debussy and Maurice Ravel. His activities as conductor, performer and composer significantly raised the profile of Spanish music abroad and encouraged Spanish music and musicians in his own country. Albéniz's works have become an important part of the repertoire of the classical guitar, many of which have been transcribed by Francisco Tárrega, Miguel Llobet and others. Asturias (Leyenda) in particular is heard most often on the guitar, as are Granada, Sevilla, Cadiz, Cataluña, Córdoba, Mallorca, and Tango in D. Gordon Crosskey and Cuban-born guitarist Manuel Barrueco have both made solo guitar arrangements of all the eight-movements in Suite española. Selections from Iberia have rarely been attempted on solo guitar but have been very effectively performed by guitar ensembles, such as the performance by John Williams and Julian Bream of Iberia's opening "Evocation". The Doors incorporated "Asturias" into their song
|
“in order to avoid harmful interference between radio stations of different countries”. The international spectrum management system is therefore based on regulatory procedures for frequency coordination, notification and registration. ITU-R has a permanent secretariat, the Radiocommunication Bureau, based at the ITU HQ in Geneva, Switzerland. The elected Director of the Bureau is Mr. Mario Maniewicz; he was first elected by
|
of the International Telecommunication Union (ITU) and is responsible for radio communications. Its role is to manage the international radio-frequency spectrum and satellite orbit resources and to develop standards for radiocommunication systems with the objective of ensuring the effective use of the spectrum. ITU is required, according to its constitution, to allocate spectrum and register frequency allocation, orbital positions and other parameters
|
to attack the Four Courts unless the Provisional Government took action. In fact, the British cabinet actually resolved to attack the Four Courts themselves on 25 June, in an operation that would have involved tanks, howitzers and aeroplanes. However, on the advice of General Nevil Macready, who commanded the British garrison in Dublin, the plan was cancelled at the last minute. Macready's argument was that British involvement would have united Irish Nationalist opinion against the treaty, and instead Collins was given a last chance to clear the Four Courts himself. Collins orders the assault on the Four Courts The final straw for the Free State government came on 26 June, when the anti-treaty forces occupying the Four Courts kidnapped JJ "Ginger" O'Connell, a general in the new National Army, in retaliation for the arrest of Leo Henderson. Collins, after giving the Four Courts garrison a final (and according to Ernie O'Malley, only) ultimatum to leave the building on 27 June, decided to end the stand-off by bombarding the Four Courts garrison into surrender. The government then appointed Collins as Commander-in-Chief of the National Army. This attack was not the opening shot of the war, as skirmishes had taken place between pro- and anti-treaty IRA factions throughout the country when the British were handing over the barracks. However, this represented the 'point of no return', when all-out war was effectively declared and the Civil War officially began. Collins ordered Mulcahy to accept a British offer of two 18-pounder field artillery for use by the new army of the Free State, though General Macready gave just 200 shells of the 10,000 he had in store at Richmond barracks in Inchicore. The anti-treaty forces in the Four Courts, who possessed only small arms, surrendered after three days of bombardment and the storming of the building by Provisional Government troops (28–30 June 1922). Shortly before the surrender, a massive explosion destroyed the western wing of the complex, including the Irish Public Record Office (PRO), injuring many advancing Free State soldiers and destroying the records. Government supporters alleged that the building had been deliberately mined. Historians dispute whether the PRO was intentionally destroyed by mines laid by the Republicans on their evacuation, or whether the explosions occurred when their ammunition store was accidentally ignited by the bombardment. Coogan, however, asserts that two lorry-loads of gelignite was exploded in the PRO, leaving priceless manuscripts floating over the city for several hours afterward. Pitched battles continued in Dublin until 5 July. IRA units from the Dublin Brigade, led by Oscar Traynor, occupied O'Connell Street – provoking a week's more street fighting and costing another 65 killed and 280 wounded. Among the dead was Republican leader Cathal Brugha, who made his last stand after exiting the Granville Hotel. In addition, the Free State took over 500 Republican prisoners. The civilian casualties are estimated to have numbered well over 250. When the fighting in Dublin died down, the Free State government was left firmly in control of the Irish capital and the anti-treaty forces dispersed around the country, mainly to the south and west. The opposing forces The outbreak of the Civil War forced pro- and anti-treaty supporters to choose sides. Supporters of the treaty came to be known as "pro-treaty" or Free State Army, legally the National Army, and were often called "Staters" by their opponents. The latter called themselves Republicans and were also known as "anti-treaty" forces or "Irregulars", a term preferred by the Free State side. The Anti-Treaty IRA claimed that it was defending the Irish Republic declared in 1916 during the Easter Rising, confirmed by the First Dáil and invalidly set aside by those who accepted the compromise of the Free State. Éamon de Valera stated that he would serve as an ordinary IRA volunteer and left the leadership of the anti-treaty Republicans to Liam Lynch, the IRA Chief of Staff. De Valera, though the Republican President as of October 1922, had little control over military operations. The campaign was directed by Liam Lynch until he was killed on 10 April 1923, and then by Frank Aiken from 20 April 1923. The Civil War split the IRA. When the Civil War broke out, the Anti-Treaty IRA (concentrated in the south and west) outnumbered pro-Free State forces by roughly 12,000 men to 8,000. Moreover, the anti-treaty ranks included many of the IRA's most experienced guerrilla fighters. The paper strength of the IRA in early 1922 was over 72,000 men, but most of them were recruited during the truce with the British and fought in neither the War of Independence nor the Civil War. According to Richard Mulcahy's estimate, the Anti-Treaty IRA at the beginning of the war had 6,780 rifles and 12,900 men. However, the IRA lacked an effective command structure, a clear strategy and sufficient arms. As well as rifles they had a handful of machine guns and many of their fighters were armed only with shotguns or handguns. They also took a small number of armoured cars from British troops as they were evacuating the country. Finally, they had no artillery of any kind. As a result, they were forced to adopt a defensive stance throughout the war. By contrast, the Free State government managed to expand its forces dramatically after the start of the war. Michael Collins and his commanders were able to build up an army that could overwhelm their opponents in the field. British supplies of artillery, aircraft, armoured cars, machine guns, small arms and ammunition were of much help to pro-Treaty forces. The British delivered for instance, over 27,000 rifles, 250 machine guns and eight 18-pounder artillery pieces to the pro-treaty forces between the outbreak of the Civil War and September 1922. The National Army amounted to 14,000 men by August 1922, was 38,000 strong by the end of 1922, and by the end of the war had grown to 55,000 men and 3,500 officers, far in excess of what the Irish state would need to maintain in peacetime. Like the Anti-Treaty IRA, the Free State's National Army was initially rooted in the IRA that fought against the British. Collins' most ruthless officers and men were recruited from the Dublin Active Service Unit (the elite unit of the IRA's Dublin Brigade) and from Michael Collins' Intelligence Department and assassination unit, The Squad. In the new National Army, they were known as the Dublin Guard. Towards the end of the war, they were implicated in some notorious atrocities against anti-treaty guerrillas in County Kerry. Up to the outbreak of Civil War, it had been agreed that only men with service in the IRA could be recruited into the National Army. However, once the war began, all such restrictions were lifted. A 'National Call to Arms' issued on 7 July for recruitment on a six-month basis brought in thousands of new recruits. Many of the new army's recruits were veterans of the British Army in World War I, where they had served in disbanded Irish regiments of the British Army. Many others were raw recruits without any military experience. The fact that at least 50% of the other ranks had no military experience in turn led to ill-discipline becoming a major problem. A major problem for the National Army was a shortage of experienced officers. At least 20% of its officers had previously served as officers in the British Army, while 50% of the rank-and-file of the National Army had served in the British Army in World War I. Former British Army officers were also recruited for their technical expertise. A number of the senior Free State commanders, such as Emmet Dalton, John T. Prout and W.R.E. Murphy, had seen service as officers in World War I, Dalton and Murphy in the British Army and Prout in the US Army. The Republicans made much use of this fact in their propaganda — claiming that the Free State was only a proxy force for Britain itself. However, the majority of Free State soldiers were raw recruits without military experience, either in World War I or the Irish War of Independence. There were also a significant number of former members of the British Armed Forces on the Republican side, including such senior figures as Tom Barry, David Robinson and Erskine Childers. Free State takes major towns With Dublin in pro-treaty hands, conflict spread throughout the country. The war started with the anti-treaty forces holding Cork, Limerick and Waterford as part of a self-styled Munster Republic. However, since the anti-treaty side were not equipped to wage conventional war, Liam Lynch was unable to take advantage of the Republicans' initial advantage in numbers and territory held. He hoped simply to hold the Munster Republic long enough to force Britain to renegotiate the treaty. The large towns in Ireland were all relatively easily taken by the Free State in August 1922. Michael Collins, Richard Mulcahy and Eoin O'Duffy planned a nationwide Free State offensive, dispatching columns overland to take Limerick in the west and Waterford in the south-east and seaborne forces to take counties Cork and Kerry in the south and Mayo in the west. In the south, landings occurred at Union Hall in Cork and Fenit, the port of Tralee, in Kerry. Limerick fell on 20 July, Waterford on the same day and Cork city on 10 August after a Free State force landed by sea at Passage West. Another seaborne expedition to Mayo in the west secured government control over that part of the country. While in some places the Republicans had put up determined resistance, nowhere were they able to defeat regular forces armed with artillery and armour. The only real conventional battle during the Free State offensive, the Battle of Killmallock, was fought when Free State troops advanced south from Limerick. Guerrilla war Government victories in the major towns inaugurated a period of guerrilla warfare. After the fall of Cork, Liam Lynch ordered IRA units to disperse and form flying columns as they had when fighting the British. They held out in areas such as the western part of counties Cork and Kerry in the south, county Wexford in the east and counties Sligo and Mayo in the west. Sporadic fighting also took place around Dundalk, where Frank Aiken and the Fourth Northern Division of the Irish Republican Army were based, and Dublin, where small-scale but regular attacks were mounted on Free State troops. August and September 1922 saw widespread attacks on Free State forces in the territories that they had occupied in the July–August offensive, inflicting heavy casualties on them. Michael Collins was killed in an ambush by anti-treaty Republicans at Béal na Bláth, near his home in County Cork, in August 1922. Collins' death increased the bitterness of the Free State leadership towards the Republicans and probably contributed to the subsequent descent of the conflict into a cycle of atrocities and reprisals. Arthur Griffith, the Free State president, had also died of a brain haemorrhage ten days before, leaving the government in the hands of W.T. Cosgrave and the Free State army under the command of General Richard Mulcahy. For a brief period, with rising casualties among its troops and its two principal leaders dead, it looked as if the Free State might collapse. However, as winter set in, the Republicans found it increasingly difficult to sustain their campaign, and casualty rates among National Army troops dropped rapidly. For instance, in County Sligo, 54 people died in the conflict, of whom all but eight had been killed by the end of September. In the autumn and winter of 1922, Free State forces broke up many of the larger Republican guerrilla units – in Sligo, Meath and Connemara in the west, for example, and in much of Dublin city. Elsewhere, anti-treaty units were forced by lack of supplies and safe-houses to disperse into smaller groups, typically of nine to ten men. Despite these successes for the National Army, it took eight more months of intermittent warfare before the war was brought to an end. By late 1922 and early 1923, the anti-treaty guerrilla campaign had been reduced largely to acts of sabotage and destruction of public infrastructure such as roads and railways. It was also in this period that the Anti-Treaty IRA began burning the homes of Free State Senators and of many of the Anglo-Irish landed class. In October 1922, Éamon de Valera and the anti-treaty Teachtaí Dála (TDs) set up their own "Republican government" in opposition to the Free State. However, by then the anti-treaty side held no significant territory and de Valera's government had no authority over the population. Atrocities and executions On 27 September 1922, three months after the outbreak of war, the Free State's Provisional Government put before the Dáil an Army Emergency Powers Resolution proposing to extend the legislation for setting up military tribunals, transferring some of the Free State's judicial powers over Irish citizens accused of anti-government activities to the Army Council. The legislation, commonly referred to as the "Public Safety Bill", set up and empowered military tribunals to impose life imprisonment, as well as the death penalty, for 'aiding or abetting attacks' on state forces, possession of arms and ammunition or explosive 'without the proper authority' and 'looting destruction or arson'. The final phase of the Civil War degenerated into a series of atrocities that left a lasting legacy of bitterness in Irish politics. The Free State began executing Republican prisoners on 17 November 1922, when five IRA men were shot by firing squad. They were followed on 24 November by the execution of acclaimed author and treaty negotiator Erskine Childers. In all, out of around 12,000 Republican prisoners taken in the conflict, 81 were officially executed by the Free State. The Anti-Treaty IRA in reprisal assassinated TD Seán Hales on 7 December 1922. The next day four prominent Republicans held since the first week of the war — Rory O'Connor, Liam Mellows, Richard Barrett and Joe McKelvey — were executed in revenge for the killing of Hales. In addition, Free State troops, particularly in County Kerry, where the guerrilla campaign was most bitter, began the summary execution of captured anti-treaty fighters. The most notorious example of this occurred at Ballyseedy, where nine Republican prisoners were tied to a landmine, which was detonated, killing eight and only leaving one, Stephen Fuller, who was blown clear by the blast, to escape. The number of "unauthorised" executions of Republican prisoners during the war has been put as high as 153. Among the Republican reprisals were the assassination of Kevin O'Higgins's father and W. T. Cosgrave's uncle in February 1923. The IRA were unable to maintain an effective guerrilla campaign, given the gradual loss of support. The Catholic Church also supported the Free State, deeming it the lawful government of the country, denouncing the IRA and refusing to administer the Sacraments to anti-treaty fighters. On 10 October 1922, the Catholic Bishops of Ireland issued a formal statement, describing the anti-treaty campaign as: The Church's support for the Free State aroused bitter hostility among some republicans. Although the Catholic Church in independent Ireland has often been seen as a triumphalist Church, a recent study has found that it felt deeply insecure after these events. End of the war By early 1923, the offensive capability of the IRA had been seriously eroded and when, in February 1923, the Republican leader Liam Deasy was captured by Free State forces, he called on the republicans to end their campaign and reach an accommodation with the Free State. The State's executions of anti-treaty prisoners, 34 of whom were shot in January 1923, also took its toll on the Republicans' morale. In addition, the National Army's operations in the field were slowly but steadily breaking up the remaining Republican concentrations. March and April 1923 saw this progressive dismemberment of the Republican forces continue with the capture and sometimes killing of guerrilla columns. A National Army report of 11 April stated, "Events of the last few days point to the beginning of the end as a far as the irregular campaign is concerned". As the conflict petered out into a de facto victory for the pro-treaty side, de Valera asked the IRA leadership to call a ceasefire, but they refused. The Anti-Treaty IRA executive met on 26 March in County Tipperary to discuss the war's future. Tom Barry proposed a motion to end the war, but it was defeated by 6 votes to 5. Éamon de Valera was allowed to attend, after some debate, but was given no voting rights. Liam Lynch, the Republican leader, was killed in a skirmish in the Knockmealdown Mountains in County Tipperary on 10 April. The National Army had extracted information from Republican prisoners in Dublin that the IRA Executive was in the area and as well as killing Lynch, they also captured senior anti-treaty IRA officers Dan Breen, Todd Andrews, Seán Gaynor and Frank Barrett in the operation. It is often suggested that the death of Lynch allowed the more pragmatic Frank Aiken, who took over as IRA Chief of Staff, to call a halt to what seemed a futile struggle. Aiken's accession to IRA leadership was followed on 30 April by the declaration of a suspension of military activities; on 24 May 1923, he issued a ceasefire order to IRA volunteers. They were to dump arms rather than surrender them or continue a fight that they were incapable of winning. Aftermath of the ceasefire Éamon de Valera supported the order, issuing a statement to Anti-Treaty fighters on 24 May: The Free State government had started peace negotiations in early May, which broke down. The High Court of Justice in Ireland ruled on 31 July 1923 that a state of war no longer existed, and consequently the internment of republicans, permitted under common law only in wartime, was now illegal. Without a formal peace, holding 13,000 prisoners and worried that fighting could break out again at any time, the government enacted two Public Safety (Emergency Powers) Acts on 1 and 3 August 1923, to permit continued internment and other measures. Thousands of Anti-Treaty IRA members (including Éamon de Valera on 15 August) were arrested by the Free State forces in the weeks and months after the end of the war, when they had dumped their arms and returned home. A general election was held on 27 August 1923, which Cumann na nGaedheal, the pro-Free State party, won with about 40% of the first-preference vote. The Republicans, represented by Sinn Féin, won about 27% of the vote. Many of their candidates and supporters were still imprisoned before, during and after the election. In October 1923, around 8,000 of the 12,000 Republican prisoners in Free State gaols went on a hunger strike. The strike lasted for 41 days and met little success (among those who died were Denny Barry, Joseph Whitty and Andy O'Sullivan) see: 1923 Irish Hunger Strikes. However, most of the women prisoners were released shortly thereafter and the hunger strike helped concentrate the Republican movement on the prisoners and their associated organisations. In July, de Valera had recognised the Republican political interests lay with the prisoners and went so far as to say: Attacks on former Unionists Although the cause of the Civil War was the Treaty, as the war developed the anti-treaty forces sought to identify their actions with the traditional Republican cause of the "men of no property" and the result was that large Anglo-Irish landowners and some less well-off Southern Unionists were attacked. A total of 192 "stately homes" of the old landed class and of Free State politicians were destroyed by anti-treaty forces during the war. The stated reason for such attacks was that some landowners had become Free State senators. In October 1922, a deputation of Southern Unionists met W. T. Cosgrave to offer their support to the Free State and some of them had received positions in the State's Upper house or Senate. Among the prominent senators whose homes were attacked were: Palmerstown House near Naas, which belonged to the Earl of Mayo, Moore Hall in Mayo, Horace Plunkett (who had helped to establish the rural co-operative schemes), and Senator Henry Guinness (which was unsuccessful). Also burned was Marlfield House in Clonmel, the home of Senator John Philip Bagwell, with its extensive library of historical documents. Bagwell was kidnapped and held in the Dublin Mountains, but later released when reprisals were threatened. However, in addition to their allegiance to the Free State, there were also other factors behind Republican animosity towards the old landed class. Many, but not all of these people, had supported the Crown forces during the War of Independence. This support was often largely moral, but sometimes
|
a massive explosion destroyed the western wing of the complex, including the Irish Public Record Office (PRO), injuring many advancing Free State soldiers and destroying the records. Government supporters alleged that the building had been deliberately mined. Historians dispute whether the PRO was intentionally destroyed by mines laid by the Republicans on their evacuation, or whether the explosions occurred when their ammunition store was accidentally ignited by the bombardment. Coogan, however, asserts that two lorry-loads of gelignite was exploded in the PRO, leaving priceless manuscripts floating over the city for several hours afterward. Pitched battles continued in Dublin until 5 July. IRA units from the Dublin Brigade, led by Oscar Traynor, occupied O'Connell Street – provoking a week's more street fighting and costing another 65 killed and 280 wounded. Among the dead was Republican leader Cathal Brugha, who made his last stand after exiting the Granville Hotel. In addition, the Free State took over 500 Republican prisoners. The civilian casualties are estimated to have numbered well over 250. When the fighting in Dublin died down, the Free State government was left firmly in control of the Irish capital and the anti-treaty forces dispersed around the country, mainly to the south and west. The opposing forces The outbreak of the Civil War forced pro- and anti-treaty supporters to choose sides. Supporters of the treaty came to be known as "pro-treaty" or Free State Army, legally the National Army, and were often called "Staters" by their opponents. The latter called themselves Republicans and were also known as "anti-treaty" forces or "Irregulars", a term preferred by the Free State side. The Anti-Treaty IRA claimed that it was defending the Irish Republic declared in 1916 during the Easter Rising, confirmed by the First Dáil and invalidly set aside by those who accepted the compromise of the Free State. Éamon de Valera stated that he would serve as an ordinary IRA volunteer and left the leadership of the anti-treaty Republicans to Liam Lynch, the IRA Chief of Staff. De Valera, though the Republican President as of October 1922, had little control over military operations. The campaign was directed by Liam Lynch until he was killed on 10 April 1923, and then by Frank Aiken from 20 April 1923. The Civil War split the IRA. When the Civil War broke out, the Anti-Treaty IRA (concentrated in the south and west) outnumbered pro-Free State forces by roughly 12,000 men to 8,000. Moreover, the anti-treaty ranks included many of the IRA's most experienced guerrilla fighters. The paper strength of the IRA in early 1922 was over 72,000 men, but most of them were recruited during the truce with the British and fought in neither the War of Independence nor the Civil War. According to Richard Mulcahy's estimate, the Anti-Treaty IRA at the beginning of the war had 6,780 rifles and 12,900 men. However, the IRA lacked an effective command structure, a clear strategy and sufficient arms. As well as rifles they had a handful of machine guns and many of their fighters were armed only with shotguns or handguns. They also took a small number of armoured cars from British troops as they were evacuating the country. Finally, they had no artillery of any kind. As a result, they were forced to adopt a defensive stance throughout the war. By contrast, the Free State government managed to expand its forces dramatically after the start of the war. Michael Collins and his commanders were able to build up an army that could overwhelm their opponents in the field. British supplies of artillery, aircraft, armoured cars, machine guns, small arms and ammunition were of much help to pro-Treaty forces. The British delivered for instance, over 27,000 rifles, 250 machine guns and eight 18-pounder artillery pieces to the pro-treaty forces between the outbreak of the Civil War and September 1922. The National Army amounted to 14,000 men by August 1922, was 38,000 strong by the end of 1922, and by the end of the war had grown to 55,000 men and 3,500 officers, far in excess of what the Irish state would need to maintain in peacetime. Like the Anti-Treaty IRA, the Free State's National Army was initially rooted in the IRA that fought against the British. Collins' most ruthless officers and men were recruited from the Dublin Active Service Unit (the elite unit of the IRA's Dublin Brigade) and from Michael Collins' Intelligence Department and assassination unit, The Squad. In the new National Army, they were known as the Dublin Guard. Towards the end of the war, they were implicated in some notorious atrocities against anti-treaty guerrillas in County Kerry. Up to the outbreak of Civil War, it had been agreed that only men with service in the IRA could be recruited into the National Army. However, once the war began, all such restrictions were lifted. A 'National Call to Arms' issued on 7 July for recruitment on a six-month basis brought in thousands of new recruits. Many of the new army's recruits were veterans of the British Army in World War I, where they had served in disbanded Irish regiments of the British Army. Many others were raw recruits without any military experience. The fact that at least 50% of the other ranks had no military experience in turn led to ill-discipline becoming a major problem. A major problem for the National Army was a shortage of experienced officers. At least 20% of its officers had previously served as officers in the British Army, while 50% of the rank-and-file of the National Army had served in the British Army in World War I. Former British Army officers were also recruited for their technical expertise. A number of the senior Free State commanders, such as Emmet Dalton, John T. Prout and W.R.E. Murphy, had seen service as officers in World War I, Dalton and Murphy in the British Army and Prout in the US Army. The Republicans made much use of this fact in their propaganda — claiming that the Free State was only a proxy force for Britain itself. However, the majority of Free State soldiers were raw recruits without military experience, either in World War I or the Irish War of Independence. There were also a significant number of former members of the British Armed Forces on the Republican side, including such senior figures as Tom Barry, David Robinson and Erskine Childers. Free State takes major towns With Dublin in pro-treaty hands, conflict spread throughout the country. The war started with the anti-treaty forces holding Cork, Limerick and Waterford as part of a self-styled Munster Republic. However, since the anti-treaty side were not equipped to wage conventional war, Liam Lynch was unable to take advantage of the Republicans' initial advantage in numbers and territory held. He hoped simply to hold the Munster Republic long enough to force Britain to renegotiate the treaty. The large towns in Ireland were all relatively easily taken by the Free State in August 1922. Michael Collins, Richard Mulcahy and Eoin O'Duffy planned a nationwide Free State offensive, dispatching columns overland to take Limerick in the west and Waterford in the south-east and seaborne forces to take counties Cork and Kerry in the south and Mayo in the west. In the south, landings occurred at Union Hall in Cork and Fenit, the port of Tralee, in Kerry. Limerick fell on 20 July, Waterford on the same day and Cork city on 10 August after a Free State force landed by sea at Passage West. Another seaborne expedition to Mayo in the west secured government control over that part of the country. While in some places the Republicans had put up determined resistance, nowhere were they able to defeat regular forces armed with artillery and armour. The only real conventional battle during the Free State offensive, the Battle of Killmallock, was fought when Free State troops advanced south from Limerick. Guerrilla war Government victories in the major towns inaugurated a period of guerrilla warfare. After the fall of Cork, Liam Lynch ordered IRA units to disperse and form flying columns as they had when fighting the British. They held out in areas such as the western part of counties Cork and Kerry in the south, county Wexford in the east and counties Sligo and Mayo in the west. Sporadic fighting also took place around Dundalk, where Frank Aiken and the Fourth Northern Division of the Irish Republican Army were based, and Dublin, where small-scale but regular attacks were mounted on Free State troops. August and September 1922 saw widespread attacks on Free State forces in the territories that they had occupied in the July–August offensive, inflicting heavy casualties on them. Michael Collins was killed in an ambush by anti-treaty Republicans at Béal na Bláth, near his home in County Cork, in August 1922. Collins' death increased the bitterness of the Free State leadership towards the Republicans and probably contributed to the subsequent descent of the conflict into a cycle of atrocities and reprisals. Arthur Griffith, the Free State president, had also died of a brain haemorrhage ten days before, leaving the government in the hands of W.T. Cosgrave and the Free State army under the command of General Richard Mulcahy. For a brief period, with rising casualties among its troops and its two principal leaders dead, it looked as if the Free State might collapse. However, as winter set in, the Republicans found it increasingly difficult to sustain their campaign, and casualty rates among National Army troops dropped rapidly. For instance, in County Sligo, 54 people died in the conflict, of whom all but eight had been killed by the end of September. In the autumn and winter of 1922, Free State forces broke up many of the larger Republican guerrilla units – in Sligo, Meath and Connemara in the west, for example, and in much of Dublin city. Elsewhere, anti-treaty units were forced by lack of supplies and safe-houses to disperse into smaller groups, typically of nine to ten men. Despite these successes for the National Army, it took eight more months of intermittent warfare before the war was brought to an end. By late 1922 and early 1923, the anti-treaty guerrilla campaign had been reduced largely to acts of sabotage and destruction of public infrastructure such as roads and railways. It was also in this period that the Anti-Treaty IRA began burning the homes of Free State Senators and of many of the Anglo-Irish landed class. In October 1922, Éamon de Valera and the anti-treaty Teachtaí Dála (TDs) set up their own "Republican government" in opposition to the Free State. However, by then the anti-treaty side held no significant territory and de Valera's government had no authority over the population. Atrocities and executions On 27 September 1922, three months after the outbreak of war, the Free State's Provisional Government put before the Dáil an Army Emergency Powers Resolution proposing to extend the legislation for setting up military tribunals, transferring some of the Free State's judicial powers over Irish citizens accused of anti-government activities to the Army Council. The legislation, commonly referred to as the "Public Safety Bill", set up and empowered military tribunals to impose life imprisonment, as well as the death penalty, for 'aiding or abetting attacks' on state forces, possession of arms and ammunition or explosive 'without the proper authority' and 'looting destruction or arson'. The final phase of the Civil War degenerated into a series of atrocities that left a lasting legacy of bitterness in Irish politics. The Free State began executing Republican prisoners on 17 November 1922, when five IRA men were shot by firing squad. They were followed on 24 November by the execution of acclaimed author and treaty negotiator Erskine Childers. In all, out of around 12,000 Republican prisoners taken in the conflict, 81 were officially executed by the Free State. The Anti-Treaty IRA in reprisal assassinated TD Seán Hales on 7 December 1922. The next day four prominent Republicans held since the first week of the war — Rory O'Connor, Liam Mellows, Richard Barrett and Joe McKelvey — were executed in revenge for the killing of Hales. In addition, Free State troops, particularly in County Kerry, where the guerrilla campaign was most bitter, began the summary execution of captured anti-treaty fighters. The most notorious example of this occurred at Ballyseedy, where nine Republican prisoners were tied to a landmine, which was detonated, killing eight and only leaving one, Stephen Fuller, who was blown clear by the blast, to escape. The number of "unauthorised" executions of Republican prisoners during the war has been put as high as 153. Among the Republican reprisals were the assassination of Kevin O'Higgins's father and W. T. Cosgrave's uncle in February 1923. The IRA were unable to maintain an effective guerrilla campaign, given the gradual loss of support. The Catholic Church also supported the Free State, deeming it the lawful government of the country, denouncing the IRA and refusing to administer the Sacraments to anti-treaty fighters. On 10 October 1922, the Catholic Bishops of Ireland issued a formal statement, describing the anti-treaty campaign as: The Church's support for the Free State aroused bitter hostility among some republicans. Although the Catholic Church in independent Ireland has often been seen as a triumphalist Church, a recent study has found that it felt deeply insecure after these events. End of the war By early 1923, the offensive capability of the IRA had been seriously eroded and when, in February 1923, the Republican leader Liam Deasy was captured by Free State forces, he called on the republicans to end their campaign and reach an accommodation with the Free State. The State's executions of anti-treaty prisoners, 34 of whom were shot in January 1923, also took its toll on the Republicans' morale. In addition, the National Army's operations in the field were slowly but steadily breaking up the remaining Republican concentrations. March and April 1923 saw this progressive dismemberment of the Republican forces continue with the capture and sometimes killing of guerrilla columns. A National Army report of 11 April stated, "Events of the last few days point to the beginning of the end as a far as the irregular campaign is concerned". As the conflict petered out into a de facto victory for the pro-treaty side, de Valera asked the IRA leadership to call a ceasefire, but they refused. The Anti-Treaty IRA executive met on 26 March in County Tipperary to discuss the war's future. Tom Barry proposed a motion to end the war, but it was defeated by 6 votes to 5. Éamon de Valera was allowed to attend, after some debate, but was given no voting rights. Liam Lynch, the Republican leader, was killed in a skirmish in the Knockmealdown Mountains in County Tipperary on 10 April. The National Army had extracted information from Republican prisoners in Dublin that the IRA Executive was in the area and as well as killing Lynch, they also captured senior anti-treaty IRA officers Dan Breen, Todd Andrews, Seán Gaynor and Frank Barrett in the operation. It is often suggested that the death of Lynch allowed the more pragmatic Frank Aiken, who took over as IRA Chief of Staff, to call a halt to what seemed a futile struggle. Aiken's accession to IRA leadership was followed on 30 April by the declaration of a suspension of military activities; on 24 May 1923, he issued a ceasefire order to IRA volunteers. They were to dump arms rather than surrender them or continue a fight that they were incapable of winning. Aftermath of the ceasefire Éamon de Valera supported the order, issuing a statement to Anti-Treaty fighters on 24 May: The Free State government had started peace negotiations in early May, which broke down. The
|
of the system. Internet Explorer 9 introduced a new component – Add-on Performance Advisor. Add-on Performance Advisor shows a notification when one or more of installed add-ons exceed a pre-set performance threshold. The notification appears in the Notification Bar when the user launches the browser. Windows 8 and Windows RT introduce a Metro-style version of Internet Explorer that is entirely sandboxed and does not run add-ons at all. In addition, Windows RT cannot download or install ActiveX controls at all; although existing ones bundled with Windows RT still run in the traditional version of Internet Explorer. Internet Explorer itself can be hosted by other applications via a set of COM interfaces. This can be used to embed the browser functionality inside a computer program or create Internet Explorer shells. Security Internet Explorer uses a zone-based security framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions. Internet Explorer 6 SP2 onwards uses the Attachment Execution Service of Microsoft Windows to mark executable files downloaded from the Internet as being potentially unsafe. Accessing files marked as such will prompt the user to make an explicit trust decision to execute the file, as executables originating from the Internet can be potentially unsafe. This helps in preventing the accidental installation of malware. Internet Explorer 7 introduced the phishing filter, which restricts access to phishing sites unless the user overrides the decision. With version 8, it also blocks access to sites known to host malware. Downloads are also checked to see if they are known to be malware-infected. In Windows Vista, Internet Explorer by default runs in what is called Protected Mode, where the privileges of the browser itself are severely restricted—it cannot make any system-wide changes. One can optionally turn this mode off, but this is not recommended. This also effectively restricts the privileges of any add-ons. As a result, even if the browser or any add-on is compromised, the damage the security breach can cause is limited. Patches and updates to the browser are released periodically and made available through the Windows Update service, as well as through Automatic Updates. Although security patches continue to be released for a range of platforms, most feature additions and security infrastructure improvements are only made available on operating systems that are in Microsoft's mainstream support phase. On December 16, 2008, Trend Micro recommended users switch to rival browsers until an emergency patch was released to fix a potential security risk which "could allow outside users to take control of a person's computer and steal their passwords.” Microsoft representatives countered this recommendation, claiming that "0.02% of internet sites" were affected by the flaw. A fix for the issue was released the following day with the Security Update for Internet Explorer KB960714, on Microsoft Windows Update. In 2010, Germany's Federal Office for Information Security, known by its German initials, BSI, advised "temporary use of alternative browsers" because of a "critical security hole" in Microsoft's software that could allow hackers to remotely plant and run malicious code on Windows PCs. In 2011, a report by Accuvant, funded by Google, rated the security (based on sandboxing) of Internet Explorer worse than Google Chrome but better than Mozilla Firefox. A 2017 browser security white paper comparing Google Chrome, Microsoft Edge, and Internet Explorer 11 by X41 D-Sec in 2017 came to similar conclusions, also based on sandboxing and support of legacy web technologies. Security vulnerabilities Internet Explorer has been subjected to many security vulnerabilities and concerns such that the volume of criticism for IE is unusually high. Much of the spyware, adware, and computer viruses across the Internet are made possible by exploitable bugs and flaws in the security architecture of Internet Explorer, sometimes requiring nothing more than viewing of a malicious web page to install themselves. This is known as a "drive-by install.” There are also attempts to trick the user into installing malicious software by misrepresenting the software's true purpose in the description section of an ActiveX security alert. A number of security flaws affecting IE originated not in the browser itself, but in ActiveX-based add-ons used by it. Because the add-ons have the same privilege as IE, the flaws can be as critical as browser flaws. This has led to the ActiveX-based architecture being criticized for being fault-prone. By 2005, some experts maintained that the dangers of ActiveX had been overstated and there were safeguards in place. In 2006, new techniques using automated testing found more than a hundred vulnerabilities in standard Microsoft ActiveX components. Security features introduced in Internet Explorer 7 mitigated some of these vulnerabilities. In 2008, Internet Explorer had a number of published security vulnerabilities. According to research done by security research firm Secunia, Microsoft did not respond as quickly as its competitors in fixing security holes and making patches available. The firm also reported 366 vulnerabilities in ActiveX controls, an increase from the previous year. According to an October 2010 report in The Register, researcher Chris Evans had detected a known security vulnerability which, then dating back to 2008, had not been fixed for at least six hundred days. Microsoft says that it had known about this vulnerability, but it was of exceptionally low severity as the victim web site must be configured in a peculiar way for this attack to be feasible at all. In December 2010, researchers were able to bypass the "Protected Mode" feature in Internet Explorer. Vulnerability exploited in attacks on U.S. firms In an advisory on January 14, 2010, Microsoft said that attackers targeting Google and other U.S. companies used software that exploits a security hole, which had already been patched, in Internet Explorer. The vulnerability affected Internet Explorer 6 from on Windows XP and Server 2003, IE6 SP1 on Windows 2000 SP4, IE7 on Windows Vista, XP, Server 2008, and Server 2003, IE8 on Windows 7, Vista, XP, Server 2003, and Server 2008 (R2). The German government warned users against using Internet Explorer and recommended switching to an alternative web browser, due to the major security hole described above that was exploited in Internet Explorer. The Australian and French Government issued a similar warning a few days later. Major vulnerability across versions On April 26, 2014, Microsoft issued a security advisory relating to (use-after-free vulnerability in Microsoft Internet Explorer 6 through 11), a vulnerability that could allow "remote code execution" in Internet Explorer versions 6 to 11. On April 28, 2014, the United States Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) released an advisory stating that the vulnerability could result in "the complete compromise" of an affected system. US-CERT recommended reviewing Microsoft's suggestions to mitigate an attack or using an alternate browser until the bug is fixed. The UK National Computer Emergency Response Team (CERT-UK) published an advisory announcing similar concerns and for users to take the additional step of ensuring their antivirus software is up to date. Symantec, a cyber security firm, confirmed that "the vulnerability crashes Internet Explorer on Windows XP". The vulnerability was resolved on May 1, 2014, with a security update. Market adoption and usage share The adoption rate of Internet Explorer seems to be closely related to that of Microsoft Windows, as it is the default web browser that comes with Windows. Since the integration of Internet Explorer 2.0 with Windows 95 OSR 1 in 1996, and especially after version 4.0's release in 1997, the adoption was greatly accelerated: from below 20% in 1996, to about 40% in 1998, and over 80% in 2000. This made Microsoft the winner in the infamous 'first browser war' against Netscape. Netscape Navigator was the dominant browser during 1995 and until 1997, but rapidly lost share to IE starting in 1998, and eventually slipped behind in 1999. The integration of IE with Windows led to a lawsuit by AOL, Netscape's owner, accusing Microsoft of unfair competition. The infamous case was eventually won by AOL but by then it was too late, as Internet Explorer had already become the dominant browser. Internet Explorer peaked during 2002 and 2003, with about 95% share. Its first notable competitor after beating Netscape was Firefox from Mozilla, which itself was an offshoot from Netscape. Firefox 1.0 had surpassed Internet Explorer 5 in early 2005, with Firefox 1.0 at 8 percent market share. Approximate usage over time based on various usage share counters averaged for the year overall, or for the fourth quarter, or for the last month in the year depending on availability of reference. According to StatCounter Internet Explorer's market share fell below 50% in September 2010. In May 2012, Google Chrome overtook Internet Explorer as the most used browser worldwide, according to StatCounter. In September 2021, usage share is low globally, while a bit higher in Africa, at 2.61%. Industry adoption Browser Helper Objects are also used by many search engines companies and third parties for creating add-ons that access their services, such as search engine toolbars. Because of the use of COM, it is possible to embed web-browsing functionality
|
by Tim Berners-Lee for its limited support for SVG, which is promoted by W3C. Non-standard extensions Internet Explorer has introduced an array of proprietary extensions to many of the standards, including HTML, CSS, and the DOM. This has resulted in several web pages that appear broken in standards-compliant web browsers and has introduced the need for a "quirks mode" to allow for rendering improper elements meant for Internet Explorer in these other browsers. Internet Explorer has introduced several extensions to the DOM that have been adopted by other browsers. These include the inner HTML property, which provides access to the HTML string within an element, which was part of IE 5 and was standardized as part of HTML 5 roughly 15 years later after all other browsers implemented it for compatibility, the XMLHttpRequest object, which allows the sending of HTTP request and receiving of HTTP response, and may be used to perform AJAX, and the designMode attribute of the content Document object, which enables rich text editing of HTML documents. Some of these functionalities were not possible until the introduction of the W3C DOM methods. Its Ruby character extension to HTML is also accepted as a module in W3C XHTML 1.1, though it is not found in all versions of W3C HTML. Microsoft submitted several other features of IE for consideration by the W3C for standardization. These include the 'behavior' CSS property, which connects the HTML elements with JScript behaviors (known as HTML Components, HTC), HTML+TIME profile, which adds timing and media synchronization support to HTML documents (similar to the W3C XHTML+SMIL), and the VML vector graphics file format. However, all were rejected, at least in their original forms; VML was subsequently combined with PGML (proposed by Adobe and Sun), resulting in the W3C-approved SVG format, one of the few vector image formats being used on the web, which IE did not support until version 9. Other non-standard behaviors include: support for vertical text, but in a syntax different from W3C CSS3 candidate recommendation, support for a variety of image effects and page transitions, which are not found in W3C CSS, support for obfuscated script code, in particular JScript.Encode, as well as support for embedding EOT fonts in web pages. Favicon Support for favicons was first added in Internet Explorer 5. Internet Explorer supports favicons in PNG, static GIF and native Windows icon formats. In Windows Vista and later, Internet Explorer can display native Windows icons that have embedded PNG files. Usability and accessibility Internet Explorer makes use of the accessibility framework provided in Windows. Internet Explorer is also a user interface for FTP, with operations similar to Windows Explorer. Internet Explorer 5 and 6 had a side bar for web searches, enabling jumps through pages from results listed in the side bar. Pop-up blocking and tabbed browsing were added respectively in Internet Explorer 6 and Internet Explorer 7. Tabbed browsing can also be added to older versions by installing MSN Search Toolbar or Yahoo Toolbar. Cache Internet Explorer caches visited content in the Temporary Internet Files folder to allow quicker access (or offline access) to previously visited pages. The content is indexed in a database file, known as Index.dat. Multiple Index.dat files exist which index different content—visited content, web feeds, visited URLs, cookies, etc. Prior to IE7, clearing the cache used to clear the index but the files themselves were not reliably removed, posing a potential security and privacy risk. In IE7 and later, when the cache is cleared, the cache files are more reliably removed, and the index.dat file is overwritten with null bytes. Caching has been improved in IE9. Group Policy Internet Explorer is fully configurable using Group Policy. Administrators of Windows Server domains (for domain-joined computers) or the local computer can apply and enforce a variety of settings on computers that affect the user interface (such as disabling menu items and individual configuration options), as well as underlying security features such as downloading of files, zone configuration, per-site settings, ActiveX control behavior and others. Policy settings can be configured for each user and for each machine. Internet Explorer also supports Integrated Windows Authentication. Architecture Internet Explorer uses a componentized architecture built on the Component Object Model (COM) technology. It consists of several major components, each of which is contained in a separate dynamic-link library (DLL) and exposes a set of COM programming interfaces hosted by the Internet Explorer main executable, : is the protocol handler for HTTP, HTTPS, and FTP. It handles all network communication over these protocols. is responsible for MIME-type handling and download of web content, and provides a thread-safe wrapper around WinInet.dll and other protocol implementations. houses the MSHTML (Trident) browser engine introduced in Internet Explorer 4, which is responsible for displaying the pages on-screen and handling the Document Object Model (DOM) of the web pages. MSHTML.dll parses the HTML/CSS file and creates the internal DOM tree representation of it. It also exposes a set of APIs for runtime inspection and modification of the DOM tree. The DOM tree is further processed by a browser engine which then renders the internal representation on screen. contains the user interface and window of IE in Internet Explorer 7 and above. provides the navigation, local caching and history functionalities for the browser. is responsible for rendering the browser user interface such as menus and toolbars. Internet Explorer does not include any native scripting functionality. Rather, exposes an API that permits a programmer to develop a scripting environment to be plugged-in and to access the DOM tree. Internet Explorer 8 includes the bindings for the Active Scripting engine, which is a part of Microsoft Windows and allows any language implemented as an Active Scripting module to be used for client-side scripting. By default, only the JScript and VBScript modules are provided; third party implementations like ScreamingMonkey (for ECMAScript 4 support) can also be used. Microsoft also makes available the Microsoft Silverlight runtime that allows CLI languages, including DLR-based dynamic languages like IronPython and IronRuby, to be used for client-side scripting. Internet Explorer 8 introduced some major architectural changes, called loosely coupled IE (LCIE). LCIE separates the main window process (frame process) from the processes hosting the different web applications in different tabs (tab processes). A frame process can create multiple tab processes, each of which can be of a different integrity level, each tab process can host multiple web sites. The processes use asynchronous inter-process communication to synchronize themselves. Generally, there will be a single frame process for all web sites. In Windows Vista with protected mode turned on, however, opening privileged content (such as local HTML pages) will create a new tab process as it will not be constrained by protected mode. Extensibility Internet Explorer exposes a set of Component Object Model (COM) interfaces that allows add-ons to extend the functionality of the browser. Extensibility is divided into two types: Browser extensibility and content extensibility. Browser extensibility involves adding context menu entries, toolbars, menu items or Browser Helper Objects (BHO). BHOs are used to extend the feature set of the browser, whereas the other extensibility options are used to expose that feature in the user interface. Content extensibility adds support for non-native content formats. It allows Internet Explorer to handle new file formats and new protocols, e.g. WebM or SPDY. In addition, web pages can integrate widgets known as ActiveX controls which run on Windows only but have vast potentials to extend the content capabilities; Adobe Flash Player and Microsoft Silverlight are examples. Add-ons can be installed either locally, or directly by a web site. Since malicious add-ons can compromise the security of a system, Internet Explorer implements several safeguards. Internet Explorer 6 with Service Pack 2 and later feature an Add-on Manager for enabling or disabling individual add-ons, complemented by a "No Add-Ons" mode. Starting with Windows Vista, Internet Explorer and its BHOs run with restricted privileges and are isolated from the rest of the system. Internet Explorer 9 introduced a new component – Add-on Performance Advisor. Add-on Performance Advisor shows a notification when one or more of installed add-ons exceed a pre-set performance threshold. The notification appears in the Notification Bar when the user launches the browser. Windows 8 and Windows RT introduce a Metro-style version of Internet Explorer that is entirely sandboxed and does not run add-ons at all. In addition, Windows RT cannot download or install ActiveX controls at all; although existing ones bundled with Windows RT still run in the traditional version of Internet Explorer. Internet Explorer itself can be hosted by other applications via a set of COM interfaces. This can be used to embed the browser functionality inside a computer program or create Internet Explorer shells. Security Internet Explorer uses a zone-based security framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions. Internet Explorer 6 SP2 onwards uses the Attachment Execution Service of Microsoft Windows to mark executable files downloaded from the Internet as being potentially unsafe. Accessing files marked as such will prompt the user to make an explicit trust decision to execute the file, as executables originating from the Internet can be potentially unsafe. This helps in preventing the accidental installation of malware. Internet Explorer 7 introduced the phishing filter, which restricts access to phishing sites unless the user overrides the decision. With version 8, it also blocks access to sites known to host malware. Downloads are also checked to see if they are known to be malware-infected. In Windows Vista, Internet Explorer by default runs in what is called Protected Mode, where the privileges of the browser itself are severely restricted—it cannot make any system-wide changes. One can optionally turn this mode off, but this is not recommended. This also effectively restricts the privileges of any add-ons. As a result, even if the browser or any add-on is compromised, the damage the security breach can cause is limited. Patches and updates to the browser are released periodically and made available through the Windows Update service, as well as through Automatic Updates. Although security patches continue to be released for a range of platforms, most feature additions and security infrastructure improvements are only made available on operating systems that are in Microsoft's mainstream support phase. On December 16, 2008, Trend Micro recommended users switch to rival browsers until an emergency patch was released to fix a potential security risk which "could allow outside users to take control of a person's computer and steal their passwords.” Microsoft representatives countered this recommendation, claiming that "0.02% of internet sites" were affected by the flaw. A fix for the issue was released the following day with the Security Update for Internet Explorer KB960714, on Microsoft Windows Update. In 2010, Germany's Federal Office for Information Security, known by its German initials, BSI, advised "temporary use of alternative browsers" because of a
|
or phrase pertains to its having more than one meaning in the language to which the word belongs. vagueness – when borderline cases interfere with an interpretation. equivocation – the misleading use of a term with more than one meaning or sense (by glossing over which meaning is intended at
|
might be said to be imprecise because it exhibits one or more of the following features: ambiguity – when a word or phrase pertains to its having more than one meaning in the language to which the word belongs. vagueness – when borderline cases interfere with an interpretation. equivocation – the misleading use of a term with more than one meaning or sense (by glossing over which meaning is
|
It had a throughput of 1 million instructions per second. Intel second sourced this microprocessor to Fujitsu Limited around 1985. Description Features and performance The 80188 series was generally intended for embedded systems, as microcontrollers with external memory. Therefore, to reduce the number of chips required, it included features such as clock generator, interrupt controller, timers, wait state generator, DMA channels, and external chip select lines. While the N80188 was compatible with the 8087 numeric co-processor, the 80C188 was not. It did not have the ESC control codes integrated. The initial clock rate of the 80188 was 6 MHz, but due to more hardware available for the microcode to use, especially for address calculation,
|
and the one megabyte address range were unchanged, however. It had a throughput of 1 million instructions per second. Intel second sourced this microprocessor to Fujitsu Limited around 1985. Description Features and performance The 80188 series was generally intended for embedded systems, as microcontrollers with external memory. Therefore, to reduce the number of chips required, it included features such as clock generator, interrupt controller, timers, wait state generator, DMA channels, and external chip select lines. While the N80188 was compatible with the 8087 numeric co-processor, the 80C188 was not. It did not have the ESC control codes integrated. The initial clock rate of the 80188 was
|
is a software component that provides a uniform interface to the user of the data link service, usually the network layer. LLC may offer three types of services: Unacknowledged connectionless mode services (mandatory) Connection mode services (optional) Acknowledged connectionless mode services (optional) Conversely, the LLC uses the services of the media access control (MAC), which is dependent on the specific transmission medium (Ethernet, Token Ring, FDDI, 802.11, etc.). Using LLC is compulsory for all IEEE 802 networks with the exception of Ethernet. It is also used in Fiber Distributed Data Interface (FDDI) which is not part of the IEEE 802 family. The IEEE 802.2 sublayer adds some control information to the message created by the upper layer and passed to the LLC for transmission to another node on the same data link. The resulting packet is generally referred to as LLC protocol data unit (PDU) and the additional information added by the LLC sublayer is the LLC HEADER. The LLC Header consist of DSAP (Destination Service Access Point), SSAP (Source Service Access Point) and the Control field. The two 8-bit fields DSAP and SSAP allow multiplexing of various upper layer protocols above LLC. However, many protocols use the Subnetwork Access Protocol (SNAP) extension which allows using EtherType values to specify the protocol being transported atop IEEE 802.2. It also allows vendors to define their own protocol value spaces. The 8 or 16 bit HDLC-style Control field serves to distinguish communication mode, to specify a specific operation and to facilitate connection control and flow control (in connection mode) or acknowledgements (in acknowledged connectionless mode). Operational modes IEEE 802.2 provides two connectionless and one connection-oriented operational modes: Type 1 is an unacknowledged connectionless mode for a datagram service. It allows for sending frames to a single destination (point-to-point or unicast transfer), to multiple destinations on the same network (multicast), or to all stations of the network (broadcast). The use of multicasts and broadcasts reduce network traffic when the same information needs to be propagated to all stations of the network. However the Type 1 service provides no guarantees regarding the order of the received frames compared to the order in which they have been sent; the sender does not even get an acknowledgment that the frames have been received. Type 2 is a connection-oriented operational mode. Sequence numbering ensures that the frames received are guaranteed to be in the order they have been sent, and no frames are lost. Type 3 is an acknowledged connectionless service. It supports point-to-point communication only. Each device conforming the IEEE 802.2 standard must support service type 1. Each network node is assigned an LLC Class according to which service types it supports: LLC header Any 802.2 LLC PDU has the following format: When Subnetwork Access Protocol (SNAP) extension is used, it is located at the start of the Information field: The 802.2 header includes two eight-bit address fields, called service access points (SAP) or collectively LSAP in the OSI terminology: SSAP (Source SAP) is an 8-bit long field that represents the logical address of the network layer entity that has created the message. DSAP (Destination SAP) is an 8-bit long field that represents the logical addresses of the network layer entity intended to receive the message. LSAP values Although the LSAP fields are 8 bits long, the low-order bit
|
protocol being transported atop IEEE 802.2. It also allows vendors to define their own protocol value spaces. The 8 or 16 bit HDLC-style Control field serves to distinguish communication mode, to specify a specific operation and to facilitate connection control and flow control (in connection mode) or acknowledgements (in acknowledged connectionless mode). Operational modes IEEE 802.2 provides two connectionless and one connection-oriented operational modes: Type 1 is an unacknowledged connectionless mode for a datagram service. It allows for sending frames to a single destination (point-to-point or unicast transfer), to multiple destinations on the same network (multicast), or to all stations of the network (broadcast). The use of multicasts and broadcasts reduce network traffic when the same information needs to be propagated to all stations of the network. However the Type 1 service provides no guarantees regarding the order of the received frames compared to the order in which they have been sent; the sender does not even get an acknowledgment that the frames have been received. Type 2 is a connection-oriented operational mode. Sequence numbering ensures that the frames received are guaranteed to be in the order they have been sent, and no frames are lost. Type 3 is an acknowledged connectionless service. It supports point-to-point communication only. Each device conforming the IEEE 802.2 standard must support service type 1. Each network node is assigned an LLC Class according to which service types it supports: LLC header Any 802.2 LLC PDU has the following format: When Subnetwork Access Protocol (SNAP) extension is used, it is located at the start of the Information field: The 802.2 header includes two eight-bit address fields, called service access points (SAP) or collectively LSAP in the OSI terminology: SSAP (Source SAP) is an 8-bit long field that represents the logical address of the network layer entity that has created the message. DSAP (Destination SAP) is an 8-bit long field that represents the logical addresses of the network layer entity intended to receive the message. LSAP values Although the LSAP fields are 8 bits long, the low-order bit is reserved for special purposes, leaving only 128 values available for most purposes. The low-order bit of the DSAP indicates whether it contains an individual or a group address: if the low-order bit is 0, the remaining 7 bits of the DSAP specify an individual address, which refers to a single local service access point (LSAP) to which the packet should be delivered. and if the low-order bit is 1, the remaining 7 bits of the DSAP specify a group address, which refers to a group
|
insects, the tracheae exchange gas through the body wall directly, in the form of a gill, or function essentially as normal, via a plastron. Note that despite being internal, the tracheae of arthropods are shed during moulting (ecdysis). Reproduction Like vertebrates, most invertebrates reproduce at least partly through sexual reproduction. They produce specialized reproductive cells that undergo meiosis to produce smaller, motile spermatozoa or larger, non-motile ova. These fuse to form zygotes, which develop into new individuals. Others are capable of asexual reproduction, or sometimes, both methods of reproduction. Social interaction Social behavior is widespread in invertebrates, including cockroaches, termites, aphids, thrips, ants, bees, Passalidae, Acari, spiders, and more. Social interaction is particularly salient in eusocial species but applies to other invertebrates as well. Insects recognize information transmitted by other insects. Phyla The term invertebrates covers several phyla. One of these are the sponges (Porifera). They were long thought to have diverged from other animals early. They lack the complex organization found in most other phyla. Their cells are differentiated, but in most cases not organized into distinct tissues. Sponges typically feed by drawing in water through pores. Some speculate that sponges are not so primitive, but may instead be secondarily simplified. The Ctenophora and the Cnidaria, which includes sea anemones, corals, and jellyfish, are radially symmetric and have digestive chambers with a single opening, which serves as both the mouth and the anus. Both have distinct tissues, but they are not organized into organs. There are only two main germ layers, the ectoderm and endoderm, with only scattered cells between them. As such, they are sometimes called diploblastic. The Echinodermata are radially symmetric and exclusively marine, including starfish (Asteroidea), sea urchins, (Echinoidea), brittle stars (Ophiuroidea), sea cucumbers (Holothuroidea) and feather stars (Crinoidea). The largest animal phylum is also included within invertebrates: the Arthropoda, including insects, spiders, crabs, and their kin. All these organisms have a body divided into repeating segments, typically with paired appendages. In addition, they possess a hardened exoskeleton that is periodically shed during growth. Two smaller phyla, the Onychophora and Tardigrada, are close relatives of the arthropods and share these traits. The Nematoda or roundworms, are perhaps the second largest animal phylum, and are also invertebrates. Roundworms are typically microscopic, and occur in nearly every environment where there is water. A number are important parasites. Smaller phyla related to them are the Kinorhyncha, Priapulida, and Loricifera. These groups have a reduced coelom, called a pseudocoelom. Other invertebrates include the Nemertea or ribbon worms, and the Sipuncula. Another phylum is Platyhelminthes, the flatworms. These were originally considered primitive, but it now appears they developed from more complex ancestors. Flatworms are acoelomates, lacking a body cavity, as are their closest relatives, the microscopic Gastrotricha. The Rotifera or rotifers, are common in aqueous environments. Invertebrates also include the Acanthocephala or spiny-headed worms, the Gnathostomulida, Micrognathozoa, and the Cycliophora. Also included are two of the most successful animal phyla, the Mollusca and Annelida. The former, which is the second-largest animal phylum by number of described species, includes animals such as snails, clams, and squids, and the latter comprises the segmented worms, such as earthworms and leeches. These two groups have long been considered close relatives because of the common presence of trochophore larvae, but the annelids were considered closer to the arthropods because they are both segmented. Now, this is generally considered convergent evolution, owing to many morphological and genetic differences between the two phyla. Among lesser phyla of invertebrates are the Hemichordata, or acorn worms, and the Chaetognatha, or arrow worms. Other phyla include Acoelomorpha, Brachiopoda, Bryozoa, Entoprocta, Phoronida, and Xenoturbellida. Classification of invertebrates Invertebrates can be classified into several main categories, some of which are taxonomically obsolescent or debatable, but still used as terms of convenience. Each however appears in its own article at the following links. Sponges (Porifera) Comb jellies (Ctenophora) Medusozoans and corals (Cnidaria) Acoels (Xenacoelomorpha) Flatworms (Platyhelminthes) Bristleworms, earthworms and leeches (Annelida) Insects, springtails, crustaceans, myriapods, chelicerates (Arthropoda) Chitons, snails, slugs, bivalves, tusk shells, cephalopods (Mollusca) Roundworms or threadworms (Nematoda) Rotifers (Rotifera) Tardigrades (Tardigrada) Scalidophores (Scalidophora) Lophophorates (Lophophorata) Velvet worms (Onychophora) Arrow worms (Chaetognatha) Gordian worms or horsehair worms (Nematomorpha) Ribbon worms (Nemertea)PlacozoaLoriciferaStarfishes, sea urchins, sea cucumbers, sea lilies and brittle stars (Echinodermata) Acorn worms, cephalodiscids and graptolites (Hemichordata) Lancelets (Amphioxiformes) Salps, pyrosomes, doliolids, larvaceans and sea squirts (Tunicata) History The earliest animal fossils appear to be those of invertebrates. 665-million-year-old fossils in the Trezona Formation at Trezona Bore, West Central Flinders, South Australia have been interpreted as being early sponges. Some paleontologists suggest that animals appeared much earlier, possibly as early as 1 billion years ago though they probably became multicellular in the Tonian. Trace fossils such as tracks and burrows found in the late Neoproterozoic era indicate the presence of triploblastic worms, roughly as large (about 5 mm wide) and complex as earthworms. Around 453 MYA, animals began diversifying, and many of the important groups of invertebrates diverged from one another. Fossils of invertebrates are found in various types of sediment from the Phanerozoic. Fossils of invertebrates are commonly used in stratigraphy. Classification Carl Linnaeus divided these animals into only two groups, the Insecta and the now-obsolete Vermes (worms). Jean-Baptiste Lamarck, who was appointed to the position of "Curator of Insecta and Vermes" at the Muséum National d'Histoire Naturelle in 1793, both coined the term "invertebrate" to describe such animals and divided the original two groups into ten, by splitting Arachnida and Crustacea from the Linnean Insecta, and Mollusca, Annelida, Cirripedia, Radiata, Coelenterata and Infusoria from the Linnean Vermes. They are now classified into over 30 phyla, from simple organisms such as sea sponges and flatworms to complex animals such as arthropods and molluscs. Significance of the group Invertebrates are animals without a vertebral column. This has led to the conclusion that invertebrates are a group that deviates from the normal, vertebrates. This has been said to be because researchers in the past, such as Lamarck, viewed vertebrates as a "standard": in Lamarck's theory of evolution, he believed that characteristics acquired through the evolutionary process involved not only survival, but also progression toward a "higher form", to which humans and vertebrates were closer than invertebrates were. Although goal-directed evolution has
|
not generally carry oxygen in their haemolymph. A tracheal tube may contain ridge-like circumferential rings of taenidia in various geometries such as loops or helices. In the head, thorax, or abdomen, tracheae may also be connected to air sacs. Many insects, such as grasshoppers and bees, which actively pump the air sacs in their abdomen, are able to control the flow of air through their body. In some aquatic insects, the tracheae exchange gas through the body wall directly, in the form of a gill, or function essentially as normal, via a plastron. Note that despite being internal, the tracheae of arthropods are shed during moulting (ecdysis). Reproduction Like vertebrates, most invertebrates reproduce at least partly through sexual reproduction. They produce specialized reproductive cells that undergo meiosis to produce smaller, motile spermatozoa or larger, non-motile ova. These fuse to form zygotes, which develop into new individuals. Others are capable of asexual reproduction, or sometimes, both methods of reproduction. Social interaction Social behavior is widespread in invertebrates, including cockroaches, termites, aphids, thrips, ants, bees, Passalidae, Acari, spiders, and more. Social interaction is particularly salient in eusocial species but applies to other invertebrates as well. Insects recognize information transmitted by other insects. Phyla The term invertebrates covers several phyla. One of these are the sponges (Porifera). They were long thought to have diverged from other animals early. They lack the complex organization found in most other phyla. Their cells are differentiated, but in most cases not organized into distinct tissues. Sponges typically feed by drawing in water through pores. Some speculate that sponges are not so primitive, but may instead be secondarily simplified. The Ctenophora and the Cnidaria, which includes sea anemones, corals, and jellyfish, are radially symmetric and have digestive chambers with a single opening, which serves as both the mouth and the anus. Both have distinct tissues, but they are not organized into organs. There are only two main germ layers, the ectoderm and endoderm, with only scattered cells between them. As such, they are sometimes called diploblastic. The Echinodermata are radially symmetric and exclusively marine, including starfish (Asteroidea), sea urchins, (Echinoidea), brittle stars (Ophiuroidea), sea cucumbers (Holothuroidea) and feather stars (Crinoidea). The largest animal phylum is also included within invertebrates: the Arthropoda, including insects, spiders, crabs, and their kin. All these organisms have a body divided into repeating segments, typically with paired appendages. In addition, they possess a hardened exoskeleton that is periodically shed during growth. Two smaller phyla, the Onychophora and Tardigrada, are close relatives of the arthropods and share these traits. The Nematoda or roundworms, are perhaps the second largest animal phylum, and are also invertebrates. Roundworms are typically microscopic, and occur in nearly every environment where there is water. A number are important parasites. Smaller phyla related to them are the Kinorhyncha, Priapulida, and Loricifera. These groups have a reduced coelom, called a pseudocoelom. Other invertebrates include the Nemertea or ribbon worms, and the Sipuncula. Another phylum is Platyhelminthes, the flatworms. These were originally considered primitive, but it now appears they developed from more complex ancestors. Flatworms are acoelomates, lacking a body cavity, as are their closest relatives, the microscopic Gastrotricha. The Rotifera or rotifers, are common in aqueous environments. Invertebrates also include the Acanthocephala or spiny-headed worms, the Gnathostomulida, Micrognathozoa, and the Cycliophora. Also included are two of the most successful animal phyla, the Mollusca and Annelida. The former, which is the second-largest animal phylum by number of described species, includes animals such as snails, clams, and squids, and the latter comprises the segmented worms, such as earthworms and leeches. These two groups have long been considered close relatives because of the common presence of trochophore larvae, but the annelids were considered closer to the arthropods because they are both segmented. Now, this is generally considered convergent evolution, owing to many morphological and genetic differences between the two phyla. Among lesser phyla of invertebrates are the Hemichordata, or acorn worms, and the Chaetognatha, or arrow worms. Other phyla include Acoelomorpha, Brachiopoda, Bryozoa, Entoprocta, Phoronida, and Xenoturbellida. Classification of invertebrates Invertebrates can be classified into several main categories, some of which are taxonomically obsolescent or debatable, but still used as terms of convenience. Each however appears in its own article at the following links. Sponges (Porifera) Comb jellies (Ctenophora) Medusozoans and corals (Cnidaria) Acoels (Xenacoelomorpha) Flatworms (Platyhelminthes) Bristleworms, earthworms and leeches (Annelida) Insects, springtails, crustaceans, myriapods, chelicerates (Arthropoda) Chitons, snails, slugs, bivalves, tusk shells, cephalopods (Mollusca) Roundworms or threadworms (Nematoda) Rotifers (Rotifera) Tardigrades (Tardigrada) Scalidophores (Scalidophora) Lophophorates (Lophophorata) Velvet worms (Onychophora) Arrow worms (Chaetognatha) Gordian worms or horsehair worms (Nematomorpha) Ribbon worms (Nemertea)PlacozoaLoriciferaStarfishes, sea urchins, sea cucumbers, sea lilies and brittle stars (Echinodermata) Acorn worms, cephalodiscids and graptolites (Hemichordata) Lancelets (Amphioxiformes) Salps, pyrosomes, doliolids, larvaceans and sea squirts (Tunicata) History The earliest animal fossils appear to be those of invertebrates. 665-million-year-old fossils in the Trezona Formation at Trezona Bore, West Central Flinders, South Australia have been interpreted as being early sponges. Some paleontologists suggest that animals appeared much earlier, possibly as early as 1 billion years ago though they probably became multicellular in the Tonian. Trace fossils such as tracks and burrows found in the late Neoproterozoic era indicate the presence of triploblastic worms, roughly as large (about 5 mm wide) and complex as earthworms. Around 453 MYA, animals began diversifying, and many of the important groups of invertebrates diverged from one another. Fossils of invertebrates are found in various types of sediment from the Phanerozoic. Fossils of invertebrates are commonly used in stratigraphy. Classification Carl Linnaeus divided these animals into only two groups, the Insecta and the now-obsolete Vermes (worms). Jean-Baptiste Lamarck, who was appointed to the position of "Curator of Insecta and Vermes" at the Muséum National d'Histoire Naturelle in 1793, both coined the term "invertebrate" to describe such animals and divided the original two groups into ten, by splitting Arachnida and Crustacea from the Linnean Insecta, and Mollusca, Annelida, Cirripedia, Radiata, Coelenterata and Infusoria from the Linnean Vermes. They are now classified into over 30 phyla, from simple organisms such as sea sponges and flatworms to complex animals such as arthropods and molluscs. Significance of the group Invertebrates are animals without a vertebral column. This has led to the conclusion that invertebrates are a group that deviates from the normal, vertebrates. This has been said to be because researchers in the past, such as Lamarck, viewed vertebrates as a "standard": in Lamarck's theory of evolution, he believed that characteristics acquired through the evolutionary process involved not only survival, but also progression toward a "higher form", to which humans and vertebrates were closer than invertebrates were. Although goal-directed evolution has been abandoned, the distinction of invertebrates and vertebrates persists to this day, even though the grouping has been noted to be "hardly natural or even very sharp." Another reason cited for this continued distinction is that Lamarck created a precedent through his classifications which is now difficult to escape from. It is also possible that some humans believe that, they themselves being vertebrates, the group deserves more attention than invertebrates. In any event, in the 1968 edition of Invertebrate Zoology, it is noted that "division of the Animal Kingdom into vertebrates and invertebrates is artificial and reflects human bias in favor of man's own relatives." The book also points out that the group lumps a vast number of species together, so that
|
When he was eighteen, he opened an elementary school in his native parish. In 1833 he entered the household of Hans Conrad Thoresen, the husband of the eminent writer Magdalene Thoresen, in Herøy (then Herø), and there he picked up the elements of Latin. Gradually, and by dint of infinite patience and concentration, the young peasant mastered many languages, and began the scientific study of their structure. Ivar single-handedly created a new language for Norway to become the “literary” language. Career About 1846 he had freed himself from all the burden of manual labour, and could occupy his thoughts with the dialect of his native district, Sunnmøre; his first publication was a small collection of folk songs in the Sunnmøre dialect (1843). His remarkable abilities now attracted general attention, and he was helped to continue his studies undisturbed. His Grammar of the Norwegian Dialects (, 1848) was the result of much labour, and of journeys taken to every part of the country. Aasen's famous Dictionary of the Norwegian Dialects () appeared in its original form in 1850, and from this publication dates all the wide cultivation of the popular language in Norwegian, since Aasen really did no less than construct, out of the different materials at his disposal, a popular language or definite folke-maal (people's language) for Norway. By 1853, he had created the norm for utilizing his new language, which he called Landsmaal, meaning country language. With certain modifications, the most important of which were introduced later by Aasen himself, but also through a latter policy aiming to merge this Norwegian language with Dano-Norwegian, this language has become Nynorsk ("New Norwegian"), the second of Norway's two official languages (the other being Bokmål, the Dano-Norwegian descendant of the Danish language used
|
dialect of his native district, Sunnmøre; his first publication was a small collection of folk songs in the Sunnmøre dialect (1843). His remarkable abilities now attracted general attention, and he was helped to continue his studies undisturbed. His Grammar of the Norwegian Dialects (, 1848) was the result of much labour, and of journeys taken to every part of the country. Aasen's famous Dictionary of the Norwegian Dialects () appeared in its original form in 1850, and from this publication dates all the wide cultivation of the popular language in Norwegian, since Aasen really did no less than construct, out of the different materials at his disposal, a popular language or definite folke-maal (people's language) for Norway. By 1853, he had created the norm for utilizing his new language, which he called Landsmaal, meaning country language. With certain modifications, the most important of which were introduced later by Aasen himself, but also through a latter policy aiming to merge this Norwegian language with Dano-Norwegian, this language has become Nynorsk ("New Norwegian"), the second of Norway's two official languages (the other being Bokmål, the Dano-Norwegian descendant of the Danish language used in Norway in Aasen's time). An unofficial variety of Norwegian more close to Aasen's language is still found in Høgnorsk ("High Norwegian"). Today, some consider Nynorsk on equal footing with Bokmål, as Bokmål tends to be used more in radio and television and most newspapers, whereas New Norse (Nynorsk) is used equally in government work as well as approximately 17% of schools. Although it is not as common as its brother language, it needs to be looked upon as a viable language, as a large minority of Norwegians use it as their primary language including many scholars and authors. New Norse is both a written and spoken language. Aasen composed poems and plays in the composite dialect to show how it
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.